Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM 000-420 Exam -

Free 000-420 Sample Questions:

1. As part of a maintenance team for an InfoSphere MDM Server implementation, you are investigating the "EndDate must be after StartDate" error. This error is generated multiple times when uploading large delta requests containing multiple objects of different types.
Which action would help you to quickly detect the object causing this error?
A. Check all of the objects in the request message for discrepancy in the dates.
B. Run the transaction causing the error in debug mode.
C. Check the error response for component details to identify the correct object type.
D. Change the log level to a higher level.
Answer: C

2. You have a business requirement for an insurance domain. A party needs to declare existing medical conditions. A party can have multiple ailments. The attributes of an ailment depend upon the nature of ailment and there is no search requirement on ailment attributes. Additional attributes of an ailment are frequently added.
What should you do?
A. Create a data extension to the party.
B. Retain in the insurance system.
C. Create appropriate party demographic specs.
D. Create data addition.
Answer: C

3. A granular composite Java proxy,, is created to process (search, inquiry, and persist) partyAddress records in InfoSphere MDM Server application.
Which two steps are required to implement (Choose two.)
A.Extend DWLTxnBP and create a public method execute() to overwrite the com.dwl.base.requesthandler.DWLTxnBP.execute() method.
B. Implement the IBusProxy interface and add business logic in the execute() method.
C. Invoke the appropriate method in to complete the transaction.
D. Invoke the super.execute() method to delegate transactions to the appropriate MDM controller to complete the transaction.
Answer: AD

4. A customer wants to implement a new search transaction (searchbyZipCode) at the controller component level. This is implemented by associating a finder class to this transaction. This finder class contains the business logic to search for all party details that match the zip code supplied in the input request by a direct SQL statement call.
What are two steps necessary to implement this customization? (Choose two.)
A. Assign a name for this transaction, e.g., searchByZipCode -- modify the OOTB request XML to reflect the required structure for input for the search parameter by changing the appropriate search transaction.
B. Ensure that the MDM extension framework is disabled (enabled = false).
C. Register the transaction name searchByZipCode?in the CDBUSINESSTXTP table.
D. Register the new transaction name searchByZipCode?within the files.
Answer: CD

5. Which two reasons would justify the execution of the Evergreen application? (Choose two.)
A. The solution has been upgraded to the new version of InfoSphere MDM Server.
B. New Rules of Visibility have been deployed.
C. Suspect processing is enabled in an operational environment after the initial load of data with suspect processing is bypassed.
D. Party matching rules have changed.
Answer: CD

6. Where in the InfoSphere MDM Server Workbench can you set the database schema name?
A. in an MDM Module Project "module.mdmxmi" file
B. in an MDM Module Project "" file
C. in the MDM Application Model "application.mdmxmi" file
D. within the "resources" folder in an MDM Module Project
Answer: C

7. Which capability of Rational Software Architect must be enabled before developing extensions or additions?
A. Java Persistence API Transformation
B. Enterprise Java Developer
C. J2EE Developer
D. Web Service Developer
Answer: C

8. You are installing a standalone development environment on a workstation PC with both the database and application server running on the PC.
Which statement is true regarding the installation and configuration of this environment?
A. The database tables must be setup manually by running the provided SQL scripts.
B. A database and database user need to exist, but the InfoSphere MDM Server Workbench tooling can setup the necessary tables as part of an automated process.
C. A database server needs to be installed, but the InfoSphere MDM Server Workbench tooling will automatically setup everything, including creation of a database user, as part of an automated process.
D. The application server needs to be manually configured with the appropriate data sources which the InfoSphere MDM Server Workbench will then use to setup the database as part of an automated process.
Answer: B

9. You are setting up a new workstation using WebSphere Application Server 6.1.
What are two manual steps that must be completed when setting up InfoSphere MDM Server on the workstation PC? (Choose two.)
A. Change the default JRE to the WebSphere Application Server JRE.
B. Change the default JRE to the Eclipse JDK.
C. Set the compiler level to 1.5.
D. Add BusinessServices.jar and DWLCommonService s.jar to the Java build path as User Libraries.
Answer: AC

10. Click the Exhibit button.
<soapenv:Envelope xmlns:soapenv=""
<faultstring> WSEC5048E: One of "SOAP Header "
elements required.</faultstring>
<detail encodingStyle="" />
You have set up an InfoSphere MDM Server development environment using a test WebSphere Application Server and locally installed DB2. The WebSphere Application Server security is not enabled.
You run the "addPerson" Web service and receive the response shown in the exhibit.
Which step is required to allow the Web service request to succeed?
A. Set the configuration setting /IBM/DWLCommonServices/Security/enabled to false.
B. Redeploy the party Web service module with security disabled.
C. Run Prepare for Deployment on the MDM application.
D. Use the correct user ID and password in the request.
Answer: B

11. You have set up an InfoSphere MDM Server development environment using a test WebSphere Application Server, locally installed DB2, and have developed a new data extension. After deploying and testing the data extension you need to add some additional attributes to it. You modify the data extension model and re-generate the code.
Before running the generated database setup scripts to deploy the changed database definitions, which step is required?
A. Run the generated database rollback scripts.
B. Run the Configuration and Management component.
C. Run the Development Environment Setup wizard.
D. Restart the server.
Answer: A

12. You have set up an InfoSphere MDM Server development environment using a test WebSphere Application Server, locally installed DB2, and developed a new data ext ension.
Which three steps are required when deploying the modified MDM application to the WebSphere test server? (Choose three.)
A. Publish changes in the workspace to the WebSphere Application Server.
B. Update properties.jar and DWLSchemas.jar in the MD M application project.
C. Run the generated SQL scripts to set up the database.
D. Merge the generated properties and XSD file snippets into the files in the CustomerResources project.
E. Deploy the configuration to the WebSphere Application Server.
Answer: ACD

13. What are three behaviors of InfoSphere MDM Server that the Configuration and Management
component controls? (Choose three.)
A. enabling and disabling notifications
B. configuring external validations
C. configuring performance tracking
D. enabling and disabling suspect duplicate processing
E. defining custom error messages
Answer: ACD

14. When configuring the Configuration and Management component of InfoSphere MDM Server for J2EE, what is the correct value for the "NAME" column of the APPDEPLOY MENT table?
A. the installation directory of the application
B. the name of the application as known by the application server and specified in the file
C. the name of the cluster node on which the instance runs
D. the URI indicating the JMX remote connector server through which incoming connections can be made
Answer: B

15. Which two subcomponents make up the Configuration and Management component of InfoSphere MDM Server? (Choose two.)
A. A separate set of database tables that may reside on a separate database.
B. A set of database tables that must reside on the same database as InfoSphere MDM Server.
C. A configuration management console that runs as part of the InfoSphere MDM Server runtime.
D. A configuration management agent that runs as a separate process from the InfoSphere MDM Server runtime.
Answer: AD

16. You are configuring InfoSphere MDM Server for a financial institution with a large number of customers.
Which two statements are correct regarding performance of the InfoSphere MDM Server application? (Choose two.)
A. Turning on the suspect Duplicate Processing feature does not have any impact on the performance.
B. The Transaction Audit Information Log will not have any impact on the performance.
C. Smart inquiries help in minimizing the performance impact.
D. The summary data indicators feature avoids queries on a per transaction basis thus helping improve performance.
Answer: CD

17. Which two statements are true regarding tracking InfoSphere MDM Server performance? (Choose two.)
A. InfoSphere MDM Server provides the ability to capture performance statistics for the transactions.
B. Performance tracking is a configurable option in InfoSphere MDM Server.
C. When performance tracking is configured to Level 1, you will obtain maximum details of all the components.
D. You can use Log4j to redirect MDM performance log to a log file.
Answer: AB

18. Your client has several external rules used in their solution. The client is experiencing performance problems. You are trying to determine which external rule is causing the performance bottleneck.
Which two configurations are needed to track the performance using the performance tracker component of InfoSphere MDM Server. (Choose two.)
A. Set the /IBM/DWLCommonServices/PerformanceTracking/ExternalBusinessRules/enabled configuration property to true.
B. Set the /IBM/DWLCommonServices/PerformanceTracking/ExternalBusinessRules/enabled configuration property to false.
C. Set tracking level as "-1" to indicate that you are enabling custom performance tracking.
D. The default level performance tracking level 0 will be enough to track the performance effectively.
Answer: AC

19. What are three ways to determine which InfoSphere MDM Server components are causing performance bottlenecks? (Choose three.)
A. Capture performance data using the logging component of InfoSphere MDM Server.
B. Use Tivoli Performance Viewer of WebSphere Application Server to summarize reports of performance statistics.
C. Capture the data stored in the Transaction Audit Information Log of InfoSphere MDM Server.
D. Use ARM4.0 implementation to measure the availability and performance of transactions.
E. Review the history tables data.
Answer: ABD

20. As part of an InfoSphere MDM Server application maintenance team, you ar e analyzing the numerous warnings that appear in the InfoSphere MDM Server log file.
What will help you to quickly detect the component producing a particular warning message?
A. Set the logging to the finest level.
B. The sequence of execution flow should logically point to the component.
C. Unique message identifiers used by InfoSphere MDM Server.
D. Adequate experience in InfoSphere MDM Server is required.
Answer: C

© 2014, All Rights Reserved