IBM C9530-001 Exam Practice Questions (P. 2)
- Full Access (122 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
A message flow reads messages from a queue Database Node fails to insert data in the table. If no error handling and rollback is implemented in the message flow, which of the following statements is true?
- AThe transaction is by default rolled back in a globally coordinated manner.
- BThe message fails the Input Node and cannot be propagated out of the Out terminal. The transaction is rolled back.
- CThe error is caught by the MQ Input Node and if the Catch terminal is not connected the message is rolled back into the queue.
- DThe message flow rolls back the database transaction but not the MQ transaction unless a XA coordinated transaction is configured.
Correct Answer:
C
The MQInput node takes certain actions when handling errors with persistent and transactional messages. The node attempts retry processing when a transactional message is rolled back to the input queue. Non-transactional messages are not rolled back to the input queue when an exception occurs.
If the MQInput node has successfully propagated the message to the out terminal and an exception is thrown in the out flow, the message is returned to the
MQInput node:
✑ If you have not connected the Catch terminal, the message is rolled back to the input queue. The MQInput node writes the error to the local error log and invokes the retry logic, described in Handling retry processing.
✑ If you have connected the Catch terminal, you are responsible for handling the error in the flow connected to the Catch terminal. The broker creates a new exception list to represent the error and this list is propagated to the Catch terminal as part of the message tree, but neither the MQInput node nor the broker provide any further failure processing.
References:
https://www.ibm.com/support/knowledgecenter/SSMKHH_9.0.0/com.ibm.etools.mft.doc/ac00414_.htm
C
The MQInput node takes certain actions when handling errors with persistent and transactional messages. The node attempts retry processing when a transactional message is rolled back to the input queue. Non-transactional messages are not rolled back to the input queue when an exception occurs.
If the MQInput node has successfully propagated the message to the out terminal and an exception is thrown in the out flow, the message is returned to the
MQInput node:
✑ If you have not connected the Catch terminal, the message is rolled back to the input queue. The MQInput node writes the error to the local error log and invokes the retry logic, described in Handling retry processing.
✑ If you have connected the Catch terminal, you are responsible for handling the error in the flow connected to the Catch terminal. The broker creates a new exception list to represent the error and this list is propagated to the Catch terminal as part of the message tree, but neither the MQInput node nor the broker provide any further failure processing.
References:
https://www.ibm.com/support/knowledgecenter/SSMKHH_9.0.0/com.ibm.etools.mft.doc/ac00414_.htm
send
light_mode
delete
Question #7
A developer creates a message flow that uses a DecisionService Node. Which command must the developer use before deploying the message flow?
- Amqsicvp
- Bmqsimode
- Cmqsichangebroker
- Dmqsichangeproperties
Correct Answer:
B
Before you deploy message flows that contain a DecisionService node, you must enable the mode extension by using the mqsimode command: mqsimode -x DecisionServices
Incorrect Answers:
A: The mqsicvp command is run automatically when you start a broker by using the mqsistart command. The command checks that the broker environment is set up correctly. This checking has been enhanced to verify that the ODBC environment is configured correctly on Linux and UNIX systems.
References:
https://www.ibm.com/support/knowledgecenter/en/SSMKHH_10.0.0/com.ibm.etools.mft.doc/bc23793_.htm
B
Before you deploy message flows that contain a DecisionService node, you must enable the mode extension by using the mqsimode command: mqsimode -x DecisionServices
Incorrect Answers:
A: The mqsicvp command is run automatically when you start a broker by using the mqsistart command. The command checks that the broker environment is set up correctly. This checking has been enhanced to verify that the ODBC environment is configured correctly on Linux and UNIX systems.
References:
https://www.ibm.com/support/knowledgecenter/en/SSMKHH_10.0.0/com.ibm.etools.mft.doc/bc23793_.htm
send
light_mode
delete
Question #8
In the User Trace output shows the following message:
2016-04-12 16:17:18.242605 5344 UserTrace BIP2539I: Node
'Reply.MapToRequestor':
Evaluating expression ''I + 1''
at
('MapToRequestor.CopyMessageHeaders', '6.14'). This resolved to ''1 + 1''. The result was ''2''.
What does 6.14 indicate here?
2016-04-12 16:17:18.242605 5344 UserTrace BIP2539I: Node
'Reply.MapToRequestor':
Evaluating expression ''I + 1''
at
('MapToRequestor.CopyMessageHeaders', '6.14'). This resolved to ''1 + 1''. The result was ''2''.
What does 6.14 indicate here?
- ALine 6, Column 14 in the CopyMessageHeaders node.
- BLine 14, Column 6 in CopyMessageHeaders node.
- CColumn 6, line 14 in the CopyMessageHeaders function of MapToRequestor.
- DLine 6, Column 14 in the CopyMessageHeaders function of MapToRequestor.
Correct Answer:
D
References such as '6.14' apply to the row and column number within a function that specify the location of the command that is being executed; in this case, row
6, column 14.
Example:
2005-07-12 16:17:18.242605 5344 UserTrace BIP2539I: Node 'Reply.MapToRequestor':
Evaluating expression ''I'' at -
('.MapToRequestor.CopyMessageHeaders',
'6.12'). This resolved to ''I''. The
result was ''1''.
References:
https://www.ibm.com/support/knowledgecenter/en/SSMKHH_9.0.0/com.ibm.etools.mft.doc/au14320_.htm
D
References such as '6.14' apply to the row and column number within a function that specify the location of the command that is being executed; in this case, row
6, column 14.
Example:
2005-07-12 16:17:18.242605 5344 UserTrace BIP2539I: Node 'Reply.MapToRequestor':
Evaluating expression ''I'' at -
('.MapToRequestor.CopyMessageHeaders',
'6.12'). This resolved to ''I''. The
result was ''1''.
References:
https://www.ibm.com/support/knowledgecenter/en/SSMKHH_9.0.0/com.ibm.etools.mft.doc/au14320_.htm
send
light_mode
delete
Question #9
Which protocol for security is not supported by IBM Integration Bus?
- AOAuth 2.0
- BSAML assertion
- CX.509 certificate
- DUser Id + Password
Correct Answer:
A
Setting up message flow security
Set up security on a message flow to control access based on the identity of a message passing through the message flow.
You can configure the broker to perform end-to-end processing of an identity carried in a message through a message flow. Administrators can configure security at message flow level, controlling access based on the identity flowed in a message. This security mechanism is independent of both the transport and the message format.
✑ To work with an identity, you must configure the policy sets and bindings for the relevant capabilities:
✑ To work with a SAML assertion, configure the policy sets and bindings for SAML token capabilities.
✑ To work with an X.509 Certificate identity, configure the policy sets and bindings for X.509 certificate token capabilities.
✑ To work with a Username and Password identity, configure the policy sets and bindings for Username token capabilities.
✑ To work with an LTPA token, configure the policy sets and bindings for LTPA token capabilities.
✑ To work with a Kerberos ticket, configure the policy sets and bindings for Kerberos token capabilities.
References:
https://www.ibm.com/support/knowledgecenter/en/SSMKHH_9.0.0/com.ibm.etools.mft.doc/ap04170_.htm
A
Setting up message flow security
Set up security on a message flow to control access based on the identity of a message passing through the message flow.
You can configure the broker to perform end-to-end processing of an identity carried in a message through a message flow. Administrators can configure security at message flow level, controlling access based on the identity flowed in a message. This security mechanism is independent of both the transport and the message format.
✑ To work with an identity, you must configure the policy sets and bindings for the relevant capabilities:
✑ To work with a SAML assertion, configure the policy sets and bindings for SAML token capabilities.
✑ To work with an X.509 Certificate identity, configure the policy sets and bindings for X.509 certificate token capabilities.
✑ To work with a Username and Password identity, configure the policy sets and bindings for Username token capabilities.
✑ To work with an LTPA token, configure the policy sets and bindings for LTPA token capabilities.
✑ To work with a Kerberos ticket, configure the policy sets and bindings for Kerberos token capabilities.
References:
https://www.ibm.com/support/knowledgecenter/en/SSMKHH_9.0.0/com.ibm.etools.mft.doc/ap04170_.htm
send
light_mode
delete
Question #10
A developer is trying to investigate slow processing times with a specific message flow. What tool would be used to investigate this?
- AService trace
- BDebug mode
- CResource Statistics
- DAccounting and Statistics
Correct Answer:
C
You can use the message flow statistics data to help you identify aspects of a message flow that might be reducing the performance of the flow, and to help you understand how you can optimize it.
If you detect that system resources are under pressure, you can examine the statistics collected by the broker to assess whether the cause of the concern is the use of those resources by processes in IBM Integration Bus.
References:
https://www.ibm.com/support/knowledgecenter/en/SSMKHH_9.0.0/com.ibm.etools.mft.doc/bj43310_.htm
C
You can use the message flow statistics data to help you identify aspects of a message flow that might be reducing the performance of the flow, and to help you understand how you can optimize it.
If you detect that system resources are under pressure, you can examine the statistics collected by the broker to assess whether the cause of the concern is the use of those resources by processes in IBM Integration Bus.
References:
https://www.ibm.com/support/knowledgecenter/en/SSMKHH_9.0.0/com.ibm.etools.mft.doc/bj43310_.htm
send
light_mode
delete
All Pages