Vendor: IBM
Exam Code: C2090-420
Exam Name: InfoSphere MDM Server v9.0
QUESTION 1
You are required to store the history of any errors generated for reporting at a later time.
Which statement is correct?
A. History is configured during installation; so this will be implemented.
B. Write a custom business rule to save error data in the custom history tables.
C. Enable transactions in the Transaction Audit Information Log(TAIL).
D. Generate a report on sample error tables.
Answer: C
QUESTION 2
The request parser factory, parser, response constructor factory, constructor, and request handler are all parts of the Request and Response framework. What is the request handler?
A. The request handler is a component that interacts with these components to carry out the request.
B. The request handler is a transaction that interacts with these components to carry out the request.
C. The request handler is a parser that interacts with these components to carry out the request.
D. The request handler is a factory that interacts with these components to carry out the request.
Answer: A
QUESTION 3
The tcrm_extension.properties file contains the following:
id_factory_identifier=com.dwl.tcrm.utilities.ClientIDF actory id_factory_contequiv=com.dwl.tcrm.utilities.ClientIDF actory How will the primary key be generated for the CONTACT, IDENTIFIER, and CONTEQUIV tables?
A. A custom key will be defined for the IDENTIFIER table and the CONTEQUIV table, a default key will be defined for the CONTACT table.
B. Default keys will be defined for all tables, as defined by TCRMIDF actory.
C. Custom kdys will be defined for all tables, as defined by ClientIDF actoryGeneral.
D. A custom key will be defined for the CONTACT table, default keys will be defined for the
IDENTIFIER and CONTEQUIV tables.
Answer: A
QUESTION 4
InfoSphere MDM server stores metadata about its data table definition for table name and column name. Which feature relies on this metadata in the CDDWLTABLETP table or the CDDWLCOLUMNTP table?
A. Rules of Visibility
B. Business Key Validation
C. External Validation
D. Extension Framework
Answer: B
QUESTION 5
If the MandatorySearchDone field of the TCRMPartyBObj is set to “Y” and an A2 suspect is found during an addParty, which two actions occur?(Choose two.)
A. The source party is returned in the response.
B. The suspect parties are returned in the response.
C. The source party is not added to the database.
D. The source party is added to the database.
Answer: BD
QUESTION 6
What is a design component of Data Persistency Entitlements?
A. Ancestors
B. Accessors
C. Activities
D. Profiles
Answer: B
QUESTION 7
An external system provides a daily master data feed into InfoSphere MDM Server. New business proxies are created to synchronize this information with existing data in the MDM database. The synchronization process involves calling existing InfoSphere MDM Server transactions. What information does the business proxy use to resolve the identities of business objects and detect transactions needed in the composite transaction?(Choose two.)
A. business object primary key fields
B. business object foreign key fields
C. business object business key fields
D. business key fields in parent business object hierarchy
Answer: CD
QUESTION 8
Which two statements are true about the type of history database triggers in InfSphere MDM Server?(Choose two.)
A. SIMPLE triggers populate the history record in audit tables when a record is inserted into an operational table in the InfoSphere MDM Server database.
B. COMPOUND triggers populate the history record in audit tables when a record is updated or deleted from within an operational table in the InfoSphere MDM Server database.
C. SIMPLE triggers populate the history record in audit tables when a record is updated from within an operational table in the InfoSphere MDM Server database.
D. COMPOUND triggers populate the history record in audit tables when a record is inserted or updated from within an operational table in the InfSphere MDM Server database.
Answer: CD
QUESTION 9
Which two features differ between the probabilistic and deterministic approach to Suspect Duplication Processing? (Choose two.)
A. candidate list selection
B. matching critical data elements between praties
C. handing A2 suspects
D. determining the match category
Answer: BD
QUESTION 10
Which three capabilities does the Extended Key Generation Framework provide?(Choose three.)
A. Ability to generate different types of identifiers such as numeric, alphanumeric, numeric string, and alphabetic.
B. Ability to generate different types of identifiers of variable length.
C. Ability to construct identifiers from an external messaging engine.
D. Ability to return a set of identifiers instead of a single identifier.
E. Ability to customize the behavior of the Identifier object during the collapse of Parties.
Answer: ABD
Pass C2090-420 Certification Easily With Newly Cheap C2090-420 Course Materials