You are on page 1of 3

1.

What are two options that permit Java code access to databases from a
JavaCompute node?
A. JAXB
B. SQLJ
C. BlueJ
D. JavaDB Lite
E. MbSQLStatement

2. What are two message model formats that are supported in the 'Create a
new message model' file screen of the New Message Model wizard?
A. TIFF
B. RTF
C. COBOL
D. YAML
E. Database Record

3. Which two sources can be used as templates for generating Integration


Services?
A. WSDL
B. EAR
C. Message Broker BAR
D. Java EE 8 compatible JAR
E. Business Process Manager TWX export

4. What is the order of precedence for a user defined property to be


applied?
A. BAR Override, Message flow editor, ESQL code
B. Message flow editor, ESQL code, BAR Override
C. BAR Override, ESQL code, Message flow editor
D. ESQL code, BAR Override, Message flow editor

5. What is one of the tasks that is performed by using the Flow Exerciser?
A. Manage tools that are used to interpret messages.
B. Deploy the message receiver and set the message flow to playback
mode.
C. Highlight the message content and any sub-messages that are
associated with the message flow.
D. Display the content of the logical message tree for a message that
passed through a connection in the message flow.
6. Security profiles apply to the SecurityPEP node. What happens if the
Security Profile Properties is left blank?
A. The node inherits the first SecurityProfile property set at runtime
B. The node inherits the SecurityProfile property set at the message flow
level
C. The node errors on the SecurityProfile property as it must be set in
the node
D. The node inherits the SecurityProfile property defaults of no security
at the integration node
Answer Key:
1. B & E
2. C & E
3. A & E
4. A
5. D
6. B

You might also like