Question 6 of 122

A message flow reads messages from a queue Database Node fails to insert data in the table. If no error handling and rollback is implemented in the message flow, which of the following statements is true?

Answer

Suggested Answer

The suggested answer is C.

The MQInput node takes certain actions when handling errors with persistent and transactional messages. The node attempts retry processing when a transactional message is rolled back to the input queue. Non-transactional messages are not rolled back to the input queue when an exception occurs.
If the MQInput node has successfully propagated the message to the out terminal and an exception is thrown in the out flow, the message is returned to the
MQInput node:
✑ If you have not connected the Catch terminal, the message is rolled back to the input queue. The MQInput node writes the error to the local error log and invokes the retry logic, described in Handling retry processing.
✑ If you have connected the Catch terminal, you are responsible for handling the error in the flow connected to the Catch terminal. The broker creates a new exception list to represent the error and this list is propagated to the Catch terminal as part of the message tree, but neither the MQInput node nor the broker provide any further failure processing.
References:
https://www.ibm.com/support/knowledgecenter/SSMKHH_9.0.0/com.ibm.etools.mft.doc/ac00414_.htm
Question 7 of 122

A developer creates a message flow that uses a DecisionService Node. Which command must the developer use before deploying the message flow?

Answer

Suggested Answer

The suggested answer is B.

Before you deploy message flows that contain a DecisionService node, you must enable the mode extension by using the mqsimode command: mqsimode -x DecisionServices
Incorrect Answers:
A: The mqsicvp command is run automatically when you start a broker by using the mqsistart command. The command checks that the broker environment is set up correctly. This checking has been enhanced to verify that the ODBC environment is configured correctly on Linux and UNIX systems.
References:
https://www.ibm.com/support/knowledgecenter/en/SSMKHH_10.0.0/com.ibm.etools.mft.doc/bc23793_.htm
Question 8 of 122

In the User Trace output shows the following message:

2016-04-12 16:17:18.242605 5344 UserTrace BIP2539I: Node

'Reply.MapToRequestor':

Evaluating expression ''I + 1''

at

('MapToRequestor.CopyMessageHeaders', '6.14'). This resolved to ''1 + 1''. The result was ''2''.

What does 6.14 indicate here?

Answer

Suggested Answer

The suggested answer is D.

References such as '6.14' apply to the row and column number within a function that specify the location of the command that is being executed; in this case, row
6, column 14.
Example:
2005-07-12 16:17:18.242605 5344 UserTrace BIP2539I: Node 'Reply.MapToRequestor':

Evaluating expression ''I'' at -
('.MapToRequestor.CopyMessageHeaders',
'6.12'). This resolved to ''I''. The
result was ''1''.
References:
https://www.ibm.com/support/knowledgecenter/en/SSMKHH_9.0.0/com.ibm.etools.mft.doc/au14320_.htm
Question 9 of 122

Which protocol for security is not supported by IBM Integration Bus?

Answer

Suggested Answer

The suggested answer is A.

Setting up message flow security
Set up security on a message flow to control access based on the identity of a message passing through the message flow.
You can configure the broker to perform end-to-end processing of an identity carried in a message through a message flow. Administrators can configure security at message flow level, controlling access based on the identity flowed in a message. This security mechanism is independent of both the transport and the message format.
✑ To work with an identity, you must configure the policy sets and bindings for the relevant capabilities:
✑ To work with a SAML assertion, configure the policy sets and bindings for SAML token capabilities.
✑ To work with an X.509 Certificate identity, configure the policy sets and bindings for X.509 certificate token capabilities.
✑ To work with a Username and Password identity, configure the policy sets and bindings for Username token capabilities.
✑ To work with an LTPA token, configure the policy sets and bindings for LTPA token capabilities.
✑ To work with a Kerberos ticket, configure the policy sets and bindings for Kerberos token capabilities.
References:
https://www.ibm.com/support/knowledgecenter/en/SSMKHH_9.0.0/com.ibm.etools.mft.doc/ap04170_.htm
Question 10 of 122

A developer is trying to investigate slow processing times with a specific message flow. What tool would be used to investigate this?

Answer

Suggested Answer

The suggested answer is C.

You can use the message flow statistics data to help you identify aspects of a message flow that might be reducing the performance of the flow, and to help you understand how you can optimize it.
If you detect that system resources are under pressure, you can examine the statistics collected by the broker to assess whether the cause of the concern is the use of those resources by processes in IBM Integration Bus.
References:
https://www.ibm.com/support/knowledgecenter/en/SSMKHH_9.0.0/com.ibm.etools.mft.doc/bj43310_.htm