Certbus > EMC > Legato Cert > E20-465 > E20-465 Online Practice Questions and Answers

E20-465 Online Practice Questions and Answers

Questions 4

When using a resource agent to view a log, which option CANNOT be used to sort the log entries?

A. Log level

B. Event type

C. Severity

D. From the first entry to the last entry

Browse 169 Q&As
Questions 5

A repository has an installation owner account 'dmadmin' and a repository owner account 'sop.' What is the difference between these two accounts?

A. The Documentum installation owner and the repository owner accounts have identical roles.

B. The Documentum installation owner is a regular user in a repository; the repository owner has administrative rights over the repository.

C. The Documentum installation owner is a superuser in the repository; the repository owner account owns the database tables used by the repository.

D. While both users have administration privileges, the installation owner owns the repository database tables.

Browse 169 Q&As
Questions 6

Given an environment with multiple Connection Broker hosts and the following parameters in the dfc.properties file for a Documentum client: dfc.docbroker.auto_request_forward = T dfc.docbroker.search_order = random Which statement is true about this environment?

A. Communication requests from the client will be sent to the primary Connection Broker first. If that Connection Broker is unavailable, the secondary Connection Broker will be used.

B. If the primary Connection Broker does not respond to the request, the communication request is immediately terminated and an error displayed.

C. One of the defined Connection Brokers in the dfc.properties is chosen at random by the requesting client. If it does not respond, the communication request is immediately terminated and an error displayed.

D. The client will randomly select any Connection Broker defined in the dfc.properties as the first recipient of the communication request.

Browse 169 Q&As
Questions 7

A developer requests that the client_shutdown_session_timeout parameter in the Webtop development environment be increased from its default value of 60 to a new value of 120. The developer also mentions that the save_credential parameter has already been changed so this environment is no longer using the default version of this file. Where would you change this parameter?

A. the app.xml file in the custom directory

B. the app.xml file in the webtop directory

C. the web.xml file in the WEB-INF directory

D. the web.xml file in the custom directory

Browse 169 Q&As
Questions 8

Which statement is true when the Run as Server option of a method is checked?

A. The method will be executed as the installation owner account with installation owner privileges.

B. The method will run on the dmbasic Method Server.

C. The method will run on the Java Method Server.

D. The method will run on the Content Server.

Browse 169 Q&As
Questions 9

You need to plan the restore of a cold backup of your repository. What is the correct restore procedure for a cold backup?

A. 1. stop the index server2. stop the file server3. stop the database4. restore the index vault5. start the index server6. restore the file server7. start the file server8. restore the database9. start the database

B. 1. stop all software that works with the Content Server2. stop the repository3. stop the database4. restore the database5. restore each content storage area6. start the database7. start the repository8. start all software that works with the Content Server

C. 1. stop all software that works with the Content Server2. stop the repository3. stop the database4. restore the database5. restore each content storage area from /dev/null6. start the database7. start the repository8. start all software that works with the Content Server

D. 1. stop all software that does not work with the Content Server2. restart the operating system3. import the database4. restore each content vault5. recover the database6. restore the repository.key file7. start the repository8. start all software that works with the Content Server

Browse 169 Q&As
Questions 10

One has an application that nightly ingest approximately 300,000 objects and at the same time does content migration to the same amount of objects to a low cost storage. This process is taking too long causing the end user client to be slow in the morning. Which approach should you use to speed up the ingestion and migration?

A. Use the Consistency Checker administrative tool to verify the data integrity to ensure fast operations.

B. Enable High-Volume Server's batch mode to process objects in batches.

C. Use Dmclean and Dmfilescan tools to clean the repository of all excess objects slowing down operations.

D. Enable Content Storage Services to automate the migration.

Browse 169 Q&As
Questions 11

How is Cache Hit Ratio defined?

A. the percentage of time a resource was found in the shared memory of the database machine

B. the percentage of time a resource was found on the disk where the content files are stored

C. the percentage of time a resource was found on the disk where the database files are stored

D. the percentage of time a resource was found in the shared memory of the Content server machine

Browse 169 Q&As
Questions 12

Where will a DQL Pass Through Hint be checked?

A. client interface

B. application server

C. Content Server

D. database server

Browse 169 Q&As
Questions 13

Which dfc.properties key may be used to optimize network traffic for fetch and collection transmissions?

A. dfc.batch_hint_size

B. dfc.docbroker.auto_request_forward

C. dfc.bof.cache.currency_check_interval

D. dfc.cache.query.size

Browse 169 Q&As
Questions 14

Your system operates with a single centralized site with users at several remote locations. The network provides minimal hops between routers, quick round trip response times, and high data capacity. However, users report poor application performance, and you have narrowed possible root causes to the network. Spam e-mail on the network is affecting performance of all enterprise applications. What network metric indicates the actual network capacity in this case?

A. latency

B. bandwidth

C. throughput

D. protocol overhead

Browse 169 Q&As
Questions 15

You receive a call from a user who cannot login to a repository. The user sees the message "Authentication failed."What could cause this?

A. The repository does not appear in the user's registry settings.

B. The user is not in the repository.

C. The docbroker is not running.

D. The repository is not running.

Browse 169 Q&As
Questions 16

How do you remove unwanted audit trail entries AND make sure the audit will not grow uncontrollably?

A. instruct users to remove audit trail entries from their objects

B. execute the PURGE_AUDIT method to remove unwanted audit entries

C. schedule the dm_AuditMgt job using the Audit Management tool

D. issue a DQL statement, such as delete dm_audittrail objects where datediff ( month ,time_stamp_utc , date ( today ) ) >= 3

Browse 169 Q&As
Questions 17

Users should be able to access documents only if they are citizens of a NATO country, and if they are granted Top Secret clearance. Users in the system are members of a group matching their country of citizenship. What Permission set structure will fulfill this requirement? 4 * Contains a group for each NATO country 9 * Contains a group for each NATO country and the Top Secret group.

A. Option A

B. Option B

C. Option C

D. Option D

Browse 169 Q&As
Questions 18

A manager wants to grant certain mobile team members access to confidential material that is handled

differently, depending on the location of those members. Which Documentum feature satisfies this requirement?

A. Network Locations

B. Encrypted Storage Areas

C. Dynamic Groups

D. Folder Security

Browse 169 Q&As
Exam Code: E20-465
Exam Name: Content Management System Administration
Last Update: Mar 20, 2024
Questions: 169 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99