How should you deploy a TBO to the respository?
A. Using IDfClient.newModule() only
B. Using Documentum Application Installer only
C. Using both Documentum Application Installer and IDfClient.newModule()
D. Using Documentum Application Installer, IDfClient.newModule() andIDfClient.newService()
Which version of a document, given a valid ID, is certain to be returned when the following method is called? IDfSession.getObject(IDfId objectId)
A. first version
B. last version
C. current version
D. specific version
Given the following: where queryString = "select object_name from dm_document" Which method properly executes a query and returns the appropriate results?
A. public static IDfCollection execQuery(String queryString, IDfSession session) throwsDfException{...
B. setDQL(queryString);col = q.execute(session);...return col;}
C. public static IDfCollection execQuery(String queryString, IDfSession session) throwsDfException{...
D. setDQL(queryString);col = q.execute(session,0);...return col;}
E. public static IDfDocument execQuery(String queryString, IDfSession session) throwsDfException{...
F. setDQL(queryString);objectName = q.execute(session);...return objectName;}
G. public static IDfDocument execQuery(String queryString, IDfSession session) throwsDfException{...
H. setDQL(queryString);objectName = q.execute(session,0);...return objectName;}
You have a repository with several million documents. The repository uses public ACLs to assign security for each division in an organization. What is the most efficient way to give read access to USER A for a batch of 100,000 documents while maintaining existing security on individual documents?
A. execute update dql to add USER A to each document
B. grant USER A READ permissions using IDfSysObject.grant()
C. add USER A to r_accessor_name for each acl that is referenced in the batch ofdocuments
D. create a new acl that gives USER A read permit and assign that acl to the batch ofdocuments
What is the purpose of IDfDynamicInheritance?
A. allows dynamic inheritance of all IDfSysObject's public methods to the TBO
B. provides the ability to override the parent class method
C. allows DFC to adjust the class hierarchy at run-time
D. allows dynamic loading of the TBO from the repository to the DFC client
Which action enhances the security of SOAP transmissions in the Web Services Framework (WSF)?
A. enabling SSL on the WSF application server
B. enabling Trusted Content Services (TCS) between the WSF and the repository
C. enabling RequiredGroupSet entries in the access controls
D. developing a TBO for each custom type used by a deployed web service
The IDfValidationOperation uses a temporary directory to perform XML validation. Given the following code: Which syntax can be used on line 10 to set the temporary directory?
A. operation.setDestinationDirectory("C:/Temp");
B. operation.setDestinationDirectory(new DfFolder("/Temp"));
C. operation.setDestinationDirectory(sess.getObjectByPath("/Temp"));
D. operation.setDestinationDirectory(sess.getIdByQualification("dm_folder where folder('/Temp')"));
Which statement is true about the includeContent(boolean includeContent) method of the IDfXMLQuery interface?
A. If set to true, content will be included within an XML element.
B. The content will always be returned within a
C. The query does not have to include r_object_id if the content is to be included.
D. If set to true, the resulting XML file will contain a link to the location of the content in therepository.
Which setting controls the format of DFC logging messages created by calls to DfLogger?
A. entries in the log4j.properties file
B. server.ini settings on the Content Server
C. regional settings in the operating system
D. the locale setting of the session in which the log messages are created
Given the following code: What is the effect of including the fourth argument in the DfLogger statement?
A. The exception will be handled by DfLogger.
B. The exception will be thrown again by DfLogger.
C. A stack trace of the exception will be output to the logger.
D. A text dump of the offending SysObject will be output to the logger.