A customer has deployed a two node active-active IBM Sterling B2B Integrator (SBI) cluster in the secure zone on two servers. The customer has installed two servers in the DMZ for the purpose of installing remote SBI Perimeter Servers to facilitate communications with external partners. External partners will connect to an external IP Load Balancer that will distribute inbound FTP/S, SFTP and HTTP Client sessions across the Perimeter Servers. The customer requirement is that if any single server fails, all the other SBI nodes and remote Perimeter Server instances must continue to activelyThe customer? requirement is that if any single server fails, all the other SBI nodes and remote Perimeter Server instances must continue to actively handle inbound sessions for each protocol. What is the minimum number of remote Perimeter Server instances that must be deployed in the DMZ?
A. 2
B. 3
C. 4
D. 12
A company wants to change their document storage to file system storage for a IBM Sterling B2B Integrator (SBI) cluster deployment. Which configuration needs to exist?
A. with a shared file system mounted as /FS:document_dir.jdbc.properties=/shareddefaultDocumentStorageType.jdbc.properties=FS
B. with a shared file system mounted as /FS:document_dir.jdbc.properties=/FSdefaultDocumentStorageType.jdbc.properties=shared
C. with a shared file system mounted as /shared:document_dir.jdbc.properties=/FSdefaultDocumentStorageType.jdbc.properties=FS
D. with a shared file system mounted as /shared:document_dir.jdbc.properties=/shareddefaultDocumentStorageType.jdbc.properties=FS
A company allows trading partners to send files to it via SFTP. Which port needs to be configured on the SFTP Server adapter to define the communication port?
A. Data Port
B. Send Port
C. Listen Port
D. Passive Port
A company is planning to offer FTPS connection to its community of trading partners. They already have one server certificate in IBM Sterling B2B Integrator (SBI) that they want to use for the FTPS server in the production environment. In the
development environment they want to use a self-signed test certificate.
Where can the test certificate be created?
A. Trading Partner > Digital Certificates > CA
B. Trading Partner > Digital Certificates > Trusted
C. Trading Partner > Digital Certificates > System
D. Trading Partner > Digital Certificates > Cert Manager
IBM Sterling B2B Integrator (SBI) is installed with a LDAP connection to allow users to log in using their username/password stored in the LDAP server. A user is created in SBI as a local user and the InternalUser password policy is specified. The InternalUser policy states that the password has to be changed every 30 days. After 29 days the SBI security administrator deletes the InternalUser policy from the system. When the user logs in two days later, will the user be prompted to change the password?
A. Yes, because of the configuration of the original password policy.
B. No, because the policy is deleted so the user has no password policy.
C. The user will not be logged in because there is no valid policy specified.
D. No, the policy is irrelevant since the password is managed by the LDAP server.
Due to a rise in fraud, a financial company risk management team is looking to implement more stringent security measures. What are two security features to address the fraud? (Choose two.)
A. FTP Client and Server Adapters for exchanging data
B. identification policies for recipients of data in a file transfer
C. Cyber Security Operations Center (CSOC) Comprehensive Cyber Threat Detection and Response
D. Controlled Substances Ordering System (CSOS) to permit electronic transmission of orders for controlled substances
E. a suite of encryption services to ensure that data remains secure and meets organization, industry, and government mandates for datasecurity
An administrator is getting error notifications from the Schedule_IndexBusinessProcessService stating that a previous instance of the Schedule_IndexBusinessProcessService is still running. Which menu screen in the system displays the conflict identified in the notification?
A. Operations > Lock Manager
B. Operations > System > Troubleshooter
C. Deployment > Services > Configuration
D. Deployment > Resource Managers > Resource Tags
For increased availability reasons, a two-node application cluster has been multi-homed with each node having two network adapters cards. The system needs to be enabled to accept inbound FTP or FTP SSL client connection on port 25000. The system will use a wildcard (*) default in the perimeter server. How many FTP server adapters need to be configured to support ACTIVE and PASSIVE user initiated seasons?
A. 2
B. 4
C. 8
D. 16
Where are two places the amount of time a Business Process (BP) remains online in the system can be updated? (Choose two.)
A. Archive Manager
B. archive.properties
C. Business Process Editor
D. Performance Tuning Wizard
E. Retention Service configuration
A mailbox is created for an end user called /partner/orders/TPA_inbound. When the end user connects, the end user can only see /TPA_inbound mailbox from root. What has happened?
A. A virtual root has been created on /partner/orders for that SBI userid.
B. The end user has been assigned /TPA_inbound permissions for the mailbox.
C. Mailbox permission rights have been changed to VIEW for /partner/orders/TPA_inbound.
D. Another mailbox was created called /partner/orders/TPB_inbound which the user is not allowed to access.
Where in the dashboard interface can multiple adapter service configurations be enabled or disabled on one screen?
A. Current Activity
B. Adapter Utilities
C. System Troubleshooter
D. Business Process Manager
A company has many CA certificates in their IBM Sterling B2B Integrator (SBI). The company's SBI administrator is responsible for contacting the Certificate Authorities for certificate renewal before they expire. Recently the company decides to have their security administrator perform the job instead, and requires automated notification be sent to the security administrator 30 days prior to a certificate's expiration date. What is the most effective way to configure SBI to meet the requirements?
A. Add the security administrator's email to all certificates management.
B. Add the security administrator to the SBI administrator email distribution list.
C. In the security.properties file, set emailRecipients =
D. Create a Business Process (BP) to check all certificate expire dates and send notification accordingly.
E. Set "Expire Days" to 30 in Check Expire Service configuration, set "Output method" to Email, and input the security administrator's emailaddress.
Which three areas in IBM Sterling B2B Integrator (SBI) are automatically cleaned up? (Choose three.)
A. Map definitions
B. Correlation data
C. Mailbox messages
D. Business Process (BP) definitions
E. BP instance data
F. archived data files on the file system
A company would like to maintain communication adapter availability in the event of IBM Sterling B2B Integrator (SBI) being shut down for maintenance. What can be deployed to maintain adapter communications?
A. Service Group
B. Clustered Node
C. Perimeter Server
D. Adapter Container JVM
A company requires all data at rest to be stored securely. How can this be configured in IBM Sterling B2B Integrator (SBI)?
A. Import a System Certificate.
B. Create a PGP Server Profile.
C. Enable Document Encryption.
D. Configure an Obscure Data service.