You are setting up an Optim Connect server on a Solaris machine. Which of the following is
NOT a step that must be performed?
A. Enter the TCP/IP address of the Solaris machine in the /etc/hosts.conf file.
B. Add a machine.
C. Edit the Daemon Navigator for IRPCD forthe machine to set the Workspace Server
Mode to SingleClient.
D. Open the Bindings folder for the machine and add an Optim Connect datasource for the
Optim Archive File.
正解:A
質問 2:
Which Optim method is used to: mask Name and Address fields, produce consistent results, use fictitious yet valid data, and is easy to maintain?
A. hash_lookup
B. cbhash
C. rand_lookup
D. shuffle
正解:A
質問 3:
Which of the following are included in an Access Definition?
A. Column Lists, Report Specifications
B. Privacy Functions, Sort Criteria
C. SelectionCriteria, Grouping Specifications
D. Table Maps, Column Maps
正解:C
質問 4:
During a proof of concept, you successfully install and configure Optim to archive data from a DB2 LUWtest application database running on an AIX server.
* A test archive (without deleting data) is initiated from the Optim Server running on a
Windows 2003 server and runs successfully the first day.
* The Optim directory is on a non-application databaseon the Windows 2003 server.
* During the evening, the client site runs a security routine that automatically deletes any unknown or foreign objects (e.g., packages, plans, procedures) from the application databases running on the AIX server.
* The next day, the same test archive will no longer run from the Optim Server.
Which step must you perform to enable the archive to run?
A. Configure security for the Optim Directory using the Optim Configuration wizard.
B. Re-install the Optim Client andServer on the database AIX server.
C. Update the DB Alias to the DB2 LUWtest application database.
D. Drop and rebuild the Optim Directory using the Optim Directory wizard.
正解:C
質問 5:
What are two valid levels of Optim Security? (Choose two.)
A. Functional Security
B. Extract File Security
C. Object Security
D. Network Security
E. Database Security
正解:A,C
中村** -
C2090-552における重要な知識を整理している。ありがたい。