Loading...

TIBCO Interview Questions (part 1)

1. Which security mechanisms are supported in TIBCO BusinessWorks? (Choose two.)

A. SSL and Kerberos
B. username / password
C. certificate / private key and SSL
D. Kerberos and username / password
E. TIBCO DNS Obfuscation and certificate / private key

Answer: B, C

2. Application A is sending a Customer Order message. All messages must be received by Application B. ApplicationC should only receive messages when it is running. As the Customer Order message contains sensitive informationabout the customer, only A should be able to send this message, and only B and C should be able to receive this message. Which message architecture most accurately satisfies these requirements?

Application A should send Customer Order messages as persistent messages to a TIBCO Enterprise Message Service (EMS) secure topic. Application B should receive messages as a durable subscriber. Application C should be a subscriber to the topic

 3. What is a valid method of routing messages from a TIBCO Enterprise Message Server (EMS) queue to multiple recipients?

Receive the message using the JMS Queue Receiver activity in TIBCO BusinessWorks and resend using the JMS

Topic Publisher activity

4. Which three types of input/output data can be transformed with the Transform XML activity? (Choose three.)

A. text data
B. binary data
C. dynamic data
D. xmlTree data
E. encoded data

Answer: A,B,D

5. A TIBCO BusinessWorks application you are developing uses JMS messaging where the messages only reside on the local campus. How should you implement conversation level security?
Provide the appropriate certificates and define the connection used by the message producers and consumers to use SSL
TIBCO FAQ's
6. Which are JMS message types?

A. ArrayMessage and TextMessage
B. TreeMessage and ArrayMessage
C. TextMessage and MapMessage
D. MapMessage and TreeMessage

Answer: C

7. What is the function of the Context Resource activity?

Allows you to define a schema for holding relevant context information

8. A topic A.B is bridged to a queue B.C, and B.C is bridged to a queue C.D.
Where will a message published on topic A.B be delivered?

A. only to B.C
B. only to C.D
C. to B.C and C.D
D. to neither B.C nor C.D
Ans:A

9. Which statement is true about the maximum number of EAI steps allowed in a process?

A.There is no limit.
B.A process may contain up to 20 EAI steps.
C.A process may contain up to 40 EAI steps.
D.The maximum number of EAI steps allowed in a process is configurable in the STAFFCFG file.

Answer: A

10. A bridge is defined from the topic foo to the queue bar. Both foo and bar have the secure property and the server authorization is enabled.

In this situation, in order for a message to successfully reach queue bar, the producer needs permission _____.
to publish on foo only
to publish on foo and to send on bar
to publish on foo and to receive on bar
to publish on foo and to send and receive on bar
Ans: A

11. Using TIBCO EMS, when will a topic message be ledgered to secondary storage?

When the message is bridged to a queue.
Whenever the message uses persistent delivery mode.
When the message uses either persistent or reliable delivery mode.
When there is an offline durable subscriber for the persistant message.
Ans: D

12. Some applications require the same message to be sent to more than one destination, possibly of different types. An application can process messages so that they are sent multiple times to the required destinations. However, such processing requires significant coding effort in the application.
What is the TIBCO EMS server-based solution to fulfill this requirement?

server routes
multi-hops zones
destination bridges
message selectors

Training 3108324573661814211

Post a Comment Default Comments

  1. Thanks for sharing such an amazing information its very beneficial for our company. our company name is innomatics research labs we offering data science,
    big data and many more courses to make student career success full and we are giving online, classroom and corporate training our website is https://www.innomatics.in

    ReplyDelete
  2. I was very pleased to find this site.I wanted to thank you for this great read!! I definitely enjoying every little bit of it and I have you bookmarked to check out new stuff you post.
    data science course in guwahati

    ReplyDelete

emo-but-icon

Home item

Blog Archive

Popular Posts

Random Posts

Flickr Photo