ActiveSpaces
AMX BPM
BE
BW Administration
BW Development
EMS
Interview Question and Answers
IProcess
MDM
Online
ServiceGrid
Spotfire
TIBCO
TIBCO Online Training
Training
https://tibcoonlinetraining.blogspot.com/2015/06/tibco-interview-questions.html
A. SSL and Kerberos
B. username / password
C. certificate / private key and SSL
D. Kerberos and username / password
E. TIBCO DNS Obfuscation and certificate
/ private key
Answer: B, C
2. Application A is sending a Customer
Order message. All messages must be received by Application B. ApplicationC
should only receive messages when it is running. As the Customer Order message
contains sensitive informationabout the customer, only A should be able to send
this message, and only B and C should be able to receive this message. Which
message architecture most accurately satisfies these requirements?
Application A should send Customer Order
messages as persistent messages to a TIBCO Enterprise Message Service (EMS)
secure topic. Application B should receive messages as a durable subscriber.
Application C should be a subscriber to the topic
3. What is a valid method of routing
messages from a TIBCO Enterprise Message Server (EMS) queue to multiple
recipients?
Receive the message using the JMS Queue
Receiver activity in TIBCO BusinessWorks and resend using the JMS
Topic Publisher activity
4. Which three types of input/output
data can be transformed with the Transform XML activity? (Choose three.)
A. text data
B. binary data
C. dynamic data
D. xmlTree data
E. encoded data
Answer: A,B,D
5. A TIBCO BusinessWorks application you
are developing uses JMS messaging where the messages only reside on the local
campus. How should you implement conversation level security?
Provide the appropriate certificates and
define the connection used by the message producers and consumers to use SSL
A. ArrayMessage and TextMessage
B. TreeMessage and ArrayMessage
C. TextMessage and MapMessage
D. MapMessage and TreeMessage
Answer: C
7. What is the function of the Context
Resource activity?
Allows you to define a schema for
holding relevant context information
8. A topic A.B is bridged to a queue
B.C, and B.C is bridged to a queue C.D.
Where will a message published on topic
A.B be delivered?
A. only to B.C
B. only to C.D
C. to B.C and C.D
D. to neither B.C nor C.D
Ans:A
9. Which statement is true about the
maximum number of EAI steps allowed in a process?
A.There is no limit.
B.A process may contain up to 20 EAI
steps.
C.A process may contain up to 40 EAI
steps.
D.The maximum number of EAI steps
allowed in a process is configurable in the STAFFCFG file.
Answer: A
10. A bridge is defined from the topic
foo to the queue bar. Both foo and bar have the secure property and the server
authorization is enabled.
In this situation, in order for a
message to successfully reach queue bar, the producer needs permission _____.
to publish on foo only
to publish on foo and to send on bar
to publish on foo and to receive on bar
to publish on foo and to send and
receive on bar
Ans: A
11. Using TIBCO EMS, when will a topic
message be ledgered to secondary storage?
When the message is bridged to a queue.
Whenever the message uses persistent
delivery mode.
When the message uses either persistent
or reliable delivery mode.
When there is an offline durable
subscriber for the persistant message.
Ans: D
12. Some applications require the same
message to be sent to more than one destination, possibly of different types.
An application can process messages so that they are sent multiple times to the
required destinations. However, such processing requires significant coding
effort in the application.
What is the TIBCO EMS server-based
solution to fulfill this requirement?
server routes
multi-hops zones
destination bridges
message selectors
ActiveSpaces,
AMX BPM,
BE,
BW Administration,
BW Development,
EMS,
Interview Question and Answers,
IProcess,
MDM,
Online,
ServiceGrid,
Spotfire,
TIBCO,
TIBCO Online Training,
Training
Related posts
Post a Comment Default Comments Facebook Comments
Older PostTIBCO Software
Home
item
Blog Archive
Popular Posts
-
1. Which security mechanisms are supported in TIBCO BusinessWorks? (Choose two.) A. SSL and Kerberos B. username / password C....
-
TIBCO Software Inc. (NASDAQ: TIBX) is a supplier of communications software for companies to use on-premise or as part of cl...
Thanks for sharing such an amazing information its very beneficial for our company. our company name is innomatics research labs we offering data science,
ReplyDeletebig data and many more courses to make student career success full and we are giving online, classroom and corporate training our website is https://www.innomatics.in
I was very pleased to find this site.I wanted to thank you for this great read!! I definitely enjoying every little bit of it and I have you bookmarked to check out new stuff you post.
ReplyDeletedata science course in guwahati
mmorpg oyunlar
ReplyDeleteinstagram takipçi satın al
Tiktok jeton hilesi
Tiktok jeton hilesi
antalya saç ekimi
instagram takipci
instagram takipçi satın al
metin2 pvp serverlar
instagram takipçi satın al