P2170-036 - IBM i2 iBase Support Mastery Test v1 Exam
Go back to IBM
Which file extension does an iBase security file or iBase security connection file for SQL Server have?
In which of these databases is alerting for iBase available
In the iBase Designer security manager, which one of the following security groups are mandatory and must be used when adding new users?
There are four types of group that can be used in the iBase designer security manager, to control the access that users have to data in an iBase database and to the iBase features. Which one of the 4 types of group denies access to specific commands? For example, a user may be able to add records but may be denied access to the Import command.
System Commands Access Control group
The MSI install process automatically sends notices of its activity to the system event log. Any events logged by the MSI install process have their source set to MsiInstaller. Which of the below is not an event message from the MsiInstaller?
SQL ServerAgent Service successfully started
Bulk import enables you to import data more quickly. Which if the following is NOT true for Bulk Importing?
You can run bulk import on an access iBase database
Which of the following is not True for search 360?
Access iBase databases can use Search 360
Which file extension does an iBase database or iBase database connection file for SQL Server have?
To enable more verbose logging about the install process than the system event log provides, you must add a value to a key in the registry. The key in question is HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Installer, The new addition is a string value named Logging, with the value _________________.
You can create a new empty database from a template. Which for the following cannot be contained in the template?
support files, such as Text Chart or Analyst's Notebook templates
iBase has separate modules for iBase Designer and iBase User, so you log on to whichever is appropriate for you. Which of the following is a false statement about iBase User?
iBase user allows you to delete enitity and link types from the Database schema
Which of the following is NOT true for creating iBase SQL server databases?
The name of the iBase database must all be uppercase/Capital letters
Which statement is False about Alert definitions?
Alert definitions are created and edited by the iBase designer using the alerting configuration tool
Which is NOT true about Labelling schemes?
You can only create one Labeling Scheme per database
Which of the following false statement about iBase Designer?
iBase designer allows you to add, modify and delete entity record data.
Which of these is not listed in the release notes as a supported SQL Server version for iBase 8.9.1?
SQL Server 2000
To make more significant changes to the way an MSI installation takes place, you can edit the database that an MSI file contains. This requires you to create a transform. The tool used to create a transform is which of the following?
There are additional administration/configuration tools outside of iBase designer.(Provided as part of the iBase installer, you must select/include the tools option as part of the customised install.) These configuration tools are available from the Windows start menu: Select Programs, then select IBM i2 iBase 8, then select the tools menu. Which of the following is False about the the Index Service Configuration tool?
You use this tool to enable the iBase databases for Full Text Search
Which of the following iBase security features is not supported by iBase Scheduler, and any restrictions imposed by this features will be ignored in iBase Scheduler:
System Command Access Control
Before you use iBase Scheduler to schedule the import or export of data, you need to configure it in the iBase Scheduler Configuration dialog. Which one of the following steps is NOT perfomed using the iBase scheduler Configuration dialog?
Create import Specifications
In iBase designer, what database type is available when upsizing an existing iBase database?
Which type of log file does the audit viewer contain?
security file logs and database logs
There are four types of group that can be used in the iBase designer security manager, to control the access that users have to data in an iBase database and to the iBase features. Which one of the 4 types of group makes read only or hides entity types, link types, specific entity or link fields and individual records?
Data Access Control group
At version 8.9, IBM i2 iBase _______________.
no longer supports or requires authorization mechanisms
Which of the following is False for iBase SQL server?
iBase requires case-sensitive SQL Servers
A charting scheme controls how the properties of items added to Analyst's Notebook charts from iBase are updated. Which is NOT True ?
You can include more than 1 labeling scheme in your charting scheme
Which is not correct when using the Index Service Configuration tool?
the index tool can connect to any SQL instance that is not on the local machine.
IBM i2 iBase is supported on a number of virtual machine environments. Which of the following is not listed within the IBM i2 iBase 8.9.1 release notes?
Which of the following is NOT true about the user who switches on and configures alerting for a database?
They use the iBase user module and the Format, alerting menu to configure alerting for a database