When can an IBM UrbanCode Deploy (UCD) component identify new component versions from SonotypeNexus? A. When the component source config type is set to “Maven” B. When the component source config type is set to “Repository” C. When the components source config type is set to “Nexus” D. When the component version type is set […]
Category: C5050-062
Rational UrbanCode Deploy
What information does inventory provide?
What information does inventory provide? A. The inventory shows which application and component processes have been executed. B. The inventory shows which agents are disabled. C. The inventory shows which applications and components are deployed. D. The inventory shows which agents are enabled. Explanation: The Inventory system in IBM UrbanCode Deploy tracks what is where […]
How would the user interface for a FileUtils plugin be defined?
How would the user interface for a FileUtils plugin be defined? A. using JavaScript that is contained in a FileUtils.ui file, which is referenced from the plugin definition file B. Using xml that is contained in the plugin definition file C. Using JavaScript that is contained in the plugin definition file D. Using xml that […]
What are two authentication types?
When creating a new user, an authentication realm must be defined. What are two authentication types? A. Internal Storage and LDAP B. OpenLDAP and Rational Authentication Method C. External Storage and LDAP D. OpenLDAP and Internal Storage Explanation: The available authorization realms for the server are as follows:* Internal StorageUses internal role management. The default […]
What is the main use of resources in IBM UrbanCode Deploy?
What is the main use of resources in IBM UrbanCode Deploy? A. To contain actual deployment artifacts B. To group component versions and configuration versioning into one entity C. To contain artifacts, or files, that provide a reusable solution D. To translate between agents (actual execution) and logical deployment targets Explanation: A resource is a […]
Which statement is true about importing files into component versions from the file system?
Which statement is true about importing files into component versions from the file system? A. Component versions can only be imported from the file system via the UCD server process over port 2776. B. Component versions can only be imported from the file system using an agent installed on the IBM UrbanCode Deploy server. C. […]
Which three statements are true about creating new component versions?
Which three statements are true about creating new component versions? (Select three.) A. New component versions can be created using the IBM UrbanCode Deploy client. B. New component versions can be created when updating the application configuration. C. New component versions can be created from the versions tab of the component. D. New component versions […]
What do you use to define a logical grouping of deployable that function as a single unit and
What do you use to define a logical grouping of deployable that function as a single unit and containdefinitions of automations and target environments? A. Component template B. Resource C. Application D. Resource template Explanation: Component-type resources represent the components that are deployed to target environments.A resource is a logical deployment target that typically resolves […]
In which product areas is it impossible to define additional subtypes?
A security type in IBM UrbanCode Deploy is a product area that can have permissions defined for it.Additional subtypes can be defined for the product areas. In which product areas is it impossible to defineadditional subtypes? A. Agents and Resources B. Web UI and Server Configuration C. License and Process D. Components and Applications Explanation: […]
Which security types are used to secure the IBM UrbanCode Deploy server?
Which security types are used to secure the IBM UrbanCode Deploy server? A. Server Configuration and Web UI B. Security UI & Application Security C. Application Security & DevOps Security D. UI Security & DevOps Security Explanation: References: http://www.ibm.com/support/knowledgecenter/en/SS4GSP_6.1.3/com.ibm.udeploy.admin.doc/ topics/security_types.html Show Answer