What is the result?
You enter the user name Administrator as the required Domain Administrator user during the installation of a new Informatica domain. What is the result?A . This action is not permitted because the user Administrator...
You enter the user name Administrator as the required Domain Administrator user during the installation of a new Informatica domain. What is the result?A . This action is not permitted because the user Administrator...
What factors must be considered to import an object stored as XML into a repository?A . The user who created the original object.B . The privileges and permissions on the original object.C . The...
Select the correct statement below regarding nodesA . Each node must have a hostname set as a property of the node.B . A minimum of two nodes are required for a running domain, one...
Which statement best describes the process when a user connects to a PowerCenter Repository Service for the first time? Assume the following: -PowerCenter Developer is the only PowerCenter client application running -There are 2...
The Service Manager runs which functions on the Master Gateway Node in the domain?A . Workflows, Configuration, and Alerting.B . Security, Web Services, and Alerting.C . Security, Configuration, and Alerting.D . Web Services, Configuration,...
Which of the following can be configured as the security protocol used for Domain Management?A . SFTP (Secure File Transfer Protocol) or SSL (Secure Sockets Layer)B . TCP/IP (Internet Protocol Suite) or TLS (Transport...
Which of the following services does not require a database connection as part of its configuration?A . The Powercenter Repository service.B . The Powercenter Integration Service.C . The PowerCenter Designer Service.D . The Reporting...
What are the three basic security objects that are created and maintained in the Security tab of the Informatica Administrator?A . Users, Groups. PermissionsB . Users, Groups, PrivilegesC . Users, Groups, RolesD . Users,...
Which statement best describes the relationship between system roles and custom roles?A . System roles cannot be edited and custom roles can be edited.B . A custom role is created by editing a system...
Which operations can be done with an incremental key?A . Add functionality, delete functionality.B . Add functionality, delete functionality, extend expiration date.C . Add functionality, delete functionality, enable additional services.D . Add functionality, delete...