- 142 Views
- 0 Comments
IBM FileNet P8 Certification Related 1
FunMaster
- Post By FunMaster
- 3 months ago
FileNet certification question and answers Which one of the following statements on 5.2 FileNet Content Manager
compression is
correct?
A. Compression is not supported in FileNet Content Manager 5.2B. Only Fixed Content Devices can be compressedC. All valid storage areas can contain both compressed and non-compressed contentD. No Fixed Content Devices can be compressed
Answer: C
Which error log is created by Content Platform Engine server
?
A. log4jB. Systemout.logC. Event ViewerD.
p8_server_error.log
Answer: D
Which of the following is the current framework recommended by IBM for
building rich
interactive web-based content applications?
interactive web-based content applications?
A. IBM Rational Data Architect.B. Workplace Web Application
Toolkit (WAT).C. Administration Console for Content Platform Engine (ACCE).D.
IBM Content Navigator (ICN).
Answer: D
What happens if the GCD is not available upon startup of the Content Platform Engine?
- A. The
Content Platform Engine will use a cached in memory copy of the GCD and is
fully functional.
- B. The
Content Platform Engine does not need the GCD, cached in memory or local
file based copy.
- C. The
Content Platform Engine will use a local file based copy and can process
requests that do not update the GCD.
- D. The
Content Platform Engine will use a local file based copy and is fully
functional.
Here’s how it works:
- The Global
Configuration Database (GCD) is critical — it stores domain-wide
configuration (object store definitions, security principals, add-ons,
etc.).
- CPE
cannot start fully without accessing the GCD at least once.
- However,
after startup, if GCD becomes temporarily unavailable, CPE uses a cached
local file copy for read-only operations.
- Operations
that update GCD (e.g., creating new object stores, modifying
domain-wide settings) will fail until the database is available again.
✅ Correct Answer:
C. The Content Platform Engine will use a local file based copy and can
process requests that do not update the GCD.
In a Kerberos-configured environment, the Service Principal Name (SPN) is
used to identify the Content Platform Engine service. In this environment, the
SPN is configured as follows:
FNCEWS/myce01.MYDOM.COM -
What is the hostname of the server where Content Platform Engine resides?
- A. MYDOM.DOM
- B. myce01
- C. FNCEWS
- D. MYDOM
🔹 SPN Structure Reminder
An SPN typically looks like:
<service>/<hostname>.<domain>
- Service
→ Application or service identifier (here FNCEWS = FileNet Content Engine
Web Service).
- Hostname
→ The server’s machine name.
- Domain
→ The Active Directory domain name.
🔹 Given SPN
FNCEWS/myce01.MYDOM.COM
- Service:
FNCEWS
- Hostname:
myce01
- Domain:
MYDOM.COM
✅ Correct Answer
B. myce01
(because that is the actual hostname of the server
where Content Platform Engine resides).
⚡ Tip:
- FNCEWS
= logical service identifier, not the host.
- MYDOM.COM
= AD domain, not the host.
- Host
= myce01.
Within a FileNet P8 environment, what is an essential high availability building block?
- A. Preventing
single points of failure
- B. Use
of LTPA keys for intra-cell communications
- C. One
instance of Content Platform Engine
- D. A
group of servers where there is only one instance of each ECM component
🔹 Option Analysis
- A.
Preventing single points of failure ✅
- This
is the core principle of HA.
- In
FileNet, that means clustering CPE, redundant Process Engines, multiple
ICN nodes, DB HA (RAC/AlwaysOn), shared storage, load balancers, etc.
- B.
Use of LTPA keys for intra-cell communications
- That’s
about authentication between WebSphere cells, not HA.
- C.
One instance of Content Platform Engine
- Opposite
of HA (single instance = SPOF).
- D.
A group of servers where there is only one instance of each ECM component
- Again,
that introduces SPOFs — not HA.
✅ Correct Answer
A. Preventing single points of failure
⚡ Real-world example:
- Multiple
CPE nodes in a WebSphere cluster.
- ICN
in cluster behind load balancer.
- DB
with failover (Oracle RAC, DB2 HADR, SQL AlwaysOn).
- Redundant
LDAPs.
- Shared
filestore with HA (GPFS, NAS, SAN).
Which of the following is used by the Content Platform Engine to connect to a database?
- A. JDBC
driver
- B. LTPA
key
- C. System
Administrator access
- D. ODBC
driver
🔹 Option Analysis
- A.
JDBC driver ✅
- CPE
is a Java EE application running in WebSphere (or WebLogic).
- It
connects to the database using JDBC drivers configured in the
application server’s data sources.
- B.
LTPA key
- Used
for authentication tokens in WebSphere SSO, not for database
connectivity.
- C.
System Administrator access
- Refers
to user privileges, not a connection mechanism.
- D.
ODBC driver
- That’s
for non-Java apps (Windows native), not used in FileNet Java EE apps.
✅ Correct Answer
A. JDBC driver
While implementing a Workflow solution on FileNet P8, a business requirement lists the need to integrate existing legacy applications in the workflow. The legacy mainframe applications have Java interfaces that can be invoked from the workflow. Which is the best method to achieve this integration? :
- A. Ask
the legacy application maintenance team to expose the functionality as a
web service
- B. Develop
a custom Java component using Component Integrator to invoke the legacy
application
- C. Use
Java Message Service integration
- D. Use
a REST based integration from the workflow
🔹 Option Analysis
- A.
Ask the legacy application maintenance team to expose the functionality as
a web service
- Possible,
but depends on another team. Not the best FileNet-native solution
if Java APIs are already available.
- B.
Develop a custom Java component using Component Integrator to invoke the
legacy application ✅
- Component
Integrator (CI) is designed for this exact use case.
- You
wrap Java logic (or .NET, via web services) in a CI component → expose it
to Process Engine → call from workflow steps.
- Since
the legacy apps already have Java interfaces, this is the most direct,
maintainable, and FileNet-aligned solution.
- C.
Use Java Message Service integration
- JMS
can integrate with messaging middleware (MQ, etc.), but here the legacy
apps already provide Java interfaces, so JMS is unnecessary.
- D.
Use a REST based integration from the workflow
- Would
require wrapping Java interfaces in REST endpoints first. Adds
unnecessary complexity.
✅ Correct Answer
B. Develop a custom Java component using Component
Integrator to invoke the legacy application
⚡ Extra Tip:
- Component
Integrator (CI) = extend workflow functionality using custom Java/.NET
classes.
- Useful
when:
- Calling
external apps/APIs.
- Doing
specialized business logic not natively supported in workflow steps.
- Integrating
with legacy systems with existing Java libraries.
What is the primary use of FileNet Deployment Manager?
- A. Deployment
of custom jar files into the selected J2EE server
- B. Deployment
of the base application into the selected J2EE server
- C. Propagating
patched files to IBM supplied applications as part of maintenance
operations
- D. Propagating
incremental sets of changes from a source environment to a subset of the
existing objects in a destination environment
🔹 Option Analysis
- A.
Deployment of custom jar files into the selected J2EE server
- Not
exactly. DM is not just a generic JAR deployer — it’s for propagating FileNet
objects/configurations.
- B.
Deployment of the base application into the selected J2EE server
- DM
can deploy the base application, but that’s not its primary use in
day-to-day operations.
- C.
Propagating patched files to IBM supplied applications as part of
maintenance operations
- DM
doesn’t patch the application binaries; maintenance fixes are handled
separately.
- D.
Propagating incremental sets of changes from a source environment to a
subset of the existing objects in a destination environment ✅
- Correct.
- Deployment
Manager is used to migrate changes (like object store
configuration, workflow definitions, custom workflow components, domain
changes) from one environment (e.g., Dev/Test) to another (e.g.,
QA/Prod).
- Supports
incremental deployment, selectively choosing objects to propagate.
✅ Correct Answer
D. Propagating incremental sets of changes from a source
environment to a subset of the existing objects in a destination environment
⚡ Tip:
- Typical
use case:
- Dev
environment → create new workflow / object store objects.
- DM
exports changes → produces .dat files or deployment packages.
- Import
into QA/Prod → incremental update without overwriting the whole system.
Which of these are TYPICAL uses for extending P8 with subscription event handlers?
- A. Checking
a database partition for adequate space before storing large content.
- B. Monitoring
server environmental factors like temperature and power consumption.
- C. Launching
a workflow in response to a document creation, modification, or deletion.
- D. Generating
nightly statistical reports of the numbers of documents using storage
areas.
🔹 What are Subscription
Event Handlers?
- Subscription
event handlers are server-side listeners in CPE.
- They
react to content or object store events: create, update, delete,
move, check-in, etc.
- They
are tightly integrated with the object store and run in response to
specific events.
- Common
uses: launching workflows, sending notifications, custom business logic.
🔹 Option Analysis
- A.
Checking a database partition for adequate space before storing large
content
- ❌
Not typical. DB/storage monitoring is handled by infrastructure, not
subscription handlers.
- B.
Monitoring server environmental factors like temperature and power
consumption
- ❌
Definitely not — this is hardware/ops monitoring, not FileNet-level
events.
- C.
Launching a workflow in response to a document creation, modification, or
deletion ✅
- ✅
Classic use case.
- Example:
New invoice document → trigger workflow for approvals automatically.
- D.
Generating nightly statistical reports of the numbers of documents using
storage areas
- ❌
Not event-driven; this is a scheduled/batch reporting job, not
subscription events.
✅ Correct Answer
C. Launching a workflow in response to a document
creation, modification, or deletion
⚡ Tip:
- Subscription
handlers are event-driven, not scheduled.
- Good
real-world uses:
- Auto-classification
of documents.
- Triggering
workflows for compliance.
- Sending
notifications when sensitive documents are added.
Which IBM
FileNet Content Manager tool facilitates migrating all or part of the FileNet
P8 system or application from one environment to another?
- A. FileNet
Process Designer
- B. FileNet
Process Administrator
- C. FileNet
Deployment Manager (FDM)
- D. IBM
Administration Console for Content Engine Platform (ACCE)
🔹 Option Analysis
- A.
FileNet Process Designer
- ❌
Used to design workflows and business processes, not for migrating
system objects.
- B.
FileNet Process Administrator
- ❌
Used to monitor and manage workflow instances, not for migrating
applications.
- C.
FileNet Deployment Manager (FDM) ✅
- ✅
This is the exact tool for migrating all or part of a FileNet
P8 system (object stores, workflows, domain configurations) from source
environment → destination environment.
- Supports
incremental migrations, selective object migration, and ensures dependencies
are maintained.
- D.
IBM Administration Console for Content Engine Platform (ACCE)
- ❌
Primarily for administration/configuration of domains, object
stores, and security. Not for cross-environment migration.
✅ Correct Answer
C. FileNet Deployment Manager (FDM)
⚡ Tip:
- FDM
is used heavily in Dev → QA → Prod migrations.
- Typical
workflow:
- Export
objects/changes in source.
- Package
them using Deployment Manager.
- Import
into target environment.
- Validate
dependencies and workflow triggers.
Which
event log is automatically created during the creation of an isolated region?
- A. VW_WO
System OperationMsg
- B. EventLog
- C. DefaultEventLog
- D. VW_EventLog
🔹 Background
- In
FileNet P8, an isolated region is a logical separation of
workflow execution — used to isolate workloads or run specific
workflows independently.
- When
an isolated region is created, a default event log is automatically
created to capture workflow and system events within that region.
🔹 Option Analysis
- A.
VW_WO System OperationMsg
- ❌
Specific to work object/system messages, not the default event log for a
region.
- B.
EventLog
- ❌
Generic term, not the actual log name used by PE.
- C.
DefaultEventLog ✅
- ✅
Correct.
- FileNet
automatically creates DefaultEventLog when an isolated region is
set up.
- Captures
workflow events, system messages, and exceptions within that
region.
- D.
VW_EventLog
- ❌
Used for workflow-specific events but not automatically created for an
isolated region.
✅ Correct Answer
C. DefaultEventLog
⚡ Tip:
- You
can view DefaultEventLog via Process Administrator or query via PE
APIs.
- Best
practice: don’t delete it, as it is required for region-level monitoring
and troubleshooting.
What is
Administration Console for Content Platform Engine (ACCE) replacing?
- A. System
Manager
- B. Configuration
Manager
- C. Deployment
Manager
- D. FileNet
Enterprise Manager
🔹 Background
- ACCE
(Administration Console for Content Platform Engine) is the web-based
admin console for managing:
- Domains
- Object
stores
- Security
(users/groups)
- Document
classes, properties, and lifecycles
- It
was introduced to replace older desktop-based management tools.
🔹 Option Analysis
- A.
System Manager ✅
- ✅
Correct.
- System
Manager was the Windows desktop application used in early
FileNet versions to manage CE domains, object stores, and configuration.
- ACCE
replaces System Manager with a modern, browser-based interface.
- B.
Configuration Manager
- ❌
Not replaced by ACCE; Configuration Manager is a different utility for
exporting/importing object definitions.
- C.
Deployment Manager
- ❌
FDM is still a separate tool for migrating objects and workflows.
- D.
FileNet Enterprise Manager
- ❌
This is for process/workflow design in older versions, not CE admin.
✅ Correct Answer
A. System Manager
⚡ Tip:
- ACCE
is cross-platform (browser-based) and integrates security,
object store, and domain administration in one place.
- Legacy
System Manager is deprecated in modern FileNet P8 deployments.
Where are
the application server logs located in a typical IBM WebSphere CPE
installation?
- A. install_root/profiles/<profile-name>/logs/<server-name>
- B. install_root/user_projects/domains/<domain-name>/servers/<server-name>/logs
- C. install_root/server/<server-name>/log
- D. <Deployed_CPE_home_dir/FileNet/<server-name>
🔹 Background
- Content
Platform Engine (CPE) runs inside a WebSphere Application Server
(WAS) profile.
- Each
WAS server instance has its own set of logs:
- SystemOut.log
→ standard output (startup messages, CPE logs)
- SystemErr.log
→ errors and exceptions
- The typical
log location depends on the WAS profile, not the CPE EAR
location.
🔹 Option Analysis
- A.
install_root/profiles/<profile-name>/logs/<server-name> ✅
- ✅
Correct.
- This
is the default WebSphere location for all server logs including
CPE logs (SystemOut.log, SystemErr.log, p8_server_out.log).
- B.
install_root/user_projects/domains/<domain-name>/servers/<server-name>/logs
- ❌
This is WebLogic-style directory, not WebSphere.
- C.
install_root/server/<server-name>/log
- ❌
Not a WebSphere standard path.
- D.
<Deployed_CPE_home_dir/FileNet/<server-name>
- ❌
The deployed EAR does not contain WAS runtime logs.
✅ Correct Answer
A.
install_root/profiles/<profile-name>/logs/<server-name>
Which of the following is NOT true about authentication for P8 custom applications?A Kerberos is available with the CE .NET API.
- B. Kerberos
is available with the CE Java API when using CEWS transport.
- C. The
CE Java API with EJB transport does not know or care what form of
authentication was actually used as long as it is trusted by the CE
application server
- D. The
CE Java API with CEWS transports unencrypted credentials. For protection,
an encrypted connection using TLS/SSL should be used.
🔹 Option Analysis
- A.
Kerberos is available with the CE .NET API.
- ✅
True. CE .NET API supports Kerberos authentication for single sign-on
environments.
- B.
Kerberos is available with the CE Java API when using CEWS transport.
- ✅
True. When using CE Web Services (CEWS) transport, Java API can
leverage Kerberos for SSO.
- C.
The CE Java API with EJB transport does not know or care what form of
authentication was actually used as long as it is trusted by the CE
application server
- ✅
True. The EJB transport is server-to-server trusted connection, so
the client doesn’t need to handle auth explicitly.
- D.
The CE Java API with CEWS transports unencrypted credentials. For
protection, an encrypted connection using TLS/SSL should be used.
- ❌
Not strictly true anymore.
- CEWS
can be configured to use WS-Security, Kerberos, or TLS/SSL. By
default, you can also send credentials over HTTPS (encrypted). Saying it
“transports unencrypted credentials” is misleading—it depends on
configuration.
✅ Correct Answer
D. The CE Java API with CEWS transports unencrypted
credentials. For protection, an encrypted connection using TLS/SSL should be
used.
Which is
the best way for custom applications to get information at runtime about the
data model of a P8 system?
- A. Read
the repository database schema and mapping the table and column names to
classes and properties.
- B. Use
P8 APIs to examine metadata objects like Class Descriptions and Property
Descriptions.
- C. Study
IBM FileNet product documentation along with custom application functional
specifications.
- D. Use
IBM InfoSphere Master Data Management tools to discover relationships and
data types.
🔹 Option Analysis
- A.
Read the repository database schema and mapping the table and column names
to classes and properties
- ❌
Not recommended.
- The
underlying DB schema is internal, not guaranteed to be stable
across versions or patches. Direct DB access is unsupported for metadata
discovery.
- B.
Use P8 APIs to examine metadata objects like Class Descriptions and
Property Descriptions ✅
- ✅
Correct.
- The
Content Engine (CE) APIs provide programmatic access to:
- Object
Store classes (DocumentClass, FolderClass, etc.)
- Property
definitions (PropertyDescription)
- Relationships
and lifecycle information
- Safe,
supported, and works at runtime for dynamic applications.
- C.
Study IBM FileNet product documentation along with custom application
functional specifications
- ❌
Helpful for design, but cannot provide runtime metadata.
- D.
Use IBM InfoSphere Master Data Management tools to discover relationships
and data types
- ❌
Not relevant for FileNet runtime metadata access. InfoSphere is for
MDM/ETL scenarios.
✅ Correct Answer
B. Use P8 APIs to examine metadata objects like Class
Descriptions and Property Descriptions
⚡ Key Tip:
- Using
CE API (com.filenet.api.admin.*) you can programmatically discover
classes, properties, choice lists, and relationships.
- This allows dynamic applications that adapt to schema changes without code modification.
- Which is the best way for custom applications to get information at runtime about the data model of a P8 system?
- A. File
Storage areas
- B. Stored
searches
- C. Class
definitions
- D. Property
definitions
🔹 Option Analysis
- A.
File Storage areas ✅ Cannot be migrated via
FDM
- Correct.
Storage areas are environment-specific and deal with physical
content storage paths on the server or network.
- FDM
only migrates metadata and configuration objects (classes,
properties, workflows, stored searches, etc.), not actual storage
configurations.
- Storage
areas must be manually created in the target environment.
- B.
Stored searches
- ✅
Can be exported/imported via FDM.
- C.
Class definitions
- ✅
Fully supported in FDM migrations.
- D.
Property definitions
- ✅
Fully supported in FDM migrations.
✅ Correct Answer
A. File Storage areas
⚡ Tip:
- When
planning migrations:
- Object
store definitions, class/property metadata, workflows, security groups
→ use FDM
- Physical
storage areas, DB connections, server-specific settings → must be configured
manually in target environment
IBM
FileNet Process Designer is the tool used to create work flow definitions. This
tool also provides access to other commonly used tools, provided you have the
proper access rights. What are the proper access rights?
- A. Process
Administration, Process Analyzer, and Simulation
- B. FileNet
Enterprise Manager, Process Administration, Process Configuration
- C. Process
Configuration, Process Administration, and Simulation
- D. Process
Configuration, Process Administration, Process Analyzer, and Simulation
🔹 Background
- Process
Designer (PD) is used to design workflows in FileNet P8.
- PD
provides integration/access to other Process Engine tools, but only
if the user has the appropriate security rights/roles.
- Typical
tools you can access from PD:
- Process
Configuration – modify workflow configurations, step assignments,
queues.
- Process
Administration – monitor and manage running workflow instances.
- Process
Analyzer – workflow metrics and reports.
- Simulation
– simulate workflow execution before deployment.
🔹 Option Analysis
- A.
Process Administration, Process Analyzer, and Simulation
- ❌
Missing Process Configuration. You need it to design and configure
workflows.
- B.
FileNet Enterprise Manager, Process Administration, Process Configuration
- ❌
FileNet Enterprise Manager is not part of PD toolset access; it’s
for legacy workflow/ECM management.
- C.
Process Configuration, Process Administration, and Simulation
- ❌
Missing Process Analyzer → can’t access workflow metrics/reports.
- D.
Process Configuration, Process Administration, Process Analyzer, and
Simulation ✅
- ✅
Correct. Full access rights for PD to use all integrated workflow
tools.
✅ Correct Answer
D. Process Configuration, Process Administration, Process
Analyzer, and Simulation
⚡ Tip:
- In
practice, access is controlled via Process Engine roles in ACCE.
- Without
proper rights, PD may still open but buttons/menus for integrated tools
will be grayed out.
Which of
the following is NOT a standard, out-of-the-box feature of P8 security?
- A. There
is a mechanism for default permissions by document class.
- B. There
is a mechanism for automatically adjusting permissions during
checkout/checkin cycles.
- C. Security
can be modified individually on business objects.
- D. There
is a mechanism for automatically adjusting permissions based on date and
time.
🔹 Option Analysis
- A.
There is a mechanism for default permissions by document class ✅
- True.
You can define default ACLs at the document class level.
- B.
There is a mechanism for automatically adjusting permissions during
checkout/checkin cycles ✅
- True.
Check-out/check-in can preserve ACLs and apply security
inheritance rules.
- C.
Security can be modified individually on business objects ✅
- True.
You can assign object-level ACLs on documents, folders, workflows,
etc.
- D.
There is a mechanism for automatically adjusting permissions based on date
and time ❌
- Not
true. FileNet P8 OOTB security does not provide time-based permission
changes.
- To
implement this, you’d need custom code, subscription event handlers,
or workflow automation.