EXAMPREP | COMPLETE ACTUAL EXAM WITH
DETAILED VERIFIED ANSWERS AND 100%
SOLUTIONS
⩥ At the time of publish, if two data sources have the same order, or
if you don't specify an order, deduplication order is determined by
which of the following?
a. Artifact ID
b. Control Number
c. Priority Job Number
d. Deduplication Hash - a. Artifact ID
⩥ If two emails have identical _____, _____, _______ and header
hashes, then they are duplicates. (Select All That Apply)
a. recipient
b. MD5
c. attachment
d. Message Body Hash - a. recipient
,c. attachment
d. Message Body Hash
⩥ While there is no limit on the number of passwords you add to the
password bank, having more than ______ passwords could degrade
the performance of your processing and imaging jobs.
a. 10
b. 50
c. 100
d. 1000 - c. 100
⩥ The Password Bank layout contains the field Type. What are the
options for this field? (Select All that Apply)
a. Passwords
b. Outlook
c. Lotus Notes
d. Email Encryption Certificate - a. Passwords
c. Lotus Notes
d. Email Encryption Certificate
,⩥ You must enter a passwords for all files in the Password Bank
layout (even if not required) if you want them to decrypt them during
the processing job. True/False. - True
⩥ On the Password Bank layout, if you enter two passwords on the
same line, then the password banks interprets the value as a single
password. True/False. - True - you should separate passwords with a
carriage return so they are on a single line.
⩥ A password can only unlock a single file. True/False. - False - a
password can unlock multiple files.
⩥ Including a password that doesn't belong to a document in your
data set doesn't throw an error or effect the process. True/False. -
True
⩥ You can resolve password bank errors by supplying the correct
password to the bank and then retrying those errors in their
respective processing or imaging jobs. True/False. - True
⩥ Passwords on PST and OST files are automatically bypassed.
True/False. - True
⩥ Match the following profile settings to their definitions.
, Profile Setting
a. Deduplication
b. DeNIST
c. Email Output
d. Extract children .
Definition
i. Determines how to handle items
such as attachments, embedded
objects, and embedded images
during discovery.
ii. Determines the file format
published to the workspace as
MHT or MSG.
iii. Checks electronic files against a
standardized list of known system
files to be removed from the total
document set.