Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Alfresco > APSCA > ACSCA

ACSCA Alfresco Content Services Certified Administrator Question and Answers

Question # 4

A business requires an Alfresco-only tier in their implementation, what are the components that need to be removed from the Alfresco Content Services installation? Select Two.

A.

alfresco-share-services module

B.

AOS module

C.

share.war

D.

alfresco.war

E.

SOLR configurations

Full Access
Question # 5

What are two of the core items involved in backing up and restoring an Alfresco repository?

A.

WAR files

B.

Exploded WAR folders

C.

tomcat/conf directory

D.

Database

E.

Content Stores

Full Access
Question # 6

What happens by default when a user empties the trashcan containing one file? Select One.

A.

The system waits 14 days, then it moves the binary file to the contentstore.deleted folder.

B.

The system waits 14 days, then it deletes the binary file in the contentstore.deleted folder.

C.

The binary file stays in contentstore as it is still referenced by the node table.

D.

The binary file moves to the folder contentstore.deleted immediately.

Full Access
Question # 7

In a clustered Share environment, which one of the following actions sends a cache invalidation messages from the affected Share node to other Share nodes in the cluster?

A.

A document folder is deleted.

B.

An existings site/user dashboard layout is modified.

C.

A site is deleted.

D.

A user is denied access.

Full Access
Question # 8

Which component in an Audit Configuration file uses input data to produce some output, either transforming the data or outputting the data verbatim? Select One.

A.

DataExtractors

B.

DataGenerators

C.

PathMappings

D.

Application

Full Access
Question # 9

Which of the following functions is NOT provided by an authentication subsystem?

A.

CIFS file system authentication.

B.

SSO authentication can be targeted at multiple subsystem instances in the authentication chain.

C.

Password-based authentication for web browsing, Microsoft SharePoint protocol, FTP, and WebDAV.

D.

User registry export (the automatic population of the user and authority database).

Full Access