Which four of the following are valid settings for an organization's location data security?
Answer : C, D, E, G
ftp://public.dhe.ibm.com/software/solutions/curam/6.0.4.0/en/BusinessAnalysts/
CuramLocationAdministrationGuide.pdf
Which two of the following handle communications in IBM Cram?
Answer : A, B
What is a communication exception?
Answer : A
https://www.ibm.com/support/knowledgecenter/SS8S5A_6.0.5/com.ibm.curam.content.doc/
Communications/c_COMM_FeaturesExceptions.html
Which three of the following are IBM Cram Verification Engine components?
Answer : B, C, E
Which three of the following elements of a user's profile can be used to prevent them from successfully logging into IBM Cram?
Answer : B, E, F
Which provider status is required in order to provision services in IBM Cram Provider Management?
Answer : A
ftp://public.dhe.ibm.com/software/solutions/curam/6.0.5.0/en/pdf/Administrators/
CPMConfigurationGuide.pdf
Which of the following performs runtime execution of a workflow process?
Answer : B
ftp://public.dhe.ibm.com/software/solutions/curam/6.0.4.0/en/BusinessAnalysts/
CuramWorkflowOverviewGuide.pdf (39)