YouTube Icon

Interview Questions.

Top 100+ Sterling Integrator Consultant Interview Questions And Answers - Jun 02, 2020

fluid

Top 100+ Sterling Integrator Consultant Interview Questions And Answers

Question 1. What Are The Advantages Of Ibm Sterling B2b Integrator ?

Answer :

Sterling B2B Integrator is designed to be configured strategically across the precise techniques critical for your employer's achievement.

Its systematic and managed technique supports your integration requirements for each transaction-oriented and batch procedures, and works with each pre-present Electronic Data Interchange (EDI) protocols and Internet-primarily based XML protocols. 

Question 2. Sterling B2b Integrator 5.2 System Requirements ?

Answer :

System requirements for IBM® Sterling B2B Integrator vary with your business wishes and device environment. Contact your Sterling B2B Integrator sales consultant to help you compare performance and gadget utilization requirements.

Contributing factors consist of (but aren't restricted to) the subsequent: 

Number of transactions processed. 
Amount of facts being transferred. 
Whether you run Sterling B2B Integrator without or with perimeter servers. 
Whether your surroundings is clustered (a couple of node) or non-clustered (unmarried node).
The following sections list the systems and databases that are supported by way of Sterling B2B Integrator: 

Platforms
Databases
The following sections list minimal gadget requirements, and other information,needed to set up and run Sterling B2B Integrator on unique structures: 

IPv6 Capabilities
UNIX/Linux Requirements
Windows Requirements
iSeries Requirements
The following sections list extra records that is needed to installation and run Sterling B2B Integrator: v JCE Requirements (All Platforms)

JDBC Driver Requirements (All Databases)
Perimeter Server Requirements (UNIX/Linux and Windows)
Internet Browser and Plugin Requirements (All Platforms)
Map Editor and Graphical Process Modeler System Requirements
Supported Third Party Software
Project Management Interview Questions
Question 3. What's New In Sterling B2b Integrator ?

Answer :

Sterling B2B Integrator 5.2 Enhancements

Soft Stop of Sterling B2B Integrator

Sterling B2B Integrator five.2 now has the capacity to gracefully prevent the machine—permitting current approaches the possibility to finish, be transferred to other cluster nodes or be saved for resumption after restart. This saves time via casting off the want to manually observe and resume tactics after a restart.

The softstop functionality blended with a rolling restart of nodes will permit for minimum interruption of processing. You can provoke the tender stop command from either the UI or from the command line.

The soft forestall UI affords the capability to interactively step thru the shutdown process taking into account:

The switch of a running enterprise tactics to other cluster nodes or to the database for healing
The capability to control the finishing touch of queued enterprise tactics at the nearby node
The capacity to expose the repute of adapter pastime and open sessions Performance Tuning Utility
Sterling B2B Integrator 5.2 includes an updated software that calculates the tuning parameter values for you. You can use the Performance Tuning utility to tune and configure Sterling B2B Integrator in line with your desires. 

Queue settings can be modified, as well as memory allocations, JVM settings, and pool settings. Additionally, future Sterling B2B Integrator patches will now not overwrite the performance tuning changes made by means of the Performance Tuning utility.

Sterling B2B Integrator License Files

You no longer want to touch IBM to collect a license document previous to product set up. Product functionality is grouped into massive supplying areas. During installation, you should pick out the product offerings applicable on your buy and a bundled license record could be used.

Sterling Standards Library 8.Zero

Applying Sterling B2B Integrator, Release 5.2 routinely includes Sterling Standards Library eight.Zero. Your precise standards implementation will rely upon the phrases of your licensing settlement.

Sterling Standards Library version eight.0 provides guide for the subsequent X12 5010

HIPAA transactions:

v 5010 220A1 834
v 5010 221A1 835
v 5010 222A1 837
v 5010 223A2 837
v 5010 224A2 837
v 5010 279A1 270
v 5010 279A1 271

Question four. Sterling B2b Integrator For Financial Services Overview ?

Answer :

Sterling B2B Integrator for Financial Services is the answer that enables banks, dealer-dealers, funding managers, and market infrastructures in bills, securities, treasury and trade to optimize monetary quarter manner integration—both internally and with external companies and groups—for cozy give up-to-give up control of financial records trade.

This product leverages components of Sterling B2B Integrator to allow report transfer and translation talents the use of economic-enterprise shipping kinds and messaging codecs. Enhanced reporting and notification tools provide progressed insight into business techniques, furthering your purpose to create a sustainable competitive benefit. Available components consist of pre-built guide for financial requirements and protocols, services, adapters, code lists, pre-loaded DTDs and schemas within the Map Editor, and tools together with Reporting Services and the SWIFT Editor.

With Sterling B2B Integrator for Financial Services, you could combine current systems with a gateway solution presenting visibility and simplified error/exceptions control, such as routing of files and messages into legacy structures. This whole and streamlined automation of procedures assist you to reduce fees, increase revenue, and enhance patron delight whilst leveraging Sterling B2B Integrator safety features to offer cozy, non-repudiated exchange of B2B statistics.

Depending for your needs, Sterling B2B Integrator for Financial Services may be a easy record transfer solution for monetary files, a translation engine supporting financial standards and people of your again workplace systems, or a complicated complete gateway solution involving all kinds of document switch, intelligent routing, translation, and transmission sports. Your answer can be configured to be absolutely convertible between payments networks, platform agnostic, and deployed in the back of the corporate firewall. If needed, IBM® Support let you personalize Sterling B2B Integrator for Financial Services to allow full payload inspection and custom designed visibility into files processed. Sterling B2B Integrator for Financial Services is rather scalable to suit your evolving needs.

Sterling B2B Integrator for Financial Services makes process continuity of enterprise finance a part of your organization's included cost chain, shared by the enterprise companions and monetary institutions that make up your B2B groups. 

Project Management Tutorial
Question five. Sterling B2b Integrator For Financial Services Supported Standards And Protocols ?

Answer :

The range of communications structures and requirements makes it hard to respond to client needs for higher and extra comprehensive carrier. Sterling B2B Integrator for Financial Services' integrated aid for monetary standards reduces the facts technology costs concerned in custom coding and enables you to extra fee-effectively combine disparate structures to overcome data silos. Pre-described economic requirements are automatically loaded into the Sterling B2B Integrator Map Editor graphical mapping device, which include code lists. With Sterling B2B Integrator for Financial Services, you can translate and pass statistics among many special environments.

The following financial offerings standards are supported, but aren't constrained to:

FIX, FIXML, FpML, IFX
ISO 8589, 20022, and 150222, such as TWIST
XBRL
NACHA ACH
SWIFTNet FIN MT messages (2005 & 2006) and SWIFTNet MX messages (along with those unique to SWIFT Solutions)
TARGET2
EBA STEP2
Adv Java Interview Questions
Question 6. What Are Various Types Of Extended Rules ?

Answer :

Pre-Session extended rules: These policies outline variables that have global scope and can be accessed from some other extended rule in the map. They are processed earlier than the translation item is processed. 

Post-Session popular guidelines: These rules run after the translation item is processed and have no permanent scope.

On-Begin prolonged rules: The On-Begin rules are processed earlier than the begin of the institution iterations and earlier than any variables inside the group are instantiated. 

On-End extended regulations: The On-End policies are processed after the end of the institution.

Question 7. Explain About Update Standard Rule ?

Answer :

The Update general rule: flow statistics from a field within the map into procedure information, to replace manner data so that the statistics can be used some place else in the BP, to file file-unique parameters at some point of translation, and to check for reproduction facts. 
Document extraction: load values into the Sender ID, Application Sender ID, Receiver ID, Application Receiver ID, and Accepter Lookup Alias discipline values inside the Document Extraction desk, so that the Document Extraction service can placed those values in procedure information, along side an associated output file. 
Process information: service-impartial XML DOM related to a BP that holds facts related to the BP, which you engage with the usage of XPath. 
Correlation facts: file report-unique correlation parameters all through translation.
Transaction check in: specify a discipline for that you want to test for duplicate data (the use of the Update general rule Transaction Register feature) after which invoke it (using the Select popular rule Transaction Register function) to verify whether the sector incorporates duplicate statistics.
Transaction XREF: cross-reference the utility statistics to generated transaction.
Adv Java Tutorial Core Java Interview Questions
Question 8. Explain About Select Standard Rule ?

Answer :

The Select trendy rule: companion a discipline with a TP code listing, a segment in manner records, a file envelope, and use the transaction check in function.Document envelope: aid TRADACOMS enveloping to allow the map to extract values from the envelope definition and use them within the map. Trading associate code list: listing of codes which are dynamic, related to buying and selling partners, and stored inside the Application database. Process facts: carrier-impartial XML DOM related to a BP that holds statistics associated with the BP, that you engage with using XPath. Transaction check in: specify a subject for that you want to see if it consists of reproduction information (the use of the Update fashionable rule Transaction Register characteristic) and then invoke it (using the Select wellknown rule Transaction Register characteristic) to affirm whether or not the field incorporates reproduction data.

Question nine. Explain About Promote Function ?

Answer :

The Promote characteristic extracts one new release (example) of one of the following map additives :

Group
Repeating report
Repeating element
Repeating composite
Promote is a specialized model of the Split characteristic. For example, if you have a group with 50 iterations and you pick out Promote, then you definitely have  agencies: one institution with an iteration of 1 and a group that iterates 49 times. 

The Promote characteristic is to be had best if a set or repeating report, detail, or composite is selected.

Promote characteristic enables you to map specific data from a record and to kind a specialised definition.

Oracle Interview Questions
Question 10. Explain About Split Function ?

Answer :

The Split feature can be used to split the subsequent items into  companies:

Group
Repeating record
Repeating detail
Repeating composite
After the break up operation is executed, the man or woman iterations of the 2 groups that have been created with the aid of splitting a set upload as much as the unique variety of iterations of the group earlier than the cut up. 

The Split feature is available most effective if a group or repeating document, element, or composite is chosen.

Use the Split characteristic whilst you need a couple of example of a map component that happens a couple of times.

Core Java Tutorial
Question eleven. Where To Use Temporary Records And Fields ?

Answer :

You can upload brief information and fields at any hierarchical degree in a map. However, whilst you use brief data and fields, you ought to find them after the map element that includes the essential statistics.

You ought to use a document tag which you could never get hold of to your Input record, and the endorsed default is $$$.

If you're growing a transient record for an XML report, use the tag XXX, because $$$ isn't accepted as a tag in XML.

The translator does now not run widespread or prolonged regulations on brief facts.

Oracle 11g Interview Questions
Question 12. When To Use Temporary Records And Fields ?

Answer :

Use transient statistics and fields
When you can not use a simple link or in case you must extract best unique occurrences of a document from your records record.
If you must map from a repeating map component to a single map aspect, or vice versa.
If the Input hierarchical level in a map does not fit the Output hierarchical stage.
If you handiest need to populate an Output discipline with statistics if a distinct qualifier is used or if precise standards is met.
If you must use extended guidelines further to developing transient facts and fields.
Project Management Interview Questions
Question thirteen. Explain The Process In Migration Map Development?

Answer :

We will analyse the business regulations on the mapping for the patron within the manufacturing device then we can create the specification.

We will take a look at the map by using taking existing production device input report and run that in SI then examine current manufacturing gadget to corresponding output document.

Oracle 11g Tutorial
Question 14. Explain The Execution Of A Map In Si Map Editor?

Answer :

In map editor, what are all of the conditions and variables listed inside the pre consultation rule that will execute first because presession regulations gets execute at the beginning of the translation. 

And then it's going to check the group or document if is there any on start rule so that it will execute subsequent. 

Then it goes in to fields within the report, if is there any Standard rule/ Extended rule we follow for the field so one can execute Extended rule for the sphere could be carried out. 

At the stop of the report, on end rule will be carried out if we write any situations there.

Question 15. How Does Encryption Works ?

Answer :

Encryption is a technique of changing plaintext (text this is readable by people) into ciphertext (textual content that is meaningless to humans). There are many special methods of encryption, a few more potent than others. Two important classes of encryption are symmetric and asymmetric. 

In symmetric cryptography, the equal key that encrypts a record also decrypts it. In uneven cryptography, which is what PGP uses, one key (the general public key) encrypts the document, and the other key (the personal key) decrypts it. So, if person A desires to send an encrypted message to user B, consumer A could first obtain user B’s public key.

This is viable due to the fact public keys are supposed to be extensively dispensed. Then user A encrypts the message the use of person B’s public key. The encrypted message can now most effective be decrypted with B’s personal key, which best he possesses. Not even consumer A, who wrote the message, can decrypt what he has encrypted, due to the fact he does now not possess person B’s personal key. 

This ensures that the message is unreadable via all and sundry apart from consumer A. Encryption and signing are often mixed. 

In this situation, consumer A could use consumer B’s public key to encrypt the message, then use his personal personal key to sign the message. This will ensure that nobody however user B can examine the message, and whilst consumer B receives it, he may be confident that the message become now not altered. To examine the message, userB could first use consumer A’s public key to affirm that the signature matches. 

Then person B could use his personal key to decrypt the message that consumer A wrote.

SQL Interview Questions
Question sixteen. What Are The Uses Of Pgp ?

Answer :

The most typically used component of PGP is the signing and encryption of e mail or files. “Signing” a file is a manner of verifying the integrity of the unique work. 

The approach is as follows:

Make a digest or “hash” of the report or email. A hash is an set of rules that produces (theoretically) a completely unique output (the hash) from a given input (the message).
Add the hash to the quit of the message.
When someone wants to verify that the message has now not been changed, they run the hash set of rules on the message and compare it to the hash at the stop of the message. If the signatures healthy, the message has no longer been altered.
Java Tutorial
Question 17. How Does Pgp Work ?

Answer :

When someone begins the usage of PGP, they generate a Key Pair. These are clearly just textual content documents that appear like gibberish to a human. The keys can be created at diverse degrees of energy – 512, 1024, or 2048 bit strengths are used. The better the quantity, the more potent the encryption value of the important thing. One key of the pair is the Private key – this key should constantly be kept secure and by no means given to all and sundry. The different key is the public key – this key need to receive to as many people as feasible.

Java Interview Questions
Question 18. What Is Pgp?

Answer :

Pretty Good Privacy turned into at first advanced with the aid of Phillip Zimmerman to offer a way of relaxed verbal exchange in an insecure electronic environment. “Pretty Good” is an understatement – the framework it's far primarily based on, PKI (Public Key Infrastructure) and its encryption standards (it can use Diffie-Helman or RSA algorithms of varying strengths), had been subjected to rigorous cryptanalysis.

PGP has given that grown right into a more flexible software beneath the direction of its current proprietor, Network Associates (www.Nai.Com). Until the most latest launch PGP has been completely open source, permitting absolutely everyone to review the code and endorse enhancements.

Adv Java Interview Questions
Question 19. What Is The Risk For Using As2 ?

Answer :

There is no more chance worried with transactions over AS2 then there would be with any shape of regular e-Business transactions. If there's any threat with AS2, it's far a ways outweighed through the value financial savings implicit in its operation.

Unix/Linux Tutorial
Question 20. What Is Required To Exchange Data Using As2 ?

Answer :

A devoted chronic Internet connection
A internet server along with your EDIINT software program
Deloitte Tax Consultant Interview Questions
Question 21. What Are The Benefits Of Using As2 ?

Answer :

AS2 gives quicker, almost immediate records transfers directly in your network and decreases the factors of failure in statistics transmissions. Using AS2 gets rid of daily fee-added network (VAN) fees and long distance dial-ups. AS2 also offers increased reliability and sped, improving deliver-chain efficiency. Listed below are some of the principle benefits of the usage of AS2:

24x7 availability
Designed to push statistics securely and reliably over the Internet
Fast and dependable connectivity
Encryption ensures that only the sender and receiver can view the data
Digital signatures make certain authentication
AS2 detects if the record changed into altered at some point of transmission
Non-repudiation of receipt confirms that the supposed celebration received the facts
Faster turn-round time for commercial enterprise procedures
Question 22. How Does As2 Work ?

Answer :

AS2 presents an Internet answer for securely replacing EDI over the Internet the usage of Multipurpose Internet Mail Extensions (MIME) and the hypertext transmission protocol (HTTP) rather than the easy mail shipping protocol (SMTP) as the transport protocol. AS2 specifies the approach to connect, deliver, validate, and respond to (receipt) information in a secure and dependable way. AS2 does now not difficulty itself with the content of the EDI report, most effective the transport.

AS2 basically creates a wrapper round EDI flat documents that permits sending them over the Internet, as opposed to the use of a dial-up connection to a fee-introduced network (VAN). AS2 is a actual-time generation that offers security and encryption across the HTTP packets.

Unix makefile Tutorial
Question 23. What Is Ediint ?

Answer :

EDI over the Internet (EDIINT) is a running institution of the Internet Engineering Task Force (IETF). Formed in February of 1996, EDIINT became chartered by the IETF to create a fixed of comfy protocols for sending EDI facts over the Internet. The two EDIINT standards which have been certified are AS1 and AS2.

Unix/Linux Interview Questions
Question 24. What Is Primary Document ?

Answer :

Primary file is the core report in the business system consisting of Purchase Order.

Core Java Interview Questions
Question 25. Explain About Light Weight Jdbc Adapter ?

Answer :

It allows us to Retrieve information from a JDBC database or Update a JDBC database as a part of a business procedure with within the Sterling Integrator.

Question 26. Explain About Document Extraction Service ?

Answer :

It can be used to break up person documents out of a batch report to make each one a separate report.

Related services: EDI encoder, EDI envelop, for Each.

Configuration:

Document call prefix:
EDI encode record:
EDI envelop report:
Error on unrecognized data:
Halt on trans error.
Question 27. Explain “messages Only” In Bp Configuration ?

Answer :

Only the messages you explicitly specify in the messages could be despatched. Please word which you is probably lacking such essential Parameters because the PrimaryDocument and many others. You ought to care for the whole thing yourself!

Oracle Interview Questions
Question 28. Explain “gain Process Data First, Then Messages” ?

Answer :

First all the parameters/ variables from Process Data might be sent, then your variables on top of it protecting the values in Process statistics.

Question 29. Explain "attain Message First, Then Process Data" ?

Answer :

This will send your parameters to the carrier but will overlay them with whatever is in Process Data at that time.

Question 30. Explain About Translation Service ?

Answer :

Performs translation of primary file the use of a certain map and replaces the number one report with the result of the interpretation.

For example if we want to translate a file from positional to delimited, first we are the use of SI map editor to translate a report from positional to delimited and create a brand new enterprise technique that puts the statistics into the number one file after which begin the translation service. The translation service translate the number one record into positional to delimited.

    Configuration:

Map name: provide the call of the map.
Question 31. Explain About File System Adapter Service [fsa] ?

Answer :

FSA is used to collects (import) documents from the record machine and extracts (exports) files to the record gadget. The gathered report becomes the number one report in a business system.

     Configuration: e5 fille system adapter.

Action : collection (or) extraction
Assigned file name : sample.Txt
Assign file call: assign unique call.
Bootstrap: no, (If sure we need to deliver the BP name within the preliminary workflow id parameter and that BP runs as a toddler BP).
Collection folder: course
Extraction folder: course
Filter: handiest for series. [*(all), *.Txt (collects only .Txt files), *.Dat (collects only .Dat files)]
Question 32. Explain About X12 Deenvelope Service ?

Answer :

It handles deenveloping of inbound x12 interchanges and also generates 997 and TA1 acknowledgements. For instance an inbound buy order is obtained inner an x12 interchange. The EDI envelops are parsed and the file envelops that suit the envelop information are retrieved. With the record envelops this provider understand what to do with the acquisition order, which includes kicking off a commercial enterprise procedure that carry out a few business good judgment.

Question 33. Explain About X12 Envelop Service ?

Answer :

It handles the enveloping of outbound x12 interchanges. For example, an outbound purchase order is to be despatched interior an x12 interchange. The report envelops that fit the sender identification, receiver id, acceptor lookup alias distinctive within the EDI encoder service are retrieved. If required through the ST envelop, translation is achieved using the map certain by way of envelop. The ST,GS,ISA envelops are implemented to the output of the map.

Oracle 11g Interview Questions
Question 34. Explain About Edi Encoder Service ?

Answer :

It determines which transaction stage envelop will be used on the record. If translations are specified in an envelop, this provider determines which map to apply.

  Configuration:

Accepter lookup alias:
EDI Standard:
Mode: on the spot (or) deferred.
Receiver identity:
Sender identification:
Question 35. Explain About Time Stamp Utility Service ?

Answer :

The time stamp utility provider allows you to create time stamp values to the enterprise procedure for the modern time.

  Configuration: time stamp utility.

Format: mmss
Scale: milliseconds.
Question 36. Explain About Assign Service ?

Answer :

Assign service is used for to shop values into a variable; values may be constant cost or process information fee. We can area values into procedure statistics.

   Configuration:

Append : false
Constant :
From:
To:
SQL Interview Questions
Question 37. Explain About Bp Metadata Info Service ?

Answer :

It presents the entire information and homes of the commercial enterprise technique and those properties can be to be had in procedure statistics. Some of the homes are

BPID
Process name
Description
State
Status
Type
Correlations
Question 38. What Is Adapter ?

Answer :

It will connect to the outside system with sterling integrator.

Question 39. What Is Xpath ?

Answer :

Xpath is an expression language used to navigate the xml facts.

Question 40. What Is Correlation ?

Answer :

Correlation is used for report tracking.

Correlation facts enable you to document document, a specific correlation parameters generated all through the translations by using the correlation provider or through the report monitoring feature.

Java Interview Questions




CFG