Sterling Integrator consultant Interview Questions & Answers

4 avg. rating (80% score) - 1 votes

Sterling Integrator consultant Interview Questions & Answers

Finding another job can be so cumbersome that it can turn into a job itself. Prepare well for the job interviews to get your dream job. Here's our recommendation on the important things to You need to prepare for the job interview to achieve your career goals in an easy way. Sterling Integrator is an IBM product/service. Sterling Integrator / GIS integration consultants possess the knowledge and experience to ensure success. Some of the roles are Adapter configuration, Web extensions, Business Process modeling, Clustering, load balancing and disaster recovery. Certifications available to master the responsibilities in the field. Follow our Wisdomjobs page for Sterling Integrator Consultant job interview questions and answers page to get through your job interview successfully in first attempt.

Sterling Integrator Consultant Interview Questions

Sterling Integrator consultant Interview Questions
    1. Question 1. What Are The Advantages Of Ibm Sterling B2b Integrator ?

      Answer :

      Sterling B2B Integrator is designed to be configured strategically around the specific processes crucial to your company's success.

      Its systematic and managed approach supports your integration requirements for both transaction-oriented and batch processes, and works with both pre-existing Electronic Data Interchange (EDI) protocols and Internet-based XML protocols. 

    2. Question 2. Sterling B2b Integrator 5.2 System Requirements ?

      Answer :

      System requirements for IBM® Sterling B2B Integrator vary with your business needs and system environment. Contact your Sterling B2B Integrator sales representative to help you evaluate performance and system usage requirements.

      Contributing factors include (but are not limited to) the following: 

      1. Number of transactions processed. 
      2. Amount of data being transferred. 
      3. Whether you run Sterling B2B Integrator with or without perimeter servers. 
      4. Whether your environment is clustered (multiple node) or non-clustered (single node).

      The following sections list the platforms and databases that are supported by Sterling B2B Integrator: 

      1. Platforms
      2. Databases

      The following sections list minimum system requirements, and other information,needed to install and run Sterling B2B Integrator on particular platforms: 

      1. IPv6 Capabilities
      2. UNIX/Linux Requirements
      3. Windows Requirements
      4. iSeries Requirements

      The following sections list additional information that is needed to install and run Sterling B2B Integrator: v JCE Requirements (All Platforms)

      1. JDBC Driver Requirements (All Databases)
      2. Perimeter Server Requirements (UNIX/Linux and Windows)
      3. Internet Browser and Plugin Requirements (All Platforms)
      4. Map Editor and Graphical Process Modeler System Requirements
      5. Supported Third Party Software

    3. Question 3. What's New In Sterling B2b Integrator ?

      Answer :

      Sterling B2B Integrator 5.2 Enhancements

      Soft Stop of Sterling B2B Integrator

      Sterling B2B Integrator 5.2 now has the ability to gracefully stop the system—allowing existing processes the opportunity to complete, be transferred to other cluster nodes or be saved for resumption after restart. This saves time by eliminating the need to manually examine and resume processes after a restart.

      The softstop functionality combined with a rolling restart of nodes will allow for minimal interruption of processing. You can initiate the soft stop command from either the UI or from the command line.

      The soft stop UI provides the ability to interactively step through the shutdown process allowing for:

      1. The transfer of a running business processes to other cluster nodes or to the database for recovery
      2. The ability to control the completion of queued business processes on the local node
      3. The ability to show the status of adapter activity and open sessions Performance Tuning Utility

      Sterling B2B Integrator 5.2 includes an updated utility that calculates the tuning parameter values for you. You can use the Performance Tuning utility to tune and configure Sterling B2B Integrator according to your needs. 

      Queue settings can be changed, as well as memory allocations, JVM settings, and pool settings. Additionally, future Sterling B2B Integrator patches will not overwrite the performance tuning changes made by the Performance Tuning utility.

      Sterling B2B Integrator License Files

      You no longer need to contact IBM to acquire a license file prior to product installation. Product functionality is grouped into large offering areas. During installation, you must select the product offerings applicable to your purchase and a bundled license file will be used.

      Sterling Standards Library 8.0

      Applying Sterling B2B Integrator, Release 5.2 automatically includes Sterling Standards Library 8.0. Your specific standards implementation will depend upon the terms of your licensing agreement.

      Sterling Standards Library version 8.0 adds support for the following X12 5010

      HIPAA transactions:

      v 5010 220A1 834
      v 5010 221A1 835
      v 5010 222A1 837
      v 5010 223A2 837
      v 5010 224A2 837
      v 5010 279A1 270
      v 5010 279A1 271

    4. Question 4. Sterling B2b Integrator For Financial Services Overview ?

      Answer :

      Sterling B2B Integrator for Financial Services is the solution that enables banks, broker-dealers, investment managers, and market infrastructures in payments, securities, treasury and trade to optimize financial sector process integration—both internally and with external enterprises and communities—for secure end-to-end management of financial data exchange.

      This product leverages components of Sterling B2B Integrator to enable file transfer and translation capabilities using financial-industry transport types and messaging formats. Enhanced reporting and notification tools provide improved insight into business processes, furthering your goal to create a sustainable competitive advantage. Available components include pre-built support for financial standards and protocols, services, adapters, code lists, pre-loaded DTDs and schemas in the Map Editor, and tools such as Reporting Services and the SWIFT Editor.

      With Sterling B2B Integrator for Financial Services, you can integrate existing systems with a gateway solution offering visibility and simplified error/exceptions management, including routing of files and messages into legacy systems. This complete and streamlined automation of processes can help you reduce costs, increase revenue, and improve customer satisfaction while leveraging Sterling B2B Integrator security features to provide secure, non-repudiated exchange of B2B information.

      Depending on your needs, Sterling B2B Integrator for Financial Services can be a simple file transfer solution for financial documents, a translation engine supporting financial standards and those of your back office systems, or a complex full gateway solution involving all types of file transfer, intelligent routing, translation, and transmission activities. Your solution can be configured to be fully convertible between payments networks, platform agnostic, and deployed behind the corporate firewall. If needed, IBM® Support can help you customize Sterling B2B Integrator for Financial Services to enable full payload inspection and customized visibility into documents processed. Sterling B2B Integrator for Financial Services is highly scalable to suit your evolving needs.

      Sterling B2B Integrator for Financial Services makes process continuity of business finance part of your organization's integrated value chain, shared by the business partners and financial institutions that make up your B2B communities. 

    5. Question 5. Sterling B2b Integrator For Financial Services Supported Standards And Protocols ?

      Answer :

      The diversity of communications systems and standards makes it difficult to respond to customer demands for better and more comprehensive service. Sterling B2B Integrator for Financial Services' built-in support for financial standards reduces the information technology costs involved in custom coding and enables you to more cost-effectively integrate disparate systems to overcome information silos. Pre-defined financial standards are automatically loaded into the Sterling B2B Integrator Map Editor graphical mapping tool, including code lists. With Sterling B2B Integrator for Financial Services, you can translate and move data among many different environments.

      The following financial services standards are supported, but are not limited to:

      1. FIX, FIXML, FpML, IFX
      2. ISO 8589, 20022, and 150222, including TWIST
      3. XBRL
      4. NACHA ACH
      5. SWIFTNet FIN MT messages (2005 & 2006) and SWIFTNet MX messages (including those specific to SWIFT Solutions)
      6. TARGET2
      7. EBA STEP2

    6. Question 6. What Are Various Types Of Extended Rules ?

      Answer :

      Pre-Session extended rules: These rules define variables that have global scope and can be accessed from any other extended rule in the map. They are processed before the translation object is processed. 

      Post-Session standard rules: These rules run after the translation object is processed and have no permanent scope.

      On-Begin extended rules: The On-Begin rules are processed before the start of the group iterations and before any variables in the group are instantiated. 

      On-End extended rules: The On-End rules are processed after the end of the group.

    7. Question 7. Explain About Update Standard Rule ?

      Answer :

      • The Update standard rule: move data from a field in the map into process data, to update process data so that the data can be used elsewhere in the BP, to record document-specific parameters during translation, and to check for duplicate data. 
      • Document extraction: load values into the Sender ID, Application Sender ID, Receiver ID, Application Receiver ID, and Accepter Lookup Alias field values in the Document Extraction table, so that the Document Extraction service can put these values in process data, along with an associated output document. 
      • process data: service-independent XML DOM associated with a BP that holds data associated with the BP, which you interact with using XPath. 
      • correlation data: record document-specific correlation parameters during translation.
      • Transaction register: specify a field for which you want to check for duplicate data (using the Update standard rule Transaction Register function) and then invoke it (using the Select standard rule Transaction Register function) to verify whether the field contains duplicate data.
      • Transaction XREF: cross-reference the application data to generated transaction.

    8. Question 8. Explain About Select Standard Rule ?

      Answer :

      The Select standard rule: associate a field with a TP code list, a section in process data, a document envelope, and use the transaction register function.Document envelope: support TRADACOMS enveloping to enable the map to extract values from the envelope definition and use them in the map. Trading partner code list: list of codes that are dynamic, related to trading partners, and stored in the Application database. Process data: service-independent XML DOM associated with a BP that holds data associated with the BP, which you interact with using XPath. Transaction register: specify a field for which you want to see if it contains duplicate data (using the Update standard rule Transaction Register function) and then invoke it (using the Select standard rule Transaction Register function) to verify whether the field contains duplicate data.

    9. Question 9. Explain About Promote Function ?

      Answer :

      The Promote function extracts one iteration (instance) of one of the following map components :

      • Group
      • Repeating record
      • Repeating element
      • Repeating composite

      Promote is a specialized version of the Split function. For example, if you have a group with 50 iterations and you select Promote, you then have two groups: one group with an iteration of 1 and a group that iterates 49 times. 

      The Promote function is available only if a group or repeating record, element, or composite is selected.

      Promote function enables you to map unique data from a document and to type a specialized definition.

    10. Question 10. Explain About Split Function ?

      Answer :

      The Split function can be used to split the following objects into two groups:

      • Group
      • Repeating record
      • Repeating element
      • Repeating composite

      After the split operation is performed, the individual iterations of the two groups that were created by splitting a group add up to the original number of iterations of the group before the split. 

      The Split function is available only if a group or repeating record, element, or composite is selected.

      Use the Split function when you need more than one instance of a map component that occurs multiple times.

    11. Question 11. Where To Use Temporary Records And Fields ?

      Answer :

      You can add temporary records and fields at any hierarchical level in a map. However, when you use temporary records and fields, you must locate them after the map component that contains the necessary data.

      You must use a record tag that you would never receive in your Input file, and the recommended default is $$$.

      If you are creating a temporary record for an XML file, use the tag XXX, because $$$ is not permitted as a tag in XML.

      The translator does not run standard or extended rules on temporary records.

    12. Question 12. When To Use Temporary Records And Fields ?

      Answer :

      • Use temporary records and fields
      • When you cannot use a simple link or if you must extract only specific occurrences of a record from your data file.
      • If you must map from a repeating map component to a single map component, or vice versa.
      • If the Input hierarchical level in a map does not match the Output hierarchical level.
      • If you only want to populate an Output field with data if a specified qualifier is used or if specific criteria is met.
      • If you must use extended rules in addition to creating temporary records and fields.

    13. Question 13. Explain The Process In Migration Map Development?

      Answer :

      We will analyse the business rules on the mapping for the customer in the production system then we will create the specification.

      We will test the map by taking existing production system input file and run that in SI then compare existing production system to corresponding output file.

    14. Question 14. Explain The Execution Of A Map In Si Map Editor?

      Answer :

      In map editor, what are all the conditions and variables listed in the pre session rule that will execute first because presession rules will get execute at the beginning of the translation. 

      And then it will check the group or record if is there any on begin rule that will execute next. 

      Then it goes in to fields in the record, if is there any Standard rule/ Extended rule we apply for the field that will execute Extended rule for the field will be executed. 

      At the end of the record, on end rule will be executed if we write any conditions there.

    15. Question 15. How Does Encryption Works ?

      Answer :

      Encryption is a method of changing plaintext (text that is readable by humans) into ciphertext (text that is meaningless to humans). There are many different ways of encryption, some stronger than others. Two main categories of encryption are symmetric and asymmetric. 

      In symmetric cryptography, the same key that encrypts a file also decrypts it. In asymmetric cryptography, which is what PGP uses, one key (the public key) encrypts the file, and the other key (the private key) decrypts it. So, if user A wants to send an encrypted message to user B, user A would first obtain user B’s public key.

      This is possible because public keys are meant to be widely distributed. Then user A encrypts the message using user B’s public key. The encrypted message can now only be decrypted with B’s private key, which only he possesses. Not even user A, who wrote the message, can decrypt what he has encrypted, because he does not possess user B’s private key. 

      This ensures that the message is unreadable by anyone other than user A. Encryption and signing are often combined. 

      In this scenario, user A would use user B’s public key to encrypt the message, then use his own private key to sign the message. This will ensure that no one but user B can read the message, and when user B receives it, he can be assured that the message was not altered. To read the message, userB would first use user A’s public key to verify that the signature matches. 

      Then user B would use his private key to decrypt the message that user A wrote.

    16. Question 16. What Are The Uses Of Pgp ?

      Answer :

      The most commonly used aspect of PGP is the signing and encryption of email or files. “Signing” a document is a way of verifying the integrity of the original work. 

      The method is as follows:

      1. Make a digest or “hash” of the file or email. A hash is an algorithm that produces (theoretically) a unique output (the hash) from a given input (the message).
      2. Add the hash to the end of the message.
      3. When someone wants to verify that the message has not been modified, they run the hash algorithm on the message and compare it to the hash at the end of the message. If the signatures match, the message has not been altered.

    17. Question 17. How Does Pgp Work ?

      Answer :

      When someone starts using PGP, they generate a Key Pair. These are really just text files that look like gibberish to a human. The keys can be created at various levels of strength – 512, 1024, or 2048 bit strengths are used. The higher the number, the stronger the encryption value of the key. One key of the pair is the Private key – this key should always be kept safe and never given to anyone. The other key is the public key – this key should be given to as many people as possible.

    18. Question 18. What Is Pgp?

      Answer :

      Pretty Good Privacy was originally developed by Phillip Zimmerman to provide a means of secure communication in an insecure electronic environment. “Pretty Good” is an understatement – the framework it is based on, PKI (Public Key Infrastructure) and its encryption standards (it can use Diffie-Helman or RSA algorithms of varying strengths), have been subjected to rigorous cryptanalysis.

      PGP has since grown into a more versatile application under the direction of its current owner, Network Associates (www.nai.com). Until the most recent release PGP has been completely open source, allowing anyone to review the code and suggest improvements.

    19. Question 19. What Is The Risk For Using As2 ?

      Answer :

      There is no more risk involved with transactions over AS2 then there would be with any form of normal e-Business transactions. If there is any risk with AS2, it is far outweighed by the cost savings implicit in its operation.

    20. Question 20. What Is Required To Exchange Data Using As2 ?

      Answer :

      • A dedicated persistent Internet connection
      • A web server with your EDIINT software

    21. Question 21. What Are The Benefits Of Using As2 ?

      Answer :

      AS2 provides faster, almost instantaneous data transfers directly to your network and reduces the points of failure in data transmissions. Using AS2 eliminates day-to-day value-added network (VAN) charges and long distance dial-ups. AS2 also provides increased reliability and sped, improving supply-chain efficiency. Listed below are some of the main benefits of using AS2:

      • 24x7 availability
      • Designed to push data securely and reliably over the Internet
      • Fast and reliable connectivity
      • Encryption ensures that only the sender and receiver can view the data
      • Digital signatures ensure authentication
      • AS2 detects if the document was altered during transmission
      • Non-repudiation of receipt confirms that the intended party received the data
      • Faster turn-around time for business processes

    22. Question 22. How Does As2 Work ?

      Answer :

      AS2 provides an Internet solution for securely exchanging EDI over the Internet using Multipurpose Internet Mail Extensions (MIME) and the hypertext transmission protocol (HTTP) instead of the simple mail transport protocol (SMTP) as the transport protocol. AS2 specifies the means to connect, deliver, validate, and reply to (receipt) data in a secure and reliable way. AS2 does not concern itself with the content of the EDI document, only the transport.

      AS2 essentially creates a wrapper around EDI flat files that enables sending them over the Internet, instead of using a dial-up connection to a value-added network (VAN). AS2 is a real-time technology that provides security and encryption around the HTTP packets.

    23. Question 23. What Is Ediint ?

      Answer :

      EDI over the Internet (EDIINT) is a working group of the Internet Engineering Task Force (IETF). Formed in February of 1996, EDIINT was chartered by the IETF to create a set of secure protocols for sending EDI data over the Internet. The two EDIINT standards that have been certified are AS1 and AS2.

    24. Question 24. What Is Primary Document ?

      Answer :

      Primary document is the core document in the business process such as Purchase Order.

    25. Question 25. Explain About Light Weight Jdbc Adapter ?

      Answer :

      It enables us to Retrieve data from a JDBC database or Update a JDBC database as part of a business process with in the Sterling Integrator.

    26. Question 26. Explain About Document Extraction Service ?

      Answer :

      It can be used to split individual documents out of a batch file to make each one a separate document.

      Related services: EDI encoder, EDI envelop, for Each.

      Configuration:

      1. Document name prefix:
      2. EDI encode document:
      3. EDI envelop document:
      4. Error on unrecognized data:
      5. Halt on trans error.

    27. Question 27. Explain “messages Only” In Bp Configuration ?

      Answer :

      Only the messages you explicitly specify in the messages will be sent. Please note that you might be missing such important Parameters as the PrimaryDocument etc. You have to care for everything yourself!

    28. Question 28. Explain “obtain Process Data First, Then Messages” ?

      Answer :

      First all the parameters/ variables from Process Data will be sent, then your variables on top of it overlaying the values in Process data.

    29. Question 29. Explain "obtain Message First, Then Process Data" ?

      Answer :

      This will send your parameters to the service but will overlay them with whatever is in Process Data at that time.

    30. Question 30. Explain About Translation Service ?

      Answer :

      Performs translation of primary document using a specified map and replaces the primary document with the result of the translation.

      For example if we want to translate a file from positional to delimited, first we are using SI map editor to translate a file from positional to delimited and create a new business process that puts the data into the primary document and then start the translation service. The translation service translate the primary document into positional to delimited.

          Configuration:

      • Map name: give the name of the map.

    31. Question 31. Explain About File System Adapter Service [fsa] ?

      Answer :

      FSA is used to collects (import) files from the file system and extracts (exports) files to the file system. The collected file becomes the primary document in a business process.

           Configuration: e5 fille system adapter.

      • Action : collection (or) extraction
      • Assigned file name : sample.txt
      • Assign file name: assign specific name.
      • Bootstrap: no, (If yes we have to give the BP name in the initial workflow id parameter and that BP runs as a child BP).
      • Collection folder: path
      • Extraction folder: path
      • Filter: only for collection. [*(all), *.txt (collects only .txt files), *.dat (collects only .dat files)]

    32. Question 32. Explain About X12 Deenvelope Service ?

      Answer :

      It handles deenveloping of inbound x12 interchanges and also generates 997 and TA1 acknowledgements. For example an inbound purchase order is received inside an x12 interchange. The EDI envelops are parsed and the document envelops that match the envelop data are retrieved. With the document envelops this service know what to do with the purchase order, such as kicking off a business process that perform some business logic.

    33. Question 33. Explain About X12 Envelop Service ?

      Answer :

      It handles the enveloping of outbound x12 interchanges. For example, an outbound purchase order is to be sent inside an x12 interchange. The document envelops that match the sender id, receiver id, acceptor lookup alias specified in the EDI encoder service are retrieved. If required by the ST envelop, translation is performed using the map specified by envelop. The ST,GS,ISA envelops are applied to the output of the map.

    34. Question 34. Explain About Edi Encoder Service ?

      Answer :

      It determines which transaction level envelop will be used on the document. If translations are specified in an envelop, this service determines which map to use.

        Configuration:

      • Accepter lookup alias:
      • EDI Standard:
      • Mode: immediate (or) deferred.
      • Receiver id:
      • Sender id:

    35. Question 35. Explain About Time Stamp Utility Service ?

      Answer :

      The time stamp utility service enables you to create time stamp values to the business process for the current time.

        Configuration: time stamp utility.

      • Format: mmss
      • Scale: milliseconds.

    36. Question 36. Explain About Assign Service ?

      Answer :

      Assign service is used for to store values into a variable; values can be constant value or process data value. We can place values into process data.

         Configuration:

      • Append : false
      • Constant :
      • From:
      • To:

    37. Question 37. Explain About Bp Metadata Info Service ?

      Answer :

      It provides the complete details and properties of the business process and these properties will be available in process data. Some of the properties are

      • BPID
      • Process name
      • Description
      • State
      • Status
      • Type
      • Correlations

    38. Question 38. What Is Adapter ?

      Answer :

      It will connect to the external system with sterling integrator.

    39. Question 39. What Is Xpath ?

      Answer :

      Xpath is an expression language used to navigate the xml data.

    40. Question 40. What Is Correlation ?

      Answer :

      Correlation is used for document tracking.

      Correlation data enable you to record document, a specific correlation parameters generated during the translations by the correlation service or by the document tracking function.

Popular Interview Questions

All Interview Questions

Sterling Integrator Consultant Practice Test

All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status

Tutorial