IBM C2070-994 Exam (page: 2)
IBM IMB Datacap V9.0 Solution Designer
Updated on: 28-Jul-2025

Viewing Page 2 of 15

A company is going to test authentication by both using passwords and not using passwords for their IBM Datacap application.
Which two authentication system can optionally be configured to either require passwords or not require passwords?

  1. TMA
  2. LDAP
  3. ADSI
  4. ADLDS
  5. LLLDAP

Answer(s): B,C

Explanation:

For ADSI authentication, select one of the following strings to enter based on whether you require password entry:
WinNT://<%domain%>/<%user%>
WinNT://<%domain%>/<%user%>?password:enabled
For LDAP authentication, select one of the following strings to enter based on whether you require password entry:
LDAP://<%domain%>.com

LDAP://<%domain%>.com?password:enabled
Note: You can configure Datacap to use Datacap authentication or to use one of the external authentication methods.
The following five authentication systems are supported:


Reference:

https://www.ibm.com/support/knowledgecenter/SSZRWV_9.0.0/com.ibm.dc.install.doc/dcain427.h tm



An account payable department needs to collect and gather information from the receipts of its employees as part of their expense reporting process. Although many of the receipts follow specific patterns there are some images, such as handwritten receipts, that do not lend themselves to having their information gathered by automation and require a human to analyze the image for the data to be extracted.
Which of the following methods would be best suited for this type of data extraction?

  1. Zonal
  2. Click N Key
  3. Locating by keyword
  4. Locate with regular expressions

Answer(s): B

Explanation:

Click N Key is the fourth and final method of extracting data from a form is for the data entry operator to click the form. Data at that location is then extracted and placed into the active field. This is the least preferred approach because it is the most expensive (it requires a human to do the clicking), although it is reliable.
Note: There are four ways of extracting data from an image. They are ranked in order of preferable practice: Zonal, Locate with regular expressions, Locating by keyword, Click N Key Reference: IBM Redbooks, Implementing Document Imaging and Capture Solutions with IBM Datacap, Second Edition (October 2015), page 125



A developer needs to insert the date and time into the current field separated by a space.
Which of the following is the correct Smart Parameter string to accomplish this task?

  1. rrset("@DATE+@CHR(\s)+@TIME,"@F")
  2. rrset("@DATE+@STRING(\s)+@TIME,"@F")
  3. rrset("@DATE+@CHR()+@TIME(HH:MM:SS),"@F")
  4. rrset("@DATE+@STRING()+@TIME(HH:MM:SS),"@F")

Answer(s): B

Explanation:

@STRING( string value) Returns a string of the argument passed.



Within IBM Datacap there is a file that contains a list of the available report types that are displayed in report Viewer.
When a new report type is created, what is the name and default location of the file that the new report type must be added to?

  1. C:\Datacap\RV2\reports.ini
  2. C:\Datacap\RV2\reports.xml
  3. C:\Datacap\ReportViewer\reports.ini
  4. C:\Datacap\ReportViewer\reports.dco

Answer(s): B

Explanation:

The C:\Datacap\RV2\reports.xml file contains a list of the available report types that are displayed in Report Viewer.
When you create a new report type, you must add the report type to this file.


Reference:

https://www.ibm.com/support/knowledgecenter/en/SSZRWV_9.0.0/com.ibm.dc.customrv2.doc/dca pi037.htm



An accounts payable department needs to collect and gather information from the receipts of its employees as part of their expense reporting process. They have chosen IBM Datacap as the tool they want to use to automate large portions of this process.
What method would be best suited to gather data from images where the name of the data label might change from image to image but still able to be defined as a list?

  1. Zonal
  2. Click N Key
  3. Fingerprinting
  4. locating by keyword

Answer(s): D

Explanation:

Keywords are labels that accompany the data you want to find on the form. Locating by keyword ranks third behind the zonal and regular expression methods in terms of reliability because you have to know what the keyword is and recognize the keyword correctly. You also have to anticipate the location of the actual data, relative to the position of the keyword, for extraction.
Keyword extraction is made easier by using keyword lists, which are text files that contain many different keywords that might be used as labels around the data you want to extract. For instance, a keyword list could contain Total, Total Due, Pay this amount, and similar words or phrases that occur in close proximity to the actual data.
Note: There are four ways of extracting data from an image. They are ranked in order of preferable practice: Zonal, Locate with regular expressions, Locating by keyword, Click N Key Reference: IBM Redbooks, Implementing Document Imaging and Capture Solutions with IBM

Datacap, Second Edition (October 2015), page 125



Viewing Page 2 of 15



Share your comments for IBM C2070-994 exam with other users:

Karim 10/8/2023 8:34:00 PM

good questions, wrong answers
Anonymous


Itumeleng 1/6/2024 12:53:00 PM

im preparing for exams
Anonymous


MS 1/19/2024 2:56:00 PM

question no: 42 isnt azure vm an iaas solution? so, shouldnt the answer be "no"?
Anonymous


keylly 11/28/2023 10:10:00 AM

im study azure
Anonymous


dorcas 9/22/2023 8:08:00 AM

i need this now
Anonymous


treyf 11/9/2023 5:13:00 AM

i took the aws saa-c03 test and scored 935/1000. it has all the exam dumps and important info.
UNITED STATES


anonymous 1/11/2024 4:50:00 AM

good questions
Anonymous


Anjum 9/23/2023 6:22:00 PM

well explained
Anonymous


Thakor 6/7/2023 11:52:00 PM

i got the full version and it helped me pass the exam. pdf version is very good.
INDIA


sartaj 7/18/2023 11:36:00 AM

provide the download link, please
INDIA


loso 7/25/2023 5:18:00 AM

please upload thank.
THAILAND


Paul 6/23/2023 7:12:00 AM

please can you share 1z0-1055-22 dump pls
UNITED STATES


exampei 10/7/2023 8:14:00 AM

i will wait impatiently. thank youu
Anonymous


Prince 10/31/2023 9:09:00 PM

is it possible to clear the exam if we focus on only these 156 questions instead of 623 questions? kindly help!
Anonymous


Ali Azam 12/7/2023 1:51:00 AM

really helped with preparation of my scrum exam
Anonymous


Jerman 9/29/2023 8:46:00 AM

very informative and through explanations
Anonymous


Jimmy 11/4/2023 12:11:00 PM

prep for exam
INDONESIA


Abhi 9/19/2023 1:22:00 PM

thanks for helping us
Anonymous


mrtom33 11/20/2023 4:51:00 AM

i prepared for the eccouncil 350-401 exam. i scored 92% on the test.
Anonymous


JUAN 6/28/2023 2:12:00 AM

aba questions to practice
UNITED STATES


LK 1/2/2024 11:56:00 AM

great content
Anonymous


Srijeeta 10/8/2023 6:24:00 AM

how do i get the remaining questions?
INDIA


Jovanne 7/26/2022 11:42:00 PM

well formatted pdf and the test engine software is free. well worth the money i sept.
ITALY


CHINIMILLI SATISH 8/29/2023 6:22:00 AM

looking for 1z0-116
Anonymous


Pedro Afonso 1/15/2024 8:01:00 AM

in question 22, shouldnt be in the data (option a) layer?
Anonymous


Pushkar 11/7/2022 12:12:00 AM

the questions are incredibly close to real exam. you people are amazing.
INDIA


Ankit S 11/13/2023 3:58:00 AM

q15. answer is b. simple
UNITED STATES


S. R 12/8/2023 9:41:00 AM

great practice
FRANCE


Mungara 3/14/2023 12:10:00 AM

thanks to this exam dumps, i felt confident and passed my exam with ease.
UNITED STATES


Anonymous 7/25/2023 2:55:00 AM

need 1z0-1105-22 exam
Anonymous


Nigora 5/31/2022 10:05:00 PM

this is a beautiful tool. passed after a week of studying.
UNITED STATES


Av dey 8/16/2023 2:35:00 PM

can you please upload the dumps for 1z0-1096-23 for oracle
INDIA


Mayur Shermale 11/23/2023 12:22:00 AM

its intresting, i would like to learn more abouth this
JAPAN


JM 12/19/2023 2:23:00 PM

q252: dns poisoning is the correct answer, not locator redirection. beaconing is detected from a host. this indicates that the system has been infected with malware, which could be the source of local dns poisoning. location redirection works by either embedding the redirection in the original websites code or having a user click on a url that has an embedded redirect. since users at a different office are not getting redirected, it isnt an embedded redirection on the original website and since the user is manually typing in the url and not clicking a link, it isnt a modified link.
UNITED STATES