




































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
ECSA105/ ECSA 105 Hyperspace Web/ Interconnect/ System Pulse |Questions and Verified Answers| 100% Correct (2024/ 2025 Update)
Typology: Exams
1 / 44
This page cannot be seen from the preview
Don't miss anything!
A user goes to activate a package for Hyperspace Web using the Package Registration Tool, but when they navigate to the Tools tab they find it is not there. What would be the solution to this problem? Answer: Ensure the user is a part of a security group that has 'Use' access
When setting up a virtual server for Load balancing , what is configured to monitor the health of the applications on the servers it's distributing traffic across? Answer: Health Checks
What ensures that a client remains connected to the same load balanced server for the duration of the entire session Answer: Session Affinity
True or False TLS encryption should be enabled on all production IIS applications and sites.
Answer: True
What method of TLS encryption is the least secure? Answer: Terminate at Load Balancer
Why can't the TLS method of terminating encryption at the Web Server be used for Hyperspace Web? Answer: Because it can't decrypt the packets so it's not compatible with cookie based session-affinity
What is the recommended TLS encryption option for any product that does not require cookie- based session affinity and does not use content switching? Answer: Terminate at Web Server
Care Everywhere and e‐prescribing with Surescripts use that allows for both the client and server to validate the identity of the other party before proceeding with the connection. Answer: mutual TLS authentication
Answer: resource
Whenever a time has more than one timeslot that applies, the timeslot with the lower priority number will be used to evaluate if any thresholds have been passed. Is that higher or lower in the list? Answer: higher in the list
For what events might you want to create timeslots? Answer: anything that happens at least once per week on a regular schedule work well with timeslots, Backups, AV scans, business hours vs. off hours, shift changes, large nightly print runs
What events are not handled well by timeslots? Answer: Maintenance that is less frequent than weekly (updates, MS patches, and Epic upgrades) do not work well with timeslots.
You add timeslots to a resource, group, or default level on a basis Answer: per‐metric
The most specific timeslot should appear at the and the most general, usually "All Time", should appear at the. Answer: top, bottom
Assigns a red or yellow exception to each instance of a workflow step that exceeds predefined thresholds Answer: Response Time Tracking RTT exceptions
When System Pulse is having issues collecting metrics from monitored resources, you can investigate by using the section of System Pulse Diagnostics. You can access System Pulse Diagnostics using the hammer and wrench icon in the upper right of System Pulse. If a resource is having connectivity issues, you can use the icon to access diagnostics as well. Answer: Monitored Servers broken connection
If there are any errors in Satellite communication, a log entry is created in.... Answer: the Applications and Services Logs section of the Windows Event Viewer
How do end‐users know they are accessing web‐based workflows in the Classic client? Answer: They don't. The transition of workflows from the Classic client to web‐based is seamless to end users.
A client application included with Kuiper that you install on application machines Answer: Satellite
Instead of needing Kuiper to transfer files from the base package directory to the Satellite machine, what can download files directly from Kuiper's base package directory? Answer: Satellite
As you create the you can associate it with the desired group. This allows Client machines to automatically register with the desired Kuiper group when Satellite is installed and checks in with the Kuiper server for the first time Answer: Satellite Activation Key
For the client Kuiper groups that are supported by Kuiper Satellite, you will packages when you want to signal Satellite that it should download the new Epic code to the Satellite‐ managed machine Answer: Stage
When you are ready to actually use the new code ﴾usually on "night of update"﴿, you will the previously staged package. At this point Satellite will actually install the new Epic code the next time the Satellite client checks in with Kuiper. Answer: Publish
A user can pause or cancel actions only if they have security for the application and the corresponding environment type or group. If a user clicks Pause All or Cancel All, only actions the user has security for are paused or canceled. Answer: Deploy Groups security
You can also use Satellite to manage machines not on your network. To manage machines not on your network, your Satellite configuration will need to reference a Kuiper URL that routes traffic through? Answer: Reverse Proxy Servers
This switch controls whether Kuiper is authorized to uninstall packages that are identified as old packages according to the conditions of this channel. Channels without the Authorize cleanup of packages checkbox selected require per‐package authorization to be uninstalled. Unauthorized packages are never uninstalled. Answer: Package authorization
This condition controls the days of the week and times of day when packages can be uninstalled. Answer: Allowed days and times
The user who installed Kuiper is automatically a member of the group Answer: Super Administrator
What can only Super Administrators access? Answer:
Members of a security group with the or modify permission can define an environment or server in Kuiper
Answer: Environments or Machines
A Kuiper user does not need the Environments or Machines permissions to an environment Answer: Attach
Without permissions, the relevant groups or applications won't show up when you log into Kuiper. Answer: Read
Can a Classic client running Client Pack XYZ0‐25 work with a Hyperspace Web application running XYZ0‐24? Answer: Possibly, if the XYZ0‐25 Classic Client Pack did not introduce any additional dependencies on Hyperspace Web.
True or False? The Epic operational database environment will not direct you to a Hyperspace Web application URL if all instances of that application are unhealthy Answer: False. The environment has no insight as to which Hyperspace Web servers the applications live on. Nor does the environment communicate with the network appliance which does monitor Hyperspace Web application health.
Terminating TLS encryption at the load balancer without re‐encrypting is not best practice. Which of the following are reasons why? Choose one. A. Traffic will move through ALL of your infrastructure unencrypted B. Traffic will move through PART of your infrastructure unencrypted C. Terminating at the Load Balancer slows down traffic considerably D. Terminating at the Load Balancer will cause problems with cookie‐based session affinity Answer: B is correct. If you terminate encryption without re‐encrypting, the traffic between the load balancer and the HSW server will be un‐encrypted. Because this traffic could contain PHI, it is problematic if traffic is sent un‐encrypted.
After Hyperspace web configuration is deployed, the custom icons don't appear in Hyperspace until the next time Hyperspace application pool is Answer: recycled
You can access each Hyperspace Web application's health page from the report in Kuiper Answer: Deployed Packages
In addition to the health page, where else can you look for information regarding an unhealthy Hyperspace Web application? Answer:
The application event log on the Hyperspace Web server experiencing issues.
How can you complete an end‐to‐end test of Hyperspace Web? Answer: Access any Hyperspace Web activity from within the Classic client or navigate to Hyperspace via Chrome or Edge or Hyperdrive
What are two ways to see the current Hyperspace Web URL Answer: About Hyperpsace Session Information Report
Error Starting Activity or the "3 tabbed error" means that the Classic client is not even attempting to reach a HSWeb URL and seen when no Hyperspace Web app made it through the filtering process Answer: environment's
When Hyperspace Web generates a TraceX file an entry will also be added to the? Answer: Hyperspace Web server's application event log
Review 'Status' and 'Allowed' state of registered HSW applications Answer: Environment Status report in Kuiper
Determine which HSW URL is assigned to a Hyperspace session Answer: About Hyperspace activity in Hyperspace
View and monitor the number of active sessions for a HSW application and number of TraceX files created Answer: System Pulse
Investigate TLS issues and determine if a given server received a web request Answer: IIS logs
Investigate issues with package deployment and group creation Answer: Actions reports in Kuiper
Complete an end‐to‐end test of HSW Answer: Any HSW activity in the Classic client
In order to access a HSW application that is still in testing mode, what configuration change is necessary? Answer: Add the WebTestMode command‐line argument to the Classic client command line.
If a given HSW application is unhealthy, where can you find more information beyond the health page? Answer: The application event log on the server where the HSW application is unhealthy and the Galaxy KB articles linked to from the health page.
How can you identify if Classic client connections to Hyperspace Web are not maintaining session affinity? Answer: Review TraceX files and HSW servers' application event logs to look for evidence of the issue. Reviewing the Caché error log from System Pulse and looking for errors stating that the HSWeb request was sent to the wrong web server is also useful.
Where would you look to see which Hyperspace Web application the environment directed a given Hyperspace session to? Choose one.
Answer: Ensure any applications associated with the package are not being monitored by the load balancer. Otherwise all nodes would be marked offline. Unregister the package from all appropriate environments. Additionally, check Active Session in System Pulse to determine if anyone is still connecting to the HSW IIS applications associated with the package you want to remove.
You can deploy Hyperspace Web packages well in advance of update night. However, you should wait until after the ODBA updates the environment to activate the package. Which of the following are reasons why you should follow this order of operations? Choose all that apply. A. 'Testing' packages won't pass the filtering process, so users can't connect to pre‐deployed packages, thus adhering to change control B. A URL won't be created for a new application until it's active, so deploying a new package won't create a URL to access, thus adhering to change control C. Not all Hyperspace Web packages introduce new dependencies, thus activating prior to night of update may violate change control D. The Hyperspace Web IIS application won't be running until the associate package is activated, so users can't access it, thus adhering to change control Answer: A - Testing C - There may not be dependencies introduced by HSWeb, thus it would pass the filtering process.
What are the two parts of a Interconnect instance? Answer: IIS application Windows service
What functions do the service and IIS application associated with an Interconnect instance serve?
Answer: The service runs the listeners which are connected to queues in the operational database environment. The service picks up and processes outgoing messages coming from the Epic The IIS application responds to messages sent from other sources. These other sources could originate outside your organization or within your own datacenter. The IIS application receives and process incoming messages
What will happen if two different instances that support different functionalities are configured to use the same listeners? Choose one. A. Messages will route to the instance with the correct business services B. Messages will route to the instance with the correct role C. Messages will be routed to both instances at the same time D. Messages may be sent to the wrong instance, resulting in broken functionality Answer: D. By having two different instances share the same listeners, we can end up with message stealing, where messages go to instances that don't know how to process that type of message.
When will messages route through the reverse proxy servers in the DMZ? Choose one. A. Outbound synchronous messages sent from the environment B. Outbound asynchronous messages sent from the environment C. Responses to synchronous messages sent from the environment D. Responses to asynchronous messages sent from the environment Answer: D is correct. Our messages will route through the reverse proxy servers when we need to establish a new connection with our Interconnect servers. This is only the case for responses to asynchronous messages and for third‐party initiated messages
Interconnect Kuiper groups can only be associated with one Epic environment.