Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

ECSA 105 EXAM WITH COMPLETE SOLUTIONS 2025-2026, Exams of Engineering

ECSA 105 EXAM WITH COMPLETE SOLUTIONS 2025-2026

Typology: Exams

2024/2025

Available from 03/15/2025

BESTOFLUCK
BESTOFLUCK 🇺🇸

4.2

(5)

2.1K documents

1 / 20

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
ECSA 105 EXAM WITH COMPLETE SOLUTIONS
2025-2026
Will you get support from Epic if your organization is running on an OffTarget platform?
- ANSWER Yes, Epic will support your organization regardless of what type of platform
is hosting the
software
Target Platforms: These are platforms that Epic has tested to ensure that they work and
work well. Scalability tests, which determine how CPU and storage affect scalability, are
also done. These have been the most successful platforms on which Epic software has
been hosted. - ANSWER Target Platform
Will you get Epic support if your Organization is on an Off
platform? - ANSWER Whatever type of platform is hosting the software, Epic will support
your organization.
Documents contains hundreds of build suggestions that Epic has tested. - ANSWER
Setup and Support Guide
What is the advantage in using a CNAME when defining the hostname for your
environments in Kuiper? - ANSWER A CNAME is a variable that can be redefined in DNS.
When it is time to switch over to DR it is much easier and more efficient to change what a
CNAME resolves to rather than redefine the hostname in every place it is defined
What is the name of the technology from InterSystems that can be used by organizations
running either Caché or IRIS as their ODB platform to allow those organizations to scale
their infrastructure to higher workloads - ANSWER Enterprise Cache Protocol ECP﴿
A group of machines supporting a given product and one or more Epic operational
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14

Partial preview of the text

Download ECSA 105 EXAM WITH COMPLETE SOLUTIONS 2025-2026 and more Exams Engineering in PDF only on Docsity!

ECSA 105 EXAM WITH COMPLETE SOLUTIONS

Will you get support from Epic if your organization is running on an Off‐Target platform?

  • ANSWER Yes, Epic will support your organization regardless of what type of platform is hosting the

software

Target Platforms: These are platforms that Epic has tested to ensure that they work and work well. Scalability tests, which determine how CPU and storage affect scalability, are also done. These have been the most successful platforms on which Epic software has been hosted. - ANSWER Target Platform

Will you get Epic support if your Organization is on an Off‐

platform? - ANSWER Whatever type of platform is hosting the software, Epic will support your organization.

Documents contains hundreds of build suggestions that Epic has tested. - ANSWER Setup and Support Guide

What is the advantage in using a CNAME when defining the hostname for your environments in Kuiper? - ANSWER A CNAME is a variable that can be redefined in DNS. When it is time to switch over to DR it is much easier and more efficient to change what a CNAME resolves to rather than redefine the hostname in every place it is defined

What is the name of the technology from InterSystems that can be used by organizations running either Caché or IRIS as their ODB platform to allow those organizations to scale their infrastructure to higher workloads - ANSWER Enterprise Cache Protocol ﴾ECP﴿

A group of machines supporting a given product and one or more Epic operational

database environments - ANSWER Kuiper Group

What are the 4 Kuiper Prerequisites? - ANSWER * Firewall ports

  • PS Remoting enabled

  • PS Execution policy remote signed or something less restrictive

  • The users administering the group must be admin on the servers in the group

A user can only pause or cancel actions if they have _______ _______ security for the application and the related environment type or group - ANSWER Deploy Groups

A client application included with Kuiper that you install on application machines - ANSWER Satellite

Instead of Kuiper having to copy files from the base package directory to the Satellite machine, what can download the file directly from the base package directory of Kuiper? - ANSWER Satellite

As you generate the ______ _______ _______ you can assign it to the intended group. This will enable Client machines to automate joining the intended Kuiper group when Satellite is installed and checks in with the Kuiper server for the first time - ANSWER Satellite Activation Key

For the Kuiper clusters that are managed by customer Kuiper Satellite you will _______ packages when you want to signal Satellite that it should download the new Epic code to the Satellite‐managed machine - ANSWER Stage

When you are ready to actually use the new code ﴾usually on "night of update"﴿ you will _________ the previously staged package. At this point Satellite will actually install the new Epic code the next time the Satellite client checks in with Kuiper. - ANSWER Publish

A user can pause or cancel actions only if they have _______ _______ security for the application and the corresponding environment type or group. If a user clicks Pause All

ANSWER Super Administrator

Which of the following is only available for Super Administrators? - ANSWER * Security and Configuration pages

  • Kuiper restore from backup

Members of a security group with the _______________ or ___________ modify permission can define an environment or server in Kuiper - ANSWER Environments or Machines

A Kuiper user does not need the Environments or Machines permissions to __________ an environment - ANSWER Attach

Without _________ permissions, the relevant groups or applications won't show up when you log into Kuiper. - ANSWER Read

The Package Registration Tool failed to show a package of Hyperspace Web when a user tried to activate one. When the user clicks on the Tools tab, it is not there. What would be the solution to this problem? ANSWER Ensure the user is a member of a security group with 'Use' access

The best answer is Health Checks. When you were setting up a virtual server for the purpose of Load balancing, what would you setup that enables checking of the health of the applications on the servers its distributing traffic across? - ANSWER Health Checks

What keeps a client connected to the same load balanced server for the duration of the entire session - ANSWER Session Affinity

True or False

TLS encryption should be enabled for all production IIS applications and sites. - ANSWER True

Which of the following methods of TLS encryption is the least secure? - ANSWER Terminate at Load Balancer

Why can't the TLS method of terminating encryption at the Web Server be used for Hyperspace Web? - ANSWER Because it can't decrypt the packets so it's not compatible with cookie based session-affinity

What is the recommended encryption option in TLS for a product that does not require session affinity using cookies and does not use content switching? - ANSWER Terminate at Web Server

Care Everywhere and e‐prescribing with Surescripts use ______________ _____ _______________ that allows both the client and server to authenticate the other party's identity prior to processing the connection.

What is the recommended TLS option for products that DO NOT require cookie‐based session affinity, client certificates for mutual TLS, or content switching and is the recommended TLS encryption option for any production that DOES require cookie based session affinity, or DOES use content switching, and DOES NOT use client certificates for the purposes of mutual TLS - ANSWER Terminate at the Load Balancer and Re‐encrypt

Writing to _________ first prevents data from being lost when information comes into System Pulse faster than it can be written to the SQL database. - ANSWER MSMQ

Many ________ ___________ have predefined thresholds defined at the default level - ANSWER alert definitions

Ideally you will define alerts using __________ level overrides, such that thresholds are customized for the particular function of the servers and the performance expectations for those servers - ANSWER group

For single resources that require unique thresholds, you will define __________ level overrides or put those resources in their own group. - ANSWER resource

Use ___________ __________ ____________ to investigate issue with System Pulse itself - ANSWER System Pulse Diagnostics

The ____________ ____________ section lets you see if MSMQ keeping up with data as it is received by your System Pulse server and subsequently processed and saved to your SQL database. - ANSWER Queue Performance

After installing the updated version, you should test your database connection, at which point you will be prompted to update the SQL database _________. Use an account with _______________ permissions - ANSWER schema

ndb_owner

What are the 3 filters the epic environment applies? - ANSWER Active/Inactive - based on status

Allowed value of No OR

Classic client compatibility

How do end‐users know they are accessing web‐based workflows in the Classic client? - ANSWER They don't. The transition of workflows from the Classic client to web‐based is seamless to end users.

Can a Classic client running Client Pack XYZ0‐25 work with a Hyperspace Web application running XYZ0‐24? - ANSWER Possibly, if the XYZ0‐25 Classic Client Pack did not introduce any additional dependencies on Hyperspace Web.

True or False? The Epic operational database environment will not forward you to a Hyperspace Web application URL if all instances of that application are unhealthy - ANSWER False. The environment has no insight as to which Hyperspace Web servers the applications live on. Nor does the environment communicate with the network appliance which does monitor Hyperspace Web application health.

True or False? The Epic environment selects which Hyperspace Web application URL you should go to when you launch a Hyperspace Web enabled workflow in the Classic client. - ANSWER False. The Epic environment picks which Hyperspace Web URL your Classic client session should use when the Classic client first connects to the environment.

Changing the version‐independent application, which usually is done as a part of activation does cause the IIS _______ ________ for all version‐independent applications to get cycled. - ANSWER application pools

The registration status of HSW applications is checked only at the time of launch/initial connection to the Epic operational database environment. What are the 4 options? - ANSWER Active/Inactive

Testing

Reregister

Unregister

Why would it be a problem to have your training environments backed up onto your non‐production Hyperspace Web servers? - ANSWER Changes being tested in non‐production such as new Microsoft updates or server configuration may affect the stability of training

TLS encryption is terminated at the load balancer without re‐encrypting. This is not best practice. Which of the following are reasons why? Choose one.

A. Traffic will move through ALL of your infrastructure unencrypted

B. Traffic will flow through PART of your infrastructure unencrypted

C. Performing SSL termination at the ELB significantly slows traffic

D. Performing SSL termination at the ELB will create issues with cookie‐based session affinity - ANSWER B is correct. If you perform encryption termination without re‐encrypting, the traffic between the load balancer and the HSW server will be un‐encrypted. Because this traffic could contain PHI, it is problematic if traffic is sent un‐encrypted.

"C:\\Program Files (x86)\\Epic\\vXY.Z\\Shared Files\\EpicDXYZ.exe" EDAppServersXYZ.EpicApp Name=Desktop WebTestMode

View health of HSW applications without details QUESTION HSW health page from Kuiper's Deployed Packages report

Review the health of HSW applications with details QUESTION Application event log

HSW health page from a HSW server

Review issues encountered within HSW workflows and/or view evidence of session affinity loss QUESTION Application event log

TraceX files

Review 'Status' and 'Allowed' state of registered HSW applications QUESTION Environment Status report in Kuiper

Which HSW URL is associated with a given Hyperspace session - ANS Historica information about Hyperspace use, in Hyperspace

View and track for an HSW application both the number of active sessions and number of TraceX files generated - ANS System Pulse

Analyze TLS issues and check whether a specific server received a web request - ANS IIS logs

Troubleshoot issues with packages deployment and group creation - ANS Actions reports in Kuiper

Exerciser end‐to‐end test HSW - ANSWER Any activity within HSW that is conducted in the Classic client

What is the configuration change needed to access a HSW application that is in test mode? ANSWER Add the command WebTestMode to the Classic client command line.

If a given HSW application is unhealthy, where can you find more information beyond the health page? - ANSWER The application event log on the server where the HSW application is unhealthy and the Galaxy KB articles linked to from the health page.

How would you know if Classic client connections to Hyperspace Web are not maintaining session affinity? - ANSWER Analyze TraceX files and application event logs of HSW servers for signs of the problem.

Checking Caché error log in System Pulse for errors indicating HSWeb request was submitted to incorrect web server is also helpful.

Where would you go to find out what Hyperspace Web application the environment routed a particular Hyperspace session to? Select one.

A. Environment Status Report

B. Deployed Packages Report

C. About Hyperspace

D. Any Hyperspace Web‐based activity - ANSWER C. About Hyperspace

You are experiencing Hyperspace Web disconnects within your organization and have traced the problem down to a session affinity issue. Your load balancer has been configured to use cookie‐based session affinity. Which of the following is a potential cause?

A. Your load balancer is only referencing one of your Hyperspace Web servers

B. Your health monitor is checking the default website instead of the version‐independent Hyperspace Web application

C. Your Hyperspace Web applications are in Testing

D. You are Offloading TLS encryption at the web server - ANSWER D. You are Offloading TLS encryption at the web server

Running an end‐to‐end test confirms what about your Hyperspace Web infrastructure?

Choose one.

A. At least one HSW URL passes the filtering process

Windows service

What are the purposes of the service and the IIS application that are part of an Interconnect instance? - ANSWER The service executes the listeners that are hooked up to queues in the operational database environment. It retrieves and processes the outgoing messages coming from the Epic

The IIS application would respond to messages received from other sources. These other sources might be outside of your organization, or even outside your own datacenter. The IIS application listens and processes incoming messages.

What if two different instances that have been configured to support the different functionalities described earlier have been configured to use the same listeners? Select the one that applies.

A. Messages will route to the instance with the correct business services

B. Messages will route to the instance with the correct role

C. Messages will be routed to both instances at the same time

D. Messages may be sent to the wrong instance, resulting in broken functionality - ANSWER D.

The converse problem, by having to different instances shared the same listeners, results in message stealing, where messages go to instances that don't know how to process that type of message.

Which of the following will be the timing when the messages route through the reverse proxy servers in the DMZ? Choose one.

A. Outbound synchronous messages sent from the environment

B. Outbound asynchronous messages sent from the environment

C. Responses to synchronous messages sent from the environment

D. Responses to asynchronous messages sent from the environment - ANSWER D is correct. Our messages will route through the reverse proxy servers when we need to establish a new connection with our Interconnect servers. This is only the case for responses to asynchronous messages and for third‐party initiated messages

Interconnect Kuiper groups can only be associated with one Epic environment. - ANSWER True

If you have two instances of IC supporting different functionalities using the same queues the result will be? - ANSWER failed messages and broken functionality. no two instances can use the same listener/queue

If traffic makes it through IIS but then fails to match the TLS requirements of your Interconnect instance, you'll see a __________ in your IIS logs on your Interconnect server. - ANSWER 404 error

The details of the security policy you should use for an Interconnect instance is specified in the _____ _______ __________ section of the Interconnect Use Case Guide - ANSWER Use Case Configurations

For Interconnect, you'll use a slightly more advanced form of load balancing, called - ANSWER content switching

___________ ____________ functionality cannot be load balanced in an active‐active configuration and must be setup as active‐passive. - ANSWER Epic Monitor

The monitor for Interconnect will be an HTTP GET of /<Interconnect‐

Instance>/httplistener.ashx - ANSWER True

The ___________ _______________ instance is an exception to Interconnect using content switching. This instance will use standard load balancing, via its own Virtual Server, with TLS terminating at the Web Server. - ANSWER Events Notification

For LB monitor If using TLS what encryption method needs to be used for content switching to work on the IC servers? - ANSWER Terminate at the LB and re-encrypt so it can identify the instance and direct appropriately

Click on an instance's name to connect to a server. You may also connect to the status page from the Interconnect Configuration Editor, via IIS manager, or manually by entering its URL into a web browser. - ANSWER Test Database Connections tool

When you need further details about the health of an Interconnect instance you want to go to the __________ ________, which are linked in the upper right corner of the status page - ANSWER diagnostics page

Where do I go for more information about test options for a given functionality? - ANSWER In the Interconnect Use Case Guide See the 'How to Test' row.

When you receive calls regarding issues, among the first things you will want to look at are the - ANSWER internal‐only tests

When application analysts are investigating message failures they will often use the _________ _________ _________ to view trace logs. The trace logs may contain PHI; you only provide access to the logs to those who

actually need to see them. The viewer is located in the __________ directory. - ANSWER Interconnect Trace Viewer

instance's

Information about nearly everything that Interconnect does is logged to a _____ trace file

  • ANSWER

When errors are thrown from the IIS application part of the Interconnect instance, they'll be logged to a _____ trace log - ANSWER wcf

General server errors and service errors will be logged to the _____ trace logs - ANSWER non‐wcf

Usually the _________ _____________ of an error provide the most useful information -

ANSWER inner exceptions

Which logs are outgoing traffic contained in? - ANSWER , AKA non‐wcf logs

Which logs contain the responses to synchronous messages? - ANSWER , AKA non‐wcf logs

Which logs contain the responses to asynchronous messages? - ANSWER wcf, AKA wcf logs

Which logs contain the inbound third‐party initiated message? - ANSWER wcf, AKA wcf logs

If you try to connect to Interconnect using an URL, whose server hostname was right, but had the wrong IIS application name, you'd find evidence in the _____ ______ and not in the trace logs. ANSWER IIS logs

the Encryption option selected within the Security Policy area of an Interconnect instance configuration editor must match the entering traffic for the Interconnect server. It must also be set to match your settings within IIS as well. If the incoming traffic is not over TLS encryption but IIS is set to Require SSL, then you will get an

If the traffic navigates through IIS's encryption requirements, but doesn't match the configuration editor's options then you will see a ### error in your IIS logs. - ANSWER 404

Will the trace logs be recorded if the traffic can't make its way to the IC instance? - ANSWER No

View Interconnect logs associated with outbound traffic ANSWER trace logs, AKA non‐wcf logs; associated with the service portion of an Interconnect instance

start/stop/recycle it - ANSWER IIS Manager mmc snap‐in

Recycle Application Pools tool

Complete instance configuration - ANSWER Interconnect Configuration Editor

Add instance configuration to Kuiper - ANSWER Import Configuration tool

Q: Where would an ECSA first look when troubleshooting a malfunctioning Interconnect instance? - ANSWER Status and diagnostics pages in the Interconnect instance, or by utilizing the Kuiper Test Database Connections tool.

Q: What information does the Interconnect Trace Viewer display? - ANSWER The Contents of messages sent and received by Interconnect. Some system information and issues can be found.

To save unnecessary troubleshooting effort, you want to give analysts the ability to verify the Instances are up and healthy. How might you do that? - ANSWER Give analysts the URLs for the status pages of your instances, or grant them access to the Test Database Connections tool in Kuiper.

Your organization sends an asynchronous message to a third‐party. An acknowledgement of the message has not been received. Which logs have been updated by this transaction? Choose one.

A. Wcf trace logs

B. Non‐wcf trace logs

C. IIS logs on Interconnect server

D. IIS logs on ARR server - ANSWER B. Non‐wcf trace logs. All outgoing messages are handled by the Windows service portion of Interconnect. The Windows service portion of Interconnect writes to the non‐wcf trace logs

What information does the Interconnect Trace Viewer display? - ANSWER Contents of messages sent and received by Interconnect. Some system information and issues can

also be found in the Trace Viewer.

Why would you activate a new Interconnect package after you have updated the environment? Choose one.

A. There could be dependencies between a new Interconnect package and the environment

B. Interconnect never is able to link up with environment if its on a higher package version as the environment.

C. You can always enable a new Interconnect package before you update the environment. - ANSWER A. A new Interconnect package and the environment may have dependencies.