当前分类: IBM(000-891)
问题:多选题What are two functions of a custom mapping module?()Arecords the token assertionBmaps a STSUUSER input to a SAML tokenClooks up attributes in an external data sourceDmaps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 p...
查看答案
问题:单选题What limitations exist for a SAML Partner Provider ID configured at the Identity Provider?()A The Provider ID can be any string.B The Provider ID can only include alphanumeric characters.C The Provider ID must match the prefix of Target URLs in SSO req...
问题:单选题If an invalid username and password is entered on the EchoClient, which log files will be the first to record this (assuming all components have necessary logging and tracing enabled)?()A the PDACLD authentication audit logB the EchoClient log during t...
问题:多选题Which two tasks are required to install Service Integration Bus Web Services?()Ainstall the Resource AdapterBconfigure SOAP listener portCdeploy the Service Integration Bus applicationDinstall the Service Data Objects (SDO) RepositoryEcreate a new WebS...
问题:单选题You want to use TCPMON between the two WS-Provisioning Service instances. How do you configure the endpoint of the partner WS-Provisioning service (i.e., the destination of step 3) so that TCPMON can be used?()A modify the ITFIMClientIDI.properties fil...
问题:单选题When recovering from a disaster, the backup and restore operation you use is similar to the export/import configuration procedure, with one additional step. Which additional step must you take when recovering from a disaster?()A A new WebSphere profile...
问题:单选题Which statement is true about a Dynamic Chain Selection Module instance?()A It is the first module in the partner module chain in Web Services Security Management (WSSM).B It is the last module in the partner module chain in WSSM.C It is the first modu...
问题:单选题When planning for secure communications between a partner and the Point of Contact, at what level is the SSL connection defined?()A each individual partner within a single federationB all federations configured for an instance of IBM Tivoli Federated I...
问题:多选题What are three functions of a WebSphere Node Agent?()Amonitors performanceBmanages JVM memoryCserves J2EE applicationsDmanages the deployment managerEmanages configuration synchronizationFroutes administrative requests to servers...
问题:单选题You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()A stop all...
问题:单选题Which XSL if statement checks for the existence of a homepage attribute within an STS Universal User XML structure?()A xsl:if test=//stsuuser:AttributeList/stsuuser:Attribute[attr='homepage']B xsl:if test=//stsuuser:AttributeList/stsuuser:Attribute[@na...
问题:单选题What is the default trace file (for Linux) that is used for the initial debugging of IBM Tivoli Federated Identity Manager Runtime?()A /opt/IBM/FIM/logs/ ITFIM Domain Name/tivoli-common/FBT/logs/msg.logB /opt/IBM/FIM/logs/ ITFIM Domain Name/tivoli-comm...
问题:单选题When designing a system to use WS-Federation, which browser Single Sign-On (SSO) method should be used?()A Browser GETB Browser POSTC Browser ArtifactD Browser Response...
问题:多选题Which two software components are prerequisite products for the Common Audit and Reporting Service (CARS) event server?()AIBM DB2 ServerBCrystal Enterprise ServerCIBM Tivoli Directory ServerDIBM WebSphere Application ServerEIBM Tivoli Access Manager Au...