A
B
C
D
E
第1题:
Which two software components are prerequisite products for the Common Audit and Reporting Service (CARS) event server?()
第2题:
Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()
第3题:
Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
第4题:
The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()
第5题:
An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()
第6题:
Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
第7题:
What is the IBM tool used to configure the IBM System Storage DS5000 system?()
第8题:
IBM DB2 Server
Crystal Enterprise Server
IBM Tivoli Directory Server
IBM WebSphere Application Server
IBM Tivoli Access Manager Authorization Server
第9题:
Batchman process is down.
User password has expired.
WebSphere security is damaged.
There are insufficient permissions in Security file.
第10题:
Cisco IOS configuration
tri-band 11g single radios
rouge AP integration
single view to deploy and manage
secure guest access
第11题:
the size of the hard drives for each PC connected to the client’s network
the average size of the wallet based on the number of profiles and accounts
if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hours
the number of users that will be connected using the wireless network, as opposed to a wired connection
第12题:
Data Mining API
Provisioning API
Cryptography API
API for Second Factors
SOAP API for Mobile ActiveCode
第13题:
Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()
第14题:
Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()
第15题:
What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()
第16题:
In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()
第17题:
What is the required element for encryption key management on an LTO-5 drive within a tapelibrary?()
第18题:
User "twsuser" is logged on to the IBM Tivoli Workload Scheduler Master Domain Manager server using Job Scheduling Console to update calendar. The user receives a message: MODIFY on CALENDAR access not granted. What is the cause of this error?()
第19题:
You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()
第20题:
IBM Tivoli Storage Manager
IBM Tivoli Enterprise Console
IBM Tivoli Configuration Manager
IBM Tivoli System Automation Manager
第21题:
The directory must exist with one subdirectory (general).
The directory must exist with two subdirectories (daily, weekly).
The directory must exist with three subdirectories (daily, weekly, monthly).
The directory must exist with four subdirectories (general, daily, weekly, monthly).
第22题:
The database user must be created using DB2 Control Center.
The database user must be created using the DB2 Command Line Processor.
The database user may be created using DB2 Control Center or DB2 Command Line Processor.
The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.
第23题:
A
B
C
D
E
第24题:
to add second factor based authentication to a Web application
to pre-populate user wallets with all their application credentials in one go
to enhance out-of-the-box audit logging by creating custom audit log events
to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On
to configure automatic password change on expiry for an application so that the new password is a random string of specified strength