details related to application user ID requirements
policy requirements related to the number of applications that a user can access
policy requirements for application and user initiated password resets and password complexity
do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project
第1题:
Which two are needed components when designing and implementing a security solution?()
第2题:
User "twsuser" is logged on to the IBM Tivoli Workload Scheduler Master Domain Manager server using Job Scheduling Console to update calendar. The user receives a message: MODIFY on CALENDAR access not granted. What is the cause of this error?()
第3题:
You have an Exchange Server 2010 organization. The organization contains a global security group named Group1. You plan to deploy a monitoring solution for the Exchange servers in your organization. You need to recommend a solution that allows members of Group1 to monitor the performance of Exchange Server 2010 servers. Your solution must prevent members of Group1 from modifying the configurations of the Exchanges Server 2010 organization. What should you include in the solution?()
第4题:
You have an Exchange 2010 organization. Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication. You need to recommend a solution to meet the security policy requirements. Which two possible ways to achieve this goal should you recommend?()
第5题:
You have an Exchange Server 2010 organization. Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA). You need to recommend a client access solution that meets the requirements of the security policy. What should you include in the solution?()
第6题:
Create a new Active Directory site. Deploy a Group Policy object (GPO) to the site.
Create a new Password Settings Object (PSO) for the research department’s users
Create a new organizational unit (OU) named Research in the existing domain. Deploy a Group Policy object (GPO) to the Research OU.
Create a new domain in the forest.Add the research department’s user accounts to the new domain.Configure a new security policy in the new domain.
第7题:
Batchman process is down.
User password has expired.
WebSphere security is damaged.
There are insufficient permissions in Security file.
第8题:
the detailed security-related requirements
guidelines to meet security-related requirements
the detailed security-related requirements and the guidelines to meet them
how to run a shipping company considering the potential terrorism action
第9题:
Active Directory Rights Management Services (AD RMS)
Domain Security
Forms-based Authentication
Secure/Multipurpose Internet Mail Extensions (S/MIME)
第10题:
Delegation of Control Wizard
Federation Trusts
Reliability Monitor
Role Based Access Control (RBAC)
第11题:
details related to application user ID requirements
policy requirements related to the number of applications that a user can access
policy requirements for application and user initiated password resets and password complexity
do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project
第12题:
An international company has a heterogeneous IBM storage environment with two IBM DS8700 systems in a Metro Mirror relationship. They also have a virtualized environment with two SVC clusters in a Global Mirror relationship. The storage administrator complains about the monitoring of copy services. Which solution should the IBM storage specialist propose for this pain point()
第13题:
Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers. All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements: .Ensure that users can send encrypted messages to any other organization on the Internet .Ensure that all Exchange-related communication between Hub Transport servers and Edge Transport servers is encrypted What should you recommend?()
第14题:
You have an Exchange Server 2010 organization. You have a global security group named Legal that contains all the members of your companys legaldepartment. The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords. You need to recommend a solution for the organization that complies with the security policy. What should you include in the solution?()
第15题:
Your network contains a single Active Directory domain. You have an Exchange Server 2010 organization that contains a Hub Transport server named Hub1. Hub1 receives all e-mail messages that are sent to your organization from the Internet. A new company security policy states that domain-joined servers must not be accessible directly from theInternet. You need to create a message hygiene solution to meet the following requirements: .Comply with the new security policy .Minimize the amount of spam that is delivered to the internal Exchange servers in the organization What should you do first?()
第16题:
Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All domain controllers run Windows Server 2008 R2. A corporate policy requires that the users from the research department have higher levels of account and password security than other users in the domain. You need to recommend a solution that meets the requirements of the corporate policy. Your solution must minimize hardware and software costs. What should you recommend?()
第17题:
IBM Tivoli Storage Manager
IBM Tivoli Enterprise Console
IBM Tivoli Configuration Manager
IBM Tivoli System Automation Manager
第18题:
a Discovery Management role group
a legal hold
administrator audit logging
Mailbox journaling
第19题:
WLDF has better performance than OEM
my organization already has a solution for unified management and monitoring; we need to supplement that with some specific WLS-related capabilities
OEM is not certified with latest version of WLS
OEM is really focused on the database tier, is not meant to address JEE management and monitoring
第20题:
managed folder mailbox policies
multiple OWA virtual directories
OWA segmentation
WebReady Document Viewing
第21题:
Microsoft Update
Microsoft System Center Configuration Manager
Windows Server Update Services
Windows Update
第22题:
to add second factor based authentication to a Web application
to pre-populate user wallets with all their application credentials in one go
to enhance out-of-the-box audit logging by creating custom audit log events
to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On
to configure automatic password change on expiry for an application so that the new password is a random string of specified strength