多选题What are two functions of a custom mapping module?()Arecords the token assertionBmaps a STSUUSER input to a SAML tokenClooks up attributes in an external data sourceDmaps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 p

题目
多选题
What are two functions of a custom mapping module?()
A

records the token assertion

B

maps a STSUUSER input to a SAML token

C

looks up attributes in an external data source

D

maps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 protocol

E

maps a GUI XML attributes into UI controls that are used by the IBM Tivoli Federated Identity Manager Console to collect the input data


相似考题

2.The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()A、The input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. B、The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. C、The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. D、The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.

更多“多选题What are two functions of a custom mapping module?()Arecords the token assertionBmaps a STSUUSER input to a SAML tokenClooks up attributes in an external data sourceDmaps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 p”相关问题
  • 第1题:

    Consider the following command to create a tablespace in your production database (which is using an Automatic Storage Management [ASM] instance to manage the database files):  CREATE TABLESPACE user_tbsp  DATAFILE ’+dgroup3(user_temp)/user_files/user_tbsp’ SIZE 200M;  What would be the result of this command?()

    • A、It would result in an error because the template cannot be used along with the disk group.
    • B、It would result in an error because the path cannot be specified while creating a tablespace in a disk group.
    • C、It would create a tablespace with a data file that has an alias, and its attributes are set by the user-defined template.
    • D、It would create a tablespace with a data file that does not have an alias, and its attributes are set by the user-defined template.

    正确答案:C

  • 第2题:

    Which security token may carry user attribute information as part of the defined token format?()

    • A、Kerberos
    • B、RACF Token
    • C、SAML Assertion
    • D、Username Token

    正确答案:C

  • 第3题:

    Which two are the uses of the ASM metadata backup and restore (AMBR) feature?()

    • A、 It can be used to back up all data on ASM disks.
    • B、 It can be used to recover the damaged ASM disk group along with the data.
    • C、 It can be used to gather information about a preexisting ASM disk group with disk paths,disk name,failure groups,attributes templates,and alias directory structure.
    • D、 It can be used to re-create the ASM disk group with its attributes.

    正确答案:C,D

  • 第4题:

    Consider the following command to create a tablespace in your production database (which is using an Automatic Storage Management [ASM] instance to manage the database files): CREATE TABLESPACE user_tbsp DATAFILE ’+dgroup3 (usder_temp) /user_files/user_tbsp’ SIZE 200M; What would be the result of this command?()

    • A、 It would result in an error because the template cannot be used along with the disk group.
    • B、 It would result in an error because the path cannot be specified while creating a tablespace in a disk group.
    • C、 It would create a tablespace with a data file that has an alias, and its attributes are set by the user-defined template.
    • D、 It would create a tablespace with a data file that does not have an alias, and its attributes are set by the user-defined template.

    正确答案:C

  • 第5题:

    You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users' files.  What should you do to accomplish these goals?()

    • A、Add Maria’s user account to the System group.
    • B、Add Maria’s user account to the Interactive group.
    • C、Add Maria’s user account to the Power Users group.
    • D、Add Maria’s user account to the Administrators group.
    • E、Add Maria’s user account to the Backup Operators group.

    正确答案:C,E

  • 第6题:

    Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have a file server that contains two volumes named C and D. Volume C contains a folder named User1data. User1 is the owner of all files in the User1data folder. You copy the User1data folder to volume D. You examine the ownership of the User1data folder on volume D and discover that your user account is listed as the owner. You need to ensure that User1 is the owner of the User1data folder on volume D. What should you do? ()

    • A、Modify the Advanced Security settings for the User1data folder.
    • B、Modify the Advanced Attributes settings for the User1data folder.
    • C、Delete the User1data folder on volume
    • D、From Windows Explorer, move the User1data folder from volume C to volume

    正确答案:A

  • 第7题:

    多选题
    What are two functions of a custom mapping module?()
    A

    records the token assertion

    B

    maps a STSUUSER input to a SAML token

    C

    looks up attributes in an external data source

    D

    maps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 protocol

    E

    maps a GUI XML attributes into UI controls that are used by the IBM Tivoli Federated Identity Manager Console to collect the input data


    正确答案: B,E
    解析: 暂无解析

  • 第8题:

    多选题
    You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users’ files.   What should you do to accomplish these goals?()
    A

    Add Maria’s user account to the system group.

    B

    Add Maria’s user account to the interactive group.

    C

    Add Maria’s user account to the power user group.

    D

    Add Maria’s user account to the administrators group.

    E

    Add Maria’s user account to the Backup Operators group.


    正确答案: A,B
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements are true regarding the Oracle Data Pump export and import operations()
    A

    You cannot export data from a remote database.

    B

    You can rename tables during an import operation.

    C

    You can overwrite existing dump files during an export operation.

    D

    You can compress the data during export but not the metadata because it is not supported.


    正确答案: D,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two are the uses of the ASM metadata backup and restore (AMBR) feature?()
    A

    It can be used to back up all data on ASM disks.

    B

    It can be used to recover the damaged ASM disk group along with the data.

    C

    It can be used to gather information about a preexisting ASM disk group with disk paths,disk name,failure groups,attributes templates,and alias directory structure.

    D

    It can be used to re-create the ASM disk group with its attributes.


    正确答案: D,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true regarding the usage of the SQL*Loader utility()
    A

    You can load data into multiple tables during the same load session.

    B

    You can load data from multiple files to a table during the same load session.

    C

    You cannot perform selective data loading based on the values available in the records.

    D

    You can use an export file generated by the EXPDP utility as an input data file to load the data.

    E

    You can load data only if the input file is available on the disk and tape but not in a named pipes.


    正确答案: B,A
    解析: 暂无解析

  • 第12题:

    单选题
    Consider the following command to create a tablespace in your production database (which is using an Automatic Storage Management [ASM] instance to manage the database files):  CREATE TABLESPACE user_tbsp  DATAFILE ’+dgroup3(user_temp)/user_files/user_tbsp’ SIZE 200M;  What would be the result of this command?()
    A

    It would result in an error because the template cannot be used along with the disk group.

    B

    It would result in an error because the path cannot be specified while creating a tablespace in a disk group.

    C

    It would create a tablespace with a data file that has an alias, and its attributes are set by the user-defined template.

    D

    It would create a tablespace with a data file that does not have an alias, and its attributes are set by the user-defined template.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which XSL if statement checks for the existence of a homepage attribute within an STS Universal User XML structure?()

    • A、<xsl:if test="//stsuuser:AttributeList/stsuuser:Attribute[attr='homepage']">
    • B、<xsl:if test="//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage']">
    • C、<xsl:if-exists="//stsuuser:AttributeList/stsuuser:Attribute/custom:Homepage">
    • D、<xsl:if-exists="//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage'])>

    正确答案:B

  • 第14题:

    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()

    • A、LDAP
    • B、S/Key
    • C、TACACS+
    • D、RADIUS
    • E、SiteMinder

    正确答案:A,D,E

  • 第15题:

    Which two statements are true regarding the Oracle Data Pump export and import operations()

    • A、You cannot export data from a remote database.
    • B、You can rename tables during an import operation.
    • C、You can overwrite existing dump files during an export operation.
    • D、You can compress the data during export but not the metadata because it is not supported.

    正确答案:B,C

  • 第16题:

    You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()

    • A、Add Julia’s user account to the local Power Users group.
    • B、Add Julia’s user account to the local Administrators group.
    • C、Allow Julia’s user account Write permissions to C:///Data.
    • D、Allow Julia’s user account Full Control permission to C:///Data.

    正确答案:C

  • 第17题:

    You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users’ files.   What should you do to accomplish these goals?()

    • A、Add Maria’s user account to the system group.
    • B、Add Maria’s user account to the interactive group.
    • C、Add Maria’s user account to the power user group.
    • D、Add Maria’s user account to the administrators group.
    • E、Add Maria’s user account to the Backup Operators group.

    正确答案:C,E

  • 第18题:

    The System Administrator wants to do a backup of the HMC and notices that there are two options on the HMC menu: Backup Critical Console data and Save Upgrade Data. Which of the following best describes the differences between the two options?()

    • A、Both options back up user and partition profile data. Only the Backup Critical Console Data backs up TCP/IP settings or preferences
    • B、Both options back up partition profile information. Only the Backup Critical Console Data backs up service function settings, such as Inventory Scout, Service Agent, and Service Focal Point
    • C、The Backup Critical Console Data should be performed just before the HMC software update operation. The Save Upgrade Data should be performed each time configuration changes are made to the system or the HMC
    • D、The Save Upgrade Data should be performed just before the HMC software update operation. The Backup Critical Console Data should be performed each time configuration changes are made to the system or the HMC

    正确答案:D

  • 第19题:

    多选题
    You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users' files.  What should you do to accomplish these goals?()
    A

    Add Maria’s user account to the System group.

    B

    Add Maria’s user account to the Interactive group.

    C

    Add Maria’s user account to the Power Users group.

    D

    Add Maria’s user account to the Administrators group.

    E

    Add Maria’s user account to the Backup Operators group.


    正确答案: B,A
    解析: 暂无解析

  • 第20题:

    单选题
    Which XSL if statement checks for the existence of a homepage attribute within an STS Universal User XML structure?()
    A

    <xsl:if test=//stsuuser:AttributeList/stsuuser:Attribute[attr='homepage']>

    B

    <xsl:if test=//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage']>

    C

    <xsl:if-exists=//stsuuser:AttributeList/stsuuser:Attribute/custom:Homepage>

    D

    <xsl:if-exists=//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage'])>


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    You are the administrator of an Active Directory domain named A user reports that he forgot his password and cannot log on to the domain. You discover that yesterday morning the user reset his password and successfully logged on to the domain. You need to enable the user to log on to the domain. What should you do? ()(Choose two)
    A

    Use Active Directory Users and Computers to move the account to the default organizational unit (OU) named Users. Instruct the user to restart his computer.

    B

    Use Active Directory Users and Computers to open the account properties for the user's user account. Clear the Account is locked out check box, and select the User must change password at next logon check box.

    C

    Use Active Directory Users and Computers to reset the user's password. Give the user the new password.

    D

    Use Computer Management to reset the password for the local Administrator account.


    正确答案: C,D
    解析: 暂无解析

  • 第22题:

    填空题
    What may happen to the user’s account if it is inactive for 9 months?The Gmail team may have to ____ the user’s account.

    正确答案: close
    解析:
    细节题。本题考查用户长久不使用账户的问题。邮件最后一段第二句提到“to keep Gmail great for our users, we may have to close inactive accounts after 9 months”,为了更好的提供服务,邮件公司将于9个月后关闭不活跃的账户。此处应填close。

  • 第23题:

    单选题
    Consider the following command to create a tablespace in your production database (which is using an Automatic Storage Management [ASM] instance to manage the database files): CREATE TABLESPACE user_tbsp DATAFILE ’+dgroup3 (usder_temp) /user_files/user_tbsp’ SIZE 200M; What would be the result of this command?()
    A

     It would result in an error because the template cannot be used along with the disk group.

    B

     It would result in an error because the path cannot be specified while creating a tablespace in a disk group.

    C

     It would create a tablespace with a data file that has an alias, and its attributes are set by the user-defined template.

    D

     It would create a tablespace with a data file that does not have an alias, and its attributes are set by the user-defined template.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    多选题
    Which two client requests are captured during database replay Capture?() (Choose two)
    A

    Flashback queries

    B

    Shared server requests

    C

    Login and logoff activities of sessions

    D

    Direct path load of data from external files by using utilities such as SQL *loader

    E

    Data definition language (DDL) and data manipulation language (DML) operations


    正确答案: C,E
    解析: 暂无解析