单选题Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()A AccessAdmin,AccessAssistant,and IMS Configuration UtilityB AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration UtilityC AccessM

题目
单选题
Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()
A

AccessAdmin,AccessAssistant,and IMS Configuration Utility

B

AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

C

AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration Utility

D

AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility


相似考题
更多“单选题Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()A AccessAdmin,AccessAssistant,and IMS Configuration UtilityB AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration UtilityC AccessM”相关问题
  • 第1题:

    Which Tivoli application has a predefined X-Agent available? ()

    • A、 IBM Tivoli Storage Manager
    • B、 IBM Tivoli Enterprise Console
    • C、 IBM Tivoli Configuration Manager
    • D、 IBM Tivoli System Automation Manager

    正确答案:A

  • 第2题:

    Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()

    • A、Windows NT Connector
    • B、Generic (LDAP) Connector
    • C、Network Information Service Connector
    • D、Active Directory Service Interfaces Connector

    正确答案:B

  • 第3题:

    Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()

    • A、the size of the hard drives for each PC connected to the client’s network
    • B、the average size of the wallet based on the number of profiles and accounts
    • C、if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hours
    • D、the number of users that will be connected using the wireless network, as opposed to a wired connection

    正确答案:B

  • 第4题:

    The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()

    • A、The user would not be able to log in to the wallet.
    • B、The user is able to log in with their wallet password, but the wallet is not synchronized with the server.
    • C、A user must be re-assigned to another policy template in order to change any aspects of the applied policy.
    • D、The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

    正确答案:B

  • 第5题:

    Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、Data Mining API
    • B、Provisioning API
    • C、Cryptography API
    • D、API for Second Factors
    • E、SOAP API for Mobile ActiveCode

    正确答案:B,E

  • 第6题:

    You are required to remove the default EXTPROC entry from the default listener configuration to create a listener that will listen specifically for EXTPROC calls. Which two methods can you use to remove the default EXTPROC entry from the default listener configuration? ()

    • A、 the RMAN utility
    • B、 the import/export utility
    • C、 the Oracle Enterprise Manager
    • D、 the change tracking feature
    • E、 the Net Manager utility

    正确答案:C,E

  • 第7题:

    单选题
    Which Tivoli application has a predefined X-Agent available? ()
    A

     IBM Tivoli Storage Manager

    B

     IBM Tivoli Enterprise Console

    C

     IBM Tivoli Configuration Manager

    D

     IBM Tivoli System Automation Manager


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()
    A

    The user would not be able to log in to the wallet.

    B

    The user is able to log in with their wallet password, but the wallet is not synchronized with the server.

    C

    A user must be re-assigned to another policy template in order to change any aspects of the applied policy.

    D

    The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()
    A

    Windows NT Connector

    B

    Generic (LDAP) Connector

    C

    Network Information Service Connector

    D

    Active Directory Service Interfaces Connector


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()
    A

    the size of the hard drives for each PC connected to the client’s network

    B

    the average size of the wallet based on the number of profiles and accounts

    C

    if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hours

    D

    the number of users that will be connected using the wireless network, as opposed to a wired connection


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()
    A

    Check the server.xml on the IMS Server.

    B

    Check the database table IMSSyncDataType.

    C

    Check the System policies in the AccessAdmin.

    D

    Check the IMS Server settings of the IMS Configuration Utility.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    to add second factor based authentication to a Web application

    B

    to pre-populate user wallets with all their application credentials in one go

    C

    to enhance out-of-the-box audit logging by creating custom audit log events

    D

    to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On

    E

    to configure automatic password change on expiry for an application so that the new password is a random string of specified strength


    正确答案: B,C
    解析: 暂无解析

  • 第13题:

    How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()

    • A、Check the server.xml on the IMS Server.
    • B、Check the database table IMSSyncDataType.
    • C、Check the System policies in the AccessAdmin.
    • D、Check the IMS Server settings of the IMS Configuration Utility.

    正确答案:D

  • 第14题:

    Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()

    • A、AccessAdmin,AccessAssistant,and IMS Configuration Utility
    • B、AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility
    • C、AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration Utility
    • D、AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

    正确答案:A

  • 第15题:

    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、The database user must be created using DB2 Control Center.
    • B、The database user must be created using the DB2 Command Line Processor.
    • C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.
    • D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

    正确答案:C

  • 第16题:

    In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()

    • A、Citrix workstation
    • B、personal workstation
    • C、shared workstation, private desktop
    • D、shared workstation, shared desktop

    正确答案:C

  • 第17题:

    our database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?()

    • A、Oracle Net Manager
    • B、Listener Control utility
    • C、Database Configuration Assistant
    • D、Oracle Net Configuration Assistant

    正确答案:B

  • 第18题:

    单选题
    Your database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.  Which tool or utility would you use to start the listener?()
    A

     Oracle Net Manager

    B

     Listener Control utility

    C

     Database Configuration Assistant

    D

     Oracle Net Configuration Assistant


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    A customer has a BladeCenter H chassis with a single AMM.  The AMM is defective. Which of the following is the method to backup the existing AMM so the new AMM automaticlally picks up the configuration? ()
    A

    Back up the AMM configuration to a file 

    B

    Back up the AMM configuration to the chassis 

    C

    Back up the AMM using IBM Systems Director 

    D

    Back up the AMM using Tivoli Storage Manager


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()
    A

    Citrix workstation

    B

    personal workstation

    C

    shared workstation, private desktop

    D

    shared workstation, shared desktop


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    The database user must be created using DB2 Control Center.

    B

    The database user must be created using the DB2 Command Line Processor.

    C

    The database user may be created using DB2 Control Center or DB2 Command Line Processor.

    D

    The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()
    A

    A

    B

    B

    C

    C

    D

    D

    E

    E


    正确答案: D,E
    解析: 暂无解析

  • 第23题:

    多选题
    Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    Data Mining API

    B

    Provisioning API

    C

    Cryptography API

    D

    API for Second Factors

    E

    SOAP API for Mobile ActiveCode


    正确答案: C,A
    解析: 暂无解析