单选题An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution 

题目
单选题
An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()
A

The MAC can only be delivered to a mobile phone and is good for a single use only.

B

The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.

C

The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.

D

The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.


相似考题
更多“单选题An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution ”相关问题
  • 第1题:

    An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()

    • A、details related to application user ID requirements
    • B、policy requirements related to the number of applications that a user can access
    • C、policy requirements for application and user initiated password resets and password complexity
    • D、do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project

    正确答案:C

  • 第2题:

    Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()

    • A、Windows NT Connector
    • B、Generic (LDAP) Connector
    • C、Network Information Service Connector
    • D、Active Directory Service Interfaces Connector

    正确答案:B

  • 第3题:

    Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()

    • A、the size of the hard drives for each PC connected to the client’s network
    • B、the average size of the wallet based on the number of profiles and accounts
    • C、if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hours
    • D、the number of users that will be connected using the wireless network, as opposed to a wired connection

    正确答案:B

  • 第4题:

    In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()

    • A、Citrix workstation
    • B、personal workstation
    • C、shared workstation, private desktop
    • D、shared workstation, shared desktop

    正确答案:C

  • 第5题:

    Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、Data Mining API
    • B、Provisioning API
    • C、Cryptography API
    • D、API for Second Factors
    • E、SOAP API for Mobile ActiveCode

    正确答案:B,E

  • 第6题:

    You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()

    • A、Use a password generator application to create a preshared key, and distribute it to all mobile users
    • B、Use computer autoenrollment to create digital certificates that can be used to authenticate to a VPN server
    • C、Acquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connection
    • D、Configure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates

    正确答案:B,D

  • 第7题:

    单选题
    An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()
    A

    The MAC can only be delivered to a mobile phone and is good for a single use only.

    B

    The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.

    C

    The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.

    D

    The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    A route-based VPN is required for which scenario?()
    A

    when the remote VPN peer is behind a NAT device

    B

    when multiple networks need to be reached across the tunnel and GRE cannot be used

    C

    when the remote VPN peer is a dialup or remote access client

    D

    when a dynamic routing protocol is required across the VPN and GRE cannot be used


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()
    A

    Citrix workstation

    B

    personal workstation

    C

    shared workstation, private desktop

    D

    shared workstation, shared desktop


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()
    A

    Windows NT Connector

    B

    Generic (LDAP) Connector

    C

    Network Information Service Connector

    D

    Active Directory Service Interfaces Connector


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()
    A

    the size of the hard drives for each PC connected to the client’s network

    B

    the average size of the wallet based on the number of profiles and accounts

    C

    if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hours

    D

    the number of users that will be connected using the wireless network, as opposed to a wired connection


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    Data Mining API

    B

    Provisioning API

    C

    Cryptography API

    D

    API for Second Factors

    E

    SOAP API for Mobile ActiveCode


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    When planning for secure communications between a partner and the Point of Contact, at what level is the SSL connection defined?()

    • A、each individual partner within a single federation
    • B、all federations configured for an instance of IBM Tivoli Federated Identity Manager (ITFIM)
    • C、each individual federation within an instance of ITFIM
    • D、all federation functionality fronted by a single instance of IBM Tivoli Access Manager for e-business WebSEAL

    正确答案:C

  • 第14题:

    Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()

    • A、AccessAdmin,AccessAssistant,and IMS Configuration Utility
    • B、AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility
    • C、AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration Utility
    • D、AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

    正确答案:A

  • 第15题:

    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、The database user must be created using DB2 Control Center.
    • B、The database user must be created using the DB2 Command Line Processor.
    • C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.
    • D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

    正确答案:C

  • 第16题:

    An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()

    • A、The MAC can only be delivered to a mobile phone and is good for a single use only.
    • B、The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.
    • C、The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.
    • D、The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

    正确答案:B

  • 第17题:

    A route-based VPN is required for which scenario?()

    • A、when the remote VPN peer is behind a NAT device
    • B、when multiple networks need to be reached across the tunnel and GRE cannot be used
    • C、when the remote VPN peer is a dialup or remote access client
    • D、when a dynamic routing protocol is required across the VPN and GRE cannot be used

    正确答案:D

  • 第18题:

    单选题
    When planning for secure communications between a partner and the Point of Contact, at what level is the SSL connection defined?()
    A

    each individual partner within a single federation

    B

    all federations configured for an instance of IBM Tivoli Federated Identity Manager (ITFIM)

    C

    each individual federation within an instance of ITFIM

    D

    all federation functionality fronted by a single instance of IBM Tivoli Access Manager for e-business WebSEAL


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()
    A

    AccessAdmin,AccessAssistant,and IMS Configuration Utility

    B

    AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

    C

    AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration Utility

    D

    AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()
    A

     It is recommended to place the VPN termination device in line with the Enterprise Edge 1

    B

     Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment

    C

     VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place

    D

     Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()
    A

    details related to application user ID requirements

    B

    policy requirements related to the number of applications that a user can access

    C

    policy requirements for application and user initiated password resets and password complexity

    D

    do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    The database user must be created using DB2 Control Center.

    B

    The database user must be created using the DB2 Command Line Processor.

    C

    The database user may be created using DB2 Control Center or DB2 Command Line Processor.

    D

    The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    多选题
    What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()
    A

    A

    B

    B

    C

    C

    D

    D

    E

    E


    正确答案: D,E
    解析: 暂无解析

  • 第24题:

    多选题
    Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    to add second factor based authentication to a Web application

    B

    to pre-populate user wallets with all their application credentials in one go

    C

    to enhance out-of-the-box audit logging by creating custom audit log events

    D

    to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On

    E

    to configure automatic password change on expiry for an application so that the new password is a random string of specified strength


    正确答案: B,C
    解析: 暂无解析