单选题What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()A The directory must exist with one subdirectory (general).B The directory must exist with two s

题目
单选题
What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()
A

The directory must exist with one subdirectory (general).

B

The directory must exist with two subdirectories (daily, weekly).

C

The directory must exist with three subdirectories (daily, weekly, monthly).

D

The directory must exist with four subdirectories (general, daily, weekly, monthly).


相似考题
更多“单选题What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()A The directory must exist with one subdirectory (general).B The directory must exist with two s”相关问题
  • 第1题:

    Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()

    • A、Windows NT Connector
    • B、Generic (LDAP) Connector
    • C、Network Information Service Connector
    • D、Active Directory Service Interfaces Connector

    正确答案:B

  • 第2题:

    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、The database user must be created using DB2 Control Center.
    • B、The database user must be created using the DB2 Command Line Processor.
    • C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.
    • D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

    正确答案:C

  • 第3题:

    The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()

    • A、The user would not be able to log in to the wallet.
    • B、The user is able to log in with their wallet password, but the wallet is not synchronized with the server.
    • C、A user must be re-assigned to another policy template in order to change any aspects of the applied policy.
    • D、The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

    正确答案:B

  • 第4题:

    Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、Data Mining API
    • B、Provisioning API
    • C、Cryptography API
    • D、API for Second Factors
    • E、SOAP API for Mobile ActiveCode

    正确答案:B,E

  • 第5题:

    You are a network administrator for Alpine Ski House. The network consists of a single Active Directory domain. The domain name is alpineskihouse.com. The network contains three Windows Server 2003 domain controllers. You are creating the recovery plan for the company. According to the existing backup plan, domain controllers are backed up by using normal backups each night. The normal backups of the domain controllers include the system state of each domain controller. Your recovery plan must incorporate the following organizational requirements. Active Directory objects that are accidentally or maliciously deleted must be recoverable. Active Directory must be restored to its most recent state as quickly as possible. Active Directory database replication must be minimized.You need to create a plan to restore a deleted organizational unit (OU).  Which two actions should you include in your plan?()

    • A、 Restart a domain controller in Directory Services Restore Mode.
    • B、 Restart a domain controller in Safe Mode.
    • C、 Use the Ntdsutil utility to perform an authoritative restore operation of the Active Directory database.
    • D、 Restore the system state by using the Always replace the file on my computer option.
    • E、 Use the Ntdsutil utility to perform an authoritative restore operation of the appropriate subtree.

    正确答案:A,E

  • 第6题:

    多选题
    Which the two about WAR files are true?()
    A

    WAR files must be located in the web application library directory.

    B

    WAR files must contain the web application deployment descriptor.

    C

    WAR files must be created by using archive tools to designed specifically for that purpose.

    D

    The web container must serve the content of any META-INF directory located in a WAR file.

    E

    The web container must allow access to resources in JARs in the web application library directory


    正确答案: D,C
    解析: 暂无解析

  • 第7题:

    单选题
    You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.The Xxx network has two Mailbox servers named XXX-EX01 and XXX-EX02.You are busy implementing a database availability group (DAG). What actions must you take to guarantee mailbox databases replications on XXX-EX01 and XXXEX02?()
    A

    You must implement a custom Send connector

    B

    You must install the Active Directory Connector (ADC)

    C

    You must change the Database paths

    D

    You must change the membership list of the DAG


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()
    A

     Configure a directory service access audit policy. Increase the maximum size of the security log.

    B

     Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.

    C

     Configure an object access audit policy for the directory. Increase the maximum size of the system log.

    D

     Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()
    A

    The directory must exist with one subdirectory (general).

    B

    The directory must exist with two subdirectories (daily, weekly).

    C

    The directory must exist with three subdirectories (daily, weekly, monthly).

    D

    The directory must exist with four subdirectories (general, daily, weekly, monthly).


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Which credentials must be entered into the S-Series GUI when joining the Active domain?()
    A

     the credentials of a privileged account on the Active directory server

    B

     the credentials of any account on the Active directory server

    C

     the credentials of the account (created by the S-Series) on the Active directory server when the domain is joined

    D

     the S-Series administrative account


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    The database user must be created using DB2 Control Center.

    B

    The database user must be created using the DB2 Command Line Processor.

    C

    The database user may be created using DB2 Control Center or DB2 Command Line Processor.

    D

    The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    Data Mining API

    B

    Provisioning API

    C

    Cryptography API

    D

    API for Second Factors

    E

    SOAP API for Mobile ActiveCode


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    Which credentials must be entered into the S-Series GUI when joining the Active domain?()

    • A、 the credentials of a privileged account on the Active directory server
    • B、 the credentials of any account on the Active directory server
    • C、 the credentials of the account (created by the S-Series) on the Active directory server when the domain is joined
    • D、 the S-Series administrative account

    正确答案:A

  • 第14题:

    What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()

    • A、The directory must exist with one subdirectory (general).
    • B、The directory must exist with two subdirectories (daily, weekly).
    • C、The directory must exist with three subdirectories (daily, weekly, monthly).
    • D、The directory must exist with four subdirectories (general, daily, weekly, monthly).

    正确答案:C

  • 第15题:

    What is the location for the application server scripts? ()

    • A、 wastools directory in IBM Tivoli Workload Scheduler bin directory
    • B、 wastools directory in IBM Tivoli Workload Automation home directory
    • C、 appserver directory in IBM Tivoli Workload Scheduler parent  directory
    • D、 appserver directory in IBM Tivoli Workload Automation home directory

    正确答案:B

  • 第16题:

    Which the two about WAR files are true?()

    • A、 WAR files must be located in the web application library directory.
    • B、 WAR files must contain the web application deployment descriptor.
    • C、 WAR files must be created by using archive tools to designed specifically for that purpose. 
    • D、 The web container must serve the content of any META-INF directory located in a WAR file.
    • E、 The web container must allow access to resources in JARs in the web application library directory

    正确答案:B,E

  • 第17题:

    多选题
    Which two software components are prerequisite products for the Common Audit and Reporting Service (CARS) event server?()
    A

    IBM DB2 Server

    B

    Crystal Enterprise Server

    C

    IBM Tivoli Directory Server

    D

    IBM WebSphere Application Server

    E

    IBM Tivoli Access Manager Authorization Server


    正确答案: A,E
    解析: 暂无解析

  • 第18题:

    多选题
    You are developing several tag libraries that will be sold for development of third-party web applications.You are about to publish the first three libraries as JAR files: container-tags.jar,advanced-html-form-tags.jar, and basic-html-form-tags.jar. Which two techniques are appropriate for packaging the TLD files forthese tag libraries?()
    A

    The TLD must be located within the WEB-INF directory of the JAR file.

    B

    The TLD must be located within the META-INF directory of the JAR file.

    C

    The TLD must be located within the META-INF/tld/ directory of the JAR file.

    D

    The TLD must be located within a subdirectory of WEB-INF directory of the JAR file.

    E

    The TLD must be located within a subdirectory of META-INF directory of the JAR file.


    正确答案: D,B
    解析: 暂无解析

  • 第19题:

    单选题
    What is the location for the application server scripts? ()
    A

     wastools directory in IBM Tivoli Workload Scheduler bin directory

    B

     wastools directory in IBM Tivoli Workload Automation home directory

    C

     appserver directory in IBM Tivoli Workload Scheduler parent  directory

    D

     appserver directory in IBM Tivoli Workload Automation home directory


    正确答案: D
    解析: 暂无解析

  • 第20题:

    多选题
    You are a network administrator for Alpine Ski House. The network consists of a single Active Directory domain. The domain name is alpineskihouse.com. The network contains three Windows Server 2003 domain controllers. You are creating the recovery plan for the company. According to the existing backup plan, domain controllers are backed up by using normal backups each night. The normal backups of the domain controllers include the system state of each domain controller. Your recovery plan must incorporate the following organizational requirements. Active Directory objects that are accidentally or maliciously deleted must be recoverable. Active Directory must be restored to its most recent state as quickly as possible. Active Directory database replication must be minimized.You need to create a plan to restore a deleted organizational unit (OU).  Which two actions should you include in your plan?()
    A

    Restart a domain controller in Directory Services Restore Mode.

    B

    Restart a domain controller in Safe Mode.

    C

    Use the Ntdsutil utility to perform an authoritative restore operation of the Active Directory database.

    D

    Restore the system state by using the Always replace the file on my computer option.

    E

    Use the Ntdsutil utility to perform an authoritative restore operation of the appropriate subtree.


    正确答案: C,D
    解析: 暂无解析

  • 第21题:

    单选题
    The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()
    A

    The user would not be able to log in to the wallet.

    B

    The user is able to log in with their wallet password, but the wallet is not synchronized with the server.

    C

    A user must be re-assigned to another policy template in order to change any aspects of the applied policy.

    D

    The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()
    A

    Windows NT Connector

    B

    Generic (LDAP) Connector

    C

    Network Information Service Connector

    D

    Active Directory Service Interfaces Connector


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()
    A

    A

    B

    B

    C

    C

    D

    D

    E

    E


    正确答案: D,E
    解析: 暂无解析

  • 第24题:

    多选题
    Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    to add second factor based authentication to a Web application

    B

    to pre-populate user wallets with all their application credentials in one go

    C

    to enhance out-of-the-box audit logging by creating custom audit log events

    D

    to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On

    E

    to configure automatic password change on expiry for an application so that the new password is a random string of specified strength


    正确答案: B,C
    解析: 暂无解析