多选题Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()AData Mining APIBProvisioning APICCryptography APIDAPI for Second FactorsESOAP API for Mobile ActiveCode

题目
多选题
Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
A

Data Mining API

B

Provisioning API

C

Cryptography API

D

API for Second Factors

E

SOAP API for Mobile ActiveCode


相似考题
参考答案和解析
正确答案: C,A
解析: 暂无解析
更多“多选题Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()AData Mining APIBProvisioning APICCryptography APIDAPI for Second FactorsESOAP API for Mobile ActiveCode”相关问题
  • 第1题:

    When planning for secure communications between a partner and the Point of Contact, at what level is the SSL connection defined?()

    • A、each individual partner within a single federation
    • B、all federations configured for an instance of IBM Tivoli Federated Identity Manager (ITFIM)
    • C、each individual federation within an instance of ITFIM
    • D、all federation functionality fronted by a single instance of IBM Tivoli Access Manager for e-business WebSEAL

    正确答案:C

  • 第2题:

    Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()

    • A、Windows NT Connector
    • B、Generic (LDAP) Connector
    • C、Network Information Service Connector
    • D、Active Directory Service Interfaces Connector

    正确答案:B

  • 第3题:

    What are two circumstances for which it may be advisable to use the  silent uninstallation method instead of an interactive method?()

    • A、 The Administrator is unable to successfully export DISPLAY to a  remote server.
    • B、 IBM Tivoli Workload Scheduler is installed on a server for which  there is no console access.
    • C、 DNS is not working properly and the server cannot be accessed  remotely to run the uninstallation script.
    • D、 TCP on the server on which IBM Tivoli Workload Scheduler is  installed is configured for half-duplex rather than full-duplex.
    • E、 The remote IBM Tivoli Workload Scheduler server is multi-homed, thus  the return connection to IBM Tivoli Workload Scheduler cannot be  established thereby requiring the use of the silent  uninstaller.

    正确答案:A,B

  • 第4题:

    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、The database user must be created using DB2 Control Center.
    • B、The database user must be created using the DB2 Command Line Processor.
    • C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.
    • D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

    正确答案:C

  • 第5题:

    What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()

    • A、The directory must exist with one subdirectory (general).
    • B、The directory must exist with two subdirectories (daily, weekly).
    • C、The directory must exist with three subdirectories (daily, weekly, monthly).
    • D、The directory must exist with four subdirectories (general, daily, weekly, monthly).

    正确答案:C

  • 第6题:

    In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()

    • A、Citrix workstation
    • B、personal workstation
    • C、shared workstation, private desktop
    • D、shared workstation, shared desktop

    正确答案:C

  • 第7题:

    What is the required element for encryption key management on an LTO-5 drive within a tapelibrary?()

    • A、IBM LTO Encryption Manager
    • B、IBM Tape Encryption Manager
    • C、IBM Tivoli Single Sign On Manager (SSO)
    • D、IBM Tivoli Key Lifecycle Manager (TKLM)

    正确答案:D

  • 第8题:

    You have two Exchange Server 2010 servers that have the Client Access, Hub Transport, and Mailbox server roles installed.The servers are members of a database availability group (DAG).You need to ensure that all users can access the Client Access server if a single server or service fails.What should you do?()

    • A、from DNS manager, create two new records for the Client Access servers.
    • B、from Failover Cluster Manager, create a new service named Client Access Server and assign a new IP address.
    • C、Install the Network Load Balancing feature on each server and assign a second IP address to each network adapter.
    • D、Deploy a hardware load balancer.Create a DNS record for the virtual IP address and configure a Client Access server array.

    正确答案:D

  • 第9题:

    多选题
    What are two circumstances for which it may be advisable to use the  silent uninstallation method instead of an interactive method?()
    A

    The Administrator is unable to successfully export DISPLAY to a  remote server.

    B

    IBM Tivoli Workload Scheduler is installed on a server for which  there is no console access.

    C

    DNS is not working properly and the server cannot be accessed  remotely to run the uninstallation script.

    D

    TCP on the server on which IBM Tivoli Workload Scheduler is  installed is configured for half-duplex rather than full-duplex.

    E

    The remote IBM Tivoli Workload Scheduler server is multi-homed, thus  the return connection to IBM Tivoli Workload Scheduler cannot be  established thereby requiring the use of the silent  uninstaller.


    正确答案: B,D
    解析: 暂无解析

  • 第10题:

    单选题
    What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()
    A

    The directory must exist with one subdirectory (general).

    B

    The directory must exist with two subdirectories (daily, weekly).

    C

    The directory must exist with three subdirectories (daily, weekly, monthly).

    D

    The directory must exist with four subdirectories (general, daily, weekly, monthly).


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()
    A

    the size of the hard drives for each PC connected to the client’s network

    B

    the average size of the wallet based on the number of profiles and accounts

    C

    if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hours

    D

    the number of users that will be connected using the wireless network, as opposed to a wired connection


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    to add second factor based authentication to a Web application

    B

    to pre-populate user wallets with all their application credentials in one go

    C

    to enhance out-of-the-box audit logging by creating custom audit log events

    D

    to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On

    E

    to configure automatic password change on expiry for an application so that the new password is a random string of specified strength


    正确答案: B,C
    解析: 暂无解析

  • 第13题:

    Which two software components are prerequisite products for the Common Audit and Reporting Service (CARS) event server?()

    • A、IBM DB2 Server
    • B、Crystal Enterprise Server
    • C、IBM Tivoli Directory Server
    • D、IBM WebSphere Application Server
    • E、IBM Tivoli Access Manager Authorization Server

    正确答案:A,D

  • 第14题:

    Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()

    • A、AccessAdmin,AccessAssistant,and IMS Configuration Utility
    • B、AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility
    • C、AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration Utility
    • D、AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

    正确答案:A

  • 第15题:

    Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()

    • A、the size of the hard drives for each PC connected to the client’s network
    • B、the average size of the wallet based on the number of profiles and accounts
    • C、if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hours
    • D、the number of users that will be connected using the wireless network, as opposed to a wired connection

    正确答案:B

  • 第16题:

    Which of the following is a management strategy of iDataPlex?()

    • A、IBM Systems Director manages all components as single image
    • B、Rack Management Appliance manages the homogeneous image
    • C、HMC manages dissimilar components
    • D、Tivoli Provisioning Manager (TPC) manages all components as single image

    正确答案:B

  • 第17题:

    The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()

    • A、The user would not be able to log in to the wallet.
    • B、The user is able to log in with their wallet password, but the wallet is not synchronized with the server.
    • C、A user must be re-assigned to another policy template in order to change any aspects of the applied policy.
    • D、The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

    正确答案:B

  • 第18题:

    An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()

    • A、The MAC can only be delivered to a mobile phone and is good for a single use only.
    • B、The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.
    • C、The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.
    • D、The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

    正确答案:B

  • 第19题:

    Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、Data Mining API
    • B、Provisioning API
    • C、Cryptography API
    • D、API for Second Factors
    • E、SOAP API for Mobile ActiveCode

    正确答案:B,E

  • 第20题:

    多选题
    Which two software components are prerequisite products for the Common Audit and Reporting Service (CARS) event server?()
    A

    IBM DB2 Server

    B

    Crystal Enterprise Server

    C

    IBM Tivoli Directory Server

    D

    IBM WebSphere Application Server

    E

    IBM Tivoli Access Manager Authorization Server


    正确答案: A,E
    解析: 暂无解析

  • 第21题:

    单选题
    Which Tivoli application has a predefined X-Agent available? ()
    A

     IBM Tivoli Storage Manager

    B

     IBM Tivoli Enterprise Console

    C

     IBM Tivoli Configuration Manager

    D

     IBM Tivoli System Automation Manager


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    The database user must be created using DB2 Control Center.

    B

    The database user must be created using the DB2 Command Line Processor.

    C

    The database user may be created using DB2 Control Center or DB2 Command Line Processor.

    D

    The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    多选题
    What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()
    A

    A

    B

    B

    C

    C

    D

    D

    E

    E


    正确答案: D,E
    解析: 暂无解析