多选题Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()Ato add second factor based authen

题目
多选题
Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
A

to add second factor based authentication to a Web application

B

to pre-populate user wallets with all their application credentials in one go

C

to enhance out-of-the-box audit logging by creating custom audit log events

D

to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On

E

to configure automatic password change on expiry for an application so that the new password is a random string of specified strength


相似考题
更多“多选题Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()Ato add second factor based authen”相关问题
  • 第1题:

    Which two software components are prerequisite products for the Common Audit and Reporting Service (CARS) event server?()

    • A、IBM DB2 Server
    • B、Crystal Enterprise Server
    • C、IBM Tivoli Directory Server
    • D、IBM WebSphere Application Server
    • E、IBM Tivoli Access Manager Authorization Server

    正确答案:A,D

  • 第2题:

    Which tool is available for IBM BladeCenter that allows the direct power monitoring by IBM Systems Director 6.2 through the AMM?()

    • A、PowerExecutive
    • B、Active Energy Manager (AEM)
    • C、Tivoli Provisioning Manager (TPM)
    • D、Energy Monitoring and Control (EMC)

    正确答案:B

  • 第3题:

    What are two circumstances for which it may be advisable to use the  silent uninstallation method instead of an interactive method?()

    • A、 The Administrator is unable to successfully export DISPLAY to a  remote server.
    • B、 IBM Tivoli Workload Scheduler is installed on a server for which  there is no console access.
    • C、 DNS is not working properly and the server cannot be accessed  remotely to run the uninstallation script.
    • D、 TCP on the server on which IBM Tivoli Workload Scheduler is  installed is configured for half-duplex rather than full-duplex.
    • E、 The remote IBM Tivoli Workload Scheduler server is multi-homed, thus  the return connection to IBM Tivoli Workload Scheduler cannot be  established thereby requiring the use of the silent  uninstaller.

    正确答案:A,B

  • 第4题:

    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、The database user must be created using DB2 Control Center.
    • B、The database user must be created using the DB2 Command Line Processor.
    • C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.
    • D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

    正确答案:C

  • 第5题:

    What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()

    • A、The directory must exist with one subdirectory (general).
    • B、The directory must exist with two subdirectories (daily, weekly).
    • C、The directory must exist with three subdirectories (daily, weekly, monthly).
    • D、The directory must exist with four subdirectories (general, daily, weekly, monthly).

    正确答案:C

  • 第6题:

    In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()

    • A、Citrix workstation
    • B、personal workstation
    • C、shared workstation, private desktop
    • D、shared workstation, shared desktop

    正确答案:C

  • 第7题:

    What is the required element for encryption key management on an LTO-5 drive within a tapelibrary?()

    • A、IBM LTO Encryption Manager
    • B、IBM Tape Encryption Manager
    • C、IBM Tivoli Single Sign On Manager (SSO)
    • D、IBM Tivoli Key Lifecycle Manager (TKLM)

    正确答案:D

  • 第8题:

    You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()

    • A、stop all running instances of PDACLD
    • B、log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) user
    • C、change the TAMeb ACL policy applying to the Web Services namespace
    • D、update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console

    正确答案:C

  • 第9题:

    单选题
    Which Tivoli application has a predefined X-Agent available? ()
    A

     IBM Tivoli Storage Manager

    B

     IBM Tivoli Enterprise Console

    C

     IBM Tivoli Configuration Manager

    D

     IBM Tivoli System Automation Manager


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()
    A

    The directory must exist with one subdirectory (general).

    B

    The directory must exist with two subdirectories (daily, weekly).

    C

    The directory must exist with three subdirectories (daily, weekly, monthly).

    D

    The directory must exist with four subdirectories (general, daily, weekly, monthly).


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()
    A

    the size of the hard drives for each PC connected to the client’s network

    B

    the average size of the wallet based on the number of profiles and accounts

    C

    if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hours

    D

    the number of users that will be connected using the wireless network, as opposed to a wired connection


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    Data Mining API

    B

    Provisioning API

    C

    Cryptography API

    D

    API for Second Factors

    E

    SOAP API for Mobile ActiveCode


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()

    • A、Windows NT Connector
    • B、Generic (LDAP) Connector
    • C、Network Information Service Connector
    • D、Active Directory Service Interfaces Connector

    正确答案:B

  • 第14题:

    Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()

    • A、AccessAdmin,AccessAssistant,and IMS Configuration Utility
    • B、AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility
    • C、AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration Utility
    • D、AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

    正确答案:A

  • 第15题:

    Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()

    • A、the size of the hard drives for each PC connected to the client’s network
    • B、the average size of the wallet based on the number of profiles and accounts
    • C、if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hours
    • D、the number of users that will be connected using the wireless network, as opposed to a wired connection

    正确答案:B

  • 第16题:

    Which of the following is a management strategy of iDataPlex?()

    • A、IBM Systems Director manages all components as single image
    • B、Rack Management Appliance manages the homogeneous image
    • C、HMC manages dissimilar components
    • D、Tivoli Provisioning Manager (TPC) manages all components as single image

    正确答案:B

  • 第17题:

    The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()

    • A、The user would not be able to log in to the wallet.
    • B、The user is able to log in with their wallet password, but the wallet is not synchronized with the server.
    • C、A user must be re-assigned to another policy template in order to change any aspects of the applied policy.
    • D、The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

    正确答案:B

  • 第18题:

    An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()

    • A、The MAC can only be delivered to a mobile phone and is good for a single use only.
    • B、The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.
    • C、The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.
    • D、The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

    正确答案:B

  • 第19题:

    Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、Data Mining API
    • B、Provisioning API
    • C、Cryptography API
    • D、API for Second Factors
    • E、SOAP API for Mobile ActiveCode

    正确答案:B,E

  • 第20题:

    多选题
    Which two software components are prerequisite products for the Common Audit and Reporting Service (CARS) event server?()
    A

    IBM DB2 Server

    B

    Crystal Enterprise Server

    C

    IBM Tivoli Directory Server

    D

    IBM WebSphere Application Server

    E

    IBM Tivoli Access Manager Authorization Server


    正确答案: A,E
    解析: 暂无解析

  • 第21题:

    单选题
    A customer has a BladeCenter H chassis with a single AMM.  The AMM is defective. Which of the following is the method to backup the existing AMM so the new AMM automaticlally picks up the configuration? ()
    A

    Back up the AMM configuration to a file 

    B

    Back up the AMM configuration to the chassis 

    C

    Back up the AMM using IBM Systems Director 

    D

    Back up the AMM using Tivoli Storage Manager


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    The database user must be created using DB2 Control Center.

    B

    The database user must be created using the DB2 Command Line Processor.

    C

    The database user may be created using DB2 Control Center or DB2 Command Line Processor.

    D

    The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    多选题
    What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()
    A

    A

    B

    B

    C

    C

    D

    D

    E

    E


    正确答案: D,E
    解析: 暂无解析