问题:单选题What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()A The directory must exist with one subdirectory (general).B The directory must exist with two subdirectories (daily, weekly).C The directory must exist with three subdirectories (daily, weekly, monthly).D The directory must exist with four subdirectories (general, daily, weekly, monthly).
Sunday, April 14, 2024
问题:单选题An application is upgraded and it has been determined that the AccessAgent no longer properly responds to the application. It is understood that for a certain amount of time both the current version and the upgraded version of the application will be used by the end-users. The executables for both versions are the same. What should be the next step?()A Open AccessStudio and change the existing AccessProfile to use only the new signatures for Windows, control IDs, or HTML elements.B Open AccessStudio and create a new AccessProfile for the upgraded version and overwrite the existing AccessProfile on the IMS Server.C Open AccessStudio and edit the existing AccessProfile by using new triggers/actions associated with the new signatures for Windows, control IDs, or HTML elements.D Open AccessStudio and create a new AccessProfile for the upgraded version and upload it to the IMS Server so that two separate AccessProfiles may be used by the AccessAgent.
问题:单选题In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()A Citrix workstationB personal workstationC shared workstation, private desktopD shared workstation, shared desktop
问题:单选题An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications. Which password requirements need to be captured?()A details related to application user ID requirementsB policy requirements related to the number of applications that a user can accessC policy requirements for application and user initiated password resets and password complexityD do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project
Monday, March 18, 2024
问题:单选题Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A The database user must be created using DB2 Control Center.B The database user must be created using the DB2 Command Line Processor.C The database user may be created using DB2 Control Center or DB2 Command Line Processor.D The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.
问题:单选题An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()A The MAC can only be delivered to a mobile phone and is good for a single use only.B The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.C The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.D The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.
问题:多选题What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()AABBCCDDEE
问题:单选题By default what is the interval for synchronization of the wallet with the IMS Server?()A once a dayB once a weekC every minuteD every 30 minutes
问题:单选题Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()A AccessAdmin,AccessAssistant,and IMS Configuration UtilityB AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration UtilityC AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration UtilityD AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility
问题:单选题Which operator allows specification of a case-sensitive regular expression comparison for attributes in an AccessProfile signature?()A Tilde (~)B Hash (#)C Equals (=)D Asterisk (*)
问题:单选题When upgrading the AccessAgent and IMS Server from V3.6.x or V8.0.0 to V8.0.1, which statement is true about the existing AccessAgent and IMS Server?()A The AccessAgent DOES need to be uninstalled and the IMS Server software DOES need to be uninstalled.B The AccessAgent DOES need to be uninstalled and the IMS Server software DOES NOT need to be uninstalled.C The AccessAgent DOES NOT need to be uninstalled and the IMS Server software DOES need to be uninstalled.D The AccessAgent DOES NOT need to be uninstalled and the IMS Server software DOES NOT need to be uninstalled.
问题:单选题Which statement is true about the database and database-user used during installation of IMS Server?()A A preexisting database user may be used but a new database has to be created during installation.B A preexisting database may be used but a new database user has to be created during installation.C A preexisting database and user may be used or a new database and user are created during installation.D A preexisting database and user cannot be used; a new database and user are created during installation.
Monday, February 5, 2024
问题:单选题System, machine, and user policies can be configured though AccessAdmin. How are changes synchronized with the AccessAgent?()A written by the Administrators on the INI filesB propagated only with the Active Directory network serviceC propagated to the clients on the next Administrator accessD propagated to clients the next time AccessAgent synchronizes with the IMS Server
问题:单选题Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()A Windows NT ConnectorB Generic (LDAP) ConnectorC Network Information Service ConnectorD Active Directory Service Interfaces Connector