IBM(000-020)

单选题An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password m

题目
单选题
An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()
A

details related to application user ID requirements

B

policy requirements related to the number of applications that a user can access

C

policy requirements for application and user initiated password resets and password complexity

D

do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()

  • A、details related to application user ID requirements
  • B、policy requirements related to the number of applications that a user can access
  • C、policy requirements for application and user initiated password resets and password complexity
  • D、do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project

正确答案:C

第2题:

Which two are needed components when designing and implementing a security solution?()

  • A、detailed VLAN information
  • B、an incident response plan
  • C、results of testing the new network configuration
  • D、an existing hierarchical network topology
  • E、a security policy for your organization

正确答案:B,E

第3题:

Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

  • A、to add second factor based authentication to a Web application
  • B、to pre-populate user wallets with all their application credentials in one go
  • C、to enhance out-of-the-box audit logging by creating custom audit log events
  • D、to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On
  • E、to configure automatic password change on expiry for an application so that the new password is a random string of specified strength

正确答案:A,B

第4题:

You have an Exchange Server 2010 organization.  The organization contains a global security group named Group1.  You plan to deploy a monitoring solution for the Exchange servers in your organization.  You need to recommend a solution that allows members of Group1 to monitor the performance of Exchange Server 2010 servers.  Your solution must prevent members of Group1 from modifying the configurations of the Exchanges Server 2010 organization.  What should you include in the solution?()

  • A、Delegation of Control Wizard
  • B、Federation Trusts
  • C、Reliability Monitor
  • D、Role Based Access Control (RBAC)

正确答案:D

第5题:

User "twsuser" is logged on to the IBM Tivoli Workload Scheduler  Master Domain Manager server using Job Scheduling Console to update  calendar. The user receives a message: MODIFY on   CALENDAR access not granted.  What is the cause of this error?()

  • A、 Batchman process is down.
  • B、 User password has expired.
  • C、 WebSphere security is damaged.
  • D、 There are insufficient permissions in Security file.

正确答案:D

第6题:

Why would you use WebLogic Diagnostics Framework (WLDF) instead of Oracle Enterprise Manager (OEM) ()

  • A、 WLDF has better performance than OEM 
  • B、 my organization already has a solution for unified management and monitoring; we need to supplement that with some specific WLS-related capabilities
  • C、 OEM is not certified with latest version of WLS
  • D、 OEM is really focused on the database tier, is not meant to address JEE management and monitoring

正确答案:A

第7题:

An international company has a heterogeneous IBM storage environment with two IBM DS8700 systems in a Metro Mirror relationship. They also have a virtualized environment with two SVC clusters in a Global Mirror relationship. The storage administrator complains about the monitoring of copy services.  Which solution should the IBM storage specialist propose for this pain point()

  • A、System Storage Productivity Center
  • B、Tivoli Storage Productivity Center for Replication
  • C、Tivoli Storage Productivity Center for Disk
  • D、DS8000 Storage Manager

正确答案:B

第8题:

Which Tivoli application has a predefined X-Agent available? ()

  • A、 IBM Tivoli Storage Manager
  • B、 IBM Tivoli Enterprise Console
  • C、 IBM Tivoli Configuration Manager
  • D、 IBM Tivoli System Automation Manager

正确答案:A

第9题:

Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers.  All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements: .Ensure that users can send encrypted messages to any other organization on the Internet  .Ensure that all Exchange-related communication between Hub Transport servers and Edge Transport servers is encrypted What should you recommend?()

  • A、Deploy IPsec.
  • B、Deploy SMTP over SSL.
  • C、Implement Domain Security.
  • D、Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).

正确答案:D

第10题:

You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()

  • A、a Discovery Management role group
  • B、a legal hold
  • C、administrator audit logging
  • D、Mailbox journaling

正确答案:A

更多相关问题