details related to application user ID requirements
policy requirements related to the number of applications that a user can access
policy requirements for application and user initiated password resets and password complexity
do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project
第1题:
An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications. Which password requirements need to be captured?()
第2题:
Which two are needed components when designing and implementing a security solution?()
第3题:
Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
第4题:
You have an Exchange Server 2010 organization. The organization contains a global security group named Group1. You plan to deploy a monitoring solution for the Exchange servers in your organization. You need to recommend a solution that allows members of Group1 to monitor the performance of Exchange Server 2010 servers. Your solution must prevent members of Group1 from modifying the configurations of the Exchanges Server 2010 organization. What should you include in the solution?()
第5题:
User "twsuser" is logged on to the IBM Tivoli Workload Scheduler Master Domain Manager server using Job Scheduling Console to update calendar. The user receives a message: MODIFY on CALENDAR access not granted. What is the cause of this error?()
第6题:
Why would you use WebLogic Diagnostics Framework (WLDF) instead of Oracle Enterprise Manager (OEM) ()
第7题:
An international company has a heterogeneous IBM storage environment with two IBM DS8700 systems in a Metro Mirror relationship. They also have a virtualized environment with two SVC clusters in a Global Mirror relationship. The storage administrator complains about the monitoring of copy services. Which solution should the IBM storage specialist propose for this pain point()
第8题:
Which Tivoli application has a predefined X-Agent available? ()
第9题:
Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers. All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements: .Ensure that users can send encrypted messages to any other organization on the Internet .Ensure that all Exchange-related communication between Hub Transport servers and Edge Transport servers is encrypted What should you recommend?()
第10题:
You have an Exchange Server 2010 organization. You have a global security group named Legal that contains all the members of your companys legaldepartment. The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords. You need to recommend a solution for the organization that complies with the security policy. What should you include in the solution?()