移动端

  • 题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | IBM认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()

A

the size of the hard drives for each PC connected to the client’s network

B

the average size of the wallet based on the number of profiles and accounts

C

if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hours

D

the number of users that will be connected using the wireless network, as opposed to a wired connection

单选题 Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

A

The database user must be created using DB2 Control Center.

B

The database user must be created using the DB2 Command Line Processor.

C

The database user may be created using DB2 Control Center or DB2 Command Line Processor.

D

The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

单选题 An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()

A

details related to application user ID requirements

B

policy requirements related to the number of applications that a user can access

C

policy requirements for application and user initiated password resets and password complexity

D

do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project

单选题 The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()

A

The user would not be able to log in to the wallet.

B

The user is able to log in with their wallet password, but the wallet is not synchronized with the server.

C

A user must be re-assigned to another policy template in order to change any aspects of the applied policy.

D

The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

单选题 What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()

A

The directory must exist with one subdirectory (general).

B

The directory must exist with two subdirectories (daily, weekly).

C

The directory must exist with three subdirectories (daily, weekly, monthly).

D

The directory must exist with four subdirectories (general, daily, weekly, monthly).

单选题 Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()

A

AccessAdmin,AccessAssistant,and IMS Configuration Utility

B

AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

C

AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration Utility

D

AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

单选题 How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()

A

Check the server.xml on the IMS Server.

B

Check the database table IMSSyncDataType.

C

Check the System policies in the AccessAdmin.

D

Check the IMS Server settings of the IMS Configuration Utility.

单选题 An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()

A

The MAC can only be delivered to a mobile phone and is good for a single use only.

B

The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.

C

The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.

D

The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

单选题 By default what is the interval for synchronization of the wallet with the IMS Server?()

A

once a day

B

once a week

C

every minute

D

every 30 minutes

1 2 下一页 尾页 /

到第