单选题 How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()
Check the server.xml on the IMS Server.
Check the database table IMSSyncDataType.
Check the System policies in the AccessAdmin.
Check the IMS Server settings of the IMS Configuration Utility.
单选题 Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()
Windows NT Connector
Generic (LDAP) Connector
Network Information Service Connector
Active Directory Service Interfaces Connector
单选题 By default what is the interval for synchronization of the wallet with the IMS Server?()
once a day
once a week
every minute
every 30 minutes
单选题 Which statement is true about the database and database-user used during installation of IMS Server?()
A preexisting database user may be used but a new database has to be created during installation.
A preexisting database may be used but a new database user has to be created during installation.
A preexisting database and user may be used or a new database and user are created during installation.
A preexisting database and user cannot be used; a new database and user are created during installation.
单选题 Machine policy templates can be assigned based on certain attributes of a machine. A customer organizes their machines based on the following requirements: The machines are all placed in specific Organizational Units in the Active Directory. The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines. The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()
Hostnames
IP Addresses
Machine Group Tag
Active Directory Groups
多选题 What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()
A
B
C
D
E
单选题 The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()
The user would not be able to log in to the wallet.
The user is able to log in with their wallet password, but the wallet is not synchronized with the server.
A user must be re-assigned to another policy template in order to change any aspects of the applied policy.
The user experiences normal operation, but AccessAgent will be unable to store newly captured passwords.
多选题 Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
to add second factor based authentication to a Web application
to pre-populate user wallets with all their application credentials in one go
to enhance out-of-the-box audit logging by creating custom audit log events
to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On
to configure automatic password change on expiry for an application so that the new password is a random string of specified strength
单选题 Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
The database user must be created using DB2 Control Center.
The database user must be created using the DB2 Command Line Processor.
The database user may be created using DB2 Control Center or DB2 Command Line Processor.
The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.
单选题 An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()
The MAC can only be delivered to a mobile phone and is good for a single use only.
The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.
The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.
The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.
下列属于直线行驶的是()
某通信机房设置七氟丙烷预制灭火系统,该系统应有( )种启动方式。
唐后期书院产生的一个原因是受到()的影响。
压力损失是指()
干旱区造林,整地的主要目的是()
治癫证痰气郁结证,治以()
小学低、中年级的儿童____识记发展最为迅速。
( )是北京市制定的第一个全面保护历史文化名城的法规。
安全带的正确使用:使用前作外观检查,若破损应()使用。
Your network consists of a single Active Directory domain. The domain contains more than 300 group objects. The group objects are divided between several regional organizational units (OUs). You need to create a list of all groups that have names that begin with the word Sales. Which command should you use? ()