网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()
A
The MAC can only be delivered to a mobile phone and is good for a single use only.
B
The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.
C
The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.
D
The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.
参考答案
参考解析
解析:
暂无解析
更多 “单选题An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()A The MAC can only be delivered to a mobile phone and is good for a single use only.B The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.C The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.D The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.” 相关考题
考题
When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
考题
What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
考题
Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN
考题
Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、to add second factor based authentication to a Web applicationB、to pre-populate user wallets with all their application credentials in one goC、to enhance out-of-the-box audit logging by creating custom audit log eventsD、to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnE、to configure automatic password change on expiry for an application so that the new password is a random string of specified strength
考题
An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications. Which password requirements need to be captured?()A、details related to application user ID requirementsB、policy requirements related to the number of applications that a user can accessC、policy requirements for application and user initiated password resets and password complexityD、do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project
考题
When planning for secure communications between a partner and the Point of Contact, at what level is the SSL connection defined?()A、each individual partner within a single federationB、all federations configured for an instance of IBM Tivoli Federated Identity Manager (ITFIM)C、each individual federation within an instance of ITFIMD、all federation functionality fronted by a single instance of IBM Tivoli Access Manager for e-business WebSEAL
考题
Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()A、Windows NT ConnectorB、Generic (LDAP) ConnectorC、Network Information Service ConnectorD、Active Directory Service Interfaces Connector
考题
Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()A、AccessAdmin,AccessAssistant,and IMS Configuration UtilityB、AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration UtilityC、AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration UtilityD、AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility
考题
Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()A、the size of the hard drives for each PC connected to the client’s networkB、the average size of the wallet based on the number of profiles and accountsC、if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hoursD、the number of users that will be connected using the wireless network, as opposed to a wired connection
考题
Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、The database user must be created using DB2 Control Center.B、The database user must be created using the DB2 Command Line Processor.C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.
考题
In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()A、Citrix workstationB、personal workstationC、shared workstation, private desktopD、shared workstation, shared desktop
考题
An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()A、The MAC can only be delivered to a mobile phone and is good for a single use only.B、The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.C、The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.D、The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.
考题
Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、Data Mining APIB、Provisioning APIC、Cryptography APID、API for Second FactorsE、SOAP API for Mobile ActiveCode
考题
A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used
考题
You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()A、Use a password generator application to create a preshared key, and distribute it to all mobile usersB、Use computer autoenrollment to create digital certificates that can be used to authenticate to a VPN serverC、Acquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connectionD、Configure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates
考题
单选题When planning for secure communications between a partner and the Point of Contact, at what level is the SSL connection defined?()A
each individual partner within a single federationB
all federations configured for an instance of IBM Tivoli Federated Identity Manager (ITFIM)C
each individual federation within an instance of ITFIMD
all federation functionality fronted by a single instance of IBM Tivoli Access Manager for e-business WebSEAL
考题
单选题An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()A
The MAC can only be delivered to a mobile phone and is good for a single use only.B
The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.C
The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.D
The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.
考题
单选题Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()A
AccessAdmin,AccessAssistant,and IMS Configuration UtilityB
AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration UtilityC
AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration UtilityD
AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility
考题
单选题A route-based VPN is required for which scenario?()A
when the remote VPN peer is behind a NAT deviceB
when multiple networks need to be reached across the tunnel and GRE cannot be usedC
when the remote VPN peer is a dialup or remote access clientD
when a dynamic routing protocol is required across the VPN and GRE cannot be used
考题
单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A
It is recommended to place the VPN termination device in line with the Enterprise Edge 1B
Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC
VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD
Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
考题
单选题In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()A
Citrix workstationB
personal workstationC
shared workstation, private desktopD
shared workstation, shared desktop
考题
单选题An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications. Which password requirements need to be captured?()A
details related to application user ID requirementsB
policy requirements related to the number of applications that a user can accessC
policy requirements for application and user initiated password resets and password complexityD
do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project
考题
单选题Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()A
Windows NT ConnectorB
Generic (LDAP) ConnectorC
Network Information Service ConnectorD
Active Directory Service Interfaces Connector
考题
单选题Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A
The database user must be created using DB2 Control Center.B
The database user must be created using the DB2 Command Line Processor.C
The database user may be created using DB2 Control Center or DB2 Command Line Processor.D
The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.
考题
单选题Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()A
the size of the hard drives for each PC connected to the client’s networkB
the average size of the wallet based on the number of profiles and accountsC
if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hoursD
the number of users that will be connected using the wireless network, as opposed to a wired connection
考题
多选题What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()AABBCCDDEE
考题
多选题Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()AData Mining APIBProvisioning APICCryptography APIDAPI for Second FactorsESOAP API for Mobile ActiveCode
考题
多选题Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()Ato add second factor based authentication to a Web applicationBto pre-populate user wallets with all their application credentials in one goCto enhance out-of-the-box audit logging by creating custom audit log eventsDto create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnEto configure automatic password change on expiry for an application so that the new password is a random string of specified strength
热门标签
最新试卷