网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications. Which password requirements need to be captured?()
A
details related to application user ID requirements
B
policy requirements related to the number of applications that a user can access
C
policy requirements for application and user initiated password resets and password complexity
D
do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project
参考答案
参考解析
解析:
暂无解析
更多 “单选题An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications. Which password requirements need to be captured?()A details related to application user ID requirementsB policy requirements related to the number of applications that a user can accessC policy requirements for application and user initiated password resets and password complexityD do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project” 相关考题
考题
Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、to add second factor based authentication to a Web applicationB、to pre-populate user wallets with all their application credentials in one goC、to enhance out-of-the-box audit logging by creating custom audit log eventsD、to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnE、to configure automatic password change on expiry for an application so that the new password is a random string of specified strength
考题
Which Tivoli application has a predefined X-Agent available? ()A、 IBM Tivoli Storage ManagerB、 IBM Tivoli Enterprise ConsoleC、 IBM Tivoli Configuration ManagerD、 IBM Tivoli System Automation Manager
考题
When planning for secure communications between a partner and the Point of Contact, at what level is the SSL connection defined?()A、each individual partner within a single federationB、all federations configured for an instance of IBM Tivoli Federated Identity Manager (ITFIM)C、each individual federation within an instance of ITFIMD、all federation functionality fronted by a single instance of IBM Tivoli Access Manager for e-business WebSEAL
考题
Which two software components are prerequisite products for the Common Audit and Reporting Service (CARS) event server?()A、IBM DB2 ServerB、Crystal Enterprise ServerC、IBM Tivoli Directory ServerD、IBM WebSphere Application ServerE、IBM Tivoli Access Manager Authorization Server
考题
One of your customers has decided to deploy location-based services in addition to existingwireless services. The customer requires that the additional access points to be deployed in monitor-onlymode. The most likely reason for this requirement is that the customer has which of these existingwireless devices?()A、Data CollectionB、802.11b/g VoIPC、802.11b and g clientsD、RFID tags
考题
A new IBM x 3650 M3 customer has experienced support issues with problem resolution from their previous vendor. The biggest problem was with Microsoft applications failing intermittently. Which of the following IBM products covers this issue?()A、IBM Hardware Standard WarrantyB、TechlineC、Tivoli Problem Resolution Manager(TPRM)D、RTS
考题
The Business Partner technical specialist is called to determine if the addition of host ports on an IBM System Storage DS8700 has improved users’ response times for an IBM System p server running SAP. How can the improvement be verified()A、check the output of the "vmstat" command on LINUXB、check the performance reports via Tivoli Storage Productivity Center for DataC、check the performance reports via Tivoli Storage Productivity Center for DiskD、check the output of the "iostat" command on AIX
考题
What are two circumstances for which it may be advisable to use the silent uninstallation method instead of an interactive method?()A、 The Administrator is unable to successfully export DISPLAY to a remote server.B、 IBM Tivoli Workload Scheduler is installed on a server for which there is no console access.C、 DNS is not working properly and the server cannot be accessed remotely to run the uninstallation script.D、 TCP on the server on which IBM Tivoli Workload Scheduler is installed is configured for half-duplex rather than full-duplex.E、 The remote IBM Tivoli Workload Scheduler server is multi-homed, thus the return connection to IBM Tivoli Workload Scheduler cannot be established thereby requiring the use of the silent uninstaller.
考题
A customer is implementing a new streaming audio application and has requested a storageresource management product that will provide performance metrics for their IBM System StorageDS5100. The requirements are for controller read rates as well as controller data rate, amongothers. What IBM storage resource management tool would a technical specialist recommend?()A、Tivoli Storage Productivity Center for DataB、Tivoli Storage Productivity Center Basic EditionC、Tivoli Storage Productivity Center for Data Midrange EditionD、Tivoli Storage Productivity Center for Disk Midrange Edition
考题
What is the location for the application server scripts? ()A、 wastools directory in IBM Tivoli Workload Scheduler bin directoryB、 wastools directory in IBM Tivoli Workload Automation home directoryC、 appserver directory in IBM Tivoli Workload Scheduler parent directoryD、 appserver directory in IBM Tivoli Workload Automation home directory
考题
What is the required element for encryption key management on an LTO-5 drive within a tapelibrary?()A、IBM LTO Encryption ManagerB、IBM Tape Encryption ManagerC、IBM Tivoli Single Sign On Manager (SSO)D、IBM Tivoli Key Lifecycle Manager (TKLM)
考题
A customer has the need for performance monitoring of an IBM System Storage DS8000. Which product does the customer need()A、System Storage Productivity CenterB、Tivoli Storage Productivity Center for DataC、Tivoli Storage Productivity Center for DiskD、Tivoli Storage Productivity Center for Fabric
考题
Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、Data Mining APIB、Provisioning APIC、Cryptography APID、API for Second FactorsE、SOAP API for Mobile ActiveCode
考题
An international company has a heterogeneous IBM storage environment with two IBM DS8700 systems in a Metro Mirror relationship. They also have a virtualized environment with two SVC clusters in a Global Mirror relationship. The storage administrator complains about the monitoring of copy services. Which solution should the IBM storage specialist propose for this pain point()A、System Storage Productivity CenterB、Tivoli Storage Productivity Center for ReplicationC、Tivoli Storage Productivity Center for DiskD、DS8000 Storage Manager
考题
A company has 20 remotely located Microsoft Windows 2000 xSeries servers which need to deploy a non-IBM software application from a Windows 2000 xSeries server. How would they take advantage of IBM Director to be able to effectively deploy this application?()A、Use Remote Deployment Manager.B、Use the Update Assistant function of IBM Director.C、Use the Software Deployment Tool of the IBM Director.D、Use Software Distribution Premium Edition for IBM Director.
考题
User "twsuser" is logged on to the IBM Tivoli Workload Scheduler Master Domain Manager server using Job Scheduling Console to update calendar. The user receives a message: MODIFY on CALENDAR access not granted. What is the cause of this error?()A、 Batchman process is down.B、 User password has expired.C、 WebSphere security is damaged.D、 There are insufficient permissions in Security file.
考题
单选题Which Tivoli application has a predefined X-Agent available? ()A
IBM Tivoli Storage ManagerB
IBM Tivoli Enterprise ConsoleC
IBM Tivoli Configuration ManagerD
IBM Tivoli System Automation Manager
考题
单选题User "twsuser" is logged on to the IBM Tivoli Workload Scheduler Master Domain Manager server using Job Scheduling Console to update calendar. The user receives a message: MODIFY on CALENDAR access not granted. What is the cause of this error?()A
Batchman process is down.B
User password has expired.C
WebSphere security is damaged.D
There are insufficient permissions in Security file.
考题
单选题An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications. Which password requirements need to be captured?()A
details related to application user ID requirementsB
policy requirements related to the number of applications that a user can accessC
policy requirements for application and user initiated password resets and password complexityD
do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project
考题
多选题What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()AABBCCDDEE
考题
多选题Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()AData Mining APIBProvisioning APICCryptography APIDAPI for Second FactorsESOAP API for Mobile ActiveCode
考题
多选题Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()Ato add second factor based authentication to a Web applicationBto pre-populate user wallets with all their application credentials in one goCto enhance out-of-the-box audit logging by creating custom audit log eventsDto create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnEto configure automatic password change on expiry for an application so that the new password is a random string of specified strength
考题
多选题When using IBM Tivoli Monitoring Universal Agents monitors, which three IBM Tivoli Workload Scheduler processes can be monitored by default? ()AreptrBwriterCnetmanDmonmanEbatchmanFappservman
考题
单选题What is the location for the application server scripts? ()A
wastools directory in IBM Tivoli Workload Scheduler bin directoryB
wastools directory in IBM Tivoli Workload Automation home directoryC
appserver directory in IBM Tivoli Workload Scheduler parent directoryD
appserver directory in IBM Tivoli Workload Automation home directory
考题
多选题What are two circumstances for which it may be advisable to use the silent uninstallation method instead of an interactive method?()AThe Administrator is unable to successfully export DISPLAY to a remote server.BIBM Tivoli Workload Scheduler is installed on a server for which there is no console access.CDNS is not working properly and the server cannot be accessed remotely to run the uninstallation script.DTCP on the server on which IBM Tivoli Workload Scheduler is installed is configured for half-duplex rather than full-duplex.EThe remote IBM Tivoli Workload Scheduler server is multi-homed, thus the return connection to IBM Tivoli Workload Scheduler cannot be established thereby requiring the use of the silent uninstaller.
考题
单选题One of your customers has decided to deploy location-based services in addition to existingwireless services. The customer requires that the additional access points to be deployed in monitor-onlymode. The most likely reason for this requirement is that the customer has which of these existingwireless devices?()A
Data CollectionB
802.11b/g VoIPC
802.11b and g clientsD
RFID tags
考题
单选题One of your customers has decided to deploy location-based services in addition to existing wireless services. The customer requires that the additional access points to be deployed in monitor-only mode. The most likely reason for this requirement is that the customer has which of these existing wireless devices?()A
802.11b/g VoIPB
Data CollectionC
802.11b and g clientsD
RFID tags
考题
单选题One of your customers has decided to deploy location-based services in addition to existing wireless services. the customer requires that the additional access points to be deployed in monitor-only modE. The most likely reason for this requirement is that the customer has which of these existing wireless devices?()A
data collectionB
802.11b/g voipC
802.11b and g clientsD
rfid tags
热门标签
最新试卷