站内搜索
IBM(000-891) 问题列表
问题
单选题You want to use TCPMON between the two WS-Provisioning Service instances. How do you configure the endpoint of the partner WS-Provisioning service (i.e., the destination of step 3) so that TCPMON can be used?()A
modify the ITFIMClientIDI.properties fileB
modify the ITFIMClientScript.constants fileC
use the IBM Tivoli Federated Identity Manager Console to modify a custom runtime parameterD
use the WebSphere Application Server Administration Console to modify the WS-Provisioning application properties
问题
单选题You want to use TCPMON between the two WS-Provisioning Service instances. How do you configure the endpoint of the partner WS-Provisioning service (i.e., the destination of step 3) so that TCPMON can be used?()A
modify the ITFIMClientIDI.properties fileB
modify the ITFIMClientScript.constants fileC
use the IBM Tivoli Federated Identity Manager Console to modify a custom runtime parameterD
use the WebSphere Application Server Administration Console to modify the WS-Provisioning application properties
问题
单选题What is the default trace file (for Linux) that is used for the initial debugging of IBM Tivoli Federated Identity Manager Runtime?()A
/opt/IBM/FIM/logs/ ITFIM Domain Name/tivoli-common/FBT/logs/msg.logB
/opt/IBM/FIM/logs/ ITFIM Domain Name/tivoli-common/FBT/logs/trace.logC
/opt/IBM/WebSphere/AppServer/profiles/servername/logs/profile/trace.logD
/opt/IBM/WebSphere/AppServer/profiles/servername/logs/profile/SystemOut.log
问题
单选题Which statement is true about a Dynamic Chain Selection Module instance?()A
It is the first module in the partner module chain in Web Services Security Management (WSSM).B
It is the last module in the partner module chain in WSSM.C
It is the first module in the application module chain for partner.D
It is the last module in the application module chain for the partner.
问题
单选题When recovering from a disaster, the backup and restore operation you use is similar to the export/import configuration procedure, with one additional step. Which additional step must you take when recovering from a disaster?()A
A new WebSphere profile is required to restore the configuration.B
The restored system requires the IBM Tivoli Access Manager for e-business (TAMeb) JRTE to be manually configured against the WebSphere’s Java Runtime to allow the IBM Tivoli Federated Identity Manager (ITFIM) Runtime to function properly.C
The ITFIM Domain needs to be created manually within the Integrated Solution Console.D
The ITFIM Runtime instance needs to be re-registered with the TAMeb policy server by running the SvrSslCfg command.
问题
单选题When planning for secure communications between a partner and the Point of Contact, at what level is the SSL connection defined?()A
each individual partner within a single federationB
all federations configured for an instance of IBM Tivoli Federated Identity Manager (ITFIM)C
each individual federation within an instance of ITFIMD
all federation functionality fronted by a single instance of IBM Tivoli Access Manager for e-business WebSEAL
问题
单选题You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()A
stop all running instances of PDACLDB
log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) userC
change the TAMeb ACL policy applying to the Web Services namespaceD
update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console
问题
多选题Which two tasks are required to install Service Integration Bus Web Services?()Ainstall the Resource AdapterBconfigure SOAP listener portCdeploy the Service Integration Bus applicationDinstall the Service Data Objects (SDO) RepositoryEcreate a new WebSphere Application Server profile
问题
多选题What are two functions of a custom mapping module?()Arecords the token assertionBmaps a STSUUSER input to a SAML tokenClooks up attributes in an external data sourceDmaps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 protocolEmaps a GUI XML attributes into UI controls that are used by the IBM Tivoli Federated Identity Manager Console to collect the input data
问题
单选题What limitations exist for a SAML Partner Provider ID configured at the Identity Provider?()A
The Provider ID can be any string.B
The Provider ID can only include alphanumeric characters.C
The Provider ID must match the prefix of Target URLs in SSO requests.D
The Provider ID must match the Succinct ID configured at the Service Provider.
问题
单选题What is the default message level configured for IBM Tivoli Federated Identity Manager?()A
error messages onlyB
disable all messagesC
error and warning messages onlyD
info, error and warning messages
问题
单选题RBTelco is a large multinational company that outsources health care benefit management to RBBenefits. RBTelco employees access RBBenefits resources through an authenticate-able account at each company. RBBenefit and RBTelco will use SAML V1.0. Which IBM Tivoli Access Manager for e-business (ITAMeb) and IBM Tivoli Federated Identity Manager (ITFIM) components are required to be installed at RBTelco?()A
TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console B
TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit C
TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit D
TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, ITFIM Demonstration Scenarios, WebSEAL Application Developer Kit
问题
单选题Which security token may carry user attribute information as part of the defined token format?()A
KerberosB
RACF TokenC
SAML AssertionD
Username Token
问题
单选题Which XSL if statement checks for the existence of a homepage attribute within an STS Universal User XML structure?()A
xsl:if test=//stsuuser:AttributeList/stsuuser:Attribute[attr='homepage']B
xsl:if test=//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage']C
xsl:if-exists=//stsuuser:AttributeList/stsuuser:Attribute/custom:HomepageD
xsl:if-exists=//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage'])
问题
单选题The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()A
The input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. B
The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. C
The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. D
The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.