单选题An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()AThe MAC can only be delivered to a mobile phone and is good for a single use only.BThe MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.CThe MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.DThe MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

单选题
An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()
A

The MAC can only be delivered to a mobile phone and is good for a single use only.

B

The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.

C

The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.

D

The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.


参考解析

解析: 暂无解析

相关考题:

What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN

Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、to add second factor based authentication to a Web applicationB、to pre-populate user wallets with all their application credentials in one goC、to enhance out-of-the-box audit logging by creating custom audit log eventsD、to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnE、to configure automatic password change on expiry for an application so that the new password is a random string of specified strength

Which Tivoli application has a predefined X-Agent available? ()A、 IBM Tivoli Storage ManagerB、 IBM Tivoli Enterprise ConsoleC、 IBM Tivoli Configuration ManagerD、 IBM Tivoli System Automation Manager

When planning for secure communications between a partner and the Point of Contact, at what level is the SSL connection defined?()A、each individual partner within a single federationB、all federations configured for an instance of IBM Tivoli Federated Identity Manager (ITFIM)C、each individual federation within an instance of ITFIMD、all federation functionality fronted by a single instance of IBM Tivoli Access Manager for e-business WebSEAL

Which two software components are prerequisite products for the Common Audit and Reporting Service (CARS) event server?()A、IBM DB2 ServerB、Crystal Enterprise ServerC、IBM Tivoli Directory ServerD、IBM WebSphere Application ServerE、IBM Tivoli Access Manager Authorization Server

What are two circumstances for which it may be advisable to use the  silent uninstallation method instead of an interactive method?()A、 The Administrator is unable to successfully export DISPLAY to a  remote server.B、 IBM Tivoli Workload Scheduler is installed on a server for which  there is no console access.C、 DNS is not working properly and the server cannot be accessed  remotely to run the uninstallation script.D、 TCP on the server on which IBM Tivoli Workload Scheduler is  installed is configured for half-duplex rather than full-duplex.E、 The remote IBM Tivoli Workload Scheduler server is multi-homed, thus  the return connection to IBM Tivoli Workload Scheduler cannot be  established thereby requiring the use of the silent  uninstaller.

Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、The database user must be created using DB2 Control Center.B、The database user must be created using the DB2 Command Line Processor.C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

Which of the following is used to gather Disk Magic information on a Windows host that will be used for determining the optimum configuration of an IBM System Storage DS8800?()A、iostatB、PerfMonC、DS CLID、Tivoli Storage Productivity Center for Data

An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()A、The MAC can only be delivered to a mobile phone and is good for a single use only.B、The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.C、The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.D、The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

What is the location for the application server scripts? ()A、 wastools directory in IBM Tivoli Workload Scheduler bin directoryB、 wastools directory in IBM Tivoli Workload Automation home directoryC、 appserver directory in IBM Tivoli Workload Scheduler parent  directoryD、 appserver directory in IBM Tivoli Workload Automation home directory

What is the default trace file (for Linux) that is used for the initial debugging of IBM Tivoli Federated Identity Manager Runtime?()A、/opt/IBM/FIM/logs/ ITFIM Domain Name/tivoli-common/FBT/logs/msg.logB、/opt/IBM/FIM/logs/ ITFIM Domain Name/tivoli-common/FBT/logs/trace.logC、/opt/IBM/WebSphere/AppServer/profiles/servername/logs/profile/trace.logD、/opt/IBM/WebSphere/AppServer/profiles/servername/logs/profile/SystemOut.log

What is used to gather information on a Windows host that will be used for determining the optimum configuration of an IBM System Storage DS8700()A、Disk MagicB、PerfMonC、iostatD、Tivoli Storage Productivity Center for Data

What is the IBM tool used to configure the IBM System Storage DS5000 system?()A、DS Storage ManagerB、Tivoli Storage ManagerC、Remote Support ManagerD、Tivoli Provisioning Manager

When using IBM Tivoli Monitoring Universal Agents monitors, which  three IBM Tivoli Workload Scheduler processes can be monitored by  default? ()A、 reptrB、 writerC、 netmanD、 monmanE、 batchmanF、 appservman

Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

单选题What is the default trace file (for Linux) that is used for the initial debugging of IBM Tivoli Federated Identity Manager Runtime?()A/opt/IBM/FIM/logs/ ITFIM Domain Name/tivoli-common/FBT/logs/msg.logB/opt/IBM/FIM/logs/ ITFIM Domain Name/tivoli-common/FBT/logs/trace.logC/opt/IBM/WebSphere/AppServer/profiles/servername/logs/profile/trace.logD/opt/IBM/WebSphere/AppServer/profiles/servername/logs/profile/SystemOut.log

多选题Which two commands are used to migrate IBM Tivoli Workload Scheduler  to version 8.5 on a UNIX system?()Alaunch.shBwdinstspbCSETUP.binDtwsinst -migrateESETUP.bin -silent

单选题Which Tivoli application has a predefined X-Agent available? ()A IBM Tivoli Storage ManagerB IBM Tivoli Enterprise ConsoleC IBM Tivoli Configuration ManagerD IBM Tivoli System Automation Manager

单选题Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()AWindows NT ConnectorBGeneric (LDAP) ConnectorCNetwork Information Service ConnectorDActive Directory Service Interfaces Connector

单选题Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()AThe database user must be created using DB2 Control Center.BThe database user must be created using the DB2 Command Line Processor.CThe database user may be created using DB2 Control Center or DB2 Command Line Processor.DThe database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

多选题What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()AABBCCDDEE

多选题Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()Ato add second factor based authentication to a Web applicationBto pre-populate user wallets with all their application credentials in one goCto enhance out-of-the-box audit logging by creating custom audit log eventsDto create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnEto configure automatic password change on expiry for an application so that the new password is a random string of specified strength

多选题When using IBM Tivoli Monitoring Universal Agents monitors, which  three IBM Tivoli Workload Scheduler processes can be monitored by  default? ()AreptrBwriterCnetmanDmonmanEbatchmanFappservman

单选题What is the location for the application server scripts? ()A wastools directory in IBM Tivoli Workload Scheduler bin directoryB wastools directory in IBM Tivoli Workload Automation home directoryC appserver directory in IBM Tivoli Workload Scheduler parent  directoryD appserver directory in IBM Tivoli Workload Automation home directory

多选题You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()AUse a password generator application to create a preshared key, and distribute it to all mobile usersBUse computer autoenrollment to create digital certificates that can be used to authenticate to a VPN serverCAcquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connectionDConfigure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates

单选题What is not a difference between VPN tunnel authentication and per-user authentication?()AVPN tunnel authentication is part of the IKE specification. BVPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).CUser authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.