单选题Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()AAccessAdmin,AccessAssistant,and IMS Configuration UtilityBAccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration UtilityCAccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration UtilityDAccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

单选题
Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()
A

AccessAdmin,AccessAssistant,and IMS Configuration Utility

B

AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

C

AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration Utility

D

AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility


参考解析

解析: 暂无解析

相关考题:

Your database instance is running.You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?() A. Oracle Net ManagerB. Listener Control utilityC. Database Configuration AssistantD. Oracle Net Configuration Assistant

WhichWeb-basedadministrationtoolsareavailableinIBMTivoliAccessManagerforEnterpriseSingleSign-On?() A.AccessAdmin,AccessAssistant,andIMSConfigurationUtilityB.AccessStudio,AccessAdmin,AccessAssistant,andIMSConfigurationUtilityC.AccessManagerConsole,AccessAdmin,AccessAssistant,andIMSConfigurationUtilityD.AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,andIMSConfigurationUtility

A customer has a BladeCenter H chassis with a single AMM.  The AMM is defective. Which of the following is the method to backup the existing AMM so the new AMM automaticlally picks up the configuration? ()A、Back up the AMM configuration to a file B、Back up the AMM configuration to the chassis C、Back up the AMM using IBM Systems Director D、Back up the AMM using Tivoli Storage Manager

Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、to add second factor based authentication to a Web applicationB、to pre-populate user wallets with all their application credentials in one goC、to enhance out-of-the-box audit logging by creating custom audit log eventsD、to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnE、to configure automatic password change on expiry for an application so that the new password is a random string of specified strength

Which Tivoli application has a predefined X-Agent available? ()A、 IBM Tivoli Storage ManagerB、 IBM Tivoli Enterprise ConsoleC、 IBM Tivoli Configuration ManagerD、 IBM Tivoli System Automation Manager

How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()A、Check the server.xml on the IMS Server.B、Check the database table IMSSyncDataType.C、Check the System policies in the AccessAdmin.D、Check the IMS Server settings of the IMS Configuration Utility.

Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()A、Windows NT ConnectorB、Generic (LDAP) ConnectorC、Network Information Service ConnectorD、Active Directory Service Interfaces Connector

Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()A、AccessAdmin,AccessAssistant,and IMS Configuration UtilityB、AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration UtilityC、AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration UtilityD、AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()A、the size of the hard drives for each PC connected to the client’s networkB、the average size of the wallet based on the number of profiles and accountsC、if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hoursD、the number of users that will be connected using the wireless network, as opposed to a wired connection

Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、The database user must be created using DB2 Control Center.B、The database user must be created using the DB2 Command Line Processor.C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()A、The user would not be able to log in to the wallet.B、The user is able to log in with their wallet password, but the wallet is not synchronized with the server.C、A user must be re-assigned to another policy template in order to change any aspects of the applied policy.D、The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()A、Citrix workstationB、personal workstationC、shared workstation, private desktopD、shared workstation, shared desktop

Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、Data Mining APIB、Provisioning APIC、Cryptography APID、API for Second FactorsE、SOAP API for Mobile ActiveCode

our database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?()A、Oracle Net ManagerB、Listener Control utilityC、Database Configuration AssistantD、Oracle Net Configuration Assistant

You are required to remove the default EXTPROC entry from the default listener configuration to create a listener that will listen specifically for EXTPROC calls. Which two methods can you use to remove the default EXTPROC entry from the default listener configuration? ()A、 the RMAN utilityB、 the import/export utilityC、 the Oracle Enterprise ManagerD、 the change tracking featureE、 the Net Manager utility

单选题Your database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.  Which tool or utility would you use to start the listener?()A Oracle Net ManagerB Listener Control utilityC Database Configuration AssistantD Oracle Net Configuration Assistant

单选题Which Tivoli application has a predefined X-Agent available? ()A IBM Tivoli Storage ManagerB IBM Tivoli Enterprise ConsoleC IBM Tivoli Configuration ManagerD IBM Tivoli System Automation Manager

单选题A customer has a BladeCenter H chassis with a single AMM.  The AMM is defective. Which of the following is the method to backup the existing AMM so the new AMM automaticlally picks up the configuration? ()ABack up the AMM configuration to a file BBack up the AMM configuration to the chassis CBack up the AMM using IBM Systems Director DBack up the AMM using Tivoli Storage Manager

单选题The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()AThe user would not be able to log in to the wallet.BThe user is able to log in with their wallet password, but the wallet is not synchronized with the server.CA user must be re-assigned to another policy template in order to change any aspects of the applied policy.DThe user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

单选题In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()ACitrix workstationBpersonal workstationCshared workstation, private desktopDshared workstation, shared desktop

单选题Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()AWindows NT ConnectorBGeneric (LDAP) ConnectorCNetwork Information Service ConnectorDActive Directory Service Interfaces Connector

单选题Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()AThe database user must be created using DB2 Control Center.BThe database user must be created using the DB2 Command Line Processor.CThe database user may be created using DB2 Control Center or DB2 Command Line Processor.DThe database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

单选题Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()Athe size of the hard drives for each PC connected to the client’s networkBthe average size of the wallet based on the number of profiles and accountsCif any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hoursDthe number of users that will be connected using the wireless network, as opposed to a wired connection

多选题What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()AABBCCDDEE

单选题How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()ACheck the server.xml on the IMS Server.BCheck the database table IMSSyncDataType.CCheck the System policies in the AccessAdmin.DCheck the IMS Server settings of the IMS Configuration Utility.

多选题Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()AData Mining APIBProvisioning APICCryptography APIDAPI for Second FactorsESOAP API for Mobile ActiveCode

多选题Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()Ato add second factor based authentication to a Web applicationBto pre-populate user wallets with all their application credentials in one goCto enhance out-of-the-box audit logging by creating custom audit log eventsDto create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnEto configure automatic password change on expiry for an application so that the new password is a random string of specified strength