单选题The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()AThe user would not be able to log in to the wallet.BThe user is able to log in with their wallet password, but the wallet is not synchronized with the server.CA user must be re-assigned to another policy template in order to change any aspects of the applied policy.DThe user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

单选题
The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()
A

The user would not be able to log in to the wallet.

B

The user is able to log in with their wallet password, but the wallet is not synchronized with the server.

C

A user must be re-assigned to another policy template in order to change any aspects of the applied policy.

D

The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.


参考解析

解析: 暂无解析

相关考题:

Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、to add second factor based authentication to a Web applicationB、to pre-populate user wallets with all their application credentials in one goC、to enhance out-of-the-box audit logging by creating custom audit log eventsD、to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnE、to configure automatic password change on expiry for an application so that the new password is a random string of specified strength

An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()A、details related to application user ID requirementsB、policy requirements related to the number of applications that a user can accessC、policy requirements for application and user initiated password resets and password complexityD、do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project

A retail customer wants to identify the system firmware version information on several IBM System x servers and apply updates as required from a central location without causing server downtime. Which IBM tool provide this capability?()A、CDATB、Systems DirectorC、Server GuideD、Tivoli Provisioning Manager for Operational System Deployment (TPMfOSD)

When planning for secure communications between a partner and the Point of Contact, at what level is the SSL connection defined?()A、each individual partner within a single federationB、all federations configured for an instance of IBM Tivoli Federated Identity Manager (ITFIM)C、each individual federation within an instance of ITFIMD、all federation functionality fronted by a single instance of IBM Tivoli Access Manager for e-business WebSEAL

Which two software components are prerequisite products for the Common Audit and Reporting Service (CARS) event server?()A、IBM DB2 ServerB、Crystal Enterprise ServerC、IBM Tivoli Directory ServerD、IBM WebSphere Application ServerE、IBM Tivoli Access Manager Authorization Server

Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()A、Windows NT ConnectorB、Generic (LDAP) ConnectorC、Network Information Service ConnectorD、Active Directory Service Interfaces Connector

Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()A、AccessAdmin,AccessAssistant,and IMS Configuration UtilityB、AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration UtilityC、AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration UtilityD、AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()A、the size of the hard drives for each PC connected to the client’s networkB、the average size of the wallet based on the number of profiles and accountsC、if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hoursD、the number of users that will be connected using the wireless network, as opposed to a wired connection

Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、The database user must be created using DB2 Control Center.B、The database user must be created using the DB2 Command Line Processor.C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()A、The directory must exist with one subdirectory (general).B、The directory must exist with two subdirectories (daily, weekly).C、The directory must exist with three subdirectories (daily, weekly, monthly).D、The directory must exist with four subdirectories (general, daily, weekly, monthly).

The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()A、The user would not be able to log in to the wallet.B、The user is able to log in with their wallet password, but the wallet is not synchronized with the server.C、A user must be re-assigned to another policy template in order to change any aspects of the applied policy.D、The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()A、Citrix workstationB、personal workstationC、shared workstation, private desktopD、shared workstation, shared desktop

Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、Data Mining APIB、Provisioning APIC、Cryptography APID、API for Second FactorsE、SOAP API for Mobile ActiveCode

You work as an administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. You are required to remove the graphical user interface (GUI) from a server named ABC_SR06. Which of the following actions should you take?()A、You should use Server Manager console on ABC_SR06 to remove the User Interfaces.B、You should use TS Manager console on ABC_SR06 to remove the User Interfaces.C、You should use Server Manager console on ABC_SR06 to remove the Infrastructure feature.D、You should use TS Manager console on ABC_SR06 to remove the Infrastructure feature.

单选题When planning for secure communications between a partner and the Point of Contact, at what level is the SSL connection defined?()Aeach individual partner within a single federationBall federations configured for an instance of IBM Tivoli Federated Identity Manager (ITFIM)Ceach individual federation within an instance of ITFIMDall federation functionality fronted by a single instance of IBM Tivoli Access Manager for e-business WebSEAL

单选题Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()AAccessAdmin,AccessAssistant,and IMS Configuration UtilityBAccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration UtilityCAccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration UtilityDAccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

单选题A customer has Symantec NetBackup installed and is concerned about restore times for a line ofbusiness server. Which IBM Tivoli Storage Manager feature addresses this customer’s concerns?()AmigrationBcollocationCcompressionDsubfile backup

单选题What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()AThe directory must exist with one subdirectory (general).BThe directory must exist with two subdirectories (daily, weekly).CThe directory must exist with three subdirectories (daily, weekly, monthly).DThe directory must exist with four subdirectories (general, daily, weekly, monthly).

单选题Your network consists of a single Active Directory domain. The domain contains a server that runs Windows Server 2008 R2 and that has the Remote Desktop Services server role installed.   The server has six custom applications installed. The custom applications are configured as RemoteApps.   You notice that when a user runs one of the applications, other users report that the server seems slow and that some applications become unresponsive.    You need to ensure that active user sessions receive equal access to system resources. What should you do?()AImplement Remote Desktop Web Access.BImplement Remote Desktop Connection Broker.CConfigure Performance Monitor.DImplement Windows System Resource Manager.

单选题The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()AThe user would not be able to log in to the wallet.BThe user is able to log in with their wallet password, but the wallet is not synchronized with the server.CA user must be re-assigned to another policy template in order to change any aspects of the applied policy.DThe user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

单选题In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()ACitrix workstationBpersonal workstationCshared workstation, private desktopDshared workstation, shared desktop

单选题An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()Adetails related to application user ID requirementsBpolicy requirements related to the number of applications that a user can accessCpolicy requirements for application and user initiated password resets and password complexityDdo nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project

单选题Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()AWindows NT ConnectorBGeneric (LDAP) ConnectorCNetwork Information Service ConnectorDActive Directory Service Interfaces Connector

单选题Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()AThe database user must be created using DB2 Control Center.BThe database user must be created using the DB2 Command Line Processor.CThe database user may be created using DB2 Control Center or DB2 Command Line Processor.DThe database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

单选题Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()Athe size of the hard drives for each PC connected to the client’s networkBthe average size of the wallet based on the number of profiles and accountsCif any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hoursDthe number of users that will be connected using the wireless network, as opposed to a wired connection

多选题What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()AABBCCDDEE

多选题Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()AData Mining APIBProvisioning APICCryptography APIDAPI for Second FactorsESOAP API for Mobile ActiveCode

多选题Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()Ato add second factor based authentication to a Web applicationBto pre-populate user wallets with all their application credentials in one goCto enhance out-of-the-box audit logging by creating custom audit log eventsDto create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnEto configure automatic password change on expiry for an application so that the new password is a random string of specified strength