IBM(000-020) 题目列表
单选题An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()Adetails related to application user ID requirementsBpolicy requirements related to the number of applications that a user can accessCpolicy requirements for application and user initiated password resets and password complexityDdo nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project

单选题In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()ACitrix workstationBpersonal workstationCshared workstation, private desktopDshared workstation, shared desktop

单选题Which operator allows specification of a case-sensitive regular expression comparison for attributes in an AccessProfile signature?()ATilde (~)BHash (#)CEquals (=)DAsterisk (*)

单选题Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()AAccessAdmin,AccessAssistant,and IMS Configuration UtilityBAccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration UtilityCAccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration UtilityDAccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

单选题An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()AThe MAC can only be delivered to a mobile phone and is good for a single use only.BThe MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.CThe MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.DThe MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

多选题Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()Ato add second factor based authentication to a Web applicationBto pre-populate user wallets with all their application credentials in one goCto enhance out-of-the-box audit logging by creating custom audit log eventsDto create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnEto configure automatic password change on expiry for an application so that the new password is a random string of specified strength

多选题Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()AData Mining APIBProvisioning APICCryptography APIDAPI for Second FactorsESOAP API for Mobile ActiveCode

单选题Which statement is true about the database and database-user used during installation of IMS Server?()AA preexisting database user may be used but a new database has to be created during installation.BA preexisting database may be used but a new database user has to be created during installation.CA preexisting database and user may be used or a new database and user are created during installation.DA preexisting database and user cannot be used; a new database and user are created during  installation.

单选题The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()AThe user would not be able to log in to the wallet.BThe user is able to log in with their wallet password, but the wallet is not synchronized with the server.CA user must be re-assigned to another policy template in order to change any aspects of the applied policy.DThe user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

单选题Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()AAccessAdmin,AccessAssistant,and IMS Configuration UtilityBAccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration UtilityCAccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration UtilityDAccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

单选题Machine policy templates can be assigned based on certain attributes of a machine. A customer  organizes their machines based on the following requirements:   The machines are all placed in specific Organizational Units in the Active Directory.   The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines.   The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()AHostnamesBIP AddressesCMachine Group TagDActive Directory Groups

单选题How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()ACheck the server.xml on the IMS Server.BCheck the database table IMSSyncDataType.CCheck the System policies in the AccessAdmin.DCheck the IMS Server settings of the IMS Configuration Utility.

多选题What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()AABBCCDDEE

单选题Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()Athe size of the hard drives for each PC connected to the client’s networkBthe average size of the wallet based on the number of profiles and accountsCif any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hoursDthe number of users that will be connected using the wireless network, as opposed to a wired connection

单选题When upgrading the AccessAgent and IMS Server from V3.6.x or V8.0.0 to V8.0.1, which statement is true about the existing AccessAgent and IMS Server?()AThe AccessAgent DOES need to be uninstalled and the IMS Server software DOES need to be  uninstalled.BThe AccessAgent DOES need to be uninstalled and the IMS Server software DOES NOT need to be uninstalled.CThe AccessAgent DOES NOT need to be uninstalled and the IMS Server software DOES need to be uninstalled.DThe AccessAgent DOES NOT need to be uninstalled and the IMS Server software DOES NOT need to be uninstalled.