IBM(000-891) 题目列表
单选题You want to use TCPMON between the two WS-Provisioning Service instances. How do you configure the endpoint of the partner WS-Provisioning service (i.e., the destination of step 3) so that TCPMON can be used?()Amodify the ITFIMClientIDI.properties fileBmodify the ITFIMClientScript.constants fileCuse the IBM Tivoli Federated Identity Manager Console to modify a custom runtime parameterDuse the WebSphere Application Server Administration Console to modify the WS-Provisioning application properties
单选题You want to use TCPMON between the two WS-Provisioning Service instances. How do you configure the endpoint of the partner WS-Provisioning service (i.e., the destination of step 3) so that TCPMON can be used?()Amodify the ITFIMClientIDI.properties fileBmodify the ITFIMClientScript.constants fileCuse the IBM Tivoli Federated Identity Manager Console to modify a custom runtime parameterDuse the WebSphere Application Server Administration Console to modify the WS-Provisioning application properties
单选题What is the default trace file (for Linux) that is used for the initial debugging of IBM Tivoli Federated Identity Manager Runtime?()A/opt/IBM/FIM/logs/ ITFIM Domain Name/tivoli-common/FBT/logs/msg.logB/opt/IBM/FIM/logs/ ITFIM Domain Name/tivoli-common/FBT/logs/trace.logC/opt/IBM/WebSphere/AppServer/profiles/servername/logs/profile/trace.logD/opt/IBM/WebSphere/AppServer/profiles/servername/logs/profile/SystemOut.log
单选题Which statement is true about a Dynamic Chain Selection Module instance?()AIt is the first module in the partner module chain in Web Services Security Management (WSSM).BIt is the last module in the partner module chain in WSSM.CIt is the first module in the application module chain for partner.DIt is the last module in the application module chain for the partner.
单选题When recovering from a disaster, the backup and restore operation you use is similar to the export/import configuration procedure, with one additional step. Which additional step must you take when recovering from a disaster?()AA new WebSphere profile is required to restore the configuration.BThe restored system requires the IBM Tivoli Access Manager for e-business (TAMeb) JRTE to be manually configured against the WebSphere’s Java Runtime to allow the IBM Tivoli Federated Identity Manager (ITFIM) Runtime to function properly.CThe ITFIM Domain needs to be created manually within the Integrated Solution Console.DThe ITFIM Runtime instance needs to be re-registered with the TAMeb policy server by running the SvrSslCfg command.
单选题When planning for secure communications between a partner and the Point of Contact, at what level is the SSL connection defined?()Aeach individual partner within a single federationBall federations configured for an instance of IBM Tivoli Federated Identity Manager (ITFIM)Ceach individual federation within an instance of ITFIMDall federation functionality fronted by a single instance of IBM Tivoli Access Manager for e-business WebSEAL
单选题You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()Astop all running instances of PDACLDBlog in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) userCchange the TAMeb ACL policy applying to the Web Services namespaceDupdate the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console
多选题Which two tasks are required to install Service Integration Bus Web Services?()Ainstall the Resource AdapterBconfigure SOAP listener portCdeploy the Service Integration Bus applicationDinstall the Service Data Objects (SDO) RepositoryEcreate a new WebSphere Application Server profile
多选题What are two functions of a custom mapping module?()Arecords the token assertionBmaps a STSUUSER input to a SAML tokenClooks up attributes in an external data sourceDmaps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 protocolEmaps a GUI XML attributes into UI controls that are used by the IBM Tivoli Federated Identity Manager Console to collect the input data
单选题What limitations exist for a SAML Partner Provider ID configured at the Identity Provider?()AThe Provider ID can be any string.BThe Provider ID can only include alphanumeric characters.CThe Provider ID must match the prefix of Target URLs in SSO requests.DThe Provider ID must match the Succinct ID configured at the Service Provider.
单选题What is the default message level configured for IBM Tivoli Federated Identity Manager?()Aerror messages onlyBdisable all messagesCerror and warning messages onlyDinfo, error and warning messages
单选题RBTelco is a large multinational company that outsources health care benefit management to RBBenefits. RBTelco employees access RBBenefits resources through an authenticate-able account at each company. RBBenefit and RBTelco will use SAML V1.0. Which IBM Tivoli Access Manager for e-business (ITAMeb) and IBM Tivoli Federated Identity Manager (ITFIM) components are required to be installed at RBTelco?()ATAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console BTAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit CTAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit DTAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, ITFIM Demonstration Scenarios, WebSEAL Application Developer Kit
单选题Which security token may carry user attribute information as part of the defined token format?()AKerberosBRACF TokenCSAML AssertionDUsername Token
单选题Which XSL if statement checks for the existence of a homepage attribute within an STS Universal User XML structure?()Axsl:if test=//stsuuser:AttributeList/stsuuser:Attribute[attr='homepage']Bxsl:if test=//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage']Cxsl:if-exists=//stsuuser:AttributeList/stsuuser:Attribute/custom:HomepageDxsl:if-exists=//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage'])
单选题The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()AThe input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. BThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. CThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. DThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.