移动端

  • 题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

其他类 | IBM认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 System, machine, and user policies can be configured though AccessAdmin. How are changes  synchronized with the AccessAgent?()

A

written by the Administrators on the INI files

B

propagated only with the Active Directory network service

C

propagated to the clients on the next Administrator access

D

propagated to clients the next time AccessAgent synchronizes with the IMS Server

单选题 An application is upgraded and it has been determined that the AccessAgent no longer properly responds to the application. It is understood that for a certain amount of time both the current version and the upgraded version of the application will be used by the end-users. The executables for both versions are the same. What should be the next step?()

A

Open AccessStudio and change the existing AccessProfile to use only the new signatures for Windows, control IDs, or HTML elements.

B

Open AccessStudio and create a new AccessProfile for the upgraded version and overwrite the existing AccessProfile on the IMS Server.

C

Open AccessStudio and edit the existing AccessProfile by using new triggers/actions associated with the new signatures for Windows, control IDs, or HTML elements.

D

Open AccessStudio and create a new AccessProfile for the upgraded version and upload it to the IMS Server so that two separate AccessProfiles may be used by the AccessAgent.

单选题 Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()

A

the size of the hard drives for each PC connected to the client’s network

B

the average size of the wallet based on the number of profiles and accounts

C

if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hours

D

the number of users that will be connected using the wireless network, as opposed to a wired connection

多选题 Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

A

Data Mining API

B

Provisioning API

C

Cryptography API

D

API for Second Factors

E

SOAP API for Mobile ActiveCode

单选题 Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()

A

AccessAdmin,AccessAssistant,and IMS Configuration Utility

B

AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

C

AccessManager Console,AccessAdmin,AccessAssistant,and IMS Configuration Utility

D

AccessEnabler,AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration Utility

单选题 What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()

A

The directory must exist with one subdirectory (general).

B

The directory must exist with two subdirectories (daily, weekly).

C

The directory must exist with three subdirectories (daily, weekly, monthly).

D

The directory must exist with four subdirectories (general, daily, weekly, monthly).

单选题 How can it be determined if the IMS Server (below Version 8.0) is configured for "Active Directory (AD) deployment type 1" or "AD deployment type 2"?()

A

Check the server.xml on the IMS Server.

B

Check the database table IMSSyncDataType.

C

Check the System policies in the AccessAdmin.

D

Check the IMS Server settings of the IMS Configuration Utility.

多选题 Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

A

to add second factor based authentication to a Web application

B

to pre-populate user wallets with all their application credentials in one go

C

to enhance out-of-the-box audit logging by creating custom audit log events

D

to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On

E

to configure automatic password change on expiry for an application so that the new password is a random string of specified strength

最新资讯

1 2 下一页 尾页 /

到第