多选题 Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server？（）
Data Mining API
API for Second Factors
SOAP API for Mobile ActiveCode
单选题 What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping？（）
The directory must exist with one subdirectory （general）.
The directory must exist with two subdirectories （daily， weekly）.
The directory must exist with three subdirectories （daily， weekly， monthly）.
The directory must exist with four subdirectories （general， daily， weekly， monthly）.
单选题 The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication （GINA） replacement， and has enabled Active Directory （AD） password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable？（）
The user would not be able to log in to the wallet.
The user is able to log in with their wallet password， but the wallet is not synchronized with the server.
A user must be re-assigned to another policy template in order to change any aspects of the applied policy.
The user experiences normal operation， but AccessAgent will be unable to store newly captured passwords.
单选题 Machine policy templates can be assigned based on certain attributes of a machine. A customer organizes their machines based on the following requirements： The machines are all placed in specific Organizational Units in the Active Directory. The customer has Citrix Servers， and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines. The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements， which single assignment attribute would be chosen for assigning machine policy templates？（）
Machine Group Tag
Active Directory Groups
单选题 How can it be determined if the IMS Server （below Version 8.0） is configured for "Active Directory （AD） deployment type 1" or "AD deployment type 2"？（）
Check the server.xml on the IMS Server.
Check the database table IMSSyncDataType.
Check the System policies in the AccessAdmin.
Check the IMS Server settings of the IMS Configuration Utility.
单选题 Which operator allows specification of a case-sensitive regular expression comparison for attributes in an AccessProfile signature？（）
单选题 When upgrading the AccessAgent and IMS Server from V3.6.x or V8.0.0 to V8.0.1， which statement is true about the existing AccessAgent and IMS Server？（）
The AccessAgent DOES need to be uninstalled and the IMS Server software DOES need to be uninstalled.
The AccessAgent DOES need to be uninstalled and the IMS Server software DOES NOT need to be uninstalled.
The AccessAgent DOES NOT need to be uninstalled and the IMS Server software DOES need to be uninstalled.
The AccessAgent DOES NOT need to be uninstalled and the IMS Server software DOES NOT need to be uninstalled.
单选题 Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory？（）
Windows NT Connector
Generic （LDAP） Connector
Network Information Service Connector
Active Directory Service Interfaces Connector
单选题 An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode （MAC） when it is used with a VPN Solution for remote access？（）
The MAC can only be delivered to a mobile phone and is good for a single use only.
The MAC can be delivered by mobile phone， e-mail， or fax， and it is good for one time authentication only.
The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached， as set by an administrator.
The MAC can be delivered by mobile phone， email， or fax， and it is good until the expiration time is reached， as set by an administrator.
单选题 An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy， the organization has detailed requirements related to password management for their enterprise applications. Which password requirements need to be captured？（）
details related to application user ID requirements
policy requirements related to the number of applications that a user can access
policy requirements for application and user initiated password resets and password complexity
do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project
Your network consists of a single Active Directory domain. The domain contains more than 300 group objects. The group objects are divided between several regional organizational units (OUs). You need to create a list of all groups that have names that begin with the word Sales. Which command should you use? （）