IT Exam-passokay
Would you like to react to this message? Create an account in a few clicks or log in to continue.

C2150-197 Exam braindumps exam pdf torrent

向下

C2150-197 Exam braindumps exam pdf torrent Empty C2150-197 Exam braindumps exam pdf torrent

帖子 由 Admin 周一 九月 29, 2014 5:11 am

C2150-197 Exam
Exam Number/Code : C2150-197
Exam Name : IBM Security Identity Manager V6.0 Implementation
C2150-197 exam is an important IBM certifications II certification which can test your professional skills. Candidates want to pass the exam successfully to prove their competence. Passokay IBM certifications II technical experts have collected and certified 246 questions and answers of C2150-197 exam which are designed to cover the knowledge points of the Interconnecting IBM certifications II Networking Devices Part 1 and enhance candidates' abilities. With Passokay C2150-197 preparation tests you can pass the C2150-197 exam easily, get the CCENT certification and go further on IBM certifications II career path.
Questions and Answers : 87 Q&As
Update Time: 2014-08-15
Price: $ 35.00
http://www.passokay.com/C2150-197.html
http://www.passokay.com/pdf/C2150-197.pdf

^p
Question: 1
Which is true for the relationship between provisioning policies, services, and roles?
A. A provisioning policy governs only services that are associated the same business unit or sub tree of the business unit with which the policy is associated. A role referenced in the provisioning policy must be associated the same business unit or sub tree of the business unit with which the policy is associated.
B. A provisioning policy governs only services that are associated the same business unit or sub tree of the business unit with which the policy is associated. A role referenced in the provisioning policy can be anywhere in the tree of the organization.
C. A provisioning policy governs services that are anywhere in the tree of the organization. A role referenced in the provisioning policy must be associated the same business unit or sub tree of the business unit with which the policy is associated.
D. A provisioning policy governs services that are anywhere in the tree of the organization. A role referenced in the provisioning policy can be anywhere in the tree of the organization.
Answer: A
^p
Question: 2
When applying an IBM Security Identity Manager (ISIM) fixpack in a clustered ISIM installation which statement is correct?
A. Websphere application and messaging clusters must be stopped prior to installing the ISIM fixpack.
B. Websphere application and messaging clusters must be running prior to installing the ISIM fixpack.
C. All Websphere processes must be stopped prior to installing the ISIM fixpack.
D. All Websphere processes must be running prior to installing the ISIM fixpack.
Answer: A
^p
Question: 3
Which actions are best practice for securing IBM Security Identity Manager LDAP data?
A. Disabling anonymous read access, enabling SSL communication only
B. Allow only read access to IBM Security Identity Manager LDAP
C. Run the IBM Security Identity Manager server as non-root user
D. Enabled WebSphere global security
Answer: A
^p
Question: 4
When gathering requirements for a Provisioning Policy design, which type of owner is used for orphan accounts?
A. An owner with a contractor email address
B. An account manager
C. An account owner
D. A group owner
Answer: B
^p
Question: 5
When gathering requirements for setting the Password policy which two tasks should be identified for system-wide password settings? (Choose two)
A. Synchronizing password changes for all sponsor accounts
B. Enabling forgotten password authentication
C. Enabling forgotten password date rule
D. Creating a password strength rule
E. Creating a password notation rule
Answer: B, D
^p
Question: 6
A customer wants to query services that have communication failures and initiate recovery actions.
What is the recommended design approach?
A. Write custom code to query the ISIM Database tables to find services that have had communication failure. Recovery is not possible, blocked requests on these services will need to be resubmitted.
B. Write custom code to query the ISIM Database tables to find services that have communication failure. After communication is restored, ISIM will automatically retry requests that were blocked.
C. Use the ISIM Administration console to query services with a Failed status. After communication is restored, resubmit blocked requests.
D. Use the ISIM Administration console to query services with a Failed status. After communication is restored, retry blocked requests.
Answer: D
^p
Question: 7
Your customer has requested that you inte***ce their existing management reporting system based on a commercially available business intelligence tool that features the ability to read any relational database. Which of the following considerations would be part of your design?
A. You will need to set up external data synchronization to update the reporting tables before allowing the BI tool to generate reports.
B. All that is needed is to define a connector to the database, the database tables are always current.
C. Views will need to be defined to allow the BI tool to view the data.
D. You must check to see if the BI tool can read an LDAP directory.
Answer: A
^p
Question: 8
Which IBM Security Identity Manager properties file contains SSO settings?
A. enroleStartup.properties
B. enRole.properties
C. sdo.properties
D. ui.properties
Answer: B

Admin
Admin

帖子数 : 416
注册日期 : 14-06-18

https://passokay.longluntan.com

返回页首 向下

返回页首


 
您在这个论坛的权限:
不能在这个论坛回复主题