单选题An application is upgraded and it has been determined that the AccessAgent no longer properly responds to the application. It is understood that for a certain amount of time both the current version and the upgraded version of the application will be u...
Sunday, April 14, 2024
单选题When upgrading the AccessAgent and IMS Server from V3.6.x or V8.0.0 to V8.0.1, which statement is true about the existing AccessAgent and IMS Server?()A The AccessAgent DOES need to be uninstalled and the IMS Server software DOES need to be uninstalle...
单选题Which operator allows specification of a case-sensitive regular expression comparison for attributes in an AccessProfile signature?()A Tilde (~)B Hash (#)C Equals (=)D Asterisk (*)...
单选题Which Web-based administration tools are available in IBM Tivoli Access Manager for Enterprise Single Sign-On?()A AccessAdmin,AccessAssistant,and IMS Configuration UtilityB AccessStudio,AccessAdmin,AccessAssistant,and IMS Configuration UtilityC AccessM...
Monday, March 18, 2024
多选题What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()AABBCCDDEE...
单选题An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution ...
单选题What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()A The directory must exist with one subdirectory (general).B The directory must exist with two s...
单选题An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password m...
单选题Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()A Windows NT ConnectorB Generic (LDAP) ConnectorC Network Inform...
单选题System, machine, and user policies can be configured though AccessAdmin. How are changes synchronized with the AccessAgent?()A written by the Administrators on the INI filesB propagated only with the Active Directory network serviceC propagated to the...
单选题By default what is the interval for synchronization of the wallet with the IMS Server?()A once a dayB once a weekC every minuteD every 30 minutes...
多选题Which two APIs are published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()AData Mining APIBProvisioning APICCryptography APIDAPI for Second FactorsESOAP API for Mobile ActiveCode...
单选题The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authen...
Monday, February 5, 2024
单选题In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an applicati...