网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()
A

details related to application user ID requirements

B

policy requirements related to the number of applications that a user can access

C

policy requirements for application and user initiated password resets and password complexity

D

do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project


参考答案

参考解析
解析: 暂无解析
更多 “单选题An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()A details related to application user ID requirementsB policy requirements related to the number of applications that a user can accessC policy requirements for application and user initiated password resets and password complexityD do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project” 相关考题
考题 Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、to add second factor based authentication to a Web applicationB、to pre-populate user wallets with all their application credentials in one goC、to enhance out-of-the-box audit logging by creating custom audit log eventsD、to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnE、to configure automatic password change on expiry for an application so that the new password is a random string of specified strength

考题 Which Tivoli application has a predefined X-Agent available? ()A、 IBM Tivoli Storage ManagerB、 IBM Tivoli Enterprise ConsoleC、 IBM Tivoli Configuration ManagerD、 IBM Tivoli System Automation Manager

考题 An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()A、details related to application user ID requirementsB、policy requirements related to the number of applications that a user can accessC、policy requirements for application and user initiated password resets and password complexityD、do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project

考题 Why would you use WebLogic Diagnostics Framework (WLDF) instead of Oracle Enterprise Manager (OEM) ()A、 WLDF has better performance than OEM B、 my organization already has a solution for unified management and monitoring; we need to supplement that with some specific WLS-related capabilitiesC、 OEM is not certified with latest version of WLSD、 OEM is really focused on the database tier, is not meant to address JEE management and monitoring

考题 Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

考题 An international company has a heterogeneous IBM storage environment with two IBM DS8700 systems in a Metro Mirror relationship. They also have a virtualized environment with two SVC clusters in a Global Mirror relationship. The storage administrator complains about the monitoring of copy services.  Which solution should the IBM storage specialist propose for this pain point()A、System Storage Productivity CenterB、Tivoli Storage Productivity Center for ReplicationC、Tivoli Storage Productivity Center for DiskD、DS8000 Storage Manager

考题 User "twsuser" is logged on to the IBM Tivoli Workload Scheduler  Master Domain Manager server using Job Scheduling Console to update  calendar. The user receives a message: MODIFY on   CALENDAR access not granted.  What is the cause of this error?()A、 Batchman process is down.B、 User password has expired.C、 WebSphere security is damaged.D、 There are insufficient permissions in Security file.

考题 Your network contains two Exchange Server 2010 Edge Transport servers and five Exchange Server2010 Hub Transport servers.  All e-mail sent from your organization to the Internet is transferred by the Edge Transport servers. You need to recommend a security solution for the organization to meet the following requirements: .Ensure that users can send encrypted messages to any other organization on the Internet  .Ensure that all Exchange-related communication between Hub Transport servers and Edge Transport servers is encrypted What should you recommend?()A、Deploy IPsec.B、Deploy SMTP over SSL.C、Implement Domain Security.D、Implement Secure/Multipurpose Internet Mail Extensions (S/MIME).

考题 You have an Exchange Server 2010 organization.  The organization contains a global security group named Group1.  You plan to deploy a monitoring solution for the Exchange servers in your organization.  You need to recommend a solution that allows members of Group1 to monitor the performance of Exchange Server 2010 servers.  Your solution must prevent members of Group1 from modifying the configurations of the Exchanges Server 2010 organization.  What should you include in the solution?()A、Delegation of Control WizardB、Federation TrustsC、Reliability MonitorD、Role Based Access Control (RBAC)

考题 You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling

考题 You have an Exchange 2010 organization.  Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.  You need to recommend a solution to meet the security policy requirements.  Which two possible ways to achieve this goal should you recommend?()A、Require certificate-based authentication for all Internet-facing Client Access servers.B、Require Windows Integrated Authentication for all Internet-facing Client Access servers.C、Deploy an Edge Transport server, and then disable Windows Integrated Authentication.D、Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server, and then enable Kerberos constrained delegation.

考题 Your network contains a single Active Directory domain.  You have an Exchange Server 2010 organization that contains a Hub Transport server named Hub1. Hub1 receives all e-mail messages that are sent to your organization from the Internet.  A new company security policy states that domain-joined servers must not be accessible directly from theInternet.  You need to create a message hygiene solution to meet the following requirements: .Comply with the new security policy .Minimize the amount of spam that is delivered to the internal Exchange servers in the organization  What should you do first?()A、Deploy an Edge Transport server, and then configure EdgeSync synchronization.B、Deploy a new Hub Transport server, and then install the anti-spam transport agents.C、Deploy a new Hub Transport server, and then deploy Active Directory Federation Services (AD FS).D、Deploy an Edge Transport server, and then disable Active Directory Lightweight Directory Services(AD LDS).

考题 You have an Exchange Server 2010 organization.  Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).  You need to recommend a client access solution that meets the requirements of the security policy.  What should you include in the solution?()A、managed folder mailbox policiesB、multiple OWA virtual directoriesC、OWA segmentationD、WebReady Document Viewing

考题 Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All domain controllers run Windows Server 2008 R2.   A corporate policy requires that the users from the research department have higher levels of account and password security than other users in the domain.   You need to recommend a solution that meets the requirements of the corporate policy. Your solution must minimize hardware and software costs. What should you recommend?()A、Create a new Active Directory site. Deploy a Group Policy object (GPO) to the site.B、Create a new Password Settings Object (PSO) for the research department’s usersC、Create a new organizational unit (OU) named Research in the existing domain. Deploy a Group Policy object (GPO) to the Research OU.D、Create a new domain in the forest.Add the research department’s user accounts to the new domain.Configure a new security policy in the new domain.

考题 单选题Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All domain controllers run Windows Server 2008 R2.   A corporate policy requires that the users from the research department have higher levels of account and password security than other users in the domain.   You need to recommend a solution that meets the requirements of the corporate policy. Your solution must minimize hardware and software costs. What should you recommend?()A Create a new Active Directory site. Deploy a Group Policy object (GPO) to the site.B Create a new Password Settings Object (PSO) for the research department’s usersC Create a new organizational unit (OU) named Research in the existing domain. Deploy a Group Policy object (GPO) to the Research OU.D Create a new domain in the forest.Add the research department’s user accounts to the new domain.Configure a new security policy in the new domain.

考题 单选题Which Tivoli application has a predefined X-Agent available? ()A  IBM Tivoli Storage ManagerB  IBM Tivoli Enterprise ConsoleC  IBM Tivoli Configuration ManagerD  IBM Tivoli System Automation Manager

考题 单选题User "twsuser" is logged on to the IBM Tivoli Workload Scheduler  Master Domain Manager server using Job Scheduling Console to update  calendar. The user receives a message: MODIFY on   CALENDAR access not granted.  What is the cause of this error?()A  Batchman process is down.B  User password has expired.C  WebSphere security is damaged.D  There are insufficient permissions in Security file.

考题 单选题You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()A a Discovery Management role groupB a legal holdC administrator audit loggingD Mailbox journaling

考题 单选题The ISPS Code consists of a mandatory section-Part A, which shows()A the detailed security-related requirementsB guidelines to meet security-related requirementsC the detailed security-related requirements and the guidelines to meet themD how to run a shipping company considering the potential terrorism action

考题 单选题Why would you use WebLogic Diagnostics Framework (WLDF) instead of Oracle Enterprise Manager (OEM) ()A  WLDF has better performance than OEM B  my organization already has a solution for unified management and monitoring; we need to supplement that with some specific WLS-related capabilitiesC  OEM is not certified with latest version of WLSD  OEM is really focused on the database tier, is not meant to address JEE management and monitoring

考题 单选题You have an Exchange Server 2010 organization.  Your company has a relationship with another company.  The partner company has an Exchange Server 2010 organization.  You need to recommend a security solution to meet the following requirements:  .Ensure that all e-mail delivery between your servers and the partner companys servers is encrypted .Ensure that all communication between your servers and the partner companys servers is authenticated What should you include in the solution?()A Active Directory Rights Management Services (AD RMS)B Domain SecurityC Forms-based AuthenticationD Secure/Multipurpose Internet Mail Extensions (S/MIME)

考题 单选题You have an Exchange Server 2010 organization.  Your companys security policy states that users must not be able to encrypt e-mail messages by usingOutlook Web App (OWA).  You need to recommend a client access solution that meets the requirements of the security policy.  What should you include in the solution?()A managed folder mailbox policiesB multiple OWA virtual directoriesC OWA segmentationD WebReady Document Viewing

考题 单选题You have an Exchange Server 2010 organization.  The organization contains a global security group named Group1.  You plan to deploy a monitoring solution for the Exchange servers in your organization.  You need to recommend a solution that allows members of Group1 to monitor the performance of Exchange Server 2010 servers.  Your solution must prevent members of Group1 from modifying the configurations of the Exchanges Server 2010 organization.  What should you include in the solution?()A Delegation of Control WizardB Federation TrustsC Reliability MonitorD Role Based Access Control (RBAC)

考题 单选题You have an Exchange Server 2010 organization that consists of 50 Exchange Server 2010 servers. Your companys security policy states that approved Exchange and Windows Server patches and securityupdates must be applied to all Exchange servers within one week of being released.  You need to recommend a patch management solution that meets the following requirements: .Allow administrators to manually approve patches and security updates .Allow only the installation of approved patches and security updates  .Minimize the administrative effort to deploy patches  .Minimize the deployment costs What should you include in the solution?()A Microsoft UpdateB Microsoft System Center Configuration ManagerC Windows Server Update ServicesD Windows Update

考题 单选题An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()A details related to application user ID requirementsB policy requirements related to the number of applications that a user can accessC policy requirements for application and user initiated password resets and password complexityD do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project

考题 多选题Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()Ato add second factor based authentication to a Web applicationBto pre-populate user wallets with all their application credentials in one goCto enhance out-of-the-box audit logging by creating custom audit log eventsDto create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnEto configure automatic password change on expiry for an application so that the new password is a random string of specified strength