站内搜索
IBM(000-891) 问题列表
问题 单选题You want to use TCPMON between the two WS-Provisioning Service instances. How do you configure the endpoint of the partner WS-Provisioning service (i.e., the destination of step 3) so that TCPMON can be used?()A modify the ITFIMClientIDI.properties fileB modify the ITFIMClientScript.constants fileC use the IBM Tivoli Federated Identity Manager Console to modify a custom runtime parameterD use the WebSphere Application Server Administration Console to modify the WS-Provisioning application properties

问题 单选题You want to use TCPMON between the two WS-Provisioning Service instances. How do you configure the endpoint of the partner WS-Provisioning service (i.e., the destination of step 3) so that TCPMON can be used?()A modify the ITFIMClientIDI.properties fileB modify the ITFIMClientScript.constants fileC use the IBM Tivoli Federated Identity Manager Console to modify a custom runtime parameterD use the WebSphere Application Server Administration Console to modify the WS-Provisioning application properties

问题 单选题What is the default trace file (for Linux) that is used for the initial debugging of IBM Tivoli Federated Identity Manager Runtime?()A /opt/IBM/FIM/logs/ ITFIM Domain Name/tivoli-common/FBT/logs/msg.logB /opt/IBM/FIM/logs/ ITFIM Domain Name/tivoli-common/FBT/logs/trace.logC /opt/IBM/WebSphere/AppServer/profiles/servername/logs/profile/trace.logD /opt/IBM/WebSphere/AppServer/profiles/servername/logs/profile/SystemOut.log

问题 单选题Which statement is true about a Dynamic Chain Selection Module instance?()A It is the first module in the partner module chain in Web Services Security Management (WSSM).B It is the last module in the partner module chain in WSSM.C It is the first module in the application module chain for partner.D It is the last module in the application module chain for the partner.

问题 单选题When recovering from a disaster, the backup and restore operation you use is similar to the export/import configuration procedure, with one additional step. Which additional step must you take when recovering from a disaster?()A A new WebSphere profile is required to restore the configuration.B The restored system requires the IBM Tivoli Access Manager for e-business (TAMeb) JRTE to be manually configured against the WebSphere’s Java Runtime to allow the IBM Tivoli Federated Identity Manager (ITFIM) Runtime to function properly.C The ITFIM Domain needs to be created manually within the Integrated Solution Console.D The ITFIM Runtime instance needs to be re-registered with the TAMeb policy server by running the SvrSslCfg command.

问题 单选题When planning for secure communications between a partner and the Point of Contact, at what level is the SSL connection defined?()A each individual partner within a single federationB all federations configured for an instance of IBM Tivoli Federated Identity Manager (ITFIM)C each individual federation within an instance of ITFIMD all federation functionality fronted by a single instance of IBM Tivoli Access Manager for e-business WebSEAL

问题 单选题You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()A stop all running instances of PDACLDB log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) userC change the TAMeb ACL policy applying to the Web Services namespaceD update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console

问题 多选题Which two tasks are required to install Service Integration Bus Web Services?()Ainstall the Resource AdapterBconfigure SOAP listener portCdeploy the Service Integration Bus applicationDinstall the Service Data Objects (SDO) RepositoryEcreate a new WebSphere Application Server profile

问题 多选题What are two functions of a custom mapping module?()Arecords the token assertionBmaps a STSUUSER input to a SAML tokenClooks up attributes in an external data sourceDmaps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 protocolEmaps a GUI XML attributes into UI controls that are used by the IBM Tivoli Federated Identity Manager Console to collect the input data

问题 单选题What limitations exist for a SAML Partner Provider ID configured at the Identity Provider?()A The Provider ID can be any string.B The Provider ID can only include alphanumeric characters.C The Provider ID must match the prefix of Target URLs in SSO requests.D The Provider ID must match the Succinct ID configured at the Service Provider.

问题 单选题What is the default message level configured for IBM Tivoli Federated Identity Manager?()A error messages onlyB disable all messagesC error and warning messages onlyD info, error and warning messages

问题 单选题RBTelco is a large multinational company that outsources health care benefit management to RBBenefits. RBTelco employees access RBBenefits resources through an authenticate-able account at each company. RBBenefit and RBTelco will use SAML V1.0. Which IBM Tivoli Access Manager for e-business (ITAMeb) and IBM Tivoli Federated Identity Manager (ITFIM) components are required to be installed at RBTelco?()A TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console B TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit C TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit D TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, ITFIM Demonstration Scenarios, WebSEAL Application Developer Kit

问题 单选题Which security token may carry user attribute information as part of the defined token format?()A KerberosB RACF TokenC SAML AssertionD Username Token

问题 单选题Which XSL if statement checks for the existence of a homepage attribute within an STS Universal User XML structure?()A xsl:if test=//stsuuser:AttributeList/stsuuser:Attribute[attr='homepage']B xsl:if test=//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage']C xsl:if-exists=//stsuuser:AttributeList/stsuuser:Attribute/custom:HomepageD xsl:if-exists=//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage'])

问题 单选题The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()A The input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. B The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. C The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. D The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.