IBM
000-198
•IBM Security Access Manager V7.0 Implementation
Question: 1
|
Which utility provides backup, restore, and extract
capabilities for Security Access Manager data?
A. pdinfo
B. pdbackup
C. pdservice
D. pd_backup
Answer: B
|
Question: 2
|
What pdbackup command restores the contents of an Access
Manger archived file on a Windows operating system to a specific folder?
A. pdbackup -a extract
B. pdabckup -a backup
C. pdbackup -a restore
D. pdbackup -a retrieve
Answer: A
|
Question: 3
|
When performing an upgrade, which utility is used to back
up the information in Tivoli Directory Server?
A. ldapadd
B. bulkload
C. idsdb2ldif
D. idscreateldif
Answer: C
|
Question: 4
|
Which registry is NOT supported by ISAM 7?
A. Lotus?Domino?Lotus?Domino
B. IBM?Tivoli?Directory Server
C. Microsoft Active Directory 2008
D. Sun Java?System Directory Server 7
Answer: A
|
Question: 5
|
Which statement is FALSE regarding local response
redirection?
A. We need to use External authentication interface to
implement local response redirection.
B. When local response redirection is enabled, change
password must be handled by WebSEAL.
C. When using local response redirection, WebSEAL no
longer has the responsibility of generating responses to client requests.
D. When local response redirection is enabled, the
redirection is used for all local WebSEAL response types: login, error,
informational, and password management.
Answer: A
|
Question: 6
|
Which statement is true for the ISAM appliance
snapshot?
A. It is only a backup of the LMI.
B. It is a backup of all WebSEAL instances.
C. It is a copy of the state of the appliance at a
certain time.
D. It is a backup of the Policy Server and WebSEAL instances.
Answer: C
|
Question: 7
|
What is the correct archive file If pdbackup -a backup
-list C:\Program Files\Tivoli\Policy Director\etc\pdbackup.lst is executed
using ISAM on a Windows Server?
A. C:\Program Files\Tivoli\Policy
Director\pdbackup\pdbackup.lst_30aug2013.11.30.dar
B. C:\Program Files\Tivoli\Policy
Director\pdbackup\pdbackup.lst_30.08.2013.11.30.dar
C. C:\Program Files\Tivoli\Policy
Director\pdbackup\pdbackup.lst_30aug2013.11_30.dar
D. C:\Program Files\Tivoli\Policy
Director\pdbackup\pdbackup.lst_30.08.2013.11_30.dar
Answer: C
|
Question: 8
|
You have a default setup of ISAM, ITDS and a Microsoft
SharePoint backend. A Web environment is experiencing performance issues. In
order conduct analysis, tracing is temporarily switched on using the following
commands: server task
web04-webseald-unix08 trace set pdweb.debug 2 file path=/tmp/trace.log server task web04-webseald-unix08 trace set
pdweb.debug 0 During analysis of the trace.log various common occurrences
appear, the following trace.log extract displays only the lines important for
this question. 2013-05-26-22:08:01.681+02:00I ----------------- Browser ===>
PD ----------------- 2013-05-26-22:08:01.684+02:00I ----------------- Browser
<=== PD ----------------- 2013-05-26-22:08:09.283+02:00I -----------------
Browser ===> PD ----------------- 2013-05-26-22:08:16.682+02:00I
----------------- PD ===> BackEnd -----------------
2013-05-26-22:08:17.049+02:00I ----------------- PD <=== BackEnd
----------------- 2013-05-26-22:08:17.051+02:00I ----------------- Browser
<=== PD ----------------- What can be concluded by analyzing this trace
excerpt? You indicate you wish to make this a sample question, remove the
reference here.
A. This excerpt indicates no performance or other issues.
B. This excerpt indicates that ITDS has a performance
issue.
C. This excerpt indicates that the user has given a wrong
password.
D. This excerpt indicates that the backend has a
performance issue
Answer: B
|
Question: 9
|
You have a default setup of ISAM, ITDS and a Microsoft
SharePoint backend. A Web environment is experiencing performance issues. In
order conduct analysis, tracing is temporarily switched on using the following
commands: server task web04-webseald-unix08 trace set pdweb.debug 2 file
path=/tmp/trace.log server task web04-webseald-unix08 trace set pdweb.debug 0
During analysis of the trace.log various common occurrences appear, the
following trace.log extract displays only the lines important for this question.
2013-05-26-22:08:01.681+02:00I ----------------- Browser ===> PD
----------------- 2013-05-26-22:08:01.682+02:00I ----------------- PD ===>
BackEnd ----------------- 2013-05-26-22:08:07.216+02:00I ----------------- PD
<=== BackEnd ----------------- 2013-05-26-22:08:07.217+02:00I
----------------- Browser <=== PD ----------------- What can be concluded by
analyzing this trace excerpt?
A. This excerpt indicates no performance or other issues.
B. This excerpt indicates that ITDS has a performance
issue.
C. This excerpt indicates that the user has given a wrong
password.
D. This excerpt indicates that the backend has a
performance issue.
Answer: D
|
Question: 10
|
Which configuration enables the day time error page?
A. [acnt-mgt] client-alert-tod = yes
B. [acnt-mgt] client-alert-dot = yes
C. [acnt-mgt] client-notify-tod = yes
D. [acnt-mgt] client-notify-dot = yes
Answer: C
|
Question: 11
|
What is the default credential to log on to ISAM 7 WGA
command-line interface?
A. root, root
B. admin, admin
C. superadmin, secret
D. sec_master, object00
Answer: B
|
Question: 12
|
What will help reduce the volume of audit event, while
preserving important audit information?
A. complete disablement of event generation
B. generation of events for successful HTTP accesses only
C. generation of events for unsuccessful HTTP accesses
only
D. reconfiguration of WebSEAL to use CARS auditing
instead of native auditing
Answer: C
|
Question: 13
|
Recently the Risk Officer of your organization discovered
that all key databases containing web certificates in the organization are
protected with a very weak password. You are assigned to change the password on
every key database into a more complex one. How can this be accomplished?
A. Open iKeyman, open the appropriate key database, enter
the current password, and select "Change Password".
B. Generate a new stash file using command "ibmstash
-db key.kdb -stash key.sth -password <current password> -newpassword <new password>"
C. This is not possible, a new key database has to be
created; the current certificates can be exported from the old KDB into the new
one.
D. Edit the webseald-default.conf configuration file and
change the pointers to the key database password from a stash file to a plain
text password and specify the password.
Answer: A
|
Question: 14
|
How are ISAM users and groups logically separated within
a single policy server?
A. By creating multiple object spaces.
B. By installing multiple user registries.
C. By creating multiple secure domains.
D. By installing multiple policy proxy servers.
Answer: C
|
Question: 15
|
What are two installable components of the Common
Auditing and Reporting Serve? (Choose two.)
A. Audit Service.
B. Report Service
C. Audit Client Setup Utilities
D. Audit Configuration Console
E. Report Configuration Console
Answer: A,D
|
No comments:
Post a Comment