000-020 IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 Implementation


QUESTION 1
An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on
solution to help address security and productivity issues. Per their corporate security policy, the
organization has detailed requirements related to password management for their enterprise
applications. Which password requirements need to be captured?

A. details related to application user ID requirements
B. policy requirements related to the number of applications that a user can access
C. policy requirements for application and user initiated password resets and password complexity
D. do nothing as password policy requirements are best addressed within the application space
rather than in an Enterprise Single Sign-On project

Answer: C


QUESTION 2
Which operator allows specification of a case-sensitive regular expression comparison for
attributes in an AccessProfile signature?

A. Tilde (~)
B. Hash (#)
C. Equals (=)
D. Asterisk (*)

Answer: A


QUESTION 3
What are the directory details of Relational Database backup files created by IBM Tivoli Access
Manager for Enterprise Single Sign-On V8.0.1 housekeeping?

A. The directory must exist with one subdirectory (general).
B. The directory must exist with two subdirectories (daily, weekly).
C. The directory must exist with three subdirectories (daily, weekly, monthly).
D. The directory must exist with four subdirectories (general, daily, weekly, monthly).

Answer: C


QUESTION 4
System, machine, and user policies can be configured though AccessAdmin. How are changes
synchronized with the AccessAgent?

A. written by the Administrators on the INI files
B. propagated only with the Active Directory network service
C. propagated to the clients on the next Administrator access
D. propagated to clients the next timeAccessAgent synchronizes with the IMS Server

Answer: D


QUESTION 5
An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single
Sign-On to provide remote access to business critical information. Which statement is true about
the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?

A. The MAC can only be delivered to a mobile phone and is good for a single use only.
B. The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time
authentication only.
C. The MAC can only be delivered to a mobile phone and it is good until the expiration time is
reached, as set by an administrator.
D. The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration
time is reached, as set by an administrator.

Answer: B


MCTS Training, MCITP Trainnig

Best IBM Training and IBM Certification
and more IBM 000-020 exams log in to Certkingdom.com

Click to rate this post!
[Total: 0 Average: 0]

About the author /


Archives

Latest

+

Random

+
December 2013
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031