Professional Documents
Culture Documents
Version
QUESTION NO: 1
What is another piece of essential information, in addition to the list below,
which can be used to create a diagram of the customer organization?What is another
piece of essential information, in addition to the list below, which can be used to
create a diagram of the customer? organization? - divisions - location(s) /
geographical information - reporting chains
A. business units
B. e-mail addresses
C. Help Desk functions
D. whether or not the customer has a dedicated Operations Center
Answer: A
QUESTION NO: 2
Which document describes what needs to be addressed in a security solution for a
customer?
A. Installation History
B. Design Specification
C. Interface Specification
D. Requirements Specification
Answer: D
QUESTION NO: 3
How can a user bypass the strong authentication mechanism provided by IBM Tivoli
Access Manager for Enterprise Single Sign-On?
QUESTION NO: 4
Which three actions should be taken to improve the performance and availability of
IBM Tivoli Directory Server? (Choose three.)
QUESTION NO: 6
A customer wants to consolidate authentication information for all existing
products, such as IBM WebSphere, IBM Tivoli Access Manager, and IBM Tivoli Identity
Manager with a single product. Which product can be an authentication information
server for the customer?
A. IBM DB2
B. Tivoli Data Warehouse
C. IBM Tivoli Directory Server
D. IBM Tivoli Directory Integrator
Answer: C
QUESTION NO: 7
With which other IBM product does IBM Tivoli Key Lifecycle Manager work seamlessly?
QUESTION NO: 8
After meeting with the customer, the following list concerning security is
compiled: - customer business requirements- customer? business requirements -
immediate business/security needs - customer long-term business/security vision-
customer? long-term business/security vision - customer stated security
requirements- customer? stated security requirements What should also be included
in this list?
QUESTION NO: 9
Which two types of information are needed when creating a document on a customer's
IT and business organizational structure? (Choose two.)
QUESTION NO: 11
What are the two ways of configuring federation with IBM Tivoli Federated Identity
Manager? (Choose two.)
A. LTPA
B. Browser Post
C. Shared Cookies
D. Credential Cache
E. Artifact Resolution
Answer: B,E
QUESTION NO: 12
Which three IBM products have achieved Common Criteria Evaluation Assurance Level
certification as of July 2009? (Choose three.)
QUESTION NO: 13
After a number of interviews with various customer personnel, the term ser
productivity ?logon and transaction experience?came up as a businessAfter a number
of interviews with various customer personnel, the term ?ser productivity ?logon
and transaction experience?came up as a business process. Other than the word ogon?
there is not much in the way of additional description that gives insight into how
that process relates to security.process. Other than the word ?ogon? there is not
much in the way of additional description that gives insight into how that process
relates to security. What is a good list of security (and related) elements that
relate most closely to the process as identified above?
A. firewall, filtering router, and intrusion detection
B. SSL acceleration, content filtering, and pop-up blockers
C. single sign-on, personalization, scalability, and availability
D. identification, public-key infrastructure, and multi-factor authentication
Answer: C
QUESTION NO: 14
What are three featured capabilities of IBM Tivoli Security Policy Manager? (Choose
three.)
QUESTION NO: 15
Which three pieces of information should be given to a customer to help them
prepare for the long-range vision and the future direction of their security
solutions? (Choose three.)
QUESTION NO: 16
Which technology needs to be available when managing a nonstandard database with an
IBM Tivoli Identity Manager adapter?
A. SQL
B. JDBC
C. ODBC
D. TCP/IP
Answer: B
QUESTION NO: 17
Which skills are necessary to implement IBM Tivoli Directory Integrator to
synchronize data between different registries and databases?
QUESTION NO: 18
A customer has the following requirements: a. System Administrators are allowed to
log in to AIX servers any time of the day. b. Database administrators are only
allowed to log in to AIX servers between 6:00 a.m. and 6:00 p.m. local time. Which
IBM Tivoli product is capable of enforcing login policies that will satisfy the
above requirements?
QUESTION NO: 19
Which two requirements are addressed by implementing IBM Tivoli Identity Manager?
(Choose two.)
A. authentication of users
B. enterprise single sign-on
C. role-based account provisioning
D. automation of account approvals
E. system-wide security compliance reporting
Answer: C,D
QUESTION NO: 20
Which encryption method is used by IBM Tivoli Access Manager (Tivoli Access
Manager) for e-business when Tivoli Access Manager is configured with the FIPS mode
enabled?
A. SSLv3
B. TLSv1
C. WPAv2
D. Kerberos
Answer: B
QUESTION NO: 21
Which information should a customer baseline document include?Which information
should a customer? baseline document include?
QUESTION NO: 22
What is the recommended approach to map custom attributes in the HR Feed to the new
IBM Tivoli Identity Manager (Tivoli Identity Manager) person attributes?
A. Create new LDAP attributes and add them to the inetOrgPerson objectclass.
B. Create new LDAP attributes and add them to the base person class(erPersonItem).
C. Map the new attributes to unused person attributes and edit the
CustomLabels.properties file to reflect new names.
D. Create a new object class, add the new attributes to it, and register it as a
person entity in Tivoli Identity Manager.
Answer: D
QUESTION NO: 23
Click the Exhibit button. The customer list of requirements includes this
exhibit.The customer? list of requirements includes this exhibit. Which security
scenario is indicated by the word nforcer?that appears several times in the
exhibit?Which security scenario is indicated by the word ?nforcer?that appears
several times in the exhibit?
A. audit
B. authorization
C. authentication
D. confidentiality
Answer: B
QUESTION NO: 24
Which two security requirements are addressed by IBM Tivoli Access Manager for e-
business? (Choose two.)
A. authorization
B. authentication
C. intrusion detection
D. password management
E. mandatory access control
Answer: A,B
QUESTION NO: 25
Which security measure most effectively addresses users?fears of privacy misuse in
a biometric technology?
QUESTION NO: 26
Which technologies are the most likely to influence a company future direction
regarding IT security?Which technologies are the most likely to influence a
company? future direction regarding IT security?
QUESTION NO: 28
What are two main functions of IBM Tivoli Security Information and Event Manager?
(Choose two.)
QUESTION NO: 29
IBM is using the Enhanced Value Based Pricing principle for the IBM Tivoli
products. What does this mean?
QUESTION NO: 30
Which statement is true about new initiative deployment?
QUESTION NO: 31
What are three benefits of deploying the IBM Tivoli Identity and Access Manager
bundle? (Choose three.)
QUESTION NO: 32
Which product best addresses these requirements: 1.Fast access to corporate
information with improvements up to 90% by automating workflows on shared and
personal workstations 2.Automation of access workflows ?application launch, single
sign-on (SSO), user switching, drive mapping, single sign-off, and more
3.Automation of walk-off security policies ?configurable screen locks, application
logout policies, graceful unlock, and more 4.Comprehensive support for HIPAA,
Sarbanes-Oxley, GLBA, California SB 1386, and Basel II with user centric access
tracking of all SSO events for audit reports
QUESTION NO: 33
Based on IBM best practices, what are three IBM Tivoli Access Manager for e-
business authentication capabilities that indicate a higher level ofBased on IBM?
best practices, what are three IBM Tivoli Access Manager for e-business
authentication capabilities that indicate a higher level of authentication
maturity? (Choose three.)
A. basic authentication
B. shared authentication
C. step-up authentication
D. forced re-authentication
E. multi-factor authentication
F. forms-based authentication
Answer: C,D,E
QUESTION NO: 34
For single sign-on (SSO), a customer has only a Web SSO solution in place. What can
be concluded in the gap analysis?
A. IBM Tivoli Directory Server does not meet FIPS encryption requirements
B. IBM Tivoli Directory Server provides single password policy enforcement
settings.
C. IBM Tivoli Directory Server supports the RCF2307 scheme but cannot be extended.
D. IBM Tivoli Directory Server can integrate Linux, SunOS, HP-UX, and AIX operating
system user authentication on a single directory server
instance.
Answer: D
QUESTION NO: 36
While reviewing the current security policies for a company, it is discovered that
a standard exists, which dictates that information access must conform to HIPAA.
Currently the customer has no automated method to verify adherence to this policy.
Which IBM Tivoli security solution is recommended to provide the customer with the
ability to report on exceptions to this policy?
QUESTION NO: 37
A current IBM Tivoli security customer is highly satisfied with their current IBM
Tivoli Identity Manager (Tivoli Identity Manager) and IBM Tivoli Access Manager
(Tivoli Access Manager) implementations. The customer has benefited greatly from
their user management and provisioning, authentication, authorization and Web
single sign-on processes now in place. The customer sees the value of Web services
and wants to leverage their business partnerships to greatly expand their online
services, for a relatively small investment. They are expecting that their existing
Tivoli Identity Manager and Tivoli Access Manager investments can simply be
stretched to include these business-to-business (B2B) flows. IBM Tivoli Federated
Identity Manager should be added to this scenario to address which security
requirement?
QUESTION NO: 38
Which customer solution strategy is addressed by IBM Tivoli Identity Manager?
QUESTION NO: 39
In order to correctly understand the data protection requirements, which two groups
of people must be interviewed? (Choose two.)
A. all managers
B. IT department personnel
C. Business Unit management
D. Legal department personnel
E. Human Resource department
Answer: C,D
QUESTION NO: 40
Which programming languages need to be available to manage an unsupported operating
system with an IBM Tivoli Identity Manager adapter?
A. Java and C
B. Cobol and REXX
C. C++ and Javascript
D. Visual Basic and C#
Answer: A
QUESTION NO: 41
Which three identity stores are supported by IBM Tivoli zSecure Audit? (Choose
three.)
A. X.500
B. LDAP
C. ACF2
D. RACF
E. TopSecret
F. ActiveDirectory
Answer: C,D,E
QUESTION NO: 42
A client wants to use CAPTCHA authentication for their Web application access over
the internet. Which WebSEAL authentication method will meet the needs of the
client?
A. Step-Up Authentication
B. External Authentication
C. HTTP header Authentication
D. X.509 Client Certificate Authentication
Answer: B
QUESTION NO: 43
During the analysis of a failed audit report, a number of special attention events
indicating non-compliance by several employees have been revealed. These employees
have been accessing online versions of documents that they otherwise are not
allowed to access. Which IBM Tivoli security product will be recommended to address
this problem?
QUESTION NO: 44
Which statement is true about interoperability?
QUESTION NO: 45
What is considered the lowest maturity level in identity management maturity?
A. password management
B. access rights accountability
C. provisioning approval and process automation
D. connectors to access controlled systems (one tool managing multiple systems)
Answer: D
QUESTION NO: 46
Which statement is true about IBM Tivoli Security Compliance Manager (Tivoli
Security Compliance Manager)?
QUESTION NO: 47
What are two main functions of IBM Tivoli Compliance Insight Manager? (Choose two.)
A. Monitor Compliancy
B. IP-based event filtering
C. Real time event processing
D. Consistent Log management
E. Change Management reporting
Answer: A,D
QUESTION NO: 48
A current IBM Tivoli Access Manager for e-business customer wants to add the
ability to provide services to a third-party company employees. TheA current IBM
Tivoli Access Manager for e-business customer wants to add the ability to provide
services to a third-party company? employees. The customer does not want to create
accounts and manage passwords for the third-party company employees.customer does
not want to create accounts and manage passwords for the third-party company?
employees. How can the customer achieve this?
QUESTION NO: 49
A customer wants an early warning system which identifies security vulnerabilities
and security policy violations. Which product should the customer use? AIBM Tivoli
NetView
QUESTION NO: 50
Which option best classifies IBM Tivoli Security Operations Manager?
QUESTION NO: 51
What are two benefits of IBM Tivoli Directory Integrator? (Choose two.)
A. It provides a simple interface for improving Active Directory content and making
this content available for other uses.
B. It performs real time synchronization between identity data sources to establish
an authoritative identity data infrastructure.
C. It provides a framework for rapid integration development and relieves what the
customer typically has to hand-code from scratch.
D. It makes building data flow fast and easy, which eliminates the need for
traditional design and implementation decisions inherent in other
productions.
E. It provides a framework that enables a company to integrate multiple security
software into existing structures, as opposed to forcing the
company to develop new IT infrastructure.
Answer: B,C
QUESTION NO: 52
The solution advisor is analyzing customer business processes to determine security
requirements. Under the heading eb TransactionsmployeesThe solution advisor is
analyzing customer business processes to determine security requirements. Under the
heading ?eb Transactions?mployees and Customers,?is a business requirement
described as nhance User Productivity.?and Customers,?is a business requirement
described as ?nhance User Productivity. What is the corresponding security
requirement?
A. audit
B. authorization
C. single sign-on
D. user provisioning
Answer: C
QUESTION NO: 53
What is an accurate description of a highly mature company, in the area of
authorization?
A. They are highly mature, because they use a single authorization engine, shared
by many applications.
B. Their approach to authorization is in a leadership position, because they
address WS-Provisioning, SAML and Liberty.
C. They are addressing authorization optimally because they are handling
authorization within the application, and it is best to address
authorization decisions close to the decision point.
D. Their approach to authorization is highly secure and therefore highly mature,
because their infrastructure uses many different authorization
standards and thus is least likely to be penetrated.
Answer: A
QUESTION NO: 54
What are three main functionalities of the IBM Tivoli zSecure Admin product ?
(Choose three.)
QUESTION NO: 55
What is an indication that the deployment of IBM Tivoli Identity Manager have
reached its maturity phase?
A. All significant applications are covered.
B. Password synchronization is implemented.
C. Role-based access control is fully implemented.
D. Full workflow for account management is implemented and the organizational tree
is established.
Answer: C