Vous êtes sur la page 1sur 11

Exam Title

: IBM 000-877 : IBM Tivoli 877 IBM Identity Manager V4.6 Exam

Version : R6.1

www.Prepking.com

1. Which information is stored in a certificate used to secure the connection between the IBM Tivoli Identity Manager Server and its adapters? A. certificate expire date B. certificate encryption type C. certificate requesters name D. certificate encryption strength Answer: A 2. You have a standard IBM Tivoli Identity Manager (ITIM) Server installation using WebSphere. Which two log files found under the ../WebSphere/AppServer/logs/server1 directory are useful in troubleshooting an ITIM application problem? (Choose two.) A. itim.log B. WAS.log C. SystemErr.log D. itim_server.log E. SystemOut.log Answer: CE 3. Which two of the following would be relevant to the planning of IBM Tivoli Identity Manager entity lifecycle automation? (Choose two.) A. Who are the owners of each service? B. How many accounts are there for each service? C. What is the frequency that lifecycle rules must be checked? D. How often must account passwords be changed in the company? E. How are organizational role affiliations determined based on a person data attributes? Answer: CD 4. Where are the IBM Tivoli Identity Manager V4.6 trace and First Failure Data Capture (FFDC) message logs located on the Windows platform by default? A. %WAS_HOME%\AppServer\logs B. C:\Program Files\tivoli\common\CTGIM C. C:\Program Files\IBM\tivoli\common\CTGIM D. C:\Documents and Settings\<username>\CTGIM Answer: C 5. When Migrating IBM Tivoli Identity Manager (ITIM) from a test to a production environment, which task is valid? A. Export all the LDAP user accounts from test to production B. Use the Import/Export feature to migrate the ITIM configuration

www.Prepking.com

C. Assign the ITIM test server the same hostname as the production server D. Copy all the IBM Directory Server data files to the ITIM production system Answer: B 6. You have a successful IBM Tivoli Identity Manager (ITIM) Server installation on a UNIX platform. Where do you find the Tivoli_Identity_Manager_InstallLog.log? A. /root B. /usr/itim/logs C. $ITIM_HOME D. /var/ibm/tivoli/common Answer: C 7. Which list shows all the entitlement workflow design elements in IBM Tivoli Identity Manager? A. Approval, Loop, Subprocess, RFI, Operation, Work Order, Script, Extension B. Approval, Loop, Subprocess, RFI, Operation, Event Notification, Script, Extension C. Approval, Denial, Loop, Subprocess, RFI, Operation, Work Order, Script, Extension D. Approval, Denial, Suspend, Subprocess, RFI, Operation, Work Order, Script, Extension Answer: A 8. Which Provisioning Policy priority takes precedence? A. Priority = 10 B. Priority = 100 C. Priority = 100000 D. Priority = 100001 Answer: A 9. Which three of the following are valid inline variables (special keywords) may be used as part of dynamic notification template content? (Choose three.) A. $TITLE B. $VERSION C. $LOGIN_ALT D. $TENANT_ID E. $SUPERVISOR F. $EMAIL_ADDRESS Answer: ACD 10. In troubleshooting an ITIM problem on UNIX, you wish to display the contents of one of ITIM logfiles in text format using a matching regular expression ?to select all records between the period 18:00:00 and 18:59:00 ?what command would be a valid choice to use? A. viewer.sh elect default where Time match 8:[0-5][0-9]:[0-5][0-9]. text ffdc.log

www.Prepking.com

B. viewer.sh elect default where Time match 8:[0-5][0-9]:[0-5][0-9]. text trace.log C. logviewer.sh elect default where Time match 8:[0-5][0-9]:[0-5][0-9]. text trace.log D. logviewer.sh elect default where Time match 8:[0-5][0-9]:[0-5][0-9]. text SystemOut.log Answer: B 11. What are a couple of steps that should be done prior to executing an IBM Tivoli Identity Manager (ITIM) fixpack installation on a UNIX ITIM Server? (Choose two.) A. stop all of the adapters B. upgrade the LDAP schema C. back up all ITIM data contained in LDAP Server D. export workflows and provisioning policies to ldif files E. back up $ITIM_HOME/data directory and $WAS_HOME/config Answer: CE 12. Which actions need to be taken when deploying adapters? A. server configuration, adapter capability, certification authority setup B. adapter acquisition, adapter installation, certificate acquisition, adapter configuration C. adapter configuration, adapter profile installation, ITIM service selection policy setup D. adapter acquisition, server configuration, adapter access policy, IBM Tivoli Identity Manager (ITIM) account setup Answer: B 13. Which information is relevant to the creation of an Identity Policy? A. The policy that currently generate user login names. B. The authoritative source takes a data feed from Microsoft Active Directory. C. Authoritative source provides more attributes than the entity design document. D. The organizational structure contained in the authoritative source has a deeper hierarchy. Answer: A 14. You have defined a variable $reqApprovalCue as Cue Text in your workflow approval node. Where do you configure the Cue Text definition, so it appears in the To Do item request sent to a workflow participant? A. Labels.Properties B. ActionText,Properties C. CustomLabels.Properties D. Under Workflow Properties. Check se Cue Text as Action Text Answer: C 15. Which file contains the property that specifies the IBM Tivoli Identity Manager (ITIM) URL included in the email notification from the ITIM? A. ui.properties

www.Prepking.com

B. enRole.properties C. enRoleModel.xml D. enRoleMail.properties Answer: D 16. What is used to create a Lifecycle Management design? (Choose two.) A. Human Resources feed design document B. password creation policy and procedures C. Organizational Structure design document D. business procedures and procedure for entity creation E. account creation, modification, and deletion process specification Answer: DE 17. Which database information is required during the installation of IBM Tivoli Identity Manager using an Oracle or SQL Server? A. database name, database admin ID and password, database user ID B. database admin ID and password, database user ID, host name or IP address C. database name, database admin ID and password, database user ID and password, IP address and port number D. database name, database admin ID and password, port number, LDAP server name, database host name or IP address Answer: C 18. Which information is relevant to an IBM Tivoli Identity Manager delegated administration model? A. group membership, ACI, organizational roles B. organizational structure, group membership, role definition C. role definition, organizational roles, challenge response pass phrase D. password rules, challenge response pass phrase, group membership Answer: B 19. What are the two possible results of upgrading an adapter profile on the IBM Tivoli Identity Manager (ITIM) Server? (Choose two). A. The adapter schema is updated. B. The adapter certificate is updated. C. The adapter Service Name is modified. D. The adapter reconciliation schedule is modified. E. The adapter forms are updated in the ITIM LDAP. Answer: AE 20. Where does the 4.6 logging method Enrole.log(category, message) log its messages?

www.Prepking.com

A. itim.log B. ffdc.log C. msg.log D. SystemOut.log Answer: C 21. What is the default duration for a reconciliation process before it times out? A. 60 minutes B. 100 minutes C. 600 minutes D. 1000 minutes Answer: C 22. Which definition (Rule) will return all the persons in the customerPerson objectclass for a dynamic organizational role? A. return customerPerson B. objectclass==customerPerson C. (objectclass=customerPerson) D. select * from person where objectclass = 'customerPerson' Answer: C 23. What is the response from a test executed from an Adapter Service form when the adapter is not currently running? A. CTGIM<error code>: The adapter returned an error status for a

com.ibm.daml.jndi.DAMLContext.REQUEST_TYPE.request. B. A communication error occurred: A remote host refused an attempted connect operation. C. An error occurred processing the request: A connection with a remote socket was reset by that socket. D. CTGIM<error code> An IO exception occurred while sending a request. Error: CTGIM<error code>: An error occurred while connecting to an adapter. The following error occurred. Error: Connection refused. Answer: D 24. What improves IBM Tivoli Identity Manager (ITIM) Server performance? (Choose two.) A. increasing the maxAddthreadcount B. LDAP and database indices or optimizers C. adding Adapter Profiles to the ITIM Server D. adding a local queue to the MQ Series Queue Manager E. Application Server, database, and LDAP memory settings Answer: BE 25. Which three are valid membership types of a Provisioning Policy? (Choose three.)

www.Prepking.com

A. All(*) B. None C. Others D. Sponsor E. ITIM group F. Organization role Answer: ACF 26. Where is the ui.properties file located given the default IBM Tivoli Identity Manager (ITIM) installation? A. %ITIM_HOME%\data\ directory B. %ITIM_HOME%\config\ directory C. %ITIM_HOME%\interface\ directory D. %ITIM_HOME%\properties\ directory Answer: A 27. Which two user classes can be applied by the Identity Policies in the default IBM Tivoli Identity Manager (ITIM) setup? (Choose two.) A. Person B. ePerson C. BPPerson D. ITIM Person E. inetOrgPerson Answer: AC 28. How many draft policies can you maintain per Provisioning policy? A. one B. two C. unlimited D. depends on service type Answer: A 29. Which information is relevant when formulating a backup and restore schedule? A. Identity design, Security design, Roles design B. reconciliation window, batch identity feed window, adapters with local state containing user information C. database tablespace distribution, LDAP Directory Information Tree (DIT) structure, adapter listener port D. number of custom person entities, organization chart structure, Provisioning Policies with attached workflows Answer: A 30. Which area contains relevant information for the creation of Roles?

www.Prepking.com

A. ACI Attributes B. Form Attributes C. Entity Attributes D. Account Attributes Answer: C 31. What steps are required to ensure Compliance Alert email notifications use the Post Office feature? A. anable Store Forwarding Set Collection Interval, check anabled on Compliance Notification Template form. B. anable Store Forwarding enRole.properties. C. anable Store Forwarding is checked, Set Collection Interval only - Compliance emails are then automatically aggregated by Process ID. D. anable Store Forwarding is checked, Set Collection Interval, roup Email Topic is checked in Alert definition form of Policy Enforcement action. Answer: C 32. What is the correct sequence of the high level steps required to install and configure an adapter? A. install adapter, configure adapter settings and install adapter certificate B. install adapter, define service, install server profile and configure adapter settings C. install adapter, configure adapter settings, define service and install adapter certificate D. install adapter, install server profile, configure adapter settings, install adapter certificate, and define service Answer: D 33. Which tool is used to edit the most commonly used properties for the IBM Tivoli Identity Manager Server? A. Config.exe B. text editor db C. runConfig.exe D. LDAP browser Answer: C 34. Which two LDAP Directory Servers does IBM Tivoli Identity Manager V4.6 support? (Choose two.) A. IBM Directory Server B. Novell Directory Server C. Oracle Internet Directory D. Microsoft Active Directory E. Sun One Directory Server Set Collection Interval, check enrole.PostOfficeEnable=TRUE setting in

www.Prepking.com

Answer: AE 35. What is the focus of Identity Policies? A. user id generation B. user id modification C. service name algorithm D. organizational name algorithm Answer: A 36. Which information is relevant to the design of a Password Policy? A. password generation algorithm B. the challenge response pass phrase length C. the least common denominator of password rule differences for all end systems D. the greatest common denominator of password rule differences for all end systems Answer: C 37. Which of the following is true in regards to compliance enforcement processing? A. compliant changes that Grant access can trigger a compliance alert B. non-compliant changes that Grant access can trigger a compliance alert C. non-compliant changes that Revoke access can trigger a compliance alert D. non-compliant changes that Revoke access can not trigger a compliance alert Answer: C 38. When using a DSML Identity Feed, where is the organization placement rule defined? A. in the DSML file B. on the DSML Identity Feed service form C. as an attribute on each person's DSML entry D. in the reconciliation schedule for the DSML Identity Feed Answer: B 39. Which two rules apply when two or more ACIs conflict? (Choose two.) A. An explicit denial by one ACI overrides an explicit grant by other ACIs. B. An implied denial by one ACI overrides an explicit grant by other ACIs. C. An explicit grant by one ACI overrides an implied denial by other ACIs. D. An implied grant by one ACI overrides an explicit denial by other ACIs. E. An explicit grant by an ACI at the Organization level overrides an explicit denial by other ACIs in the subtree. Answer: AC 40. Click the Exhibit button. Which password is valid based upon the rules stated in the exhibit?

www.Prepking.com

A. fa1thHill B. PBandjelly C. Stephan1e D. P@ssw0rd Answer: C 41. Which information found in the IBM Tivoli Identity Manager (ITIM) Trace log file is useful in troubleshooting a problem? (Choose three.) A. log text B. ITIM version C. Message ID D. maximum cache size E. time event/error occurred F. current trace specification model Answer: ACE 42. Which two are valid lost password retrieval options? (Choose two.) A. Direct Entry B. Reset Password C. Account Disabled D. Manager Notification E. Administrator Notification

www.Prepking.com

100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/000-877.htm

Vous aimerez peut-être aussi