IBM 000-889 Fundamentals of Ent Solutions Using IBM Tivoli Security 2007 Download Full Version : http://killexams.com/pass4sure/exam-detail/000-889
access controls D. secure authentication between the users Biometric information and a central database over a SSL protocol QUESTION: 84 A customer wants to utilize a self-care application so users can maintain and reset their own password accounts, and automatically provision the change across all enterprise systems. Which security application will help accomplish this task? A. IBM Tivoli Identity Manager B. IBM Tivoli Federated Identity Manager C. IBM Tivoli Access Manager for Operating Systems D. IBM Tivoli Access Manager for Business Integration QUESTION: 85 Which is the best strategy for implementing security solutions in an enterprise? A. always buy security products and solutions from a single vendor B. for optimal performance, do not disturb security solutions once they are deployed C. use only IBM Tivoli security products as they satisfy all the security requirements of any enterprise D. if necessary, integrate third-party security products with IBM solutions to get an end-to-end security solution Answer: D QUESTION: 86 You are documenting a recommended future direction for a current customer of IBM Tivoli identity, access, risk and compliance solutions. The customer has implemented IBM Tivoli Identity Manager, IBM Tivoli Access Manager for e- business, IBM Tivoli Risk Manager, and IBM Tivoli Security Compliance Manager. This customer has solved several security exposures and realizes the efficiencies and efficacy of integrated, enterprise-level security within their enterprise. It is clear that a natural evolution for this customer is to consider many of the same security services across enterprise boundaries. Which three statements are true about the security of cross-enterprise transactions? (Choose three.) 29
A. IBM Tivoli Federated Identity Manager is an appropriate investment for this customer. B. The key technology in any cross-enterprise configuration is enterprise content filtering technology. C. Any recommended approach must be based on Worldwide Federated Data Interchange (WWFDI) standards. D. They can cover the cross-enterprise case simply by using cross-enterprise options for the IBM Tivoli security products they already have. E. The preferred route for addressing secure cross-enterprise (federated) transactions is to base your approach on emerging Web services architecture and standards. F. A service-oriented architecture approach allows significant business expansion with relatively minor investment, and securing this architecture in a Web services standards-based fashion is critical to success., E, F QUESTION: 87 Which statement is true about interoperability? A. Liberty Alliance will provide SAML V2.0 OASIS Standard interoperability. B. Microsoft and IBM will be the only companies providing SAML V2.0 interoperability for their products. C. Liberty Alliance standards will be the de-facto standards for Web services interoperability in the future. D. Microsoft identity management products have successfully undergone Liberty Alliance Liberty ID-FF V1.2 interoperability tests. QUESTION: 88 A current IBM Tivoli Access Manager for e-business customer wants to add the ability to provide services to a third-party companys employees. The customer does not want to create accounts and manage passwords for the third-party companys employees. What should you do to help the customer achieve this? A. implement a process for the customer to manually create the accounts B. use IBM Directory Integrator to synchronize the accounts between the two companies C. install IBM Tivoli Identity Manager on the third-party company side, and provision accounts back to the customer user registry. D. use IBM Tivoli Federated Identity Manager on the customer side as a service 30
provider, and use a guest account for all the companys employees when they access the site Answer: D QUESTION: 89 IBM Tivoli provides the only integrated solution that addresses the four key areas of identity management: Identity lifecycle management (user self-care, enrollment, and provisioning); Identity control (access and privacy control, single sign-on, and auditing); Identity foundation (directory, directory integration, and workflow); and which one of the following? A. Identity creation (how the Identity itself is created) B. Identity gestation (development of how an Identity is generated) C. Identity deletion (process which outline when/how a user is removed from the environment) D. Identity federation (sharing user authentication and attribute information between trusted Web services applications) Answer: D QUESTION: 90 Which fundamental skills are needed to successfully write flexible IBM Tivoli Federated Identity Manager mapping rules? A. XSL and Java B. Java and LDAP C. HTML, Java and LDAP D. HTML and JavaScript QUESTION: 91 Which two web sites contain information about solutions and examples of IBM Tivoli product implementations? (Choose two.) A. IBM RedBooks web site B. IBM Tivoli Support web site C. IBM Global Campus web site D. IBM Global Services web site E. IBM DevelopersWorks web site 31
, E QUESTION: 92 What should customers do to be aware of recent changes and enhancements to the Tivoli products they use? (Choose two.) A. open PMRs frequently B. access product web site C. request updated documentation from IBM D. participate in Support Technical Exchange seminars E. interact with other customers using the same product Answer: B, D QUESTION: 93 What is the benefit of using Tivoli Access Manager for Enterprise Single Sign- On? A. does not require scripting and does not replace the Windows GINA B. provides support for both Linux and UNIX and follows the Kerberos standard C. 100% Java implementation and does not add a directory to your environment D. provides easier manageability of proxy enforcement points and replication of policy to enforcement points QUESTION: 94 hat is an indication that the deployment of Tivoli Identity Manager has reached its maturity phase? A. All significant applications are covered. B. Password synchronization is implemented. C. Role-based access control is fully implemented. D. Full workflow for account management is implemented and the organizational tree is established. Answer: C QUESTION: 95 The Chief Information Officer of a company requests a solution to develop reports 32
showing audit trail information about who accessed an individuals personally identifiable information (PII), and for what purpose. What best provides this solution? A. Privacy Management B. Federated Identity Management C. IBM Tivoli Access Manager for e-business D. IBM Tivoli Access Manager for Operating Systems QUESTION: 96 A client has the following business requirements: - Reduce the cost of provisioning users onto systems across the enterprise - Provide single-sign-on across their web applications - Provide for cross-corporate, single-sign-on access between them and their Human Resources benefit provider, via their portal Which IBM Tivoli products would provide the best solution? A. IBM Tivoli Access Manager for e-business, IBM Tivoli Identity Manager, IBM Tivoli Federated Identity Manager B. IBM Tivoli Access Manager for e-business, IBM Tivoli Privacy Manager, IBM Tivoli Federated Identity Manager C. IBM Tivoli Access Manager for e-business, IBM Tivoli Directory Integrator, IBM Tivoli Federated Identity Manager D. IBM Tivoli Access Manager for Operating Systems, IBM Tivoli Identity Manager, IBM Tivoli Federated Identity Manager 33
For More exams visit http://killexams.com Kill your exam at First Attempt...Guaranteed!