IBM Security Identity Manager V6.0 Implementation v7.1 (C2150-197)

Page:    1 / 12   
Total 174 questions

What is the purpose of creating a custom Person entity?

  • A. To rename the user records in the IBM Security Identity Manager (ISIM).
  • B. To include enterprise-specific attributes associated with a person.
  • C. To separate Person from Business Partner Person.
  • D. To protect the privacy of the person.

Answer : B

When creating custom entity definitions based on a new customer specific object class, which TWO types of new entities can be registered in ISIM?

  • A. Organization and Business Partner Organization entities
  • B. Person entities and Business Person entities
  • C. Access and SystemUser entities
  • D. Account and Service entities
  • E. Role and Group entities

Answer : B,D

To determine which labels or text can be customized in the Self Service User Interface which of the following files can be used?

  • A.
  • B.
  • C.
  • D.

Answer : B

Which option does the Service Connection mode attribute on the service form specify?

  • A. Whether ISIM will capture password changes made directly on the end point or not.
  • B. Whether the service will function as a Manual service or Automated service.
  • C. Whether the adapter will use SSL to communicate with the end point or not.
  • D. Whether service will use HTTP or HTTPS to connect with the adapter.

Answer : D

A functioning IBM Security Identity Manager (ISIM) test environment has been copied over to a production ISIM environment. How would one validate that production ISIM can successfully communicate with production managed resources?

  • A. Perform a test connection from ISIM using the Test Connection within the Service form.
  • B. Login to the managed resource with a user's credentials.
  • C. Login to the managed resource with a service account.
  • D. Check the ibmslapd.log in ISIM for connection errors.

Answer : A

To recertify accounts and groups with a recertification policy, which target type must be chosen?

  • A. Accounts and Entitlements
  • B. Accesses
  • C. Accounts
  • D. Users

Answer : A


After applying the latest fixpack to IBM Security Identity Manager (ISIM) where would one go to validate ISIM is running at the latest fixpack level?

  • A. About page in the ISIM Administrative Console UI
  • B. ISIM directory server logs
  • C. ISIM configuration utility
  • D. ISIM database logs

Answer : C

When 'Enable store forwarding' is checked in the ISIM Post Office configuration, where is
"Group Email Topic" specified?

  • A. In the XHTML section of workflow notification templates
  • B. In the subject of the aggregate message template
  • C. In the workflow designer
  • D. In

Answer : C

Reference: http://www- ing/tsk/tsk_ic_postoffice_enable.htm?lang=en (see the procedure)

Which is considered as low-priority service to be deployed in IBM Security Identity

  • A. Service with frequent user changes.
  • B. Service requiring compliance audit.
  • C. Service with small user population.
  • D. Service with large user population.

Answer : C

The identity feed for IBM Security Identity Manager (ISIM) utilizes IBM Tivoli Directory
Integrator (ITDI) and the connector in the assembly line that communicates to ISIM has been setup in Update mode.
Which of the following would be accurate if the identity coming from ITDI was NOT in ISIM?

  • A. The ITDI assembly line would error because the assembly line was configured in update mode so adding new identities would not be supported.
  • B. A ITDI connector in Update mode would only support updating an existing identity so adding identities would not be a possibility.
  • C. The identity entry would be treated as an add as long as there was not an Override Add assembly line hook enabled.
  • D. The identity entry would be skipped since the identity did not already exist in ISIM.

Answer : B

To configure logging to diagnose an issue with the WinAD64 adapter, which of the following must be performed using AgentCfg?

  • A. Enable activity logging
  • B. Enable thread logging
  • C. Enable detail logging
  • D. Enable base logging

Answer : D

What is the default location for the Tivoli Common Reporting Pack?

  • A. <isim home>/reporting
  • B. <isim home>/jdbc/lib/data
  • C. <isim home>/opt/reporting
  • D. <isim home>/extensions/6.0/tcr

Answer : D


A customer requires that users should NOT be able to circumvent answering challenge response questions when they login to the ISIM Self Service Console, and also wants the responses to challenges to appear masked (such as passwords) instead of appearing in plain text. How can this be achieved?

  • A. and in file.
  • B. Set enrole.password.challengeResponse.bypassChallengeResponse=false in file and select checkbox for Enable Password Editing under Security Settings.
  • C. Set enrole.password.challengeResponse.bypassChallengeResponse=false and enrole.password.challengeResponse.showAnswers=false in file.
  • D. Set ui.challengeResponse.bypassChallengeResponse=faise and ui.challengeResponse.showAnswers=false in file.

Answer : C

The number of items displayed in the IBM Security Identity Manager (ISIM) Administrator
Console has been updated to a value of 100 in the test environment. What are the two options below to update the Production environment? (Choose two)

  • A. Update the value using the system configuration tool. (runConfig)
  • B. Manually update the values in the file
  • C. Update the value using the import/export feature in ISIM.
  • D. Manually update the value in the file.
  • E. Manually update the value in the file.

Answer : A,B

Which WebSphere trust association interceptor needs to be configured for single sign-on setup between IBM Security Identity Manager and IBM Security Access Manager?

  • A. Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO)
  • B. Tivoli Access Manager Trust Association Interceptor (TAI++)
  • C. IBM Security Identity Manager interceptor (ISIMi)
  • D. OAuth Trust Association Interceptor

Answer : D

Page:    1 / 12   
Total 174 questions