[Free] 2018(Jan) Dumps4cert Testking IBM C2150-197 Dumps with VCE and PDF 11-20

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan IBM Official New Released C2150-197
100% Free Download! 100% Pass Guaranteed!

IBM Security Identity Manager V6.0 Implementation

Question No: 11

Aggregation of new password emails through the Post Office is a requirement. Which TWO configuration actions are required to implement this feature?

  1. Increase workflow notification reminder interval

  2. Create custom changepassword operation(s)

  3. Disable new password notification template

  4. Setenrole.workflow.notifypassword=false

  5. Disable Post Office store forwarding

Answer: C,D

Question No: 12

An identity feed design for IBM Security Identity Manager (ISIM) makes use of IBM Tivoli Directory Integrator (ITDI) on Windows. What could be used to schedule the identity feed?

  1. Use the scheduler in WebSphere Application Server.

  2. Use the scheduler in IBM HTTP Server.

  3. Use Windows Scheduler.

  4. Setup cron job.

Answer: B

Question No: 13

Which TWO Linux distributions does IBM Security Identity Manager (ISIM) version 6 support?

  1. CentOS

  2. Redhat

  3. Ubuntu

  4. Debian

  5. SUSE

Answer: A,E

Question No: 14

How should a reconciliation schedule be configured to ignore certain accounts and certain attributes for a service?

  1. Update a attribute exclusion list through the administrative console.

  2. Select what attributes to return from the available attribute list.

  3. Add a valid LDAP filter that will return the desired accounts.

  4. Add Java script to filter out accounts.

  5. Select supporting data only option.

Answer: A

Question No: 15

When gathering requirements for email notifications, which event triggers an email notification?

  1. Reconciliation request activity

  2. Compliance request activity

  3. Adapter activity

  4. Role activity

Answer: C

Question No: 16

Which two identity feed service types come with the out of the box IBM Security Identity Manager (ISIM)? (Choose two)

  1. AD Organizational Person Identity Feed (Microsoft Windows Active Directory)

  2. Generalize XML identity feed

  3. Database Identity Feed

  4. DSML Identity Feed

  5. DAML Identity Feed

Answer: B,D

Question No: 17

When planning for backup and recovery, which of these components must be covered in the planning document?

  1. LDAP database instance, WAS profiles, HTTP server profiles, TDI adapters, SSUI

    customization files, all audit and reporting data after a data synchronization. Database instance backup is not needed as the data other than the audit and reporting data is transient in nature.

  2. LDAP database instance, WAS profiles, TDI adapters, SSUI customization, and the adapter data directory with the profiles and any adapter configuration, as well as the ISIM install data subdirectory under the home directory.

  3. ISIM database instance, LDAP database instance, WAS profiles, HTTP server configuration, TDI adapter configuration, ISIM configuration files. Adapter profiles and configuration.

  4. ISIM database instance. TDI assembly line XML documents, WAS cluster profiles, adapter data directory, and the report configuration files.

Answer: B

Question No: 18

Which interface needs to be implemented to create a custom password generator?

  1. com.ibm.tivoli.itim.passwordrules.PasswordGenerator

  2. com.ibm.passwordrules.PasswordGenerator

  3. generator.ibm.tivoli.itim.CustomGenerator

  4. com.ibm.passwordrules.Rule

Answer: C

Reference: http://www- 01.ibm.com/support/knowledgecenter/SSRMWJ_6.0.0.2/com.ibm.isim.doc_6.0.0.2/admin/t sk/tsk_ic_admin_pwdrules_customgenerator.htm?lang=cs

Question No: 19

One of the customer requirements for the I SIM v6.0 implementation you are working on is to restrict self-service access to the user forms section. Where should this be configured?

  1. Cascading style sheet (CSS)

  2. Access Control Items (ACI)

  3. Properties files

  4. Image files

Answer: D

Question No: 20

When gathering requirements for workflows, which function uses workflows?

  1. Organization Tree development

  2. LDAP Adapter development

  3. Reconciliation development

  4. Lifecycle development

Answer: D

100% Dumps4cert Free Download!
Download Free Demo:C2150-197 Demo PDF
100% Dumps4cert Free Guaranteed!
C2150-197 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.