[Free] 2018(Jan) Dumps4cert Testking IBM C2150-197 Dumps with VCE and PDF 111-120

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan IBM Official New Released C2150-197
100% Free Download! 100% Pass Guaranteed!

IBM Security Identity Manager V6.0 Implementation

Question No: 111

You are creating a new workorder node. Post Office message aggregation is enabled in the system. On the notification tab of the workorder you check #39;Use Group Email Topic#39;.

If a value for #39;Group Email Topic#39; is left blank, what will be used for Group Email Topic?

  1. ProcessID of the transaction which includes the workorder

  2. Resolved value of quot;key=pending_workitem_subjectquot;

  3. Value of quot;return PostOffice.getEmailAddress();quot;

  4. Activity ID of the workorder

Answer: A

Question No: 112

Which TWO of the following functional areas of the architecture would be described in the applications layer of a systems architecture?

  1. Workflow management

  2. Policy management

  3. Organizational tree

  4. Email notification

  5. Forms design

Answer: B,C

Question No: 113

Which DB2 command provides information about the execution state of the database?

  1. Get database manager configuration

  2. Get database configuration

  3. Get monitor switches

  4. Get snapshot

Answer: C

Question No: 114

When gathering requirements for a Roles Administration design, which would static and dynamic roles be associated?

  1. In the design of the Organization tree

  2. In the design of Password policies

  3. In the design of a LDAP Adapter

  4. In the design of a work flow

Answer: A

Question No: 115

When gathering requirements for work flows, which business process might require a manager approval?

  1. When a business process is defined for an application owner to be notified on account deletions

  2. When a business process is defined to approve last name change due to marriage

  3. When a business process is defined for an employee vacation request approval

  4. When a business process is defined for contractor address change

Answer: A

Question No: 116

A given IBM Security Identity Manager (ISIM) environment architecture consists of Websphere Application Server (WAS), IBM Tivoli Directory Server (ITDS), and DB2forthe ISIM database. The monitoring solution calls for setting up log monitors.

Given the ISIM architecture above which statement below describes which logs should be monitored?

  1. WASSystemOut.log, ITDSibmslapd.log, DB2 db2diag.log, ISIMtrace.log, and Active Directory Adapter WinADAgent.log

  2. Active DirectoryAdapterWinADAgent.log, DB2 db2diag.log, WAS SystemOut.log, and ISIM trace.log

  3. WAS SystemOut.log, ITDS ibmslapd.log, DB2 db2diag.log, and ISIMtrace.log

  4. ISIM message.log, ITDS error_messages.log, and DB2 system.out log

Answer: A

Question No: 117

What components in a IBM Security Identity Manager (ISIM) environment can be configured for SSL communication?

  1. HTTP Server. Websphere Application Server. Directory Server, Tivoli Directory Integrator, and Adapters

  2. HTTP Server and Adapters

  3. Tivoli Directory Integrator. HTTP Server, and Adapters

  4. HTTP Server and Tivoli Directory Server

Answer: C

Question No: 118

When applying an IBM Security Identity Manager (ISIM) fixpack in a clustered ISIM installation which statement is correct?

  1. Websphere application and messaging clusters must be stopped prior to installing the ISIM fixpack.

  2. Websphere application and messaging clusters must be running prior to installing the ISIM fixpack.

  3. All Websphere processes must be stopped prior to installing the ISIM fixpack.

  4. All Websphere processes must be running prior to installing the ISIM fixpack.

Answer: A

Question No: 119

An adapter is a software component that provides an interface between a managed resource and IBM Security Identity Manager. Which two statements are true? (Choose two)

  1. An agent less adapter can be on a remote system from the managed system, in order to administer accounts.

  2. An agent-based adapter must be on the managed resource, in order to administer accounts.

  3. All adapters provided by IBM are implemented using IBM Directory Integrator technology.

  4. IBM provides Adapters for all managed systems and all can be customized.

  5. Custom adapters are required to go through a stringent review process.

Answer: A,B

Reference: https://publib.boulder.ibm.com/infocenter/tivihelp/v5r1/topic/com.ibm.itim.infocenter.doc/pdf/ imx_oview.pdf (page 18)

Question No: 120

A functioning IBM Security Identity Manager (ISIM) test environment has been copied over to a production ISIM environment. Which of the following would validate the application is up and functioning correctly?

  1. Login to the application and perform a password change and verify the request is scheduled and completes successfully.

  2. Login to the WebSphere Administrative Console and validate the status of the ISIM application.

  3. Confirm the database instance for ISIM is running.

  4. Confirm the LDAP instance for ISIM is running.

Answer: B

100% Dumps4cert Free Download!
Download Free Demo:C2150-197 Demo PDF
100% Dumps4cert Free Guaranteed!
C2150-197 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.