[Free] 2018(Jan) Dumps4cert Testking IBM C2150-197 Dumps with VCE and PDF 21-30

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan IBM Official New Released C2150-197
100% Free Download! 100% Pass Guaranteed!

IBM Security Identity Manager V6.0 Implementation

Question No: 21

When gathering requirements for data to be loaded, which data feed is natively supported by IBM Security Identity Manager?

  1. A data feed using Microsoft Word format

  2. A data feed using binary data format

  3. A data feed using the SOAP format

  4. A data feed using DSML format

Answer: D

Question No: 22

When gathering requirements for a Provisioning Policy design, which type of owner is used for orphan accounts?

  1. An owner with a contractor email address

  2. An account manager

  3. An account owner

  4. A group owner

Answer: B

Question No: 23

The Recycle Bin has been activated, the Recycle Bin Age is set to 62 days, and the IdapClean script is set to run daily.

When IdapClean completes, which statement is true?

  1. Some objects in the Directory Server#39;s Recycle Bin may not be deleted even if age is greater than Recycle Bin Age Limit.

  2. All objects in the Directory Server#39;s Recycle Bin will be deleted regardless of age greater than Recycle Bin Age Limit.

  3. All objects in the Directory Server#39;s Recycle Bin will be deleted if their age is greater than Recycle Bin Age Limit.

  4. Objects in the Directory Server#39;s Recycle Bin will be deleted if their age is less than Recycle Bin Age Limit.

Answer: C

Question No: 24

Which two of the following are relevant to password retrieval by a user using a URL?

  1. enrole.generic.randomizer should be set to true for generation of random URL for each password retrieval request.

  2. enrole.password.retrievalURL should be set to the value of the URL where the user can retrieve the password.

  3. The shared secret attribute of the Person object should be populated by the user beforehand.

  4. enrole.workflow.notifyPassword should be set to false.

  5. enrole.password.retrieval should be set to true.

Answer: C

Reference: http://publib.boulder.ibm.com/tividd/td/ITIM/SC32-1152- 02/en_US/PDF/im451_enduser.pdf (page 15, retrieving new passwords)

Question No: 25

When moving from a previous version of IBM Tivoli Identity Manager (ITIM) to a ISIM v6

what is the order of the high level steps required to upgrade the directory server on a separate system?

  1. Install new version, Uninstall previous version. Backup previous version. Import directory server data into new version.

  2. Uninstall previous version, Backup previous version, Import directory server data into new version.

  3. Backup previous version. Install new version, Import directory server data into new version.

  4. Install new version, configure SSL, start the directory.

Answer: C

Question No: 26

Given an IBM Security Identity Manager solution that is integrated with QRadar Log Management, which connection type is needed?

  1. SMTP connection

  2. JDBC connection

  3. HTTP connection

  4. TCP connection

Answer: B

Question No: 27

When an identity policy generates a user ID with a null value, what does ISIM do?

  1. ISIM attempts to form a user ID and uses the first letter of the user#39;s given name, concatenated with the value of the user#39;s family name, retaining the existing case.

  2. ISIM generates the user ID in the formlt;.lt;familynamegt;. If the user ID already exists, ISIM appends a digit at the end of the user ID.

  3. ISIM generates an exception and stops the creation process for the account for which the identity policy was triggered.

  4. ISIM automatically uses the value of erUID attribute in the user#39;s ISIM account.

Answer: B

Question No: 28

For large scale initial identity feed, what approach can help improve performance?

  1. Increase the size of the memory in the WebSphere Java Virtual Machine until the data feed meets performance requirements.

  2. Disable provisioning policies before importing identities into the system and then enable applicable provisioning policies.

  3. Define default values for account attributes from the administrative console to overwrite data source attributes.

  4. Modify the person form and reduce the number of attributes.

Answer: B

Question No: 29

Where would one go to download the latest version of a specific IBM Security Identity Manager (ISIM) adapter?

  1. IBM Passport Advantage Website

  2. ISIM Administration Guide

  3. ISIM Infocenter Website

  4. ISIM Installation Guide

Answer: A

Question No: 30

Orphan accounts are managed resource accounts whose owner in the IBM Security Identity Manager Server cannot be determined.

Orphan accounts can be assigned by the administrator to a user with which restriction?

  1. When deleting the orphan accounts in IBM Security Identity Manager, they are not deleted on the managed resource.

  2. The administrator can assign the orphan account to any user as long as the applicable policies allow it.

  3. The administrator can assign the orphan account to any user and bypass policy enforcements.

  4. The orphan account, once assigned an owner, can not become orphan again.

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:C2150-197 Demo PDF
100% Dumps4cert Free Guaranteed!
C2150-197 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.