A.Data Mining API B.Provisioning API C.Cryptography API D.API for Second Factors E.SOAP API for Mobile ActiveCode
单项选择题Machine policy templates can be assigned based on certain attributes of a machine. A customer organizes their machines based on the following requirements: The machines are all placed in specific Organizational Units in the Active Directory. The customer has Citrix Servers, and they have a specific naming convention meant only for their Citrix Servers. The customer has DHCP enabled for all the client machines. The customer has made it clear that they should not need to change anything in the existing infrastructure. Given these requirements, which single assignment attribute would be chosen for assigning machine policy templates?()
A.Hostnames B.IP Addresses C.Machine Group Tag D.Active Directory Groups
单项选择题In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()
A.Citrix workstation B.personal workstation C.shared workstation, private desktop D.shared workstation, shared desktop
多项选择题What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()
A.A B.B C.C D.D E.E
单项选择题WhichtypeofIBMTivoliAccessManagerforEnterpriseSingleSign-Onbuilt-inapplicationconnectorshouldbeusedtointegratewithNovelleDirectoryasabackendenterprisedirectory?()
A.Windows NT Connector B.Generic (LDAP) Connector C.Network Information Service Connector D.Active Directory Service Interfaces Connector
单项选择题AnapplicationisupgradedandithasbeendeterminedthattheAccessAgentnolongerproperlyrespondstotheapplication.Itisunderstoodthatforacertainamountoftimeboththecurrentversionandtheupgradedversionoftheapplicationwillbeusedbytheend-users.Theexecutablesforbothversionsarethesame.Whatshouldbethenextstep?()
A.Open AccessStudio and change the existing AccessProfile to use only the new signatures for Windows, control IDs, or HTML elements. B.Open AccessStudio and create a new AccessProfile for the upgraded version and overwrite the existing AccessProfile on the IMS Server. C.Open AccessStudio and edit the existing AccessProfile by using new triggers/actions associated with the new signatures for Windows, control IDs, or HTML elements. D.Open AccessStudio and create a new AccessProfile for the upgraded version and upload it to the IMS Server so that two separate AccessProfiles may be used by the AccessAgent.