Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM 000-793 Exam - Cheat-Test.com

Free 000-793 Sample Questions:

1.Which statement is true about the Test Collector operation?
A.Test Collector does exactly the same job as Run Collector.
B.A single collector can be tested on multiple client systems at the same time.
C.Test Collector can be used to test only one collector at a time on a specific client.
D.Test Collector can be used to execute multiple collectors on a client simultaneously.
Answer: C

2.A customer has a standard DMZ network topology. They want to deploy the IBM Tivoli Security Compliance Manager (ITSCM) V5.1.0.2 Administration Console on Linux hosts only. Which preliminary step should be performed to ensure a successful installation of the Administration Console?
A.The umask must be set to 022.
B.The Administrator account must be created to install the ITSCM Administration Utilities.
C.The Administrator needs to chmod the ownership of the install package to be set at 777.
D.The install package automatically sets the file protections appropriately if installing as root.
Answer: A

3.When a collector is registered with the IBM Tivoli Security Compliance Manager (ITSCM) Server, which three schedules can be defined and associated with the collector? (Choose three.)
A.at sunset
B.every full moon night
C.every Christmas Eve
D.random time of the day
E.every Thanksgiving day
F.every Monday on January, February and March
Answer: C, D, F

4.Which command is used to launch the Administration Console?
A.jacgui
B.scmserver start
C.scmjacgui start
D.net start "SCM Console"
Answer: A

5.Which SQL operation is supported in the Query pane of the IBM Tivoli Security Compliance Manager (ITSCM) Administration Console?
A.insert
B.select
C.delete
D.update
Answer: B

6.Using the IBM Tivoli Security Compliance Manager (ITSCM) Administration Console, how are compliance queries scheduled and the compliance reports emailed?
A.via the Reports tab, click on the report name, click "Send Now" button
B.via the Messaging/Email pane, click on the compliance report name; under the Send destination, specify the email address(es) to which the compliance reports will be sent, click "Save" button
C.via the Reports tab, click on the report name, which is to be scheduled; under the Send destination, specify the email address(es) to which the compliance report will be sent, click "Send Now" button
D.via the Policies/Schedule pane, click on the policy name, which is to be scheduled; under the Send destination, specify the email address(es) to which the compliance report will be sent, click "Save" button
Answer: D

7.Which Report permission is required for a User to send a report to multiple email addresses?
A.View
B.Create
C.Execute
D.Manager
Answer: C

8.Which task is required to register an IBM Tivoli Security Compliance Manager (ITSCM) Client?
A.add CLIENT.REGISTERED=enabled to the client.pref file
B.run the Register Client option from the Administration Console
C.select the Register option in the Install Client Configuration window
D.run the scmclientregistration command on the system in which the Administrative Utilities are installed
Answer: B

9.After a collector is installed and registered, which two actions configure it to run on individual clients or client groups using the Clients pane of the Administration Console? (Choose two.)
A.add client to the collector instance
B.add the collector directly to policy schedule
C.add a policy containing the collector to a client group
D.add the collector directly to individual client or client group
E.add the collector directly to individual client or operational report
Answer: C, D

10.Which file(s) does an IBM Tivoli Security Compliance Manager (ITSCM) Server need to connect to a remote DB2 V8.1 database?
A.only db2jcc.jar
B.only db2java.zip
C.both db2java.jar and db2jcc.jar
D.both db2java.zip and db2jcc.jar
Answer: D

11.A customer has a distributed network with several domains, each of which corresponds to different suppliers. The enterprise security policy stipulates that the supplier's machines must be checked for compliance to the latest UNIX patch levels on a monthly basis. How is it determined which UNIX machines need the appropriate collectors and policies?
A.The customer provides an inventory of all UNIX machine hostnames on the network that are owned and operated by the various suppliers.
B.ITSCM and IBM Tivoli NetView provide information on all UNIX hosts on the enterprise network and their current configuration status.
C.IBM Tivoli Security Compliance Manager (ITSCM) automatically discovers all appropriate UNIX machines if the appropriate compliance query for the UNIX collector is written.
D.It is necessary to obtain from the customer the enterprise security policy documentation and the inventory of suppliers' UNIX machines with current version and patch levels.
Answer: D

12.Which Sentry component is responsible for verifying the signature level for an allow/disallow decision for network access?
A.Cisco Security Agent
B.Cisco Trust Agent (CTA)
C.Cisco Access Control Server
D.IBM Tivoli Provisioning Manager (ITPM) Server
Answer: C

13.How does an IBM Tivoli Security Compliance Manager (ITSCM) Administrator verify if the ITSCM Server is up and running?
A.try to log on to ITSCM Administrator GUI
B.run the scmserver status command
C.restart the ITSCM Server and check whether it starts correctly
D.use the ping command and check whether the ITSCM Server system responds
Answer: B

14.When creating an IBM Tivoli Security Compliance Manager (ITSCM) user with the Create User function in the Administration Console, which two pieces of information are required for that user to administer ITSCM? (Choose two.)
A.user ID
B.full name
C.password
D.email address
E.employee information
Answer: A, C

15.Using the Administration Console, when a policy is imported to the server, the collectors associated with that policy are installed on the server as well. What happens when the collectors are already installed with the same name as one in the policy the user is trying to import?
A.The policy is imported as normal and the policy collector is overwritten.
B.The policy is imported as normal and the policy collector is installed as another instance of that collector.
C.The import wizard alerts the user that the collector included in the policy is currently installed. If the collectors are registered on the server, the collectors must be unregistered and uninstalled.
D.The import wizard asks whether or not to replace the collector currently installed with the collector included in the policy. If yes, the policy collector is installed and the release number of both the installed collector and the collector in the policy are displayed.
Answer: D

16.Which license management system can be used in IBM Tivoli Security Compliance Manager (ITSCM) V5.1.0.2 to monitor license usage?
A.FLEXlm
B.iFOR/LS
C.IBM AIX LUM
D.IBM Tivoli License Management
Answer: D

17.A company is using IBM Tivoli Security Compliance Manager (ITSCM) to implement an enterprise security policy. The company has three IT Administrators. One of these administrators needs to manage policy snapshots. Which ITSCM permission should be assigned to this administrator?
A.View Snapshots
B.Manage Collectors
C.Manage Snapshots
D.Manage Compliance Objects
Answer: C

18.How can a customer schedule a report to be sent at 8:00 a.m. each morning?
A.make no selection in Day of Month and Week Days; select Hour as 8 a.m.
B.make no selection in Day of Month; select all Week Days; select Hour as 8 a.m.
C.select all checkboxes in Day of Month; select all Week Days; select Hour as 8 a.m.
D.select all checkboxes in Day of Month; make no selection in Week Days; select Hour as 8 a.m.
Answer: C

19.Which statement about importing previously exported reports is true?
A.The group name cannot be modified.
B.The report name cannot be modified.
C.Import fails if the group name does not already exist.
D.Both group and report name can be changed during import.
Answer: D

20.Which statement is true about a Global role?
A.Permissions apply to all resources in all resource categories.
B.Permissions apply to selected resources in all resource categories.
C.Permissions apply to all resources in selected resource categories.
D.Permissions apply to selected resources in selected resource categories.
Answer: C

21.After the IBM Tivoli Security Compliance Manager (ITSCM) Server is upgraded via InstallShield to the current fix pack, which task must be performed first before the server is ready for use?
A.restart the server
B.install new collectors
C.migrate the database
D.import any new policies
Answer: C

22.Which reports are IBM Tivoli Security Compliance Manager (ITSCM) reports?
A.BRIO Reports and ITSCM Operational Reports
B.ITSCM Central Data Warehouse Reports and Functional Reports
C.IBM Tivoli Risk Manager (ITRM) Warehouse Reports and Historical Reports
D.ITSCM Operational Reports and IBM Tivoli Data Warehouse ITSCM Historical Reports
Answer: D

23.How are different client groups configured to report to different people?
A.Client groups are made up of individual collectors, each configured through the Administration Utilities to send reports to a different email address.
B.Client groups are defined with different clients. Each client has a specific collector configured to use the email address of the person who is to receive the report.
C.A Junior Administrator specifies a policy for each client group, which sets the View permission for each group. In addition, the Create and Manage Report permissions need to be set for a user in the Junior Administrator role.
D.The Report Administrator role is defined for each client group. The default permissions for the Report Administrator are used to create, execute, manage, remove and view. A policy is associated with each client group with a different send destination email address for the appropriate person.
Answer: D

24.The corporate security policy requires that all Windows systems must be at a certain operating system level with all hotfixes installed. Which collector should be deployed?
A.win.any.HotfixV1.jar and win.nt.OSLevelV1.jar
B.win.any.NavV1.jar and win.any.OSLevelV1.jar
C.win.any.HotfixV1.jar and win.any.OSLevelV1.jar
D.win.any.HotfixV1.jar and any.any.OSLevelV1.jar
Answer: C

25.Which statement about an IBM Tivoli Security Compliance Manager (ITSCM) collector is true?
A.Both the ITSCM Server and Client can run an ITSCM collector.
B.An ITSCM collector needs to be manually installed on each ITSCM Client system.
C.An ITSCM collector needs to be digitally signed before it can be loaded and deployed.
D.An ITSCM collector can be written in variety of programming languages, including C/C++, Java, Shell and Perl scripts.
Answer: C

26.A company's intranet is divided into three zones: Intranet zone, DMZ and Extranet zone. There is a firewall between the Intranet and DMZ and one between the DMZ and Extranet. Corporate policy stipulates that only one system in each zone should be selected to relay IBM Tivoli Security Compliance Manager (ITSCM) communications across each firewall. If the ITSCM Server is located in the Intranet zone, how many ITSCM Proxy systems are needed (at a minimum) to reach clients
in the Extranet zone?
A.0
B.2
C.3
D.4
Answer: B

27.Which IBM Tivoli Security Compliance Manager (ITSCM) report shows the total number of policy compliance violations per subnet for a specified period of time?
A.Subnet Policy Compliance Report
B.Policy Violations by Subnet Report
C.Compliance Violations Trends Report
D.Subnet Client Group Membership Report
Answer: B

28.Which IBM Tivoli Security Compliance Manager (ITSCM) report allows the user to see the trends in policy violations over a specified period of time and allows them to predict how long it will take to achieve full compliance based on the history?
A.Policy Violation Trends Report
B.Policy Violations by System Report
C.Compliance Violations Trends Report
D.Compliant/Non Compliant Systems Report
Answer: C

29.A fixpack installation on the IBM Tivoli Security Compliance Manager (ITSCM) Server hangs or aborts. What is the recommended way to correct the situation?
A.uninstall the fixpack alone
B.install fixpack on another system and copy the files
C.attempt fixpack installation again as cleanup is not required
D.restore from filesystem backup and database backup to bring the system to prepatch state first
Answer: D

30.In a policy snapshot, what does the "violation count" indicate?
A.the number of queries that failed to run
B.the number of collectors that failed to run
C.the number of policies violated by the systems
D.the number of violations against the security policy
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved