Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM 000-891 Exam - Cheat-Test.com

Free 000-891 Sample Questions:

Q: 1 Which two software components are prerequisite products for the Common Audit and Reporting Service (CARS) event server? (Choose two.)
A. IBM DB2 Server
B. Crystal Enterprise Server
C. IBM Tivoli Directory Server
D. IBM WebSphere Application Server
E. IBM Tivoli Access Manager Authorization Server
Answer: A, D

Q: 2 Which utility is used to build a Trust Chain for a specific Web Service application?
A. TFIMCFG
B. WSDL2TAM
C. WSDL2TFIM
D. WSDL2SAML
Answer: C

Q: 3 What is the default trace file (for Linux) that is used for the initial debugging of IBM Tivoli Federated Identity Manager Runtime?
A. /opt/IBM/FIM/logs/< ITFIM Domain Name>/tivoli-common/FBT/logs/msg.log
B. /opt/IBM/FIM/logs/< ITFIM Domain Name>/tivoli-common/FBT/logs/trace.log
C. /opt/IBM/WebSphere/AppServer/profiles/<servername>/logs/<profile>/trace.log
D. /opt/IBM/WebSphere/AppServer/profiles/<servername>/logs/<profile>/SystemOut.log
Answer: B

Q: 4 RBTelco is a large multinational company that outsources health care benefit management to RBBenefits. RBTelco employees access RBBenefits resources through an authenticate-able account at each company. RBBenefit and RBTelco will use SAML V1.0.
Which IBM Tivoli Access Manager for e-business (ITAMeb) and IBM Tivoli Federated Identity Manager (ITFIM) components are required to be installed at RBTelco?
A. TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM
Runtime and Management Services, ITFIM Management Console
B. TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM
Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit
C. TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime
Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit
D. TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime
Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, ITFIM Demonstration Scenarios, WebSEAL Application Developer Kit
Answer: A

Q: 5 Which security token may carry user attribute information as part of the defined token format?
A. Kerberos
B. RACF Token
C. SAML Assertion
D. Username Token
Answer: C

Q: 6 You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?
A. stop all running instances of PDACLD
B. log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) user
C. change the TAMeb ACL policy applying to the Web Services namespace
D. update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console
Answer: C

Q: 7 When designing a system to use WS-Federation, which browser Single Sign-On (SSO) method should be used?
A. Browser GET
B. Browser POST
C. Browser Artifact
D. Browser Response
Answer: B

Q: 8 When recovering from a disaster, the backup and restore operation you use is similar to the export/import configuration procedure, with one additional step. Which additional step must you take when recovering from a disaster?
A. A new WebSphere profile is required to restore the configuration.
B. The restored system requires the IBM Tivoli Access Manager for e-business (TAMeb) JRTE to be
manually configured against the WebSphere's Java Runtime to allow the IBM Tivoli Federated Identity Manager (ITFIM) Runtime to function properly.
C. The ITFIM Domain needs to be created manually within the Integrated Solution Console.
D. The ITFIM Runtime instance needs to be re-registered with the TAMeb policy server by running the SvrSslCfg command.
Answer: C

Q: 9 Which XSL if statement checks for the existence of a homepage attribute within an STS Universal User XML structure?
A. <xsl:if test="//stsuuser:AttributeList/stsuuser:Attribute[attr='homepage']">
B. <xsl:if test="//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage']">
C. <xsl:if-exists="//stsuuser:AttributeList/stsuuser:Attribute/custom:Homepage">
D. <xsl:if-exists="//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage'])>
Answer: B

Q: 10 You have only a single WebSphere Application Server V6.0 named"server1" and a profile named "default." Which directory should you go to on a UNIX environment to find the server's logs?
A. /opt/IBM/WebSphere/AppServer/logs/server1
B. /opt/IBM/WebSphere/AppServer/server1/logs
C. /opt/IBM/WebSphere/AppServer/default/server1/logs
D. /opt/IBM/WebSphere/AppServer/profiles/default/logs/server1/
Answer: D

Q: 11 What is the default message level configured for IBM Tivoli Federated Identity Manager?
A. error messages only
B. disable all messages
C. error and warning messages only
D. info, error and warning messages
Answer: D

Q: 12 For what is the Web Services Security Management (WSSM) Token Generator used?
A. TFIM STS Trust Service
B. TAM Authorization Service
C. Web Service Provider applications
D. Web Service Requestor applications
Answer: D

Q: 13 Which utility is used to configure the WebSEAL Server once the files are installed?
A. pdadmin
B. pdconfig
C. web_config
D. config_web
Answer: B

Q: 14 Which two tasks are required to install Service Integration Bus Web Services? (Choose two.)
A. install the Resource Adapter
B. configure SOAP listener port
C. deploy the Service Integration Bus application
D. install the Service Data Objects (SDO) Repository
E. create a new WebSphere Application Server profile
Answer: A, D

Q: 15 What are two functions of a custom mapping module? (Choose two.)
A. records the token assertion
B. maps a STSUUSER input to a SAML token
C. looks up attributes in an external data source
D. maps a user's alias during the account linkage operation in SAML 2.0 and Liberty 1.2 protocol
E. maps a GUI XML attributes into UI controls that are used by the IBM Tivoli Federated Identity Manager Console to collect the input data
Answer: A, C

Q: 16 The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?
A. The input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application.
B. The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application.
C. The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application.
D. The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.
Answer: C

Q: 17 What limitations exist for a SAML Partner Provider ID configured at the Identity Provider?
A. The Provider ID can be any string.
B. The Provider ID can only include alphanumeric characters.
C. The Provider ID must match the prefix of Target URLs in SSO requests.
D. The Provider ID must match the Succinct ID configured at the Service Provider.
Answer: C

Q: 18 What are three functions of a WebSphere Node Agent? (Choose three.)
A. monitors performance
B. manages JVM memory
C. serves J2EE applications
D. manages the deployment manager
E. manages configuration synchronization
F. routes administrative requests to servers
Answer: A, E, F

Q: 19 Which statement is true about a Dynamic Chain Selection Module instance?
A. It is the first module in the partner module chain in Web Services Security Management (WSSM).
B. It is the last module in the partner module chain in WSSM.
C. It is the first module in the application module chain for partner.
D. It is the last module in the application module chain for the partner.
Answer: B

Q: 20 What must be done after adding a partner to a Federated-Single Sign-On (F-SSO) Federation to allow the partner's users to Single Sign-On (SSO)?
A. restart WebSEAL
B. enable the Partner
C. stop/restart IBM Tivoli Directory Server
D. restart Integrated Solutions Console (ISC)
Answer: B

Q: 21 A single configured IBM Tivoli Federated Identity Manager Federation can support how many Single Sign-On (SSO) standards?
A. 1
B. 2
C. 3
D. 6
Answer: A

Q: 22 When configured for a Service Provider side Liberty V1.2 Federation, which functionality requires the IBM Tivoli Federated Identity Manager Alias Service? (Choose three.)
A. Single Logout (SLO)
B. One Time Identifiers
C. Consent to Federate
D. Single Sign-On (SSO)
E. Identity Provider Proxy
F. Register Name Identifier
Answer: A, D, F

Q: 23 If the WebSphere Application Server has an unexpected outage, what is the first thing to look for to help determine the cause?
A. an entry in the operating system event log
B. heap dump file located in the product installation directory
C. a Java core file located in the products installation directory
D. a native core file located in the products installation directory
Answer: C

Q: 24 According to the Usage menu and assuming that the fields following the flags are correct, what is the proper method of making the IBM Tivoli Directory Integrator server call?
A. ./ibmditk -s /opt/IBM/IDIserver c client.xml t user_registry_handler
B. ./ibmdisrv s /opt/IBM/IDIserver c client.xml t user_registry_handler
C. ./ibmidisvr s /opt/IBM/IDIserver c client.xml t user_registry_handler
D. ./ibmserver s /opt/IBM/IDIserver c client.xml t user_registry_handler
Answer: B

Q: 25 Which two techniques can be used to add custom attributes to the IBM Tivoli Access Manager for e-business (TAMeb) credential passed to the IBM Tivoli Federated Identity Manager Runtime built at the Identity Provider? (Choose two.)
A. a Custom CDAS module
B. static text in XSL mapping rule
C. a call to Java from XSL mapping rule
D. a Credential Attribute Entitlement Service
E. an XSL mapping rule that refers to information in the TAMeb registry
Answer: A, D

Q: 26 The ldapsearch command or LDAP administration GUI, can be used to verify LDAP ACLs. Which three are valid LDAP ACL attributes? (Choose three.)
A. acluser
B. aclentry
C. aclpropagate
D. default-policy
E. ownerpropgate
F. default-management
Answer: A, B, E

Q: 27 Which action confirms that the Policy Server is able to successfully connect to the WebSEAL Server?
A. access WebSEAL with a browser
B. telnet to the WebSEAL system from the Policy Server
C. telnet from the WebSEAL system to the Policy Server
D. a server show of the WebSEAL using the pdadmin command line interface
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved