Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM A2150-537 Exam - Cheat-Test.com

Free A2150-537 Sample Questions:

Q: 1
Which tool configures an IBM Tivoli Directory Server (ITDS) proxy server?
A. ITDS Control Center
B. ITDS Instance Creation Tool
C. ITDS Web Administration Tool
D. ITDS Instance Administration Tool
Answer: C

Q: 2
Which method can be used for pass-through authentication when attribute mapping is not specified in IBM Tivoli Directory Server (ITDS)?
A. ITDS creates its own attribute mapping logic.
B. Pass-through authentication is not supported in this situation.
C. ITDS searches for a mapping entry on the pass-through LDAP server.
D. The entry on the actual ITDS maps explicitly to some entry on the pass-through LDAP server.
Answer: D

Q: 3
A client attempts to bind to a directory server and the user credential is not available locally.
Then the server attempts to verify the credential from another external directory server on behalf of the client. What is this called?
A. Referral authentication
B. Kerberos authentication
C. Credential authentication
D. Pass-through authentication
Answer: D

Q: 4
What are the correct steps to set a Non-Filtered ACL on an entry using the IBM Tivoli Directory Server Web Administration Tool?
A. 1) Navigate to Directory Management > Manage ACL.2) Select the entry where the ACL is to be added.3) Select Select Actions > Edit ACL > Go.4) Select Non-Filtered ACLs.5) Click Add.6) Define the ACL.
B. 1) Navigate to Directory Management > Manage Entries.2) Select the entry where the ACL is to be added.3) Select Select Actions > Edit ACL > Go.4) Select Non-Filtered ACLs.5) Click Add.6) Define the ACL.
C. 1) Navigate to Directory Management > Manage ACL.2) Select the entry where the ACL is to be added.3) Select Select Actions > Edit ACL > Go.4) Select Filtered ACLs.5) Click Add.6) Define the ACL.
D. 1) Navigate to Directory Management > Manage Entries.2) Select the entry where the ACL is to be added.3) Select Select Actions > Edit ACL > Go.4) Select Effective ACLs.5) Click Add.6) Define the ACL.
Answer: B

Q: 5
Click the Exhibit button. Based upon the exhibit, what is the resulting ACL on cn=Bob Jones?
A. aclEntry: group:cn=Dept XYZ,o=sample:normal:grant:rsc
B. aclEntry: group:cn=Dept XYZ,o=sample:normal:grant:rscaclEntry: group:cn=Dept ABC,o=sample:at.attribute1:grant:rsc
C. aclEntry: group:cn=Dept ABC,o=sample:at.attribute1:grant:rsc
D. aclEntry: group:cn=Dept XYZ,o=sample:at attribute1:normal:grant:rsc
Answer: B

Q: 6
Which attribute can be used when analyzing the current ACL set on a server?
A. ibm-aclentry
B. ibm-effectiveAcl
C. ibm-filterAclEntry
D. ibm-AllAclEntries
Answer: B

Q: 7
What does the idsadsrun command do?
A. It performs synchronization from any LDAP server to an IBM Tivoli Directory Server.
B. It performs synchronization from an IBM Tivoli Directory Server to any LDAP server.
C. It performs Active Directory Synchronization from an Active Directory Server to an IBM Tivoli Directory Server.
D. It performs Active Directory Synchronization from an IBM Tivoli Directory Server to an Active Directory Server.
Answer: C

Q: 8
Which operational attributes return all password policy attributes for a given entry?
A. +ibmpwdpolicy
B. ibm-pwdPolicy
C. ++idspwdpolicy
D. +passwordMinAlphaChars
Answer: A

Q: 9
What is an example of when it is recommended to have cryptographically synchronized instances?
A. When SSL is configured.
B. When referrals are configured.
C. When replication is configured with a two-way encryption scheme.
D. When replication is configured with a one-way encryption scheme.
Answer: D

Q: 10
What does the GSKCapiCmd tool do?
A. It creates only PKCS11 key databases.
B. It creates only PKCS12 key databases.
C. It manages keys, certificates, and certificate requests within a JKS key database.
D. It manages keys, certificates, and certificate requests within a CMS key database.
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved