Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM C2150-197 Exam - Cheat-Test.com

Free C2150-197 Sample Questions:

Q: 1
Which concerns should be addressed by a systems architecture document?
A. Security policy, account standardization, overall business requirements
B. Disaster recovery, performance, high availability, deployment topology
C. Capacity requirements, uptime requirements, simplicity, and price
D. Service priorities, identity feeds, approval cycles, and auditing
Answer: A

Q: 2
Which document describes the relationship between the business requirements and the features of the Security Identity Manager that will be included in the initial solution rollout?
A. Solution Architecture Document
B. Security Policy Design
C. Feature Inclusion List
D. Initial Project Plan
Answer: A

Q: 3
When 'Enable store forwarding' is checked in the ISIM Post Office configuration, where is "Group Email Topic" specified?
A. In the XHTML section of workflow notification templates
B. In the subject of the aggregate message template
C. In the workflow designer
D. In enRoleMail.properties
Answer: C

Q: 4
Which of the following is not a valid command line switch when installing TDI 7.1 on windows?
A. install_tdiv711_win_x86.exe -i
B. install_tdiv711_win_x86.exe-m
C. install_tdiv711_win_x86.exe -f
D. install tdiv711 win x86.exe -r
Answer: B

Q: 5
Which option describes a best practice for IBM Security Identity Manager HA environment?
A. Install a cluster environment with two nodes and add additional nodes later as necessary
B. Install a single-server environment and add more servers later as necessary
C. Install a single-server environment as a managed node in a WebSphere cell
D. Install a cluster environment with one node
Answer: C

Q: 6
When gathering requirements for data to be loaded, which data feed is natively supported by IBM Security Identity Manager?
A. A data feed using Microsoft Word format
B. A data feed using binary data format
C. A data feed using the SOAP format
D. A data feed using DSML format
Answer: D

Q: 7
When designing a custom adapter, which of the following areas will have the largest impact on design scope and implementation complexity?
A. The number of attributes included in the reconciliation operation.
B. The number of group definitions used by the platform.
C. The password strength policy.
D. The service definition profile.
Answer: D

Q: 8
What is the default location for the Tivoli Common Reporting Pack?
A. <isim home>/reporting
B. <isim home>/jdbc/lib/data
C. <isim home>/opt/reporting
D. <isim home>/extensions/6.0/tcr
Answer: D

Q: 9
An adoption policy matches the attributes for an account on a managed resource to the attributes for an IBM Security Identity Manager user.
If there is more than one person evaluated as the owner of the account, how is the account assigned?
A. The account is randomly assigned to one of the matched person.
B. The account is assigned to the system administrator.
C. The account is assigned to the first matching person.
D. The account is orphaned.
Answer: A

Q: 10
A functioning IBM Security Identity Manager (ISIM) test environment has been copied over to a production ISIM environment. Which of the following would validate the application is up and functioning correctly?
A. Login to the application and perform a password change and verify the request is scheduled and completes successfully.
B. Login to the WebSphere Administrative Console and validate the status of the ISIM application.
C. Confirm the database instance for ISIM is running.
D. Confirm the LDAP instance for ISIM is running.
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved