Saturday, 12 April 2014

000-198 Exam Certification Test

IBM
000-198
IBM Security Access Manager V7.0 Implementation


Question: 1

Which utility provides backup, restore, and extract capabilities for Security Access Manager data? 

A. pdinfo
B. pdbackup
C. pdservice
D. pd_backup 

Answer: B    

Question: 2

What pdbackup command restores the contents of an Access Manger archived file on a Windows operating system to a specific folder? 

A. pdbackup -a extract
B. pdabckup -a backup
C. pdbackup -a restore
D. pdbackup -a retrieve 

Answer: A    

Question: 3

When performing an upgrade, which utility is used to back up the information in Tivoli Directory Server? 

A. ldapadd
B. bulkload
C. idsdb2ldif
D. idscreateldif 

Answer: C    

Question: 4

Which registry is NOT supported by ISAM 7? 

A. Lotus?Domino?Lotus?Domino
B. IBM?Tivoli?Directory Server
C. Microsoft Active Directory 2008
D. Sun Java?System Directory Server 7 

Answer: A    

Question: 5

Which statement is FALSE regarding local response redirection? 

A. We need to use External authentication interface to implement local response redirection.
B. When local response redirection is enabled, change password must be handled by WebSEAL.
C. When using local response redirection, WebSEAL no longer has the responsibility of generating responses to client requests.
D. When local response redirection is enabled, the redirection is used for all local WebSEAL response types: login, error, informational, and password management. 

Answer: A    

Question: 6

Which statement is true for the ISAM appliance snapshot? 

A. It is only a backup of the LMI.
B. It is a backup of all WebSEAL instances.
C. It is a copy of the state of the appliance at a certain time.
D. It is a backup of the Policy Server and  WebSEAL instances. 

Answer: C    

Question: 7

What is the correct archive file If pdbackup -a backup -list C:\Program Files\Tivoli\Policy Director\etc\pdbackup.lst is executed using ISAM on a Windows Server? 

A. C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_30aug2013.11.30.dar
B. C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_30.08.2013.11.30.dar
C. C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_30aug2013.11_30.dar
D. C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_30.08.2013.11_30.dar 

Answer: C    



Question: 8

You have a default setup of ISAM, ITDS and a Microsoft SharePoint backend. A Web environment is experiencing performance issues. In order conduct analysis, tracing is temporarily switched on using the following commands:  server task web04-webseald-unix08 trace set pdweb.debug 2 file path=/tmp/trace.log  server task web04-webseald-unix08 trace set pdweb.debug 0 During analysis of the trace.log various common occurrences appear, the following trace.log extract displays only the lines important for this question. 2013-05-26-22:08:01.681+02:00I ----------------- Browser ===> PD ----------------- 2013-05-26-22:08:01.684+02:00I ----------------- Browser <=== PD ----------------- 2013-05-26-22:08:09.283+02:00I ----------------- Browser ===> PD ----------------- 2013-05-26-22:08:16.682+02:00I ----------------- PD ===> BackEnd ----------------- 2013-05-26-22:08:17.049+02:00I ----------------- PD <=== BackEnd ----------------- 2013-05-26-22:08:17.051+02:00I ----------------- Browser <=== PD ----------------- What can be concluded by analyzing this trace excerpt? You indicate you wish to make this a sample question, remove the reference here. 

A. This excerpt indicates no performance or other issues.
B. This excerpt indicates that ITDS has a performance issue.
C. This excerpt indicates that the user has given a wrong password.
D. This excerpt indicates that the backend has a performance issue 

Answer: B    

Question: 9

You have a default setup of ISAM, ITDS and a Microsoft SharePoint backend. A Web environment is experiencing performance issues. In order conduct analysis, tracing is temporarily switched on using the following commands: server task web04-webseald-unix08 trace set pdweb.debug 2 file path=/tmp/trace.log server task web04-webseald-unix08 trace set pdweb.debug 0 During analysis of the trace.log various common occurrences appear, the following trace.log extract displays only the lines important for this question. 2013-05-26-22:08:01.681+02:00I ----------------- Browser ===> PD ----------------- 2013-05-26-22:08:01.682+02:00I ----------------- PD ===> BackEnd ----------------- 2013-05-26-22:08:07.216+02:00I ----------------- PD <=== BackEnd ----------------- 2013-05-26-22:08:07.217+02:00I ----------------- Browser <=== PD ----------------- What can be concluded by analyzing this trace excerpt? 

A. This excerpt indicates no performance or other issues.
B. This excerpt indicates that ITDS has a performance issue.
C. This excerpt indicates that the user has given a wrong password.
D. This excerpt indicates that the backend has a performance issue. 

Answer: D    

Question: 10

Which configuration enables the day time error page? 

A. [acnt-mgt] client-alert-tod = yes
B. [acnt-mgt] client-alert-dot = yes
C. [acnt-mgt] client-notify-tod = yes
D. [acnt-mgt] client-notify-dot = yes 

Answer: C    

Question: 11

What is the default credential to log on to ISAM 7 WGA command-line interface? 

A. root, root
B. admin, admin
C. superadmin, secret
D. sec_master, object00 

Answer: B    

Question: 12

What will help reduce the volume of audit event, while preserving important audit information? 

A. complete disablement of event generation
B. generation of events for successful HTTP accesses only
C. generation of events for unsuccessful HTTP accesses only
D. reconfiguration of WebSEAL to use CARS auditing instead of native auditing 

Answer: C    

Question: 13

Recently the Risk Officer of your organization discovered that all key databases containing web certificates in the organization are protected with a very weak password. You are assigned to change the password on every key database into a more complex one. How can this be accomplished? 

A. Open iKeyman, open the appropriate key database, enter the current password, and select "Change Password".
B. Generate a new stash file using command "ibmstash -db key.kdb -stash key.sth -password <current password> -newpassword  <new password>"
C. This is not possible, a new key database has to be created; the current certificates can be exported from the old KDB into the new one.
D. Edit the webseald-default.conf configuration file and change the pointers to the key database password from a stash file to a plain text password and specify the password. 

Answer: A    

Question: 14

How are ISAM users and groups logically separated within a single policy server? 

A. By creating multiple object spaces.
B. By installing multiple user registries.
C. By creating multiple secure domains.
D. By installing multiple policy proxy servers. 

Answer: C    

Question: 15

What are two installable components of the Common Auditing and Reporting Serve? (Choose two.) 

A. Audit Service.
B. Report Service
C. Audit Client Setup Utilities
D. Audit Configuration Console
E. Report Configuration Console 

Answer: A,D    




No comments:

Post a Comment