What is the corresponding security requirement?
You are analyzing customer business processes to determine security requirements. Under the
heading “Web Transactionsmployees andYou are analyzing customer business processes to
determine security requirements. Under the heading “Web Transactions?mployees and
Customers,” you find a business requirement described as “Enhance User Productivity.” What is
the corresponding security requirement?
Which fields should be completed to allow a snapshot mounting operation using the IBM Tivoli Storage Manager F
Which fields should be completed to allow a snapshot mounting operation using the IBM Tivoli
Storage Manager FastBack Mount to perform a restore?
Which two would also be included on this checklist?
You are analyzing the customer business processes and trying to come up with corresponding
security requirements related to authorization. The most comprehensive checklist for targets for
which IBM Tivoli Access Manager for e-business can provide authorization includes: URLs; Java
server pages; servlets; EJBs (programmatic, declarative); .NET targets (programmatic,
declarative) and C/C++ programs. Which two would also be included on this checklist? (Choose
two.)
Which event will cause the periodic e-mail notification to alert recipients about possible system errors?
Which event will cause the periodic e-mail notification to alert recipients about possible system
errors?
Which IBM Tivoli product provides this information?
You are reviewing the identity provisioning processes of a customer. You find that there is no
check for compliance with the corporate standard for auditing the requestor of an account being
created on various systems. Which IBM Tivoli product provides this information?
Can this application be backed up with TSM FastBack and successfully restored?
An IBM Tivoli Storage Manager FastBack (TSM FastBack) client has Lotus Domino installed. Can
this application be backed up with TSM FastBack and successfully restored?
Which IBM Tivoli Security Solution provides this support?
A customer’s current identity process uses discretionary access control for creating user accounts
in their enterprise. Which IBM Tivoli Security Solution provides this support?
Which statement is true when restoring a Microsoft Exchange message?
Which statement is true when restoring a Microsoft Exchange message?
Which statement describes a risk management scenario?
Which statement describes a risk management scenario?
Which three components will verify a successful backup of a Volume Shadow Copy Service capable IBM Tivoli Stor
Which three components will verify a successful backup of a Volume Shadow Copy Service
capable IBM Tivoli Storage Manager FastBack client? (Choose three.)