Which security measure most effectively addresses users fears of privacy misuse in a Biometric technology?
Which security measure most effectively addresses users fears of privacy misuse in a Biometric
technology?
which processes?
The Snapshots Monitor view in the IBM Tivoli Storage Manager FastBack Manager is used to
display the status of which processes?
Which product can be an authentication information server for the customer?
A customer wants to consolidate authentication information for all existing products, such as IBM
WebSphere, IBM Tivoli Access Manager, and IBM Tivoli Identity Manager with a single product.
Which product can be an authentication information server for the customer?
When are the next changes applied to a file or folder on that virtual volume?
A company has an IBM Tivoli Storage Manager Fastback snapshot mounted as a virtual volume in
read/write mode on a file server. When are the next changes applied to a file or folder on that
virtual volume?
Which system achieves this?
After completing a security gap analysis, a corporation decides to install a packet monitoring
system to sniff packets passing through the organization’s DMZ. Which system achieves this?
What is a valid troubleshooting step?
Scheduled data replication operations are not functioning properly. What is a valid troubleshooting
step?
Which two statements are true about SOX as it relates to this customer?
You are discussing the subject of standards with a European customer. In your discussion, the
subject of Sarbanes-Oxley (SOX) legislation comes up. Which two statements are true about SOX
as it relates to this customer? (Choose two.)
which action must be taken to gain access to the repository to begin restoring data to clients?
A disaster has occurred at a customer site, and it is discovered that the IBM Tivoli Storage
Manager FastBack (TSM FastBack) server is corrupted. After rebuilding and restoring the TSM
FastBack server, which action must be taken to gain access to the repository to begin restoring
data to clients?
Which procedure, if implemented, is a stronger form of authentication than the current one?
All persons entering XYZ corporation are required to swipe their employee badge to get access to
the building. Which procedure, if implemented, is a stronger form of authentication than the current
one?
How can more space be added to the repository?
The IBM Tivoli Storage Manager FastBack (TSM FastBack) repository is at 85% and growing
daily. A service window is not available where the TSM FastBack server can be taken down to add
additional hardware. More repository space is needed until additional hardware can be installed.
How can more space be added to the repository?