Which security application will help accomplish this task?
A customer wants to utilize a self-care application so users can maintain and reset their own
password accounts, and automatically provision the change across all enterprise systems. Which
security application will help accomplish this task?
Which level of cleanup configuration should be selected?
Since the enterprise replicates snapshots to a Disaster Recovery server every hour, there is heavy
WAN traffic. Due to the low bandwidth available for cleanup, cleanup should wait to run only when
an entire snapshot can be removed. Which level of cleanup configuration should be selected?
Which statement is true about how IBM product(s) can meet this customer security requirements?
The customer has a clear security requirement for single sign-on (SSO). They want SSO for their
Web applications, for their client-server applications, and for a significant number of crossenterprise SOAP-based interactions with ten of their key business partners. Which statement is
true about how IBM product(s) can meet this customer security requirements?
What would the Recovery Point Objective be in this scenario?
Running a tape backup every night at the same time would mean that data is protected but there
would be a full day’s worth of data which might not be protected depending on the backup
strategy. Assuming the last backup was successful, all the data that was created or edited since
the last backup was run could be lost if a disaster occurred. What would the Recovery Point
Objective be in this scenario?
Which three statements are true about the security of cross-enterprise transactions?
You are documenting a recommended future direction for a current customer of IBM Tivoli identity,
access, risk and compliance solutions. The customer has implemented IBM Tivoli Identity
Manager, IBM Tivoli Access Manager for e-business, IBM Tivoli Risk Manager, and IBM Tivoli
Security Compliance Manager. This customer has solved several security exposures and realizes
the efficiencies and efficacy of integrated, enterprise-level security within their enterprise. It is clear
that a natural evolution for this customer is to consider many of the same security services across
enterprise boundaries. Which three statements are true about the security of cross-enterprise
transactions? (Choose three.)
Which IBM Tivoli solution can help the organization automate these checks?
An organization requires that all users have anti-virus software installed and active on their
respective workstations at all times. However, they find they do not have an automated way to
check whether users conform to this requirement. Which IBM Tivoli solution can help the
organization automate these checks?
what is the primary business goal?
In a Business to Business (B2B) scenario, what is the primary business goal?
Can the second disk be added to the repository as an additional disk repository?
A server has two internal disks, and each disk is 73 GB in size. The first disk is partitioned into 30
GB for the operating system, and has an unused partition of 43 GB. The second disk has not been
used by IBM Tivoli Storage Manager FastBack as a disk repository. Can the second disk be added
to the repository as an additional disk repository?
What do you recommend to the customer?
An IBM customer is interested in knowing more about a specific IBM Tivoli product version before
it is officially released to other customers. What do you recommend to the customer?
Which level of cleanup configuration needs to be selected?
An enterprise maintains a high number of generations of snapshots, which uses a lot of storage
space. While there are concerns about recovering the space from unnecessary generations of
snapshots, the bandwidth required during the cleanup process is the primary concern. Which level
of cleanup configuration needs to be selected?