What information is needed when creating a document concerning a customer’s IT and business organization
What information is needed when creating a document concerning a customer’s IT and business
organizational structure? (Choose two.)
what can be addressed by IBM Tivoli security solutions?
In describing their business processes, the customer provides the following aspects of
“audit/compliance”:
1. Physical building access security
2. Security of servers
3. Security of desktops
4. Audit of user identities/accounts
5. Audit of access control (policy and actuals)
6. Audit of security of business partners
7. Revoke compromised certificates
From this list, what can be addressed by IBM Tivoli security solutions?
what are three IBM Tivoli Access Manager for e-business authentication capabilities that indicate a higher lev
Based on IBM best practices, what are three IBM Tivoli Access Manager for e-business
authentication capabilities that indicate a higher level of authentication maturity? (Choose three.)
Which programming languages need to be available to manage an unsupported operating system with an IBM Tivoli
Which programming languages need to be available to manage an unsupported operating system
with an IBM Tivoli Identity Manager adapter?
Which tasks need to be accomplished during an initial meeting with the customer when reviewing a company organ
Which tasks need to be accomplished during an initial meeting with the customer when reviewing
a company organizational chart?
Which is an accurate description of a highly mature company, in the area of authorization?
Which is an accurate description of a highly mature company, in the area of authorization?
Which IBM Tivoli security solution should you recommend to provide the customer with the ability to report on
While reviewing the current security policies for a company, you find that a standard exists, which
dictates that information access must conform to HIPAA. Currently the customer has no
automated method to verify adherence to this policy. Which IBM Tivoli security solution should you
recommend to provide the customer with the ability to report on exceptions to this policy?
which security requirement?
A current IBM Tivoli security customer is very satisfied with their current IBM Tivoli Identity
Manager (ITIM) and IBM Tivoli Access Manager (ITAM) implementations. The customer has
benefited greatly from the user management and provisioning, authentication, authorization and
Web single sign-on processes now in place. The customer sees the value of Web services and
wants to leverage their business partnerships to greatly expand their online services, for a
relatively small investment. They are expecting that their existing ITIM and ITAM investments can
simply be stretched to include these business-to-business (B2B) flows. IBM Tivoli Federated
Identity Manager should be added to this scenario to address which security requirement?
What is an important guideline to follow when considering security audit and security compliance scenarios?
What is an important guideline to follow when considering security audit and security compliance
scenarios?
Which three actions provide relevant input to customer authentication scenarios?
Which three actions provide relevant input to customer authentication scenarios? (Choose three.)