Which two value propositions might you present to this customer that relate to their situation?
A customer write-up on business processes includes a description of handling requests for new
user identities or changes to identities. These processes are handled in different ways by different
disciplines. For example, there is an RACF team to handle processing of RACF identities and a
UNIX team to handle processing of UNIX identities. From a process standpoint, all these
processes are documented. They all involve assessments and approval processes. The customer
seems fairly happy with how these processes are running. They are however receiving complaints
that the process of issuing identities and updating identities is slow. Which two value propositions
might you present to this customer that relate to their situation? (Choose two.)
Which three IBM products have achieved Common Criteria Evaluation Assurance Level (EAL) certification as of Ju
Which three IBM products have achieved Common Criteria Evaluation Assurance Level (EAL)
certification as of June 2006? (Choose three.)
Which two requirements statements directly apply to user provisioning scenarios?
Which two requirements statements directly apply to user provisioning scenarios? (Choose two.)
What is the corresponding security requirement?
You are analyzing customer business processes to determine security requirements. Under the
heading “Web Transactionsmployees andYou are analyzing customer business processes to
determine security requirements. Under the heading “Web Transactions?mployees and
Customers,” you find a business requirement described as “Enhance User Productivity.” What is
the corresponding security requirement?
Which two would also be included on this checklist?
You are analyzing the customer business processes and trying to come up with corresponding
security requirements related to authorization. The most comprehensive checklist for targets for
which IBM Tivoli Access Manager for e-business can provide authorization includes: URLs; Java
server pages; servlets; EJBs (programmatic, declarative); .NET targets (programmatic,
declarative) and C/C++ programs. Which two would also be included on this checklist? (Choose
two.)
Which IBM Tivoli product provides this information?
You are reviewing the identity provisioning processes of a customer. You find that there is no
check for compliance with the corporate standard for auditing the requestor of an account being
created on various systems. Which IBM Tivoli product provides this information?
Which IBM Tivoli Security Solution provides this support?
A customer’s current identity process uses discretionary access control for creating user accounts
in their enterprise. Which IBM Tivoli Security Solution provides this support?
Which statement describes a risk management scenario?
Which statement describes a risk management scenario?
Which IBM Tivoli product satisfies this auditing requirement?
A customer has a requirement to provide auditors with a list of all failed attempts to access their
Web based applications. Which IBM Tivoli product satisfies this auditing requirement?
Which specification has completed the OASIS standardization process as of July, 2008?
Which specification has completed the OASIS standardization process as of July, 2008?