[Free] 2018(Mar) EnsurePass Pass4sure IBM C2150-197 Dumps with VCE and PDF 81-90

Ensurepass.com : Ensure you pass the IT Exams
2018 Mar IBM Official New Released C2150-197
100% Free Download! 100% Pass Guaranteed!

IBM Security Identity Manager V6.0 Implementation

Question No: 81

When moving from a previous version of IBM Tivoli Identity Manager (ITIM) to a ISIM v6 what directory is required in order to signal an upgrade?

  1. IBM Websphere Application Server home directory.

  2. IBM HTTP Server home directory

  3. IBM Java home directory

  4. ISIM home directory

Answer: D

Question No: 82

Which configuration must be in place to allow new account passwords to be emailed in clear text?

  1. Property quot;enrole.mail.notify=quot; set to #39;ASYNC in enRole.properties

  2. quot;Enable store forwardingquot; checked on Post Office configuration

  3. sharedsecret attribute populated on person objects

  4. Enrole.workflow.notifyPassword set to true

Answer: C

Question No: 83

A customer#39;s availability requirements need to minimize the risk of an ISIM outage due to a hardware server failure.

Which two are relevant architecture choices? (Choose two)

  1. Propose the WebSphere Application Server and Database Server be on the same physical server, but the Directory server be on a separate physical server.

  2. Propose the WebSphere Application Server and Directory Server be on the same physical server, but the Database server be on a separate physical server.

  3. Propose Directory Server replicas and DB2 Database Server log shipping from primary active server to secondary standby server.

  4. Propose a horizontal WebSphere Application Server cluster.

  5. Propose a vertical WebSphere Application Server cluster.

Answer: A,E

Question No: 84

Which of the following is not a valid command line switch when installing TDI 7.1 on windows?

  1. install_tdiv711_win_x86.exe -i

  2. install_tdiv711_win_x86.exe-m

  3. install_tdiv711_win_x86.exe -f

  4. install tdiv711 win x86.exe -r

Answer: B

Reference: http://www- 01.ibm.com/support/knowledgecenter/SSCQGF_7.1.0/com.ibm.IBMDI.doc_7.1/adminguide 12.htm#instnew

Question No: 85

Life cycle rule is triggered automatically by which event?

  1. A schedule and matching criteria evaluated against an entity.

  2. External event.

  3. Schedule only.

  4. Internal event.

Answer: C

Question No: 86

A customer wants to designate people who will be responsible for administering policies and workflows located in various containers of the organization tree.

Which option will achieve this objective with the least amount of configuration overhead?

  1. Create Access Control Items (ACIs) to allow each administrator to allow access to policies and workflows.

  2. Create Organizational Units for each container that has policies and workflows.

  3. Create Admin Domains for each container that has policies and workflows.

  4. Create Locations for each container that has policies and workflows.

Answer: A

Question No: 87

What are TWO valid sets of Access Control Item (ACI) members that can be used to grant access to create or modify static organizational roles?

  1. The supervisor of the business unit in which the organizational role resides.

  2. Users who are members of a role other than the one being operated on.

  3. Users who are members of an ISIM group.

  4. The supervisor of the owner of the role.

  5. Users who are members of a role.

Answer: A,E

Question No: 88

What is the Linux path and command to verify that ISIM v6.0 is currently running?

  1. WAS_PROFILE_HOME/bin/serverStatus.sh -all

  2. WAS_PROFILE_HOME/var/status.sh

  3. ISIM_HOME/var/serverStatus.sh -all

  4. ISIM_HOME/bin/serverStatus.sh-all

Answer: A

Reference: http://www-

01.ibm.com/support/knowledgecenter/SSRMWJ_6.0.0.2/com.ibm.isim.doc_6.0.0.2/installin g/tsk/tsk_ic_ins_ver_wasruns.htm?lang=en

Question No: 89

Which document describes the relationship between the business requirements and the features of the Security Identity Manager that will be included in the initial solution rollout?

  1. Solution Architecture Document

  2. Security Policy Design

  3. Feature Inclusion List

  4. Initial Project Plan

Answer: A

Question No: 90

When gathering requirements for data to be loaded, which attribute from an HR data feed is used as a required attribute to describe a person?

  1. A employee common name

  2. A contractor#39;s middle name

  3. A contractor#39;s email name

  4. A employee alias name

Answer: A

100% Ensurepass Free Download!
Download Free Demo:C2150-197 Demo PDF
100% Ensurepass Free Guaranteed!
C2150-197 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No