What is the Linux path and command to verify that ISIM v6.0 is currently running?
A. WAS_PROFILE_HOME/bin/serverStatus.sh -all
B. WAS_PROFILE_HOME/var/status.sh
C. ISIM_HOME/var/serverStatus.sh -all
D. ISIM_HOME/bin/serverStatus.sh-all
Which document describes the relationship between the business requirements and the features of the Security Identity Manager that will be included in the initial solution rollout?
A. Solution Architecture Document
B. Security Policy Design
C. Feature Inclusion List
D. Initial Project Plan
Which TWO of the following components should be setup using secure SSL communication as best practice in an IBM Security Identity Manager environment?
A. Adapter installer
B. Report server
C. SMTP server
D. HTTP server
E. Adapters
When gathering requirements for a Provisioning Policy design, which key point for granting authorization is important to be evaluated?
A. The provisioning policy consider access only by Systems Administrators
B. The provisioning policy consider assess only by authorized persons
C. The provisioning policy consider access by authorized groups
D. The provisioning policy consider access only by managers
When planning a backup for the HTTP Server, which of the following is very easy to forget?
A. The attribute map needed for control of the load balance algorithm.
B. Installation customization directives for SSL communications.
C. TheWebsphere to HTTP plug in configuration file.
D. The primary HTTP configuration directory.
What change is needed in the Directory Server when a custom person entity is created in IBM Security Identity Manager?
A. There is no change needed in the Directory Server for new custom person entities.
B. A new container needs to be created in the Directory Server.
C. Directory object class and attributes to reflect the new entity.
D. A new user entry needs be created in the Directory Server.
When planning an ISIM server upgrade, which of the following statements describes a process you need to put into place?
A. Disable all recertification processes particularly ones that disable accounts.
B. Bring the OS and all supporting middleware to the required support levels.
C. Upgrade the adapter agent on each supported target system.
D. Quiesce all active workflows and outstanding requests.
Which of the following is a component located in the compressed adapter file?
A. Service Definition File
B. Language Packs
C. Timx_agents.zip
D. app_ejb.jar
When setting up the Self Service User Interface to search and list shared access roles, what customization is needed to list only the enabled roles?
A. Add a Java object that can be called as an extension from a workflow, and invoke this to screen the roles.
B. Change the default flag setting in the SelfServiceUI.properties file.
C. Modify the JSP for the select function, adding appropriate javascript to select based on access enabled.
D. Use the request parameter configuration option to link some javascript to the search box.
Which web service call is NOT provided in the WSAccessService web service?
A. Search access entitlements available to a person.
B. Retrieve existing user access of a person.
C. Validate entitlement access for a person.
D. Remove user access.