|
hello! everyone! ITCertKeys is excellent!! I also agree! after taking exam 310-012, I confirmed most of Q is same of that. but I think it's possible to pass the exam without buying the exams, adding your study and the sample of ITCertKeys. anyway, this site is very helpful and thanks everyone!!
|
Question 1. After IBM Tivoli Compliance Insight Manager is configured on an AIX platform, what is the default location for the audit trail files? A. /var/audit B. /var/log/audit C. /var/log/eprise D. /var/audit/eprise Answer: C Question 2. What is the purpose of scoping? A. to regulate access to GEM databases B. to regulate access to policies in the policy explorer C. to regulate access to information generated in reports D. to regulate access to the Tivoli Compliance Insight Manager Web portal Answer: C Question 3. What is the advantage of collect-time data processing for a GEM database? A. Chunks are mapped as soon as they are collected. B. Chunks are mapped and loaded as soon as they are collected. C. Reports are readily available in iView as soon as the chunks are collected. D. Processing of chunks is performed at collection time to prevent loss of information when the IBM Tivoli Compliance Insight Manager server is accidentally rebooted. Answer: A Question 4. Which components are installed by default for a Standard server? A. Tivoli Compliance Insight Manager server, Tivoli Compliance Insight Manager Management Console, and Tivoli Compliance Insight Manager Consolidation B. Tivoli Compliance Insight Manager server, Tivoli Compliance Insight Manager Web Applications, and Tivoli Compliance Insight Manager Management Console C. Tivoli Compliance Insight Manager server, Tivoli Compliance Insight Manager Web Applications, Tivoli Compliance Insight Manager Management Console, and Tivoli Compliance Insight Manager Actuator D. Tivoli Compliance Insight Manager server, Tivoli Compliance Insight Manager Web Applications, Tivoli Compliance Insight Manager Management Console, and Tivoli Compliance Insight Manager Consolidation Answer: B Question 5. From which two Tivoli products can IBM Tivoli Compliance Insight Manager v8.0 retrieve information using User Information Source? (Choose two.) A. Tivoli Identity Manager B. Tivoli Access Manager C. Tivoli Directory Integrator D. Tivoli Security Operations Manager E. Tivoli Access Manager for Enterprise Single Sign-On Answer: A, B Question 6. A customer wants to use several groups from an Active Directory User Information Source to define the policy. How can this goal be accomplished? A. Drag Active Directory Groups from the View Automatic Policy. B. Collect the grouping information from the Active Directory using W7 Log and use them in the policy. C. Copy and paste the name of the Groups from the Domain Controller Users and Group Management view. D. Import the Active Directory group names into the Grouping Wizard by using an LDAP data interchange format (LDIF) file. Answer: A Question 7. Which IBM Tivoli Compliance Insight Manager component provides the capability to report against the ISO 17799 standard? A. Audit policy B. Log Manager C. Compliance module D. Management Console Answer: C Question 8. What is the procedure to verify that the diagnostics file has been successfully generated? A. Run the Diagnostics under the Administrator account. B. The only method is to check whether the Diagnostics Application ended without reporting any message. C. Check whether a fresh copy of Diagnostics file with the correct file extension has been created in the destination folder. D. Check whether the Diagnostics Application has provided a dialog message reporting that the diagnostics file was successfully generated. Answer: C Question 9. What does the error retention property in the z/OS event source define? A. sets of error files maintained in each *.err directory B. sets of error files maintained in each *.etc directory C. sets of log files maintained in each *.props directory D. sets of log files maintained in each *.property directory Answer: C Question 10. What are two advantages of using Secure Shell (SSH) remote collection? (Choose two.) A. Can have an SSH Collection user as a non-root account B. Can be used to collect logs remotely from any event source C. Uses secure user name-password authentication during collection D. Reduces maintenance costs in terms of agent installation and upgrade E. Requires less number of ports to be opened on the firewall when compared to IBM Tivoli Compliance Insight Manager-point of presence communication port requirements Answer: A, D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.