Current ibm c2150 198 certification exam pdf

Page 1

Vendor

: IBM

Exam Code : C2150-198

Version: Demo

Cheat-Test, help you pass any IT exam!


Cheat-Test.com - The Worldwide Renowned IT Certification Material Provider! The safer, easier way to help you pass any IT Certification exams.

We provide high quality IT Certification exams practice questions and answers (Q&A). Especially Cisco, Microsoft, HP, IBM, Oracle, CompTIA, Adobe, Apple, Citrix, EMC, Isaca, Avaya, SAP and so on. And help you pass an IT Certification exams at the first try.

Cheat-Test product Features: •

Verified Answers Researched by Industry Experts

Questions updated on regular basis

Like actual certification exams our product is in multiple-choice questions (MCQs).

Our questions and answers are backed by our GUARANTEE.

7x24 online customer service: contact@cheat-test.com

Click Here to get more Free Cheat-Test Certification exams!

http://www.Cheat-Test.com


Q: 1 Recently the Risk Officer of your organization discovered that all passwords for the key databases containing web certificates in the organization are stored in plain text in the webseald-default.conf file, this is not acceptable and must be configured to be more secure. How can this be accomplished? A. Use iKeyman to create a hash file, reconfigure the webseald-default.conf file to use this hash file instead of the plain text password option to open a key database. B. Use iKeyman to create a stash file, reconfigure the webseald-default.conf file to use this stash file instead of the plain text password option to open a key database. C. Generate a hash file using command "ibmhash -db key.kdb -hash key.hash -password <current password> -newpassword <new password>"; next reconfigure the webseald-default.conf file to use this hash file instead of the plain text password option to open a key database. D. Generate a stash file using command "ibmstash -db key.kdb -stash key.sth -password <current password> -newpassword <new password>"; next reconfigure the webseald-default.conf file to use this stash file instead of the plain text password option to open a key database. Answer: B Q: 2 An administrator wants to restore the pdbackup.lst_22dec2011.10_22.dar archive on a Windows operation system from the default location. Which command should the administrator run? A. pdinfo -a restore -f C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_22dec2011.10_22.dar B. pdbackup -a extract -f C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_22dec2011.10_22.dar C. pdbackup -a restore -f C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_22dec2011.10_22.dar D. pdrestore -a restore -f C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_22dec2011.10_22.dar Answer: C Q: 3 What are two supported Single Sign-On methods used for WebSphere Application Server? (Choose two.) A. HTTP Authentication Method B. Advanced Authentication Method C. Trusted Association Interceptor D. Lightweight Third Party Association E. Client Side Certificate Authentication Method Answer: C,D Q: 4 What is the name of the configuration file option which points to the kdb file used for backend server certs? A. ssl-keyfile B. ssl-cert-keyfile C. webseal-cert-keydb D. webseal-cert-keyfile Answer: D Q: 5


Given the requirement that users can only access a particular resource from Monday-Friday from 8:00am-4:30pm, what pdadmin command will update a POP named "employees" to set this restriction? A. pop modify employees set access mon:fri,08:00-16:30 B. pop modify employees set tod-access monlfri:08:00-4:30 C. pop modify employees set access mon,tue,wed,thu,fri:0800-16:30 D. pop modify employees set tod-access mon,tue,wed,thu,fri:08:00-16:30 Answer: D Q: 6 What modes are supported by the staging utility on Common Auditing and Reporting Server? A. Full, Incremental, Prune B. Trim, Full, Chronological C. Historical, Trim, Incremental D. Historical, Incremental, Prune Answer: D Q: 7 What are two prerequisite components are required when installing and configuring a base Security Access Manager Policy Server environment? (Choose two.) A. IBM Security Utilities B. Security Access manager Runtime C. Security Access Manager Web Server D. Security Access Manager Policy Proxy Server E. Security Access Manager Authorization Server Answer: A,B Q: 8 Security Access Manager supports which object type? A. Java Object B. Group Object C. Junction Object D. Browser Object Answer: C Q: 9 What pdadmin server task option is used to add an additional backend server to a WebSEAL junction? A. -a option. B. add option. C. -add option. D. add_server option Answer: B Q: 10 If someone tries to gain access to a user's account by carrying out a dictionary attack but fails, which report will show an attack to an environment? A. Most Active Accessors Report B. Failed Authorization History Report C. Audit Event History by User Report D. Failed Authentication History Report


Answer: D


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.