Password synchronization provides change to accounts of which ownership type?
A. Device
B. System
C. Individual
D. All of the above
Which interface needs to be implemented to create a custom password generator?
A. com.ibm.tivoli.itim.passwordrules.PasswordGenerator
B. com.ibm.passwordrules.PasswordGenerator
C. generator.ibm.tivoli.itim.CustomGenerator
D. com.ibm.passwordrules.Rule
When gathering requirements for work flows, which business process might require a manager approval?
A. When a business process is defined for an application owner to be notified on account deletions
B. When a business process is defined to approve last name change due to marriage
C. When a business process is defined for an employee vacation request approval
D. When a business process is defined for contractor address change
An adapter is a software component that provides an interface between a managed resource and IBM Security Identity Manager. Which two statements are true? (Choose two)
A. An agent less adapter can be on a remote system from the managed system, in order to administer accounts.
B. An agent-based adapter must be on the managed resource, in order to administer accounts.
C. All adapters provided by IBM are implemented using IBM Directory Integrator technology.
D. IBM provides Adapters for all managed systems and all can be customized.
E. Custom adapters are required to go through a stringent review process.
When prioritizing platforms for which to provide an adapter which of the following criteria would cause you to exclude a platform from an initial deployment?
A. A large user population is defined on the system.
B. Access is limited due to sensitive content.
C. Users are added and deleted dynamically.
D. User auditing is required.
Which of the following is a best practice high availability setup of LDAP for use with IBM Security Identity Manager?
A. Two read/write master LDAPs with load balancer between them to distribute requests and I SIM configured to point at the load balancer
B. Two read/write master LDAPs configured in fail over mode with load balancer and ISIM configured to point at the load balancer
C. One master and one replica LDAP with ISIM configure to the master LDAP
D. Separate read/write master LDAP for each node of an ISIM cluster
Which IBM Security Identity Manager properties file is updated to register new javascript extensions?
A. scriptframework.properties
B. fesiextensions.properties
C. wsExtensions.properties
D. enRole.properties
Which option does the Service Connection mode attribute on the service form specify?
A. Whether ISIM will capture password changes made directly on the end point or not.
B. Whether the service will function as a Manual service or Automated service.
C. Whether the adapter will use SSL to communicate with the end point or not.
D. Whether service will use HTTP or HTTPS to connect with the adapter.
A customer requires that users should NOT be able to circumvent answering challenge response questions when they login to the ISIM Self Service Console, and also wants the responses to challenges to appear masked (such as passwords) instead of appearing in plain text. How can this be achieved?
A. Setcom.ibm.tivoli.ibm.challengeResponse.bypassChallengeResponse=false and com.ibm.tivoli.ibm.challengeResponse.showAnswers=false in scriptframework.properties file.
B. Set enrole.password.challengeResponse.bypassChallengeResponse=false in enrole.properties file and select checkbox for Enable Password Editing under Security Settings.
C. Set enrole.password.challengeResponse.bypassChallengeResponse=false and enrole.password.challengeResponse.showAnswers=false in enrole.properties file.
D. Set ui.challengeResponse.bypassChallengeResponse=faise and ui.challengeResponse.showAnswers=false in ui.properties file.
Orphan accounts are managed resource accounts whose owner in the IBM Security Identity Manager Server cannot be determined.
Orphan accounts can be assigned by the administrator to a user with which restriction?
A. When deleting the orphan accounts in IBM Security Identity Manager, they are not deleted on the managed resource.
B. The administrator can assign the orphan account to any user as long as the applicable policies allow it.
C. The administrator can assign the orphan account to any user and bypass policy enforcements.
D. The orphan account, once assigned an owner, can not become orphan again.