What statement is correct when assigning roles to Active Directory security groups in IBM Tivoli Endpoint Manager Web Reports?
A. Security groups can be assigned any role.
B. Security groups can only be assigned the role Normal.
C. Security groups can only be assigned the role Read-only.
D. Security groups can only be assigned the role Administrator.
If UDP is blocked by firewalls, how can IBM Tivoli Endpoint Manager (TEM) Agents receive new content?
A. reprogram the firewall to allow UDP
B. change the TEM Server configuration
C. modify corporate policies to allow the use of UDP
D. configure the TEM Agent to periodically poll for new content
The IBM Tivoli Endpoint Manager (TEM) Agent installed on a TEM Relay is failing. It is determined that the TEM Agent should be reinstalled. How is this accomplished?
A. Run the Windows Installer program from the Control Panel to remove the TEM Agent and then reinstall it.
B. Run the BES Remove Utility to fully remove both the TEM Agent and TEM Relay. Reinstall the TEM Agent and then the TEM Relay.
C. Run the BES Remove Utility to fully remove the TEM Relay and then reinstall the TEM Relay onto the system to repair the TEM Agent.
D. Stop the TEM Relay Service first and then run the TEM Utility to fully remove the TEM Agent. Then reinstall the TEM Agent and restart the TEM Relay Service.
Installation and setup of IBM Tivoli Endpoint Manager (TEM) Client Manager for Endpoint Protection (CMEP) involves which two steps? (Choose two.)
A. CMEP Site Subscription
B. importing the CMEP Masthead
C. activating CMEP tasks and analyses
D. installing the CMEP Module on the TEM Server
E. downloading the CMEP Masthead from the IBM Support site
What should be done if a newly licensed site is not visible in the IBM Tivoli Endpoint Manager Console?
A. analyse the License Overview data
B. run the task Check for New Licenses
C. run the Fixlet Check for New Licenses
D. click the button Check for License Update
Where is the IBM Tivoli Endpoint Manager for Security and Compliance Analytics (SCA) software downloaded and unpacked?
A. SCA Dashboard
B. IBM Support Site
C. Passport Advantage
D. BES Installers directory
The configuration of an IBM Tivoli Endpoint Manager V8.1 (TEM) deployment has been changed to use Windows Authentication. What will a user who has previously logged into the TEM Console experience assuming that the user's publisher.pvk and publisher.crt files have been stored locally?
A. The user will see no change.
B. The user will need to supply their user name to log in to the TEM Console.
C. The user will need to modify their DSN Connection. Once reconfigured, the user will only require a user name to log into the TEM Console.
D. The user will need to modify their DSN Connection. Once reconfigured, the user will continue to use their user name and password to log into the TEM Console.
A retail company wants to install an IBM Tivoli Endpoint Manager (TEM) environment that will manage 10,000 endpoints across 100 stores nationwide. The TEM Server will be located at the company's corporate headquarters and each store will have IT technicians responsible for managing that store's 100 endpoints through TEM. Each store is connected to corporate headquarters through a dial-up or satellite connection. What is the best way for the technicians to access the TEM Server?
A. Install consoles on each store technician's laptop.
B. Setup a TEM Web Console that each technician can access over the Internet.
C. Require every technician to connect to the TEM Server through a remote desktop.
D. Setup a terminal server with a high speed connection that provides access to the TEM Server.
Which three components can be installed with the IBM Tivoli Endpoint Manager (TEM) Installation Guide (Component Installer)? (Choose three.)
A. TEM Relay
B. TEM Server
C. TEM Console
D. TEM Agents for UNIX
E. TEM Agents for Windows
F. TEM for Software Usage Analysis
Which statement best describes the bufferdir used by the BES FillDB service on the IBM Tivoli Endpoint Manager (TEM) Server?
A. It should always be empty in a healthy environment.
B. It is used to store downloaded files from the Internet used by Actions.
C. It may take several minutes for the files to be consumed in a large and active environment.
D. It is used to populate the Fixlet details collected from external sites into the TEM database.