(495) 925-0049, ITShop интернет-магазин 229-0436, Учебный Центр 925-0049
  Главная страница Карта сайта Контакты
Поиск
Вход
Регистрация
Рассылки сайта
 
 
 
 
 

Экзамен Tivoli 877: IBM Tivoli Identity Manager V4.6

Разделы экзамена:

Раздел 1 - Planning:

  • 1.1 Given the existing organization and reporting structure, gather the requirements and develop the solution so that an Organization Structure design is created.

    With emphasis on performing the following steps:

    Gather organization structure requirements
    Discuss alternatives
    Formalize organization structure
    Document organization structure

  • 1.2 Given the desired services list and Organization Structure design, gather target platforms, business processes and develop the solution so a Service design is created.

    With emphasis on performing the following steps:

    Gather services target platforms
    Define organization requirements
    Gather platform business processes
    Identify unsupported platforms
    Document services requirements

  • 1.3 Given the existing Human Resources data and the Services design, gather entity requirements and develop the solution so an Entities design is created.

    With emphasis on performing the following steps:

    Validate Human Resource data
    Gather entity requirements
    Design entities
    Document entity design

  • 1.4 Given the existing and projected business processes, gather the lifecycle management requirements and develop the solution so a Lifecycle Management design is created.

    With emphasis on performing the following steps:

    Gather lifecycle management requirements
    Design lifecycle management strategy
    Document lifecycle design

  • 1.5 Given the existing and projected business processes, gather the email management requirements and develop the solution so an Email Management design is created.

    With emphasis on performing the following steps:

    Determine email volume and frequency
    Determine aggregation policy
    Determine format and content of the aggregated email

  • 1.6 Given the existing role information and Organization Structure design, gather the role requirements and develop the solution so a Roles design is created.

    With emphasis on performing the following steps:
    Gather role requirements
    Define organization requirements
    Design the high-level role structure
    Document role design

  • 1.7 Given the existing provisioning policies and Organization Structure design, gather requirements, discuss and formalize the design so a Provisioning Policies design is created.

    With emphasis on performing the following steps:

    Gather policy requirements
    Define organization requirements
    Gather entitlement requirements
    Define membership
    Design high-level policy structure
    Define service selection policies
    Document policy design

  • 1.8 Given the existing workflows and services design, gather the requirements including workflow scope and approach and develop the solution so the Workflow design is created.

    With emphasis on performing the following steps:

    Gather workflow requirements
    Define workflow scope
    Design workflow approach
    Document the workflow design

  • 1.9 Given the existing Human Resources data and the entities design, analyze and map the data to the IBM Tivoli Identity Manager LDAP attributes and develop the solution so the Identity design is created.

    With emphasis on performing the following steps:

    Gather identity source requirements
    Analyze identity source data
    Map identity data to IBM Tivoli Identity Manager
    Document identity requirements

  • 1.10 Given the existing Identity policies, Entities design and Identity sources design, gather the Identity Policy and Organizational requirements and develop the solution so the Identity Policy design is created.

    With emphasis on performing the following steps:

    Gather identity policy requirements
    Define organizational requirements
    Design high-level ID policy approach
    Document ID policy design

  • 1.11 Given the existing Password Policies and services design, gather the requirements and define the scope so the Password Policies design is created.

    With emphasis on performing the following steps:

    Gather password policy requirements
    Define password policy scope
    Define password settings
    Document password policy design

  • 1.12 Given the existing application security policies, Organization Structure design, Services design and Entity design, gather the IBM Tivoli Identity Manager Groups and ACIs so the Security Model design is created.

    With emphasis on performing the following steps:

    Gather IBM Tivoli Identity Manager access requirements
    Design IBM Tivoli Identity Manager Groups
    Design IBM Tivoli Identity Manager ACIs
    Document IBM Tivoli Identity Manager security model

  • 1.13 Given proper policies and documentation, gather the customization requirements and determine the feasibility and scope so the Customization design is created.

    With emphasis on performing the following steps:

    Gather customization requirements
    Determine customization feasibility
    Design high-level functionality
    Determine customization scope
    Document server customization design

  • 1.14 Given proper documentation, gather the adapter requirements and develop the solution so a custom adapter design is created.

    With emphasis on performing the following steps:

    Gather agent requirements
    Determine customization feasibility
    Design high-level functionality
    Determine customization scope
    Document agent customization design

  • 1.15 Given the hardware assets list, existing network configuration and the Services design, gather the system architecture requirements and design the solution so a System Architecture document is created.

    With emphasis on performing the following steps:

    Gather system architecture requirements
    Design system architecture
    Document system architecture

  • 1.16 Given the Services design and existing project plans, prioritize the platforms and determine the adapter phases so that an Adapter Project Plan is created.

    With emphasis on performing the following steps:

    Prioritize platforms
    Group agents into phases
    Determine timeline for phases
    Document agent rollout plan

  • 1.17 Given the proper documentation, gather the initial timeline requirements and determine the initial solution rollout timeline so that an Initial Solution Rollout Project Plan is created.

    With emphasis on performing the following steps:

    Gather timeline requirements
    Determine timeline for production rollout
    Document timeline/plan

  • 1.18 Given the System Architecture design and existing backup processes, gather the backup requirements and develop the solution so a Backup and Recovery Strategy design is created.

    With emphasis on performing the following steps:

    Gather backup requirements
    Design backup strategy
    Document backup strategy

  • 1.19 Given proper documentation, analyze the current system and upgrade requirements so an Upgrade Planning document is created.

    With emphasis on performing the following steps:

    Analyze current system
    Determine system changes from upgrade
    Analyze customizations
    Design the customization upgrade plan
    Develop overall upgrade plan
    Document upgrade plan

Раздел 2 - Installation

  • 2.1 Given prerequisite and patch software, install and configure prerequisite software so that it is ready for IBM Tivoli Identity Manager.

    With emphasis on performing the following steps:

    Gather hardware and platform specifications
    Validate and update hardware to IBM Tivoli Identity Manger specifications
    Determine the prerequisite patch level required for IBM Tivoli Identity Manager
    Install prerequisites
    Install prerequisite patches
    Configure prerequisites for IBM Tivoli Identity Manager installation

  • 2.2 Given the IBM Tivoli Identity Manager installation software, review the installation guides and install the software so that it passes a basic functionality test.

    With emphasis on performing the following steps:

    Obtain software
    Review installation documentation
    Gather environment data
    Install software

  • 2.3 Given the IBM Tivoli Identity Manager adapter software, install the agent on the managed resource and the adapter profile on the IBM Tivoli Identity Manager server so that the adapter is properly installed and functioning.

    With emphasis on performing the following steps:

    Determine agent version required
    Obtain proper agent software and profile
    Install agent software
    Install profile on IBM Tivoli Identity Manager server

  • 2.4 Given the installed adapter, create a certificate request and install the certificate such that the adapter functions properly with its certificate.

    With emphasis on performing the following steps:

    Generate certificate request from agent
    Submit certificate request to Certificate Authority (CA)
    Obtain certificates from Certificate Authority (CA)
    Install CA certificate on server
    Install certificate on agent

  • 2.5 Given an installed IBM Tivoli Identity Manager application, login and utilize the system functions to validate IBM Tivoli Identity Manager is running properly.

    With emphasis on performing the following steps:

    Startup IBM Tivoli Identity Manager environment
    Review logs to ensure clean startup
    Login
    Navigate through environment
    Submit scheduled request
    Bring up workflow designer to verify applet environment

Раздел 3 - Implementation

  • 3.1 Given the appropriate installation files, set the environment values such that the initial environment settings are configured.

    With emphasis on performing the following steps:

    Set memory settings
    Set thread count
    Configure recycle bin age limit

  • 3.2 Given the appropriate organizational design documents, create the required organizational containers such that the organization structure is configured.

    With emphasis on performing the following steps:

    Create any additional organizations
    Create organizational units
    Create locations
    Create business partner organizations
    Create admin domains

  • 3.3 Given the appropriate IBM Tivoli Identity Manager Group and ACI design and access to the ITIM GUI, create the ITIM Groups, ACIs and relationship expressions such that the ITIM security model meets customer expectations.

    With emphasis on performing the following steps:

    Create IBM Tivoli Identity Manager Groups
    Create organizational ACIs
    Create provisioning ACIs
    Create report ACIs
    Create category ACIs
    Create required LDAP indices for attributes defined in relationship expressions

  • 3.4 Given object classes, an appropriate list of attributes and access to the LDAP tool, create and configure custom attributes such that the schema is extended.

    With emphasis on performing the following steps:

    Add attributes to LDAP
    Create new custom class
    Create custom labels
    Add attributes to the service schema
    Add attributes to the agent schema
    Add indexes as required

  • 3.5 Given the Entities design, create custom entities that will satisfy customer requirements.

    With emphasis on performing the following steps:

    Add entity
    Configure default search attribute
    Configure name attribute
    Configure mapped attributes
    Create custom operation definitions
    Save entity

  • 3.6 Given the appropriate Forms design, configure the Forms such that all required Forms are customized.

    With emphasis on performing the following steps:

    Select Form to be customized
    Add or remove tabs
    Add or remove attributes
    Change control types
    Populate attribute lists
    Configure attribute "parameters"
    Save form template

  • 3.7 Given the appropriate organizational Roles design, create the static and/or dynamic role such that they are configured.

    With emphasis on performing the following steps:

    Create static roles
    Create dynamic roles, including LDAP filter

  • 3.8 Given the appropriate Services design and managed services data, create IBM Tivoli Identity Manager service objects such that they are configured and functioning.

    With emphasis on performing the following steps:

    Determine service type
    Populate service form
    Test service connectivity
    Save service
    Set policy enforcement type
    Prevent adoption of system accounts

  • 3.9 Given the appropriate Workflow design, create workflows such that they satisfy customer requirements.

    With emphasis on performing the following steps:

    Determine workflow type
    Define workflow data
    Add elements to workflow
    Configure elements
    Connect elements
    Configure notification templates
    Configure Action Text
    Save workflow

  • 3.10 Given the appropriate service selection policy design and the Java Script definitions, enter the definition for each service selection policy so that the service selection policies function as required.

    With emphasis on performing the following steps:

    Populate general tab
    Determine service type
    Enter Java Script definition
    Save changes to policy

  • 3.11 Given the appropriate Provisioning Policy design, add entitlements, memberships and targets such that the provisioning policies are properly configured.

    With emphasis on performing the following steps:

    Populate general tab
    Add memberships
    Add entitlement
    Set target type
    Configure parameter lists
    Associate workflow
    Save changes to policy

  • 3.12 Given the appropriate Join Directives design, set the join directives for each profile so that the join directives are set.

    With emphasis on performing the following steps:

    Select service profile
    Select attribute
    Set join type
    Save join directives

  • 3.13 Given the Password Policy design and custom password policy extension, create password policy such that it creates the appropriate passwords for the specified service type.

    With emphasis on performing the following steps:

    Copy custom password policy extension files
    Edit password policies file
    Populate general tab
    Choose target service types/instances
    Set password rules
    Save changes to policy

  • 3.14 Given the Identity Policy design, create identity policy such that it creates the appropriate IDs for the specified service type.

    With emphasis on performing the following steps:

    Populate general tab
    Choose target service types/instances
    Enter Java Script definition
    Save policy changes

  • 3.15 Given the Password Settings design, configure password settings such that passwords are handled appropriately throughout IBM Tivoli Identity Manager.

    With emphasis on performing the following steps:

    Configure lost password behavior
    Enable or disable password editing
    Enable or disable password synchronization
    Set password expiration period
    Set password retrieval period
    Set maximum number of invalid login attempts
    Save password settings

  • 3.16 Given the appropriate User Interface Parameters design and the ui.properties file, configure the ui.properties file so that the user interface requirements meet customer expectations.

    With emphasis on performing the following steps:

    Configure timeout value
    Configure page size
    Configure page link maximum
    Configure search results maximum
    Configure retry settings

  • 3.17 Given the appropriate installation and custom files, enter email properties so the settings are configured.

    With emphasis on performing the following steps:

    Configure the password notification method
    Enter email address for IBM Tivoli Identity Manager email address
    Add custom password notification workflows

  • 3.18 Given an email management design, configure the IBM Tivoli Identity Manager Post Office settings such that the email management requirements have been met.

    With emphasis on performing the following steps:

    Configure the System-wide Post Office setting
    Configure the Post Office Interval
    Configure the Post Office settings on the manual activity nodes
    Define the aggregation email template
    Define the aggregation method

  • 3.19 Given an email management design, configure the workflow notification templates such that the email management requirements have been met.

    With emphasis on performing the following steps:

    Configure the default escalation limit
    Configure reminder interval
    Customize default notification templates

Раздел 4 - Data Management

  • G4.1 Given the detailed design, Human Resources data and the IBM Tivoli Identity Manager schema, determine the identity data sources and the load method (IBM Tivoli Directory Integrator (ITDI) or DSML) to create an identity loading process.

    With emphasis on performing the following steps:

    Identify data sources
    Determine load method (ITDI, custom JNDI or DSML)
    Map external data to IBM Tivoli Identity Manager schema (DSML or CSV)
    If using ITDI, configure ITDI server

  • 4.2 Given an HR feed data file and the Organization Structure design, create an IBM Tivoli Identity Manager HR feed service, schedule and run a reconcile such that the data is loaded into the ITIM repository.

    With emphasis on performing the following steps:

    Create DSML or IDI service
    Define placement rule
    Initiate reconcile
    Validate reconciled user data
    Schedule reconcile

  • 4.3 Given the IBM Tivoli Identity Manager adapter and service definition, migrate existing accounts so that the accounts are associated with appropriate identities.

    With emphasis on performing the following steps:

    Define reconciliation for services
    Define adoption rules at the appropriate level
    Run initial reconciliation
    Verify reconciliation results

  • 4.4 Given orphan accounts and their appropriate owners, configure the correct Aliases on the owner's person records so that the orphan accounts are resolved.

    With emphasis on performing the following steps:

    Identify orphan accounts
    Identify owners for orphan accounts
    Add user ID of orphan to owner's ER aliases attributes
    Add system "Person" records to adopt system accounts
    Run reconciliation again
    Verify orphans get matched with correct person records

  • 4.5 Given workload information and required file access, configure and schedule recycle bin clean up so that expired objects are removed.

    With emphasis on performing the following steps:

    Configure recycle bin age limit
    Create cron job for recycle bin cleaning

Раздел 5 - Troubleshooting

  • 5.1 Given access to the relevant logs and files, review logs to help resolve the issues.

    With emphasis on performing the following steps:

    Gather log files
    Review IBM Tivoli Identity Manager log files
    Review middleware logs (DB2, IDS, WAS)
    Determine problem category
    Increase logging level for appropriate category
    Reproduce problem if possible
    Re-level log file for addition/problem information
    Call Support for PMR #
    Take appropriate action

  • 5.2 Given a non-working configuration and access to relevant logs and files, identify the source of problems.
  • 5.3 Given a problematic data management scenario, identify the source of problems.
  • 5.4 Given adapater related problems, troubleshoot to identify the source of the problem and resolve if possible.

Раздел 6 - Production

  • 6.1 Given a functioning test environment and production systems, copy configurations to the production environment such that the production system mirrors the test systems and functions with production agents.

    With emphasis on performing the following steps:

    Create production environment including prerequisites
    Apply security to production system
    Promote ITIM configuration data to production using appropriate tools
    Promote customizations from test to production using appropriate tools
    Modify services to match production adapters
    Reconcile production adapters
    Test the production system

  • 6.2 Given a list of services and a schedule for the reconciliations, create reconciliation schedules for each service with appropriate filters.

    With emphasis on performing the following steps:

    Determine systems to be reconciled
    Determine frequency of reconciliation for each service
    Define any reconciliation filters for each service
    Create reconciliation schedule for each service

  • 6.3 Given a production environment copied from a functioning test environment, perform production verification and acceptance.

    With emphasis on performing the following steps:

    Validating communication between ITIM server and all adapters
    Validate provisioning policy changes using Policy Preview
    Validate email notifications are reaching the appropriate target(s)

Раздел 7 - Maintenance

  • 7.1 Given the IBM Tivoli Identity Manager systems, implement monitoring procedures so that the ITIM deployment can be monitored.

    With emphasis on performing the following steps:

    Monitor connectivity to database and LDAP
    Monitor disk space of application servers and repositories
    Track logs and log sizes
    Monitor error logs for problems
    Manage LDAP recycle bin
    Monitor cluster members
    Schedule system backups

  • 7.2 Given the IBM Tivoli Identity Manager upgrade software and documentation, upgrade ITIM on test and production systems so that it is functioning properly.

    With emphasis on performing the following steps:

    Determine components to upgrade
    Obtain server component upgrade software
    Request backup of all ITIM components
    Request backup of all system components
    Create "Test" environment
    Install upgrade on "Test"
    Repackage custom applications with upgraded API JAR files
    Validate "Test" upgrade environment
    Install upgrade on production server
    Test server

  • 7.3 Given the adapter software and documentation, upgrade and test the IBM Tivoli Identity Manager adapters so that it is upgraded and functioning properly.

    With emphasis on performing the following steps:

    Obtain new adapter software
    Determine components to install
    Request backup systems to be upgraded
    Install new adapter/upgrade
    Install adapter profile
    Verify certificates
    Test adapter

  • 7.4 Given the fixpack software and documentation, install the appropriate fixpack on the test and production systems such that the software is functioning properly.

    With emphasis on performing the following steps:

    Obtain fixpack software
    Determine requirements for fixpack from fixpack documents
    Create "Test" environment
    Install fixpack on "Test"
    Perform function test on items fixed by fixpack
    Request backup system
    Install fixpack on production server
    Test the fixpack

  • 7.5 Given the Performance Tuning Guide and customer's hardware specifications, configure system settings such that IBM Tivoli Identity Manager is tuned and functioning properly.

    With emphasis on performing the following steps:

    Identify IBM Tivoli Identity Manager deployment parameters and settings
    Utilize Performance Tuning Guide
    Set memory settings
    Configure logging levels, options and file sizes
    Set messaging - timeout values
    Set disk usage limits

Подготовка к экзамену: 

Курсы с преподавателем:

Course title: IBM Tivoli Identity Manager 4.6 Introduction
Course duration: 2 hours, self-paced
Course number: n/a. Course numbers vary depending on the education delivery arm used in each geography. Please refer to the Web site below to find the appropriate course number according to the education delivery vendor chosen.
Geo education page: Worldwide schedules available at Tivoli software education.
IBM PartnerWorld "You Pass We Pay": This course is approved for IBM PartnerWorld You-Pass, We-Pay.
Abstract: The IBM Tivoli Identity Manager 4.6 Introduction course is directed to anyone new to the Identity Manager system. Material covered includes: Identity Manager functionality, advantages and benefits, how Identity Manager is used and system architecture.

Course title: Preparing for an IBM Tivoli Identity Manager 4.6 Implementation
Course duration: 2 days
Course number: TV351-IBM Technical Education Services. Course numbers vary depending on the education delivery arm used in each geography. Please refer to the Web site below to find the appropriate course number according to the education delivery vendor chosen.
Geo education page: Worldwide schedules available at Tivoli software education.
IBM PartnerWorld "You Pass We Pay": This course is approved for IBM PartnerWorld You-Pass, We-Pay.
Abstract: Preparing for an IBM Tivoli Identity Manager 4.6 Implementation teaches the student to build a comprehensive deployment strategy for Tivoli Identity Manager. The students step through the planning required to ensure a successful Tivoli Identity Manager deployment that is aligned with business objectives. During class students first learn to identify key business requirements. Then, through lecture and group discussions, they learn to design a deployment strategy modeled around the business requirements as well as the security policy. Important planning considerations covered in class will include user repositories, access control, organization trees, policies, and so on. At the completion of this two-day course, the students will be able to help plan the IBM Tivoli Identity Manager implementation project for their organizations. 

Course title: IBM Tivoli Identity Manager 4.6 Installation and Configuration
Course duration: 2 days
Geo education page: Worldwide schedules available at Tivoli software education.
IBM PartnerWorld "You Pass We Pay": This course is approved for
Abstract: The IBM Tivoli Identity Manager 4.6 Installation and Configuration course is designed for individuals who need to know the core steps of how to install IBM Tivoli Identity Manager (ITIM) 4.6. Topics include middleware installation and configuration, IBM Tivoli Identity Manager 4.6 installation and configuration, Linux adapter installation and configuration, and IBM Tivoli Directory Integrator integration. This course contains lectures and labs.

This course is built on Red Hat Enterprise Linux 3.0 Update 5 servers. The final configuration of the classroom will be used in future courses so that the base scenario can be expanded.

It is recommended that the Preparing for an IBM Tivoli Identity Manager 4.6 Implementation course be completed prior to taking this course.

For information on pricing, scheduling and course registration: Course names and/or course numbers vary depending on the education delivery arm used in each geography. Please refer to the Tivoli software education Web site to find the appropriate course and education delivery vendor for each geography. 

General training information can also be found at: IBM IT Training.
(ibm.com/training) 

Литература: 

Publication title: Certification Study Guide: IBM Tivoli Identity Manager Version 4.6
Publication order number: SG24-7118-00 (IBM Form Number); 0738493910 (ISBN)
Abstract: This IBM Redbook is a study guide for the "IBM Certified Deployment Professional - IBM Tivoli Identity Manager V4.6" certification test, test number 877, and is meant for those who want to achieve IBM Certifications for this specific product.

Publication title: Redbook - Identity Management Design Guide with IBM Tivoli Identity Manager
Publication order number: SG24-6996-01
Abstract: This publication provides a methodology for designing an Identity Management solution with IBM Tivoli Identity Manager 4.6. Starting from the high-level, organizational viewpoint we show how to define user registration and maintenance processes using the Self Registration and Self Care Interfaces as well as the Delegated Administration capabilities. Using the Integrated Workflow we will automate the submission/approval processes for identity management requests and with the Automated User Provisioning we will take workflow output and automatically implement the administrative requests on the environment with no administrative intervention. This book is a valuable resource for security administrators and architects who wish to understand and implement a centralized identity management and security infrastructure.

Publication title: Redbook - Identity and Access Managment Solutions
Publication order number: SG24-6692-00
Abstract: The identity and access management solutions described in this IBM Redbook include the following key areas: User provisioning: Develop a portlet interface for self-care (user and account management), and approval of user provisioning requests by utilizing the Tivoli Identity Manager (TIM) APIs, services, workflow and policies. Tivoli Directory Integrator Assembly Lines and connectors are used to provision users to an LDAP directory, DB2 UDB database, and DB2 Content Manager. Authentication: Provide an integrated single sign-on (SSO) authentication solution using Tivoli Access Manager, and related technologies such as trusted association interceptor (TAI), Credential Vault, and LtpaToken. Authorization: Manage user access control through TIM provisioning policies and role mapping with products that have access models such as Tivoli Access Manager, WebSphere Portal, and DB2 Content Manager. First, we describe the key concepts, benefits, and architecture of an identity and access management solution. Then we present an end-to-end working example scenario for identity and access management system. The example includes business requirements, architecture, details for implementing the runtime and development environments, creation of Identity Manager policies and workflow, provisioning portlet development, deployment, and administration. Finally, we provide procedures to deploy and run the HR and document management applications used in the working example.

Publication title: Redbook - IBM Tivoli WebMEDs Deployment Guide Access Manager, Identity Manager and Privacy Manager on One Machine
Publication order number: SG24-7036-00
Abstract: This Deployment Guide provides a step-by-step installation of the WebMED demonstration environment for the IBM Tivoli security products:IBM Tivoli Access Manager for e-business, IBM Tivoli Identity Manager, IBM Tivoli Privacy Manager.

Publication title: Redbook - Enterprise Security Architecture using IBM Tivoli Security Solutions
Publication order number: SG24-6014-00
Abstract: This redbook looks at an overall Enterprise Security IT Architecture, focusing on the integration of audit, access control, flow control, identity/credential, and integrity subsystems throughout extensive e-business enterprise implementations. The available security product diversity in the marketplace challenges everybody in charge of designing single secure solutions or an overall enterprise security architecture. With Access Manager, Risk Manager, PKI, Identity Manager, User Admin, and Security Manager, Tivoli offers a complete set of security products designed to address these challenges.

This redbook depicts several e-business scenarios with different security challenges and requirements. It will use the IBM Method for Architecting Secure Solutions (MASS) to describe necessary architectural building blocks and components. By matching the desired Tivoli security product criteria, it will describe appropriate security implementations that will meet the targeted requirements.

This book is a valuable resource for security officers, administrators, and architects who wish to understand and implement enterprise security following architectural guidelines.

To order publication access IBM Publications Center on the Web or by phone: (note publication order number): 

IBM Publications Center

or call IBM Direct Publications: 1-800-879-2755 (US) 1-800-426-4968 (Canada) or from any non-IBM bookstore 

Самостоятельнаяподготовка: 

Self Study title: IBM Tivoli Identity Manager V4.6 Product Information and Related Links
Order number: n/a
Abstract: The IBM Tivoli identity management solution can help you get users, systems and applications online and productive fast, reduce costs and maximize return on investment. This solution can automate and simplify the management of user identities, access rights and privacy policies across the e-business infrastructure. To effectively manage internal users as well as an increasing number of customers and partners through the Internet, IBM Tivoli provides the only integrated solution that addresses all four key areas of identity management.

Практический тест 

Примечание: Этот тест разработан с целью дать кандидату представление о содержании и формате вопросов сертификационного экзамена. Данный тест не является оценочным тестом. Выполнение его не гарантирует выполнение сертификационного теста.

1.       Which information is relevant to the creation of an identity feed?

A.      social security number, payroll information

B.      surname, employee ID, common name

C.      auto license ID, business phone

D.      mother's maiden name, spouse name

2.       What are the possible server configurations for an application server design?

A.      single server, clustered

B.      single server, peer-to-peer

C.      peer-to-peer, multi-master

D.      multi-master, on-demand

3.       Which Application Server does IBM Tivoli Identity Manager (ITIM) V4.6 support?

A.      IBM WebSphere

B.      Sybase EAServer

C.      Oracle 9i Application Server

D.      Microsoft .NET Server

4.       In which directory would you find the UNIX script for removing an agent profile from IBM Tivoli Identity Manager (ITIM)?

A.      $ITIM_HOME/bin/unix

B.      $ITIM_HOME/data/

C.      $ITIM_HOME/bin/agents/

D.      $ITIM_HOME/data/remote_resources/

5.       What is the base objectclass used to extend the schema to add new attributes to create a custom person class?

A.      inetOrgPerson

B.      erperson

C.      ldapPerson

D.      bpPerson

6.       When are dynamic organizational roles evaluated? (Choose two.)?

A.      when the provisioning policy is executed

B.      when a user’s personal information is changed

C.      when the provisioning policy is created with a membership containing the organizational role

D.      when the ITIM server is started

E.       when a new user is created

7.       As a result of the policy’s evaluation, a user’s account must be moved to a different service instance than the one the user is currently using. Which three actions can occur based on the system’s configuration? (Choose three.)

A.      create a new user account for the new service instance and suspend the existing user account on the old service instance

B.      create a new user account for the new service instance and delete the existing user account on the old service instance

C.      create a new user account on the new service instance, lock the existing account, and send an email to the administrator that the account must be physically removed on the existing service instance

D.      move the user account to the new service instance and suspend the existing user account on the old service instance

E.       move the user account to the new service instance and locks the existing user account on the old service instance

F.       create a new user account for the new service instance and send an email to the administrator of the service instance that the account must be physically moved from the old service instance to the new service instance

8.       What is the default join directive for a single-valued string?

A.      Priority

B.      Union

C.      Append

D.      Highest

9.       With challenge response enabled, what happens when the user exceeds the maximum number of invalid logon attempts?

A.      The user is able to be able to log in with the correct challenge response answer(s).

B.      The user's account is suspended. An administrator needs to unlock the account for the user.

C.      The administrator is notified and the user is forced to change the password.

D.      The user's account is deleted. An administrator needs to restore the account.

10.   How can you control the set of account user IDs returned by the adapter during a reconciliation? (Choose two.)

A.      by defining an Identity Policy for the service

B.      by setting a query when scheduling a reconciliation in the IBM Tivoli Identity Manager (ITIM)

C.      by defining aliases on persons to match the needed set of account user IDs

D.      by setting up reconciliation account exclusion in the ITIM LDAP

E.       by configuring the adapter using the agentCfg tool to return a selective set of user IDs to ITIM

11.   Which three items can be found using the agentCfg utility? (Choose three.)

A.      ADK version

B.      ACI version

C.      adapter's local platform IP address

D.      the location of the certificate the adapter is using

E.       adapter version

F.       Protocol Server port number

12.   Which two tasks do adapter reconciliations perform? (Choose two.)

A.      load access information into the Tivoli Identity Manager directory

B.      load person identity records into the Tivoli Identity Manager directory

C.      update the eralias attribute on the person’s identity record

D.      restore suspended accounts that are compliant with a provisioning policy

E.       monitor accesses granted outside of Tivoli Identity Manager

13.   Which three actions are recommended prior to executing an IBM Tivoli Identity Manager (ITIM) Server upgrade from version V4.5 to V4.6? (Choose three.)

A.      install appropriate system and middleware prerequisite/upgrade software

B.      install latest version of browser software

C.      back up ITIM data contained in Directory Server and database

D.      back up {ITIM_HOME}/data directory and {WAS_HOME}/system/config

E.       upgrade mail server software

F.       increase CPU speed

14.   What are three recommended methods of testing a successful fixpack installation on an IBM Tivoli Identity Manager (ITIM) Server V4.6? (Choose three.)

A.      confirm email is being sent by the email server

B.      successfully ping the ITIM Server

C.      successfully start the Internet browser

D.      successfully start the ITIM Server

E.       login successfully to the ITIM application

F.       confirm functionality within the ITIM application

Answer Key:

7.      B

8.      A

9.      A

10.  A

11.  A

12.  BE

13.  ABF

14.  A

15.  B

16.  BD

17.  AEF

18.  AE

19.  ACD

20.  DEF



 Распечатать »
 Правила публикации »
  Написать редактору 
 Рекомендовать » Дата публикации: 21.05.2007 
 

Магазин программного обеспечения   WWW.ITSHOP.RU
VCL Subscription
Комплект Dr.Web «Универсальный», 1 год, 5 ПК
Toad Data Modeler Per Seat License/Maint
The BAT! Home- 1 компьютер
Nero 2018 Platinum ESD
 
Другие предложения...
 
Курсы обучения   WWW.ITSHOP.RU
 
Другие предложения...
 
Магазин сертификационных экзаменов   WWW.ITSHOP.RU
 
Другие предложения...
 
3D Принтеры | 3D Печать   WWW.ITSHOP.RU
 
Другие предложения...
 
Поиск сертификаций
 
 
Мнение профессионалов
"Подготовка к сертификации включает в себя изучение продуктов и технологий. Возможно придется изучать те части с которыми вы еще не работали. Для новых технологий очень сложно определить то, на что следует обратить особое внимание. И вот тогда важно использовать рекомендации для сдачи экзаменов на сертификацию. Именно они помогут вам сконцентрироваться на главном..."
Jonathan Blair, MCSD for .NET Edinburgh, Scotland

"Наличие сертификата MCSE для нас обязательно. Мы не рассматриваем кандидатов на позиции, если они не прошли сертификацию. Сейчас все наши специалисты сертифицированы. Возможность показать все сертифицированных специалистов в компании - прекрасный способ показать нашу техническую квалификацию для клиентов и партнеров..."

Tony Neuser, Director of the Microsoft Solutions Practice for Unisys Global Network Services, Unisys Corporation

"Предлагая новый проект, иногда достаточно просто указать, сколько специалистов в компании имеют сертификат MCSD, чтобы подчеркнуть насколько серьезно Compaq проводит техническую экспертизу."

Mark King, Solutions Architect, Compaq Computer Corporation
Новости по теме
 
Рассылки Subscribe.ru
Информационные технологии: CASE, RAD, ERP, OLAP
Новости ITShop.ru - ПО, книги, документация, курсы обучения
Обучение для IT-профессионалов
Обучение и сертификация Microsoft
IT сертификация
 
Статьи по теме
 
Новинки каталога Download
 
Исходники
 
Документация
 
 



    
rambler's top100 Rambler's Top100