Sunteți pe pagina 1din 11

Exam Title

: IBM 000-793 : IBM Tivoli Security Compliance Manager V5.1 Implementation

Version : R6.1

www.Prepking.com

Prepking - King of Computer Certification Important Information, Please Read Carefully


Other Prepking products A) Offline Testing engine Use the offline Testing engine product to practice the questions in an exam environment. B) Study Guide (not available for all exams) Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is updated. Free updates are available for 90 days after the purchase. You should check your member zone at Prepking and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go towww.Prepking.com 2.Click on Member zone/Log in (right side) 3. Then click My Account 4.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@Prepking.com. You should include the following: Exam number, version, page number, question number, and your login ID. Our experts will answer your mail promptly. Copyright Each PDF file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular PDF file is being distributed by you, Prepking reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@Prepking.com.

www.Prepking.com

1. Which statement is true about the Test Collector operation? A. Test Collector does exactly the same job as Run Collector. B. A single collector can be tested on multiple client systems at the same time. C. Test Collector can be used to test only one collector at a time on a specific client. D. Test Collector can be used to execute multiple collectors on a client simultaneously. Answer: C 2. A customer has a standard DMZ network topology. They want to deploy the IBM Tivoli Security Compliance Manager (ITSCM) V5.1.0.2 Administration Console on Linux hosts only. Which preliminary step should be performed to ensure a successful installation of the Administration Console? A. The umask must be set to 022. B. The Administrator account must be created to install the ITSCM Administration Utilities. C. The Administrator needs to chmod the ownership of the install package to be set at 777. D. The install package automatically sets the file protections appropriately if installing as root. Answer: A 3. When a collector is registered with the IBM Tivoli Security Compliance Manager (ITSCM) Server, which three schedules can be defined and associated with the collector? (Choose three.) A. at sunset B. every full moon night C. every Christmas Eve D. random time of the day E. every Thanksgiving day F. every Monday on January, February and March Answer: CDF 4. Which command is used to launch the Administration Console? A. jacgui B. scmserver start C. scmjacgui start D. net start "SCM Console" Answer: A 5. Which SQL operation is supported in the Query pane of the IBM Tivoli Security Compliance Manager (ITSCM) Administration Console? A. insert B. select C. delete D. update

www.Prepking.com

Answer: B 6. Using the IBM Tivoli Security Compliance Manager (ITSCM) Administration Console, how are compliance queries scheduled and the compliance reports emailed? A. via the Reports tab, click on the report name, click "Send Now" button B. via the Messaging/Email pane, click on the compliance report name; under the Send destination, specify the email address(es) to which the compliance reports will be sent, click "Save" button C. via the Reports tab, click on the report name, which is to be scheduled; under the Send destination, specify the email address(es) to which the compliance report will be sent, click "Send Now" button D. via the Policies/Schedule pane, click on the policy name, which is to be scheduled; under the Send destination, specify the email address(es) to which the compliance report will be sent, click "Save" button Answer: D 7. Which Report permission is required for a User to send a report to multiple email addresses? A. View B. Create C. Execute D. Manager Answer: C 8. Which task is required to register an IBM Tivoli Security Compliance Manager (ITSCM) Client? A. add CLIENT.REGISTERED=enabled to the client.pref file B. run the Register Client option from the Administration Console C. select the Register option in the Install Client Configuration window D. run the scmclientregistration command on the system in which the Administrative Utilities are installed Answer: B 9. After a collector is installed and registered, which two actions configure it to run on individual clients or client groups using the Clients pane of the Administration Console? (Choose two.) A. add client to the collector instance B. add the collector directly to policy schedule C. add a policy containing the collector to a client group D. add the collector directly to individual client or client group E. add the collector directly to individual client or operational report Answer: CD 10. Which file(s) does an IBM Tivoli Security Compliance Manager (ITSCM) Server need to connect to a

www.Prepking.com

remote DB2 V8.1 database? A. only db2jcc.jar B. only db2java.zip C. both db2java.jar and db2jcc.jar D. both db2java.zip and db2jcc.jar Answer: D 11. A customer has a distributed network with several domains, each of which corresponds to different suppliers. The enterprise security policy stipulates that the supplier's machines must be checked for compliance to the latest UNIX patch levels on a monthly basis. How is it determined which UNIX machines need the appropriate collectors and policies? A. The customer provides an inventory of all UNIX machine hostnames on the network that are owned and operated by the various suppliers. B. ITSCM and IBM Tivoli NetView provide information on all UNIX hosts on the enterprise network and their current configuration status. C. IBM Tivoli Security Compliance Manager (ITSCM) automatically discovers all appropriate UNIX machines if the appropriate compliance query for the UNIX collector is written. D. It is necessary to obtain from the customer the enterprise security policy documentation and the inventory of suppliers' UNIX machines with current version and patch levels. Answer: D 12. Which Sentry component is responsible for verifying the signature level for an allow/disallow decision for network access? A. Cisco Security Agent B. Cisco Trust Agent (CTA) C. Cisco Access Control Server D. IBM Tivoli Provisioning Manager (ITPM) Server Answer: C 13. How does an IBM Tivoli Security Compliance Manager (ITSCM) Administrator verify if the ITSCM Server is up and running? A. try to log on to ITSCM Administrator GUI B. run the scmserver status command C. restart the ITSCM Server and check whether it starts correctly D. use the ping command and check whether the ITSCM Server system responds Answer: B

www.Prepking.com

14. When creating an IBM Tivoli Security Compliance Manager (ITSCM) user with the Create User function in the Administration Console, which two pieces of information are required for that user to administer ITSCM? (Choose two.) A. user ID B. full name C. password D. e-mail address E. employee information Answer: AC 15. Using the Administration Console, when a policy is imported to the server, the collectors associated with that policy are installed on the server as well. What happens when the collectors are already installed with the same name as one in the policy the user is trying to import? A. The policy is imported as normal and the policy collector is overwritten. B. The policy is imported as normal and the policy collector is installed as another instance of that collector. C. The import wizard alerts the user that the collector included in the policy is currently installed. If the collectors are registered on the server, the collectors must be unregistered and uninstalled. D. The import wizard asks whether or not to replace the collector currently installed with the collector included in the policy. If yes, the policy collector is installed and the release number of both the installed collector and the collector in the policy are displayed. Answer: D 16. Which license management system can be used in IBM Tivoli Security Compliance Manager (ITSCM) V5.1.0.2 to monitor license usage? A. FLEXlm B. iFOR/LS C. IBM AIX LUM D. IBM Tivoli License Management Answer: D 17. A company is using IBM Tivoli Security Compliance Manager (ITSCM) to implement an enterprise security policy. The company has three IT Administrators. One of these administrators needs to manage policy snapshots. Which ITSCM permission should be assigned to this administrator? A. View Snapshots B. Manage Collectors C. Manage Snapshots D. Manage Compliance Objects Answer: C

www.Prepking.com

18. How can a customer schedule a report to be sent at 8:00 a.m. each morning? A. make no selection in Day of Month and Week Days; select Hour as 8 a.m. B. make no selection in Day of Month; select all Week Days; select Hour as 8 a.m. C. select all checkboxes in Day of Month; select all Week Days; select Hour as 8 a.m. D. select all checkboxes in Day of Month; make no selection in Week Days; select Hour as 8 a.m. Answer: C 19. Which statement about importing previously exported reports is true? A. The group name cannot be modified. B. The report name cannot be modified. C. Import fails if the group name does not already exist. D. Both group and report name can be changed during import. Answer: D 20. Which statement is true about a Global role? A. Permissions apply to all resources in all resource categories. B. Permissions apply to selected resources in all resource categories. C. Permissions apply to all resources in selected resource categories. D. Permissions apply to selected resources in selected resource categories. Answer: C 21. After the IBM Tivoli Security Compliance Manager (ITSCM) Server is upgraded via InstallShield to the current fix pack, which task must be performed first before the server is ready for use? A. restart the server B. install new collectors C. migrate the database D. import any new policies Answer: C 22. Which reports are IBM Tivoli Security Compliance Manager (ITSCM) reports? A. BRIO Reports and ITSCM Operational Reports B. ITSCM Central Data Warehouse Reports and Functional Reports C. IBM Tivoli Risk Manager (ITRM) Warehouse Reports and Historical Reports D. ITSCM Operational Reports and IBM Tivoli Data Warehouse ITSCM Historical Reports Answer: D 23. How are different client groups configured to report to different people? A. Client groups are made up of individual collectors, each configured through the Administration Utilities to send reports to a different email address.

www.Prepking.com

B. Client groups are defined with different clients. Each client has a specific collector configured to use the email address of the person who is to receive the report. C. A Junior Administrator specifies a policy for each client group, which sets the View permission for each group. In addition, the Create and Manage Report permissions need to be set for a user in the Junior Administrator role. D. The Report Administrator role is defined for each client group. The default permissions for the Report Administrator are used to create, execute, manage, remove and view. A policy is associated with each client group with a different send destination email address for the appropriate person. Answer: D 24. The corporate security policy requires that all Windows systems must be at a certain operating system level with all hotfixes installed. Which collector should be deployed? A. win.any.HotfixV1.jar and win.nt.OSLevelV1.jar B. win.any.NavV1.jar and win.any.OSLevelV1.jar C. win.any.HotfixV1.jar and win.any.OSLevelV1.jar D. win.any.HotfixV1.jar and any.any.OSLevelV1.jar Answer: C 25. Which statement about an IBM Tivoli Security Compliance Manager (ITSCM) collector is true? A. Both the ITSCM Server and Client can run an ITSCM collector. B. An ITSCM collector needs to be manually installed on each ITSCM Client system. C. An ITSCM collector needs to be digitally signed before it can be loaded and deployed. D. An ITSCM collector can be written in variety of programming languages, including C/C++, Java, Shell and Perl scripts. Answer: C 26. A company's intranet is divided into three zones: Intranet zone, DMZ and Extranet zone. There is a firewall between the Intranet and DMZ and one between the DMZ and Extranet. Corporate policy stipulates that only one system in each zone should be selected to relay IBM Tivoli Security Compliance Manager (ITSCM) communications across each firewall. If the ITSCM Server is located in the Intranet zone, how many ITSCM Proxy systems are needed (at a minimum) to reach clients in the Extranet zone? A. 0 B. 2 C. 3 D. 4

www.Prepking.com

Answer: B 27. Which IBM Tivoli Security Compliance Manager (ITSCM) report shows the total number of policy compliance violations per subnet for a specified period of time? A. Subnet Policy Compliance Report B. Policy Violations by Subnet Report C. Compliance Violations Trends Report D. Subnet Client Group Membership Report Answer: B 28. Which IBM Tivoli Security Compliance Manager (ITSCM) report allows the user to see the trends in policy violations over a specified period of time and allows them to predict how long it will take to achieve full compliance based on the history? A. Policy Violation Trends Report B. Policy Violations by System Report C. Compliance Violations Trends Report D. Compliant/Non Compliant Systems Report Answer: C 29. A fixpack installation on the IBM Tivoli Security Compliance Manager (ITSCM) Server hangs or aborts. What is the recommended way to correct the situation? A. uninstall the fixpack alone B. install fixpack on another system and copy the files C. attempt fixpack installation again as cleanup is not required D. restore from filesystem backup and database backup to bring the system to pre-patch state first Answer: D 30. In a policy snapshot, what does the "violation count" indicate? A. the number of queries that failed to run B. the number of collectors that failed to run C. the number of policies violated by the systems D. the number of violations against the security policy Answer: D 31. An IBM Tivoli Security Compliance Manager (ITSCM) Server is heavily loaded with client messages. What are two ways to help improve performance? (Choose two.) A. randomize the collection schedule of the collectors B. add ITSCM proxy relay components to offset network traffic C. add ITSCM Administration Consoles to distribute the message load D. increase network bandwidth between the ITSCM Server and Clients

www.Prepking.com

E. reduce the frequency of data collection for a collector to reduce overall message production by an instance of the collector Answer: AE 32. Which database table records errors related to collector problems? A. DELTA_TABLES B. JAC_SYS.ADMIN_LOG C. JAC_IDATA.ERROR_LOG D. JAC_SYS.COLLECTOR_DETAILS Answer: C 33. Which IBM Tivoli Security Compliance Manager (ITSCM) component is a set of one or more compliance queries used to demonstrate the level of adherence to specific security requirements? A. policy B. collector C. snapshot D. SQL builder Answer: A 34. For a large IBM Tivoli Security Compliance Manager (ITSCM) deployment with between 2501-10000 clients, what is the minimum requirement for processors and memory? A. 1-2 processors and 512 MB RAM B. 1-2 processors and 2-4 GB RAM C. 2-4 processors and 2-4 GB RAM D. 2-4 processors and 4-8 GB RAM Answer: C 35. After installing a collector, which step must be taken before deploying it to clients? A. register the collectors B. authorize the collectors C. set the default client deployment schedule D. verify that the policy to which collector is assigned has no violations Answer: A 36. Which action helps synchronize the IBM Tivoli Security Compliance Manager (ITSCM) Client with the ITSCM Server? A. performing a Soft Reset of the client B. performing a Hard Reset of the client C. launching a new instance of ITSCM GUI D. checking the client connection using the GUI

www.Prepking.com

100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/000-793.htm

S-ar putea să vă placă și