Which concerns should be addressed by a systems architecture document?
A. Security policy, account standardization, overall business requirements
B. Disaster recovery, performance, high availability, deployment topology
C. Capacity requirements, uptime requirements, simplicity, and price
D. Service priorities, identity feeds, approval cycles, and auditing
A customer's availability requirements need to minimize the risk of an ISIM outage due to a hardware
server failure.
Which two are relevant architecture choices? (Choose two)
A. Propose the WebSphere Application Server and Database Server be on the same physical server, but the Directory server be on a separate physical server.
B. Propose the WebSphere Application Server and Directory Server be on the same physical server, but the Database server be on a separate physical server.
C. Propose Directory Server replicas and DB2 Database Server log shipping from primary active server to secondary standby server.
D. Propose a horizontal WebSphere Application Server cluster.
E. Propose a vertical WebSphere Application Server cluster.
Your customer has four important business systems that drive their environment. Which of these systems would be the highest priority for a services design and adapter plan?
A. A virtualization host system used for application development and testing by everyone in the IT department.
B. A database system that is accessed by every individual enterprise application via a JDBC connector.
C. An employee portal system running on WebSphere used for general HR, email, and company news.
D. An accounting system accessed by the financial team only when authorized by the CFO.
When planning for customization, how would you handle local changes to attributes in the Microsoft Active Directory?
A. Define a new profile for the AD adapter, set up an extended schema mapping file, and build a form to collect those elements.
B. Run reconciliation against the Active Directory to obtain the values of the attributes.
C. Set up a provisioning policy to manually create accounts in Active Directory.
D. Use the adapter development toolkit to set up another MSAD adapter.
Which option describes a best practice for IBM Security Identity Manager HA environment?
A. Install a cluster environment with two nodes and add additional nodes later as necessary
B. Install a single-server environment and add more servers later as necessary
C. Install a single-server environment as a managed node in a WebSphere cell
D. Install a cluster environment with one node
Which of the following is not a valid command line switch when installing TDI 7.1 on windows?
A. install_tdiv711_win_x86.exe -i
B. install_tdiv711_win_x86.exe-m
C. install_tdiv711_win_x86.exe -f
D. install tdiv711 win x86.exe -r
A service is created in IBM Security Systems Identity Manager (ISIM) for IBM Directory Integrator (IDI)
data feed.
Which field in the ISIM service form is used to match the IDI data feed?
A. A unique identifier of the service
B. Name attribute in the service
C. The name of the service
D. The naming context
Which is TRUE concerning the configuration of Reminder Interval within Workflow Notification Properties?
A. Reminder Interval can be overridden within individual workflow activities
B. Reminder Interval must be greater than the default escalation limit
C. Reminders can be suppressed by setting Reminder Interval to 0
D. Reminder Interval is specified in days
When gathering requirements for Access Control which access level should be identified?
A. Multiple branch tree structure with a set of open nodes
B. Hierarchical tree structure with a set of linked nodes
C. Linked list tree structure with a set of linked nodes
D. Sub-tree structure with a set a defined nodes
An adapter is a software component that provides an interface between a managed resource and IBM Security Identity Manager. Which two statements are true? (Choose two)
A. An agent less adapter can be on a remote system from the managed system, in order to administer accounts.
B. An agent-based adapter must be on the managed resource, in order to administer accounts.
C. All adapters provided by IBM are implemented using IBM Directory Integrator technology.
D. IBM provides Adapters for all managed systems and all can be customized.
E. Custom adapters are required to go through a stringent review process.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IBM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C2150-197 exam preparations and IBM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.