Which entity always applies to all users in the organization tree?
A. Dynamic role membership
B. Static role membership
C. Provisioning policy
D. Work flow
An ITIM v5.x customer deploys password synchronization across user accounts using web services clients to connect to ITIM v5.1 by consuming Web Services Description Language (WSDL) files.
Which item(s) may need to be transformed or augmented when planning a migration from ITIM v5.x to ISIM v6.0?
A. WSDL files of ISIM v6.0, ownership type of account objects
B. Service form definitions and reconciliation schedules
C. Web Services client code and service object data
D. Web Services client code
Which two of the following are valid recertification policy schedule types? (Choose two)
A. Run after service reconcile
B. Run after policy update
C. Calendar
D. Rolling
E. Daily
Which of the following adapters are NOT installed by default?
A. LDAP profile (LDAP adapter)
B. Linux profile (Linux adapter)
C. AIX profile (UNIX adapter)
D. AD profile (AD adapter)
When gathering requirements for work flows, which business process might require a manager approval?
A. When a business process is defined for an application owner to be notified on account deletions
B. When a business process is defined to approve last name change due to marriage
C. When a business process is defined for an employee vacation request approval
D. When a business process is defined for contractor address change
Which two of the following are valid join directive types built-in ISIM?
A. Precedence_Sequence
B. Concatenate
C. Greatest
D. Average
E. Xor
When designing a custom adapter, which of the following areas will have the largest impact on design scope and implementation complexity?
A. The number of attributes included in the reconciliation operation.
B. The number of group definitions used by the platform.
C. The password strength policy.
D. The service definition profile.
Which two options correctly describe the recycle bin in IBM Security Identity Manager (ISIM)? (Choose two.)
A. The recycle bin age limit is the number of days after which an object in the recycle bin is eligible for deletion by the Identity Manager IdapClean cleanup script.
B. The recycle bin can be explicitly emptied by running the Identity Manager runConfig script and setting the Recycle Bin Age Limit parameter to 0 (zero).
C. The recycle bin age limit is the number of days, after which the recycle bin is emptied automatically.
D. The recycle bin is disabled by default in ISIM and must be enabled explicitly.
E. The recycle bin is a feature that is no longer available in ISIM version 6.
When gathering requirements for data to be loaded, which data feed is natively supported by IBM Security Identity Manager?
A. A data feed using Microsoft Word format
B. A data feed using binary data format
C. A data feed using the SOAP format
D. A data feed using DSML format
How should a reconciliation schedule be configured to ignore certain accounts and certain attributes for a service?
A. Update a attribute exclusion list through the administrative console.
B. Select what attributes to return from the available attribute list.
C. Add a valid LDAP filter that will return the desired accounts.
D. Add Java script to filter out accounts.
E. Select supporting data only option.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IBM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C2150-197 exam preparations and IBM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.