If a company utilizing 10,000 computers spread across 200 sites is implementing IBM Tivoli Endpoint Manager V8.1, how many IBM Tivoli Endpoint Manager Servers would be recommended?
A. 1
B. 2
C. 3
D. 5
How is logging for IBM Tivoli Endpoint Manager Web Reports enabled?
A. install Log4j from the IBM Support website
B. run the Enable Web Reports Logging Fixlet
C. run the Enable Web Reports Logging Wizard
D. create three new registry keys in HKLM\SOFTWARE\BigFix\Enterprise Server\BESReports
Power Management is visible in which domain in the IBM Tivoli Endpoint Manager V8.1 Console?
A. Systems Lifecycle
B. Patch Management
C. Endpoint Protection
D. Power Management
What happens when an administrator right-clicks on a computer in the IBM Tivoli Endpoint Manager Console and selects Send Refresh?
A. A UDP ping is sent to the computer.
B. An ICMP ping is sent to the computer.
C. An empty action is sent to the computer.
D. An updated action site is sent to the computer.
When logging in to the IBM Tivoli Endpoint Manager (TEM) Console these domains are visible: All Content, BigFix Management, Patch Management, Systems Lifecycle. When the Patch Management domain is opened the section for Microsoft Windows under OS Vendors is visible. Displaying non-relevant content shows many available patches but none are relevant to this environment even though there are some patches that must be deployed. Why?
A. Master operator access is required.
B. The TEM Server is not connected to the Internet.
C. No computers have been subscribed to the Patches for Windows site.
D. Authorization as a Reader for the Patches for Windows site is required.
A new IBM Tivoli Endpoint Manager V8.1 (TEM) environment is being deployed. The customer has a security policy that dictates that only systems approved by Human Resources (HR) IT may connect to HR IT resources.During preplanning, it becomes clear that this policy will extend to TEM systems meaning that TEM Agents within the HR Department can connect only to the TEM Relays servicing the HR IT environment and that only HR TEM Agents can connect to the HR TEM Relays. How can this be achieved?
A. Work with the HR Security Group to obtain an exception to this policy.
B. Implement Relay Affiliation for all HR systems to ensure that only HR TEM Agents connect to Human Resources TEM Relays.
C. Implement Manual Relay Selection for the Human Services TEM Agents to ensure that only TEM Agents from the HR Department can connect to the TEM Relays within the HR Department.
D. Implement Manual Relay Selection for all TEM systems. This provides the easiest methodology for complying to this security policy and for the TEM operators to maintain the environment in the future.
Which statement is correct when assigning roles to Active Directory users in IBM Tivoli Endpoint Manager Web Reports?
A. Users can only be assigned roles.
B. Users can inherit and be assigned roles.
C. Users can only inherit roles from the security group.
D. Users are not accessible from the Active Directory permissions.
Asset Discovery scans must be implemented within a customer's IBM Tivoli Endpoint Manager V8.1 deployment. Which warnings should the customer be aware of as part of the documentation for Policies and Procedures?
A. Inform any Security or Network Operations Center that the Asset Discovery scans use Nmap and may trigger Intrusion Detection Devices.Reduce scans to Class C networks to increase the speed of the actual scans.Nmap scans are completely safe and should never impact devices on the network.
B. Inform any Security or Network Operations Center that the Asset Discovery scans use Nmap and may trigger Intrusion Detection Devices. Always perform scans across the entire network to increase the speed of the actual scans. Nmap scans are completely safe and should never impact devices on the network.
C. Inform the Security or Network Operations Center that the Asset Discovery scans use Nmap and may trigger Intrusion Detection Devices. Reduce scans to Class C networks to increase the speed of the actual scans. Network scans may cause certain legacy network devices, such as old network printer devices, to fail if scanned.
D. Using a low frequency scan such as Paranoid will not trigger Intrusion Detection Devices so there is no need to inform the Security or Network Operations Center or the scans. Reduce scans to Class C networks to increase the speed of the actual scans. Network scans may cause certain legacy network devices, such as old network printer devices, to fail if scanned.
What is the lowest level default role that can create users in IBM Tivoli Endpoint Manager Web Reports?
A. Normal
B. Read-only
C. Read/Write
D. Administrator
What are three requirements for an endpoint to be used as a relay? (Choose three)
A. Java V1.4.2 or higher
B. minimum free hard drive space: 2 GB
C. Firefox V2.0 or above (for UNIX relays)
D. a two-way TCP connection to its parent
E. a two-way UDP connection to its parent
F. Internet Explorer V4.0 or above (for Windows relays)
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IBM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C2090-560 exam preparations and IBM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.