Simulation of C2150-197 pdf exam materials and class for IBM certification for IT engineers, Real Success Guaranteed with Updated C2150-197 pdf dumps vce Materials. 100% PASS IBM Security Identity Manager V6.0 Implementation exam Today!

2021 Apr C2150-197 Study Guide Questions:

Q21. A service is created in IBM Security Systems Identity Manager (ISIM) for IBM Directory Integrator (IDI) data feed. 

Which field in the ISIM service form is used to match the IDI data feed? 

A. A unique identifier of the service 

B. Name attribute in the service 

C. The name of the service 

D. The naming context 

Answer: D 


Q22. When gathering requirements for email notifications, which mail protocol is used to send email notifications in the IBM Security Identity Manager environment? 

A. SMTP protocol 

B. IMAP protocol 

C. UDP protocol 

D. TCP protocol 

Answer: A 

Explanation: 


Q23. When planning an ISIM server upgrade, which two of the following processes are NOT preserved? (Choose two) 

A. Windows Active Directory Password Synchronization 

B. Self Service User Interface customization files 

C. Provisioning policy Add/Modify/Remove 

D. Certificate Authority certificates 

E. Identity Feeds 

Answer: C,E 

Reference:http://www-01.ibm.com/support/knowledgecenter/SSRMWJ_6.0.0.2/com.ibm.isim.doc_6.0.0.2/installing/cpt/cp t_ic_ins_upg_notpreserved.htm 


C2150-197 real exam

Up to date C2150-197 dumps:

Q24. The criteria to setup indexes for a Directory Server attribute is based on what? 

A. The frequency of replicating objects containing the attribute to a replica. 

B. The frequency of reading and writing information to / from the attribute. 

C. The frequency of writing information to the attribute. 

D. The frequency of reading information based on the attribute's contents. 

Answer: A 

Explanation: 


Q25. In order to debug a problem with the ISIM Workflow Designer, you have enabled applet logging and have specified DEBUG_MAX for the tracing level. 

Where will the expected trace output be written? 

A. Websphere SystemOut.log 

B. Java Console 

C. ISIMtrace.log 

D. audit.log 

Answer: A 

Explanation: 


Q26. The client's IBM Security Identity Manager (ISIM) production environment consists of a two node IBM Websphere Application cluster. Server #1 has the Websphere Deployment Manager installed as well as one of the cluster nodes. Server #2 in the cluster just has the node installed. 

If a process monitor is being configured on Server #1 how many Java processes are there related just to Websphere? 

A. 4 - Deployment Manager process, Node process, Application Server process, Messaging Server process 

B. 1- Deployment Manager and Node processes run under a single Java process 

C. 3 - Deployment Manager process, Node process, Application Server process 

D. 2 - Deployment Manager process and Node process 

Answer: D 

Explanation: 


C2150-197 exam prep

Realistic C2150-197 vce:

Q27. Which is TRUE concerning the configuration of Reminder Interval within Workflow Notification Properties? 

A. Reminder Interval can be overridden within individual workflow activities 

B. Reminder Interval must be greater than the default escalation limit 

C. Reminders can be suppressed by setting Reminder Interval to 0 

D. Reminder Interval is specified in days 

Answer: D 

Reference:http://www-01.ibm.com/support/knowledgecenter/SSTFWV_5.1.0/com.ibm.itim.doc/tsk/tsk_ic_wkflo_cfg_remi ndinterval.html 


Q28. What special consideration needs to be taken when loading xhtml labels into a custom labels file? 

A. Escape characters need to be used for tag characters such as "(" 

B. No more than 255 characters can be used per label 

C. Closing tags are no longer needed (</body>) 

D. Each entry must contain a <body> tag 

Answer: C 

Explanation: 


Q29. Your customer has four important business systems that drive their environment. Which of these systems would be the highest priority for a services design and adapter plan? 

A. A virtualization host system used for application development and testing by everyone in the IT department. 

B. A database system that is accessed by every individual enterprise application via a JDBC connector. 

C. An employee portal system running on WebSphere used for general HR, email, and company news. 

D. An accounting system accessed by the financial team only when authorized by the CFO. 

Answer: B 


Q30. Which two options correctly describe the recycle bin in IBM Security Identity Manager (ISIM)? (Choose two.) 

A. The recycle bin age limit is the number of days after which an object in the recycle bin is eligible for deletion by the Identity Manager IdapClean cleanup script. 

B. The recycle bin can be explicitly emptied by running the Identity Manager runConfig script and setting the Recycle Bin Age Limit parameter to 0 (zero). 

C. The recycle bin age limit is the number of days, after which the recycle bin is emptied automatically. 

D. The recycle bin is disabled by default in ISIM and must be enabled explicitly. 

E. The recycle bin is a feature that is no longer available in ISIM version 6. 

Answer: C,D 

Reference:http://www-01.ibm.com/support/knowledgecenter/SSRMWJ_6.0.0.2/com.ibm.isim.doc_6.0.0.2/installing/tsk/ts k_ic_ins_first_runconfig_manual.htm