Sie sind auf Seite 1von 3

Exam 560 IBM Tivoli Endpoint Manager V8.

1 Implementation

1. Just prior to an IBM Tivoli Endpoint Manager V8.1 (TEM) deployment, a customer wants to have all systems check in twice per day for new content in the event that there are no UDP pings received by the TEM Agents. How should this requirement be handled? A. The TEM Agents may only check in daily and it is not possible to change this frequency. B. While installing TEM, adjust the Masthead Parameters to set the gathering interval to half days. C. Install the TEM environment with the default settings and use a Task to adjust the Client Setting to change the interval for checking for new content. D. Install the TEM environment with the default settings and use a Policy to adjust the Client Setting to change the interval for checking for new content 2. A consultant is responsible for an IBM Tivoli Endpoint Manager V8.1 (TEM) deployment that uses Message Level Encryption (MLE). The deployment has taken some time to complete and the encryption keys need to be regenerated per the client's Security Policy. Which statement best describes what must be completed to accomplish this? A. Using the TEM Administration Tool, create the new key. Select the check box to begin using this key immediately. Overwrite any keys that may exist on the Decrypting Relays if implemented. B. Using the TEM Administration Tool, create the new key. Deselect the check box to begin using this key immediately. Overwrite any keys that may exist on the Decrypting Relays if implemented. C. Use the Task Distribute New Message Level Encryption Key to create and distribute a new key. This action cannot be a Policy as this will force the key to be continually regenerated which impacts encryption. D. Using the TEM Administration Tool, create the new key. Deselect the check box to begin using this key immediately. Copy the key (do not delete or overwrite the existing keys) to the Decrypting Relays if implemented. 3. What must be done to enable content sites in IBM Tivoli Endpoint Manager V8.1? A. B. C. D. install at least one relay run the Enable Content Sites Fixlet enable the site from the License Overview Dashboard install the Content Site Enabler from the install media

4. What does the Relays.dat file contain? A. B. C. D. relay upgrade actions relay affiliation settings relay version of the masthead relay domain name mappings

5. What is the purpose of the BESClient_RelaySelect_MaximumTTLToPing setting? A. to ensure the agent does not ping every relay

B. to ensure the agents primary relay is in the local subnet C. to ensure the agent does not generate too much ICMP traffic D. to ensure the agent generates ICMP traffic only using small packets 6. Which three permission levels can be assigned to custom sites? (Choose three.) A. B. C. D. E. F. User Writer Owner Reader Operator Administrator

7. An IBM Tivoli Endpoint Manager operator has created an Automatic group that is populated by all the computers that contain "lab" in the computer name. The computer lab133788 is powered off. Is it visible in the group? A. B. C. D. Yes, the processing is done at the server level. No, it will be visible after the 30 minute timeout expires. No, it will be visible when the Show Computer Fixlet is deployed on the agent. No, it will be visible once the computer is powered on and the agent is started.

8. An action failed on an IBM Tivoli Endpoint Manager Agent. The Action Detail shows that all the individual lines of the Action Script are completed and yet the action as a whole has failed. Why might this occur? A. B. C. D. The action attempted to install a patch that failed. An x86 Agent is installed on an x64 Windows system. The action downloaded a file that failed the file size or SHA1 check. The action is missing the line: action uses wow64 redirection true.

9. Which statement describes PC Insomnia? A. B. C. D. Applications that prevent a computer from sleeping. A computer that is not configured for power management. When a user does not opt-in to power management policies. Power management policies that are not aggressive enough.

10. Which three steps must be completed when configuring the IBM Tivoli Endpoint Manager (TEM) Analytics component? (Choose three.) A. B. C. D. E. F. run the initial import connect to a TEM Relay configure the e-mail server create an administrative user set up and connect to the database select a security compliance checklist

11. IBM Tivoli Endpoint Manger Client Manager for Endpoint Protection supersedes which content site? A. B. C. D. Core Protection Module Client Manager for Anti-Virus Security Configuration Management Security and Compliance Management

Answer Key: 1. B 2. D 3. C 4. B 5. C 6. BCD 7. D 8. A 9. A 10. ADE 11. B

Das könnte Ihnen auch gefallen