What should the IBM Tivoli Application Dependency and Discovery Manager V7.2.1.3 administrator do in order to assign Read and Discover permissions to User1?
A. Create User1 with default settings and edit User1 to set permissions; the create step cannot modify permissions
B. Create a new role with Read and Discover permissions and assign the role to User1
C. Create an Access Collection with Read and Discover permissions and assign User1 to the Access Collection
D. Create User1 and check the boxes for Read and Discover permissions
正解:B
質問 2:
What is a valid use for a custom server template?
A. To identify custom applications with no default sensors
B. To collect configuration files from all computer systems of a certain type
C. To create dependencies between application servers
D. To populate a business application with the software that is matched by specific IPs
正解:A
質問 3:
What is the reason to turn on the Split Sensor Log feature?
A. To split the sensor logs by discovery levels
B. To diagnose problems with a particular discovery sensor
C. To split the sensor logs by discovery profiles
D. To efficiently allocate disk space for logs
正解:B
質問 4:
A customer is getting ready to set up a Level 3 profile in order to scan their production IBM WebSphere servers which are running V6.1, V7, V8, and V8.5. What should be the first step in setting up the profile?
A. Retrieve needed SSL WebSphere certificates and place them on the IBM Tivoli Application Dependency Discovery Manager Console
B. Check if WebSphere security is turned on and if so, obtain a valid user ID and password to the WebSphere Admin Console
C. Setup access list entry
D. Check the sensor reference guide in the IBM Info Center to ensure the scanned platforms are supported target versions
正解:D
質問 5:
What are two ways to create a business application in IBM Tivoli Application Dependency Discovery Manager V7.2.1.3? (Choose two.)
A. Use the Custom Server template
B. Use the Business Application template
C. Use the Discovery Management Console
D. Use Application Descriptors
E. Use the Grouping Composer
正解:D,E
質問 6:
A customer's business needs calls for verification that the list of servers available on the network matches the list of expected servers. The snapshot tool's predefined reports will be used to verify that list. Which report(s) should the customer run to obtain the information?
A. TADDM_SNAPSHOT_HOST
B. TADDM_SNAPSHOT_CHANGE, TADDM_SNAPSHOT_SYNC_CHANGE
C. TADDM_SNAPSHOT_FQDN_OS_CHANGES, TADDM_SNAPSHOT_SYNC_EQDN_OS_CHANGES
D. TADDM_SNAPSHOT_RECONCILIATION_SUMMARY, TADDM_SNAPSHOT_RECONCILIATION_DETAIL
正解:D