Test C1000-061, IBM Security Identity Governance and Intelligence V5.2.5, Deployment

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

SAMPLE QUESTIONS for

Test C1000-061, IBM Security Identity Governance and Intelligence V5.2.5,


Deployment

Note: The bolded response option is the correct answer.


------------------------------------
Question C1000-061.1.5.3
To achieve scalability, a deployment professional needs to deploy IBM Security Identity
Governance and Intelligence (IGI) to the Amazon Elastic Compute Cloud (Amazon EC2)
environment.
What is the first step in the process?

A. Upload the IGI ISO as a new Amazon Machine Image (AMI)


B. Create an Amazon Machine Image (AMI) from the appliance VHD image
C. Register an appliance snapshot as a new Amazon Machine Image (AMI)
D. Upload a VM image of the appliance as a new Amazon Machine Image (AMI)

------------------------------------
Question C1000-061.2.1.1
A deployment professional has created a DB2 database instance for Identity Governance and
Intelligence (IGI) on a Red Hat Enterprise Linux.
What is the next necessary step the deployment professional needs to take?

A. Create database user.


B. Configure the DB2 TCP/IP port.
C. Change instance owner's password.
D. Create another DB2 instance as backup.

------------------------------------
Question C1000-061.3.1.2
The customer needs to have some additional Attributes on USER entities in the Human
Resource (HR) Feed for further processing in IBM Security Identity Governance and Intelligence
(IGI). These Attributes have no representation in the IGI Data-Model.
How can a deployment professional implement this scenario?

A. Use spare Attributes in S_USER Table, alter the Table for more columns if needed.
B. Use spare Attributes in USER_EVENT_ERC Table, alter the Table for more columns if
needed.
C. Use spare Attributes in PERSON Table, alter the Table for more columns if needed.
D. Use spare Attributes in USER_ERC Table, alter the Table for more columns if needed.

------------------------------------
Question C1000-061.4.1.8
A deployment professional defines a hierarchy with a Configuration Type manual.
What does the deployment professional have to consider when adding users to it?

A. The users are added by setting a Hierarchy Attribute.


B. The users are added manually in the Access Governance Core (AGC).
C. The only way to add users to the hierarchy is by means of a custom rule.
D. By use of the Manual User add function in the Settings > Core Configurations > User Manual
Attributes tab.

------------------------------------
Question C1000-061.4.2.2
A deployment professional has created a new Rule to enable a new matching logic for a specific
Connector.
What is the next step to deploy it?

A. Match the Accounts


B. Start the Connector
C. Rerun the Connector Sync
D. Attach it to a Rule Flow

------------------------------------
Question C1000-061.5.3.4
There are new users joining the organization. The deployment professional is tasked to create a
new User Assignment Certification campaign just for these new users.
How should the deployment professional approach this task?

A. Configure a user assignment campaign > select "Exclude reviewed since" > set an
appropriate date.
B. Create a new dataset > add the new users to the white list > configure a campaign
using this dataset.
C. Create a new data set > add these new users to the black list > configure a campaign using
this dataset.
D. Create a new data set > add these new users to the black list and the white list > configure
a campaign using this dataset.

------------------------------------
Question C1000-061.6.2.3
A deployment professional needs to refer to relevant logs to validate rules.
Which IBM Security Identity Governance and Intelligence (IGI) log file provides the exception
details of any compilation issue found during the validation of a rule?

A. drools.log
B. scheduler.log
C. hibernate.log
D. accessgovernancecore.log

------------------------------------
Question C1000-061.6.3.1
An organization has configured enterprise connectors in IBM Security Identity Governance and
Intelligence (IGI) to provision accounts on target servers. After a few days, they have observed
some performance issues during event processing. The deployment professional decides to
tune threads for the Connectors scheduler.
What range should the deployment professional use?

A. 1-5
B. 1-6
C. 1-10
D. 1-15

You might also like