Test C1000-061, IBM Security Identity Governance and Intelligence V5.2.5, Deployment
Test C1000-061, IBM Security Identity Governance and Intelligence V5.2.5, Deployment
Test C1000-061, IBM Security Identity Governance and Intelligence V5.2.5, Deployment
------------------------------------
Question C1000-061.2.1.1
A deployment professional has created a DB2 database instance for Identity Governance and
Intelligence (IGI) on a Red Hat Enterprise Linux.
What is the next necessary step the deployment professional needs to take?
------------------------------------
Question C1000-061.3.1.2
The customer needs to have some additional Attributes on USER entities in the Human
Resource (HR) Feed for further processing in IBM Security Identity Governance and Intelligence
(IGI). These Attributes have no representation in the IGI Data-Model.
How can a deployment professional implement this scenario?
A. Use spare Attributes in S_USER Table, alter the Table for more columns if needed.
B. Use spare Attributes in USER_EVENT_ERC Table, alter the Table for more columns if
needed.
C. Use spare Attributes in PERSON Table, alter the Table for more columns if needed.
D. Use spare Attributes in USER_ERC Table, alter the Table for more columns if needed.
------------------------------------
Question C1000-061.4.1.8
A deployment professional defines a hierarchy with a Configuration Type manual.
What does the deployment professional have to consider when adding users to it?
------------------------------------
Question C1000-061.4.2.2
A deployment professional has created a new Rule to enable a new matching logic for a specific
Connector.
What is the next step to deploy it?
------------------------------------
Question C1000-061.5.3.4
There are new users joining the organization. The deployment professional is tasked to create a
new User Assignment Certification campaign just for these new users.
How should the deployment professional approach this task?
A. Configure a user assignment campaign > select "Exclude reviewed since" > set an
appropriate date.
B. Create a new dataset > add the new users to the white list > configure a campaign
using this dataset.
C. Create a new data set > add these new users to the black list > configure a campaign using
this dataset.
D. Create a new data set > add these new users to the black list and the white list > configure
a campaign using this dataset.
------------------------------------
Question C1000-061.6.2.3
A deployment professional needs to refer to relevant logs to validate rules.
Which IBM Security Identity Governance and Intelligence (IGI) log file provides the exception
details of any compilation issue found during the validation of a rule?
A. drools.log
B. scheduler.log
C. hibernate.log
D. accessgovernancecore.log
------------------------------------
Question C1000-061.6.3.1
An organization has configured enterprise connectors in IBM Security Identity Governance and
Intelligence (IGI) to provision accounts on target servers. After a few days, they have observed
some performance issues during event processing. The deployment professional decides to
tune threads for the Connectors scheduler.
What range should the deployment professional use?
A. 1-5
B. 1-6
C. 1-10
D. 1-15