





{"id":547,"date":"2009-03-01T22:35:27","date_gmt":"2009-03-02T02:35:27","guid":{"rendered":"http:\/\/www.killtest.hk\/?p=547"},"modified":"2009-03-02T23:48:46","modified_gmt":"2009-03-03T03:48:46","slug":"000-936","status":"publish","type":"post","link":"https:\/\/www.killtest.hk\/index.php\/ibm\/000-936\/","title":{"rendered":"000-936"},"content":{"rendered":"<p>\u6458\u81eaIT\u8a8d\u8b49\u984c\u5eab\u4e2d\u95dc\u4e8eIBM\u8a8d\u8b49<a title=\"000-936\" href=\"http:\/\/www.killtest.net\/IBMcertificationsI\/000-936.asp\" target=\"_blank\"><span style=\"color: #ff00ff;\">000-936<\/span><\/a>\u7684\u4e00\u5247\u5831\u9053\uff1a<\/p>\n<p>IBM certifications I 000-936\u8003\u8a66\u984c\u5eab\u7531KillTest\u8a8d\u8b49\u984c\u5eab\u7db2\u8cc7\u6df1IT\u8a8d\u8b49\u8b1b\u5e2b\u548cIBM certifications I\u7522\u54c1\u5c08\u5bb6\u7d50\u5408PROMETRIC\u6216VUE\u7684\u771f\u5be6000-936\u8003\u8a66\u74b0\u5883\u6700\u65b0\u539f\u984c\u50be\u5fc3\u6253\u9020\u3002\u984c\u5eab\u8986\u84cb\u4e86\u7576\u524d\u6700\u65b0\u7684\u771f\u5be6\u8003\u984c\uff0c\u4e26\u4e14\u5168\u90e8\u9644\u6709\u6b63\u78ba\u7b54\u6848\uff0c\u6211\u5011\u627f\u8afe\u984c\u5eab\u5c0dIBM certifications I 000-936(IBM Tivoli Access Manager for e-business V6.1 Implementation)\u8003\u8a66\u539f\u984c\u5b8c\u6574\u8986\u84cb\u3002000-936\u984c\u5eab\u52a9\u60a8\u8f15\u9b06\u901a\u904e\u8a8d\u8b49\u8003\u8a66\uff0c\u4e00\u6b21\u4e0d\u904e\u5168\u984d\u9000\u6b3e\u3002000-936\u6700\u65b0\u984c\u5eab\u5305\u542b139\u9053\u771f\u984c\uff0c2009\u5e742\u670818\u65e5\u9032\u884c\u6700\u65b0\u66f4\u65b0\u3002<\/p>\n<p>A customer is in the process of deploying IBM Tivoli Access Manager for e-business to a heavily used network environment. Which two configurations would accomplish this? (Choose two.)<br \/>\nA.one WebSEAL server with many junctions<br \/>\nB.replicated policy servers and replicated WebSEALs<br \/>\nC.multiple instances of WebSEAL junctioned to different back-end servers<br \/>\nD.replicated front-end WebSEAL servers, each junctioned to replicated back-end servers<br \/>\nE.two separate user registries pointing to different policy servers, two WebSEAL instances<br \/>\nCorrect:C D<\/p>\n<p>Which logout page is called when a user clicks logout in an ecsso setup?<br \/>\nA.\/pkmslogout-nomas<br \/>\nB.\/pkmslogout-no-mas<br \/>\nC.\/pkmslogout-maslogoff<br \/>\nD.\/pkmslogout-no-mas-logout-uri<br \/>\nCorrect:A<\/p>\n<p>Which two statements are true about IBM Tivoli Access Manager for e-business configuration for LDAP replicas? (Choose two.)<br \/>\nA.The master LDAP server configured must be read\/write.<br \/>\nB.All replicas must use the same port as the master LDAP server.<br \/>\nC.LDAP replicas are defined in the pd.conf file in the [ldap-replica] stanza.<br \/>\nD.If more than one replica has the same priority value, they will be load-balanced.<br \/>\nE.Priorities set for each replica can be between 1 and 5, with 5 being the highest priority.<br \/>\nCorrect:A D<\/p>\n<p>IBM certifications I 000-936(IBM Tivoli Access Manager for e-business V6.1 Implementation)\u8003\u984c\u7531\u6211\u5011\u7684\u8cc7\u6df1IT\u8a8d\u8b49\u8b1b\u5e2b\u548cIBM certifications I\u7522\u54c1\u5c08\u5bb6\u7cbe\u5fc3\u6253\u9020\uff0c\u5305\u62ec\u4e86\u7576\u524d\u6700\u65b0\u7684\u771f\u5be6000-936\u8003\u984c\uff0c\u5168\u90e8\u9644\u6709\u6b63\u78ba\u7b54\u6848\u3002\u6240\u6709\u8cfc\u8cb7KillTest 000-936 \u984c\u5eab\u7684\u5ba2\u6236\u90fd\u5c07\u5f97\u523060\u5929\u7684\u514d\u8cbb\u5347\u7d1a\u670d\u52d9\uff0c\u4fdd\u8b49\u4e86\u5ba2\u6236\u7684\u4e00\u6b21\u901a\u904e\u7387\u3002KillTest IT\u8a8d\u8b49\u984c\u5eab\u7db2\u52a9\u60a8\u4e00\u6b21\u901a\u904eIBM certifications I 000-936\u8003\u8a66\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6458\u81eaIT\u8a8d\u8b49\u984c\u5eab\u4e2d\u95dc\u4e8eIBM\u8a8d\u8b49000-936\u7684\u4e00\u5247\u5831\u9053\uff1a IBM certifications I 000- [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[241,50],"tags":[2806,2768],"class_list":["post-547","post","type-post","status-publish","format-standard","hentry","category-000-936","category-ibm","tag-000-936","tag-hp"],"_links":{"self":[{"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/posts\/547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/comments?post=547"}],"version-history":[{"count":0,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/posts\/547\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/media?parent=547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/categories?post=547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/tags?post=547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}