Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

IBM EXAM 000-560

IBM Tivoli Endpoint Manager V8.1 Implementation

Total Questions: 180

Question: 1

Which permissions are available to a non-master operator in IBM Tivoli Endpoint Manager V8.1 (TEM)? A. grant privileges level of other users B. access to the Administration utility C. view the TEM Actions of other TEM Console users D. manage content and systems delegated by the master operator

Answer: D

Question: 2

Which statement correctly identifies features of a disaster recovery plan that can be addressed by IBM Tivoli Endpoint Manager V8.1 (TEM) Distributed Server Architecture (DSA)? A. DSA can act as a hot fail-over for a TEM Server. B. DSA can act as a hot and cold fail-over for a TEM Server. C. DSA can act as a hot fail-over for a TEM Server and Console. D. DSA can act as a hot and cold fail-over for a TEM Server and Console.

Answer: A Question: 3
What is the minimum recommended hardware for the IBM Tivoli Endpoint Manager Server given an implementation of approximately 10,000 computers? A. 2-3 GHz - 2 Cores, 4 GB RAM, 1 RAID B. 2-3 GHz , 2 GB RAM, standard hard drives C. 2-3 GHz - 2-4 Cores, 8 GB RAM, 1-2 RAID 10 D. 2-3 GHz - 4-8 Cores, 16-32 GB RAM, 2 RAID 10

Answer: C

Question: 4

Which statement describes the best use for Distributed Server Architecture (DSA) within an IBM Tivoli Endpoint Manager V8.1 (TEM) deployment? A. DSA provides the ability to have two TEM Servers where either TEM Server is able to provide backup for the other in the event that either TEM Server fails. B. DSA provides the ability to have two TEM Servers where the secondary server provides backup for the primary TEM Server in the event that the primary server fails. C. DSA supports multiple TEM Servers in close proximity to major server farms but cannot provide backup for a failed TEM Server in the event that any one of the TEM Servers fail. D. DSA provides the ability to have two TEM Servers in close proximity to major server farms but cannot provide backup for a failed TEM Server in the event that either of the TEM Servers fail.

Answer: B

Question: 5

What are three inputs necessary to develop a technical architecture for an IBM Tivoli Endpoint Manager V8.1 deployment? (Choose three.) A. knowledge of the Java development kit B. knowledge of DB2 database deployment methodologies C. a requirement to implement IBM Tivoli Endpoint Manager D. an understanding of IBM Tivoli Endpoint Manager capabilities E. knowledge of the IBM Tivoli Endpoint Manager development process F. knowledge of the organization in which IBM Tivoli Endpoint Manager will be implemented

Answer: C, D, F

Question: 6

Which IBM product provides functionality including software deployment, inventory patching, and remote control? A. IBM Tivoli Endpoint Manager for Patch Management B. IBM Tivoli Endpoint Manager for Lifecycle Management C. IBM Tivoli Endpoint Manager for Systems Management D. IBM Tivoli Endpoint Manager for Configuration Management

Answer: B

Question: 7

What are two requirements to install an IBM Tivoli Endpoint Manager (TEM) Server using a remote database? (Choose two.) A. The TEM Agent is installed on the SQL server. B. The TEM Console is installed on the SQL server. C. Port 52311 is open on the remote database server. D. A user account with System Admin (sa) permissions. E. A supported SQL database must be installed prior to the server installation.

Answer: D, E Question: 8
When would an IBM Tivoli Endpoint Manager (TEM) replicated database be used? A. for use with an external web report server B. to create a backup of an existing database C. for use with a TEM for Software Usage Analysis server D. when fault tolerance is desired using Distributed Server Architecture

Answer: D

Question: 9

Which two additional rights do master operators have that operators do not have in the IBM Tivoli Endpoint Manager Console? (Choose two.) A. view all unmanaged assets B. create new custom Fixlet sites C. change or delete computer settings D. globally hide or unhide Fixlet messages E. create custom content including Fixlet messages, tasks, baselines, and analyses

Answer: A, D

Question: 10
What are two supported operating systems for the IBM Tivoli Endpoint Manager Console? (Choose two.) A. AIX B. OS/2 C. Windows XP D. Windows Server 2008 E. Red Hat 5.0 and above

Answer: C, D Question: 11
The license allocation allows 100 computers but there are 120 active computers reporting in the number of agents. What happens to the 20 computers over the license amount? A. The remaining 20 will be given grace mode licenses. B. The remaining 20 will be given restricted mode licenses. C. The first 10 are given grace mode licenses and the remaining 10 are given restricted mode licenses. D. All computers will function normally but a reminder will be displayed to all console users that the system is out of compliance.

Answer: C

Question: 12

Which two types of operators can log into the IBM Tivoli Endpoint Manager Console? (Choose two.) A. Operator B. Super User C. Administrator D. Master Operator E. Site Administrator

Answer: A, D

Question: 13

If UDP is blocked by firewalls, how can IBM Tivoli Endpoint Manager (TEM) Agents receive new content? A. reprogram the firewall to allow UDP B. change the TEM Server configuration C. modify corporate policies to allow the use of UDP D. configure the TEM Agent to periodically poll for new content

Answer: D Question: 14
What should be done if a newly licensed site is not visible in the IBM Tivoli Endpoint Manager Console? A. analyse the License Overview data B. run the task Check for New Licenses C. run the Fixlet Check for New Licenses D. click the button Check for License Update

Answer: D

Question: 15

A system is grayed out in the Computers section of the Navigation Tree. Which basic check should be performed? A. Look at the Relay for the grayed out system and determine if the Relay Service is running. B. Determine if the system is a laptop. Laptop systems often connect to and disconnect from the network and when disconnected, it will be grayed out. C. Attempt to ping the system from a workstation. If it is not reachable, it means the system is most likely turned off and is in a normal state at this time. D. Attempt to ping the system from the IBM Tivoli Endpoint Manager Server. If it is not reachable, it means the system is most likely turned off and is in a normal state at this time.

Answer: B

Question: 16

Which three platforms are supported for Relays in IBM Tivoli Endpoint Manager 8.1? (Choose three.) A. HP-UX B. Mac OS X C. Suse Linux D. Solaris V10 E. Windows XP F. Windows 2000

Answer: D, E, F

Question: 17

In an IBM Tivoli Endpoint Manager V8.1 (TEM) environment, a master operator wants to create a value that reports back the Computer Type (such as Server, Workstation, or Laptop). A relevance statement is created to execute on any targeted endpoint that will populate this value and create a computer property to set the value. But after deploying the computer property, many systems display <error> under the property column. What is the most likely cause? A. The relevance statement is not syntactically correct resulting in the <error> value being reported by the systems. B. A custom relevance statement must use error checking, therefore this is not possible within a TEM V8.0 or later environment. C. It is not possible to create or use a custom relevance statement for a computer property against all systems within a TEM environment. D. The relevance statement uses relevance that is not applicable to the version of operating system installed on the system reporting the <error> value.

Answer: D

Question: 18

The data is not updating in the database. Using the BigFix Deployment Health Checks in the IBM Tivoli Endpoint Manager Console, where is it verified that collected data is entered in the database? A. FillDB Bufferdir File Count B. InsertDB Bufferdir File Count C. GatherDB Bufferdir File Count D. CollectDB Bufferdir File Count

Answer: A

Question: 19

Which statement is true regarding putting a relay in a DMZ? A. It must always operate on port 52311. B. It must only push content to agents and never allow polling. C. It must be always have UDP enabled to send agents updates. D. It must always operate on the same port for both internal and external connections.

Answer: D

Question: 20

What are the minimum permissions required to install an IBM Tivoli Endpoint Manager (TEM) Relay from the TEM Console? A. TEM Operator B. Local Administrator C. Domain Administrator D. TEM Master Operator

Answer: A Question: 21
A request has been made to create a new user to view data and create new reports in IBM Tivoli Endpoint Manager (TEM) Web Reports. Which role do they need? A. Normal B. Read-only C. Read/Write D. Administrator

Answer: A

Question: 22

Which operator can activate the Power Consumption Analysis? A. any operator B. master operator C. console operator D. non-master operator

Answer: B

Question: 23

Which fields are required to create a user in IBM Tivoli Endpoint Manager Web Reports? A. Full Name, E-mail Address, Password, Role B. Full Name, User Logon Name, Password, Role C. User Logon Name, E-mail Address, Password, Role D. Full Name, User Logon Name, Password, Department

Answer: B

Question: 24
What statement is correct when assigning roles to Active Directory security groups in IBM Tivoli Endpoint Manager Web Reports? A. Security groups can be assigned any role. B. Security groups can only be assigned the role Normal. C. Security groups can only be assigned the role Read-only. D. Security groups can only be assigned the role Administrator.

Answer: A

Question: 25

Can a Fixlet be deployed to a group of computers? A. Yes, to any type of group. B. Yes, but only to a Manual group. C. Yes, but only to an Ad-Hoc group. D. Yes, but only to an Automatic group.

Answer: A

Question: 26

Which IBM Tivoli Endpoint Manager (TEM) operator can assign management rights to a TEM Console operator? A. any operator B. master operator C. console operator D. management operator

Answer: B

Question: 27
What is the best way to verify if an IBM Tivoli Endpoint Manager (TEM) Server connects to the Internet through a proxy? A. use the TEM Server diagnostic tool B. use a packet sniffing tool to analyze the network traffic C. deploy the Check Internet Connection Fixlet on the server D. open a Web browser and confirm access to www.ibm.com

Answer: A

Question: 28

On a 64-bit IBM Tivoli Endpoint Manager (TEM) Server, where are the installer files for the TEM Console located by default? A. C:\BES Installers\ B. C:\Program Files (x86)\IBM\TEM Installers\Console C. C:\Program Files\BigFix Enterprise\BES Installers\Console D. C:\Program Files (x86)\BigFix Enterprise\BES Installers\Console

Answer: D

Question: 29

When creating a role in IBM Tivoli Endpoint Manager Web Reports, what is the function of Restrict View with a Filter? A. It constrains what the role can view. B. It provides an unrestricted view of all objects. C. It provides a drop-down list of available targets to the user. D. It allows users in the role to restrict what they can view by creating a filter.

Answer: A Question: 30
An IBM Tivoli Endpoint Manager (TEM) Console operator has been assigned management rights on a specific computer. Can this assignment be revoked? A. Yes. By updating the masthead file. B. Yes. The TEM Console operator must become a TEM master operator. C. Yes. Use the delete option in the Assign User Management Rights dialog box. D. Yes. Use the revoke option in the Assign User Management Rights dialog box.

Answer: C

Question: 31

What are three options for subscribing computers to sites? (Choose three.) A. All Computers B. No Computers C. All Unmanaged Devices D. All Managed Computers E. use the Site Subscription tool F. computers that match a specified condition

Answer: A, B, F

Question: 32

Which statement is true about the Relay Affiliation feature? A. It allows relays to synchronize for automatic grouping. B. It allows the server to automatically group certain relays. C. It allows agents to be put into a logical group with certain relays. D. It allows agents to use manual relay selection without pre-configuration.

Answer: C

Question: 33
A company has just deployed IBM Tivoli Endpoint Manager V8.1(TEM) to manage 5000 Windows desktops for patching, operating system deployment, remote control, and power management. A patch administrator is responsible for patching all systems throughout the environment, has a TEM Console on the system, and is able to log in using the credentials supplied by the TEM administrator.An intern is hired to patch a TEM group called Test Machines. The intern has no other rights in the TEM Console. What permissions must be granted to the intern?

A. Assign operator rights to the TEM Console and management rights to the Test Machines group. B. Assign operator rights to the TEM Console and reader permissions to the Patches for Windows site. C. Assign master operator rights to the TEM Console and management rights to the Test Machines group. D. Assign operator rights to the TEM Console, reader permissions to the Patches for Windows site, and management rights to the Test Machines group.

Answer: D

Question: 34

Which computer groups are available in an IBM Tivoli Endpoint Manager V8.1 environment? A. Automatic, Static, Ad-Hoc B. Dynamic, Manual, Ad-Hoc C. Automatic, Manual, Ad-Hoc D. Automatic, Manual, Temporary

Answer: C

Question: 35

What is an IBM Tivoli Endpoint Manager analysis? A. It allows viewing of various client properties. B. It allows changing of various client properties. C. It is a task used to analyze the status of the clients. D. It is a Fixlet used to analyze the status of the clients.

Answer: A

Question: 36

Why would an IBM Tivoli Endpoint Manager (TEM) administrator use the task relay setting Name Override? A. to provide an alternate domain name for the agent connections to a relay B. to have the relay report a different name to the server to avoid name collision with another relay C. to have the relay display a different name in the TEM Console than its default name so it can be grouped with other relays D. to have the relay use a different domain name so it can be part of a Managed Service Point segmented customer environment

Answer: A

Question: 37

Which statement is true about Relay Affiliation group names? A. The names are case sensitive. B. Names must start with a double underscore. C. Names must not use a relay machine name. D. Any naming scheme can be set up by an administrator.

Answer: D Question: 38
How is command polling enabled in IBM Tivoli Endpoint Manager? A. use the BES Fixlet called Enable Polling B. use the BES Server Setting task called Enable Polling C. use the BES Client Setting task called Enable Command Polling D. use the BES Relay Setting task called Enable Command Polling

Answer: C

Question: 39

Why would an agent appear in the IBM Tivoli Endpoint Manager (TEM) Console but be grayed out? A. The agent is using manual Relay selection. B. The agent just rebooted after receiving an action. C. The agent has been offline for at least 45 minutes. D. The endpoint is using an older version of the agent.

Answer: C Question: 40
Click the Exhibit button.

A master operator for an IBM Tivoli Endpoint Manager V8.1 (TEM) environment is examining the License Overview Dashboard and notices an error. How can this error be fixed? A. The TEM administrator must run the TEM Administration Tool; simply running the tool will clear the error message. B. The TEM administrator must run the TEM Administration Tool and export the masthead using the Masthead Management Tab. C. The TEM administrator must run the TEM Administration Tool and download a new masthead using the Masthead Management Tab. D. The TEM administrator must run the TEM Administration Tool; once opened TEM will ask to propagate the masthead automatically.

Answer: D

Question: 41

What are three of the the primary services for the IBM Tivoli Endpoint Manager Server? (Choose three.) A. BES Buffer Service B. BES Relay Service C. BES Agent Service D. BES FillDB Service E. BES Gather Service F. BES GatherDB Service

Answer: D, E, F

Question: 42

What is the most common cause of IBM Tivoli Endpoint Manager Web Reports not showing data?

A. The Web Reports server cannot reach any relays. B. The Web Reports database logs did not rotate properly. C. The Web Reports user is not using a supported browser. D. The Web Reports database has been disabled due to timeout being reached.

Answer: D

Question: 43

On a Linux IBM Tivoli Endpoint Manager Agent, what is the purpose of the file /etc/opt/BESClient/actionsite.afxm? A. It stores the list of sites that the agent is subscribed to. B. It contains the masthead information for the deployment. C. It stores the list of actions that have been sent to the agent. D. It contains the list of operators that can perform actions on that agent.

Answer: B

Question: 44

How can a majority of IBM Tivoli Endpoint Manager Console issues be fixed? A. reboot the system running the Console application B. run the BES Console and select Clear Console Cache task C. clear the Console cache and restart the Console application D. request a new masthead and restart the Console application

Answer: C

Question: 45

What is the major consumer of network bandwidth by IBM Tivoli Endpoint Manager V8.1 (TEM) for Lifecyle Management? A. The updates to each subscribed site for each TEM Agent. B. The heartbeat packets sent by a TEM Agent to the TEM Server. C. The downloading of files for patching or software installations on the TEM Agent. D. The use of ICMP pings by the TEM Agent when Automatic Relay Selection is enabled.

Answer: C

Question: 46

What causes this error in the IBM Tivoli Endpoint Manager Console - Unknown Problem During Initialization? A. The server or workstation platform is not supported. B. The relay auto-detection cannot find any valid relays. C. The user does not have permissions to log in to MSSQL. D. The user does not have permissions to the BES Console folder.

Answer: D Question: 47
An administrator is troubleshooting the agent's log file. The agent is connecting to the server and downloading content, however the IBM Tivoli Endpoint Manager (TEM) Console does not show the agent computer listed but other computers are visible. What should be checked next? A. the masthead file for the agent B. TEM Console ODBC connection C. if UDP pings can reach the agent D. TEM Console operator management rights

Answer: D

Question: 48

Which statement is true when bandwidth throttling is enabled in IBM Tivoli Endpoint Manager V8.1 (TEM)? A. Only downloaded files use bandwidth throttling. Results of actions and heartbeats do not use the bandwidth throttling settings. B. Only downloaded files and site content use bandwidth throttling. Results of actions and heartbeats do not use the bandwidth throttling settings. C. Every item within the TEM environment utilizes the bandwidth throttling settings including downloads, heartbeats, and results from the TEM Agent. D. Only results from the agent use the bandwidth throttling settings. Downloaded files do not require bandwidth throttling as TEM compresses these files prior to making them available to the TEM Agents.

Answer: B

Question: 49

The IBM Tivoli Endpoint Manager (TEM) Agent installed on a TEM Relay is failing. It is determined that the TEM Agent should be reinstalled. How is this accomplished? A. Run the Windows Installer program from the Control Panel to remove the TEM Agent and then reinstall it. B. Run the BES Remove Utility to fully remove both the TEM Agent and TEM Relay. Reinstall the TEM Agent and then the TEM Relay. C. Run the BES Remove Utility to fully remove the TEM Relay and then reinstall the TEM Relay onto the system to repair the TEM Agent. D. Stop the TEM Relay Service first and then run the TEM Utility to fully remove the TEM Agent. Then reinstall the TEM Agent and restart the TEM Relay Service.

Answer: B

Question: 50

What communications are initiated between the IBM Tivoli Endpoint Manager (TEM) Server, TEM Relays, and TEM Agents? A. TCP pings are used to initiate all communications between each component. B. UDP pings are used to initiate all communications between each component. C. UDP pings from the TEM Server to TEM Relays or TEM Relay to TEM Relay; TCP pings from the TEM Server or TEM Relays to the TEM Agents. D. UDP pings from the TEM Server or TEM Relays to the TEM Agents; TCP pings from the TEM Server to the TEM Relays or TEM Relay to TEM Relay.

Answer: D

Question: 51

A number of actions have been submitted from the IBM Tivoli Endpoint Manager (TEM) Console but there are no updates for any systems. What is the most likely cause? A. The BES FillDB Service has stopped unexpectedly. Restart this service on the TEM Server. B. The BES FillDB Service has stopped unexpectedly. Restart this service on the TEM Relays. C. The BES Gather Service has stopped unexpectedly. Restart this service on the TEM Server. D. The PostResults.exe process has stopped unexpectedly. Examine the FillDB.log for the file that caused the crash, delete that file, and restart the BES Root Server Service on the TEM Server.

Answer: A

Question: 52

How is the IBM Tivoli Endpoint Manager Analytics (TEMA) component started after installation? A. run tema start as an administrator B. the TEMA component starts automatically after installation C. run the Start the Tivoli Endpoint Manager Analytics Component Task D. run the Start the Tivoli Endpoint Manager Analytics Component Fixlet

Answer: A

Question: 53

How are security patches, hot fixes, and service packs packaged with IBM Tivoli Endpoint Manager V8.1 (TEM)? A. Use the TEM Fixlet Editor to embed patches in a Fixlet. B. Acquire TEM compatible packages directly from software vendors C. Use the Software Package Editor of IBM Tivoli Configuration Manager to create one package per patch. D. IBM researches software vendor patch information and provides Fixlets that will be used to check for compliance and apply remediation if required.

Answer: D Question: 54
How is a designated scan point removed using Asset Discovery? A. run the Task - Remove Nmap Scan Point B. use the Analysis - Nmap Scan Point Statistics C. scan points are removed after two weeks of non-use D. run the Task - Uninstall Nmap Asset Discovery Import Service

Answer: A

Question: 55

A customer needs to uninstall a software package from any Windows system that has it installed. The software package was installed using a Microsoft Windows Installer (MSI) package. Which two methods can be used to uninstall the software? (Choose two.) A. Create and run a task from the Windows Software Removal Analysis. B. Create and run a task using the Windows Software Rollback Wizard. C. Create a new custom task which includes the ActionScript command:waithidden {pathname of system folder}\MsiExec.exe /X "{00000000-00000-0000-0000000000000000}" /QN. D. Use the Manage Software Distribution Packages Dashboard to create a package which delivers the MSI to the target machine and runs: msiexec.exe /X packagename.msi /QN. E. Create a new custom task which includes the ActionScript command:waithidden {pathname of system folder } \MsiExec.exe /E "{00000000-00000-0000-0000000000000000 } " /QN.

Answer: C, D

Question: 56

What is the next step after deploying the IBM Tivoli Endpoint Manager Analytics (TEMA) component? A. run the Install Tivoli Endpoint Manager Analytics Task B. run the Install Tivoli Endpoint Manager Analytics Fixlet C. run tema install on the TEMA Server as an administrator D. run the IBM Tivoli Endpoint Manager Component Installer and select Install Tivoli Endpoint Manager Analytics

Answer: C

Question: 57

Where are patches evaluated for compliance in an IBM Tivoli Endpoint Manager V8.1 (TEM) environment? A. On the TEM Relays driven by the relevance language. B. Centrally by the TEM Server using change management information. C. Centrally by the TEM Server using information stored in the relational database. D. Directly on the endpoint by the TEM Agent using Fixlets driven by the relevance language.

Answer: D

Question: 58

Computers can be awakened at a preset time without the need for Wake on LAN by using what feature? A. Power Tracking B. Last Man Standing C. Wake-from-Standby D. PC Insomnia Manager

Answer: C Question: 59
Installation and setup of IBM Tivoli Endpoint Manager (TEM) Client Manager for Endpoint Protection (CMEP) involves which two steps? (Choose two.) A. CMEP Site Subscription B. importing the CMEP Masthead C. activating CMEP tasks and analyses D. installing the CMEP Module on the TEM Server E. downloading the CMEP Masthead from the IBM Support site

Answer: A, C

Question: 60
The Manage Software Distribution Packages Dashboard will automatically create command lines for which software package types? A. MSI and EXE B. MSI and SPB C. SPB and EXE D. MSI and Microsoft Patch Files

Answer: B Question: 61
What is the system on the subnet called that does not go into a lower power state in order to wake up other machines? A. PC Insomniac B. Last Man Standing C. Wake on LAN Medic D. Wake on LAN Forwarder

Answer: B Question: 62
Installation of the Asset Discovery service requires which steps in IBM Tivoli Endpoint Manager V8.1 (TEM)? A. Run the Task Install NMAP Asset Discovery Import Service on the TEM Server. Run the Designate NMAP Scan Point Task to designate the scan points. B. Run the Task Install NMAP Asset Discovery Import Service on the TEM Relays. Run the Designate NMAP Scan Point Task to designate the scan points. C. Run the Task Install NMAP Asset Discovery Import Service on at least one TEM Relay. Run the Designate NMAP Scan Point Task to designate the scan points. D. Run the Task Install NMAP Asset Discovery Import Service on the desired TEM Agents. Run the Designate NMAP Scan Point Task to designate the scan points.

Answer: A

Question: 63

Which activities are preformed by the IBM Tivoli Endpoint Manager Site Administrator role? A. agent installation, SQL administration B. server installation, provisioning operators C. provisioning operators, assigning computers to operators D. agent installation, provisioning operators, assigning computers to operators

Answer: B

Question: 64

A new IBM Tivoli Endpoint Manager V8.1 (TEM) environment is being deployed. The customer has a security policy that dictates that only systems approved by Human Resources (HR) IT may connect to HR IT resources.During preplanning, it becomes clear that this policy will extend to TEM systems meaning that TEM Agents within the HR Department can connect only to the TEM Relays servicing the HR IT environment and that only HR TEM Agents can connect to the HR TEM Relays. How can this be achieved? A. Work with the HR Security Group to obtain an exception to this policy. B. Implement Relay Affiliation for all HR systems to ensure that only HR TEM Agents connect to Human Resources TEM Relays. C. Implement Manual Relay Selection for the Human Services TEM Agents to ensure that only TEM Agents from the HR Department can connect to the TEM Relays within the HR Department. D. Implement Manual Relay Selection for all TEM systems. This provides the easiest methodology for complying to this security policy and for the TEM operators to maintain the environment in the future.

Answer: B

Question: 65

What is the estimated size for the IBM Tivoli Endpoint Manager Database given an implementation of approximately 100,000 computers? A. 1 TB B. 5 GB C. 15 GB D. 100 GB

Answer: C

Question: 66

If a company utilizing 10,000 computers spread across 200 sites is implementing IBM Tivoli Endpoint Manager V8.1, how many IBM Tivoli Endpoint Manager Servers would be recommended? A. 1 B. 2 C. 3 D. 5

Answer: A Question: 67
What makes a system a good candidate to be an IBM Tivoli Endpoint Manager (TEM) Relay? A. It should always be a system dedicated to the relay. B. An existing system that meets the requirements of the TEM Relay. C. It should run Windows Server 2003, Windows Server 2008, or Mac OS X Server. D. It should have dual network interfaces to isolate agents from downstream relays.

Answer: B

Question: 68
IBM Tivoli Endpoint Manager is installed and all sites are enabled. However, some of the sites are not being used and will not be used at any time. How are these sites removed? A. execute the Remove Unused Sites Fixlet B. navigate to the site and click the Remove button C. All Content > License Overview and click on Disable next to the site D. BigFix Management > License Overview and click on Disable next to the site

Answer: B Question: 69
Which task should an IBM Tivoli Endpoint Manager (TEM) administrator perform on a regular basis to ensure the health of a TEM environment? A. TEM will automatically alert the administrator if actions need to be taken. B. Remove any grayed-out systems displayed in the Computer section of the Navigation Tree using the Remove From Database menu option. C. Run a TEM utility on the TEM Server to remove duplicate computer names and any computer that has not reported in within the past 30 days. D. Review the Deployment Health Checks Dashboard for any inconsistencies in the BES Server Health section and take appropriate actions to correct the warning or failure.

Answer: C Question: 70
According to IBM documentation, when is it recommended to install an IBM Tivoli Endpoint Manager Relay? A. per 1,000 agents B. per 2,000 agents C. for every 500 concurrent users D. for every 5 VLANs in the environment

Answer: A

Question: 71
Other than looking at the License Overview in the IBM Tivoli Endpoint Manager (TEM) Console, how else can the license serial number be determined? A. From the TEM Console select Help > About and look for the serial number. B. Open the ActionSite.afxm file in the BES Server directory and check the parameter SerialNumber. C. Open the license.key file in the BES Server directory and check the parameter X-FixletSite-Serial-Number. D. Open the ActionSite.afxm file in the BES Server directory and check the parameter XFixlet-Site-Serial-Number.

Answer: D Question: 72
What are three requirements for an endpoint to be used as a relay? (Choose three) A. Java V1.4.2 or higher B. minimum free hard drive space: 2 GB C. Firefox V2.0 or above (for UNIX relays) D. a two-way TCP connection to its parent E. a two-way UDP connection to its parent F. Internet Explorer V4.0 or above (for Windows relays)

Answer: B, D, F Question: 73
A console operator must preconfigure the installation of IBM Tivoli Endpoint Manager (TEM) Agents on endpoints. What is the name of the configuration file used? A. temconfig.sys B. temsettings.cfg C. clientsettings.cfg D. unattendedinstall.cfg

Answer: C

Question: 74

A computer group has been defined for systems running the Windows XP Operating System. However, new systems are not joining this group. What is the most likely cause? A. The computer group was created but it was not activated. B. The computer group is a manual group so a new system must be joined manually to the computer group. C. The computer group was created with a configured limitation. This limitation is used to stop new systems from joining this group. D. The computer group was created by another non-master operator and therefore is unable to include those system managed by other non-master operators.

Answer: B

Question: 75

A retail company wants to install an IBM Tivoli Endpoint Manager (TEM) environment that will manage 10,000 endpoints across 100 stores nationwide. The TEM Server will be located at the company's corporate headquarters and each store will have IT technicians responsible for managing that store's 100 endpoints through TEM. Each store is connected to corporate headquarters through a dial-up or satellite connection. What is the best way for the technicians to access the TEM Server? A. Install consoles on each store technician's laptop. B. Setup a TEM Web Console that each technician can access over the Internet. C. Require every technician to connect to the TEM Server through a remote desktop. D. Setup a terminal server with a high speed connection that provides access to the TEM Server.

Answer: D

Question: 76

What is the IBM Tivoli Endpoint Manager (TEM) license authorization file based upon? A. The number of endpoints running a TEM Agent. B. The value contained in the configuration file tem.cfg. C. The number of TEM Servers serving all TEM endpoints. D. The number of endpoints reported after the first full hardware scan.

Answer: A Question: 77
What are three ways to license a new IBM Tivoli Endpoint Manager (TEM) installation? (Choose three.) A. install with the product key code B. use an existing masthead.afxm file C. download license keys from the IBM website D. create a new masthead using an existing license E. use a new license authorization file provided by IBM F. the TEM installer program creates it automatically using the certificate store

Answer: B, D, E Question: 78
Which two functions can an operator perform in the IBM Tivoli Endpoint Manager Console? (Choose two.) A. deploy actions B. view all unmanaged assets C. manage external Fixlet site subscriptions D. edit the management rights settings for other operators E. view unmanaged assets according to each operator's predefined scope

Answer: A, E

Question: 79

When a site administrator creates a new user using the IBM Tivoli Endpoint Manager (TEM) Administration Tool, which two newly created files must the end user access to log-in to the TEM Console? (Choose two.) A. license.crt B. publisher.crt C. publisher.pvk D. publisher.afxm E. actionsite.afxm

Answer: B, C Question: 80
How is a new content site enabled? A. run the required Fixlet B. download a new masthead from IBM C. click on Enable in the License Overview Dashboard D. install the content site package downloaded from Passport Advantage

Answer: C

Question: 81
Which three fields are required for creating a user in IBM Tivoli Endpoint Manager Web Reports? (Choose three.) A. Role B. E-Mail C. Password D. Full Name E. Domain Name F. User Logon Name

Answer: A, C, F

Question: 82
What is required when setting up the Active Directory authentication for IBM Tivoli Endpoint Manager Web Reports? A. root CN name B. LDAP search string C. domain user ID and password D. Active Directory domain name

Answer: C Question: 83
Which statement is correct when assigning roles to Active Directory users in IBM Tivoli Endpoint Manager Web Reports? A. Users can only be assigned roles. B. Users can inherit and be assigned roles. C. Users can only inherit roles from the security group. D. Users are not accessible from the Active Directory permissions.

Answer: B Question: 84
Which two methods are supported for installing the IBM Tivoli Endpoint Manager (TEM) Console? (Choose two.) A. use the TEM Console Deployment Tool B. use a pre-defined Fixlet from another TEM Console C. download the console installer file from http://support.bigfix.com D. use the Active Directory Console Installer Wizard that is created when the TEM Server installer is run E. copy the installation folder to the target system and run setup.exe with an account that is a local administrator

Answer: B, E

Question: 85

What must an IBM Tivoli Endpoint Manager master operator do to activate an analysis? A. use the Activate Analysis Wizard B. deploy the Activate Analysis Fixlet C. right-click on the desired analysis and select the Activate option D. right-click on a computer and select the Activate Analysis option

Answer: C

Question: 86

What must an IBM Tivoli Endpoint Manager administrator do to configure the BES Gather Service to connect to the Internet through a proxy? A. set the startup type to manual B. set the startup type to automatic C. set the login as a system local account D. set the login as an account with appropriate permissions

Answer: D

Question: 87
What function does the setting BESRelay_Register_Affliation_AdvertisementList perform? A. It provides relays and servers the group they affiliate with. B. It provides a relay with the list of agents it is allowed to affiliate with. C. It provides agents, relays, and servers the list of relays to affiliate with. D. It provides agents with the location on the server that stores the advertisement list.

Answer: A

Question: 88

What is the lowest level default role that can create users in IBM Tivoli Endpoint Manager Web Reports? A. Normal B. Read-only C. Read/Write D. Administrator

Answer: D

Question: 89

In which management domain is the operator section located? A. System Lifecycle B. Patch Management C. BigFix Management D. Security Configuration

Answer: C

Question: 90
Command polling is enabled with Edit Computer Settings using which custom variable? A. _Comm_CommandPollEnable B. _BESClient_CommandPollEnable C. _BESClient_Enable_CommandPoll D. _BESClient_Comm_CommandPollEnable

Answer: D

Question: 91

When logging in to the IBM Tivoli Endpoint Manager (TEM) Console these domains are visible: All Content, BigFix Management, Patch Management, Systems Lifecycle. When the Patch Management domain is opened the section for Microsoft Windows under OS Vendors is visible. Displaying non-relevant content shows many available patches but none are relevant to this environment even though there are some patches that must be deployed. Why? A. Master operator access is required. B. The TEM Server is not connected to the Internet. C. No computers have been subscribed to the Patches for Windows site. D. Authorization as a Reader for the Patches for Windows site is required.

Answer: C Question: 92
What function does the setting BESClient_Register_Affliation_SeekList perform? A. It provides agents the list of relays they should affiliate with. B. It provides a relay with the list of agents it is allowed to affiliate with. C. It provides agents, relays, and servers the list of relays to affiliate with. D. It provides agents with the location on the server that stores the seek list.

Answer: A Question: 93
If systems are not subscribed to sites, where does that information appear in the IBM Tivoli Endpoint Manager (TEM) Console? A. in the Warnings section of the All Content domain B. in the Warnings section of the BigFix Management domain C. every domain will have a Warnings section where the information is shown D. a pop-up screen appears in the TEM Console and will not be dismissed until all sites have been subscribed to

Answer: B

Question: 94

An IBM Tivoli Endpoint Manager (TEM) operator has created an Automatic group that is populated by all the computers that contain "lab" in the computer name. Will computer newlab133788 be visible in the group after the TEM Agent is installed? A. Yes, it matches the group condition. B. Yes, but only after the Joining Automatic Group analysis is activated. C. No, because only the computers starting with the name "lab" can be shown. D. No, only the computers matching the group condition at the group creation time are shown.

Answer: A

Question: 95

Which statement is true about manually editing computer settings for fail-over relays? A. The primary relay cannot be a UNIX relay. B. Primary or secondary relays do not have to be set for an agent to function. C. Only the primary and secondary relays can be set; no other levels can be specified. D. The secondary relay should always be in the same affiliation group as the primary relay.

Answer: B Question: 96
What is the difference between a Manual Group and an Ad-Hoc Group? A. Ad-Hoc is persistent and Manual is temporary. B. Ad-Hoc is temporary and Manual is persistent. C. There is no difference, they are both persistent. D. There is no difference, they are both temporary.

Answer: B

Question: 97

An IBM Tivoli Endpoint Manager (TEM) Console operator has been assigned management rights on a computer that is powered off. Is the computer visible in the operator console? A. Yes, if Wake on LAN has been enabled. B. Yes, the processing is done at the server level. C. No, it will only be visible when the Show Computer Fixlet is deployed. D. No, it will only be visible once the computer is powered on and the BES Client is started.

Answer: D

Question: 98

Can an IBM Tivoli Endpoint Manager operator create an analysis that is applicable only on AIX agents? A. No, analysis on AIX is not supported. B. Yes, only using a proper Relevance statement. C. Yes, only after deploying the appropriate AIX agent Fixlet. D. No, an analysis does not have a Relevance section and is always applicable to any agent.

Answer: B Question: 99
How is logging for IBM Tivoli Endpoint Manager Web Reports enabled? A. install Log4j from the IBM Support website B. run the Enable Web Reports Logging Fixlet C. run the Enable Web Reports Logging Wizard D. create three new registry keys in Server\BESReports

HKLM\SOFTWARE\BigFix\Enterprise

Answer: D

Question: 100

The configuration of an IBM Tivoli Endpoint Manager V8.1 (TEM) deployment has been changed to use Windows Authentication. What will a user who has previously logged into the TEM Console experience assuming that the user's publisher.pvk and publisher.crt files have been stored locally? A. The user will see no change. B. The user will need to supply their user name to log in to the TEM Console. C. The user will need to modify their DSN Connection. Once reconfigured, the user will only require a user name to log into the TEM Console. D. The user will need to modify their DSN Connection. Once reconfigured, the user will continue to use their user name and password to log into the TEM Console.

Answer: C

Question: 101

When configuring Automatic Relay Selection, why should all IBM Tivoli Endpoint Manager (TEM) Relays and TEM Server be set for Manual Relay Selection? A. There is no implication having the TEM Relays and the TEM Server set for Automatic Relay Selection. B. TEM Relays using Automatic Relay Selection will create additional network load due to the ICMP pings used by the Auto Selection algorithm. C. TEM Relays set to Automatic Relay Selection may incorrectly select another TEM Relay leading to the potential that these TEM Relays are unable to gather new content. D. TEM Relays using Automatic Relay Selection will use additional system resources that will potentially impact the operations of the system where the TEM Relay Service has been installed.

Answer: C

Question: 102
When should bandwidth throttling be implemented for IBM Tivoli Endpoint Manager V8.1 (TEM)? A. Whenever a hub-and-spoke network exists in a TEM environment. B. Whenever there is a slow WAN connection between TEM Agents. C. Whenever the WAN connection between TEM Relays is saturated. D. Only between a TEM Relay and a TEM Agent when the connectivity speed is unknown.

Answer: C Question: 103


When debugging an agent to determine why it is not connecting to the IBM Tivoli Endpoint Manager Console, what information would an administrator look for in the agent log file? A. agent crash dumps B. timeout errors trying to reach the server C. password failed errors trying to connect to the server D. BESGather errors trying to gather content from the server

Answer: B Question: 104


What is the primary rationale for placing an IBM Tivoli Endpoint Manager (TEM) Relay at a location? A. It is based solely on the bandwidth of the connecting WAN. A slow WAN requires the use of a TEM Relay to support the remote TEM Agents. B. It is based solely on the geographical location of the remote TEM Agents. The farther from the TEM Server, the more critical it is to place a TEM Relay. C. It is based on the bandwidth and saturation of the connecting WAN along with the proximity of the proposed TEM Relay to a large number of TEM Agents. D. It is based on the availability of a supported operating system and the availability of the potential TEM Relay system to be available 24 hours a day, seven days a week.

Answer: C

Question: 105

Why would a Web browser be used on an agent to connect to http://<your TEM Server>:52311/rd? A. to determine if the Agent service is running B. to determine if there is connectivity to a relay C. to determine if the Web Reports service is running D. to determine if site requests can be issued against the server

Answer: A

Question: 106

If Message Level Encryption is enabled for an IBM Tivoli Endpoint Manager V8.1 (TEM) deployment, then which TEM Server component decrypts the encrypted messages? A. BES FillDB Service B. BES Gather Service C. BES BufferDir Service D. BES Root Server Service

Answer: A

Question: 107
What happens when an administrator right-clicks on a computer in the IBM Tivoli Endpoint Manager Console and selects Send Refresh? A. A UDP ping is sent to the computer. B. An ICMP ping is sent to the computer. C. An empty action is sent to the computer. D. An updated action site is sent to the computer.

Answer: A

Question: 108

Which three operating systems can be managed by IBM Tivoli Endpoint Manager Power Management? (Choose three.) A. AIX B. HP-UX C. Ubuntu D. Windows 7 E. Windows XP F. Mac OS X 10.5

Answer: D, E, F Question: 109


Where is the IBM Tivoli Endpoint Manager for Security and Compliance Analytics (SCA) software downloaded and unpacked? A. SCA Dashboard B. IBM Support Site C. Passport Advantage D. BES Installers directory

Answer: A Question: 110


What are the default sizes of the IBM Tivoli Endpoint Manager (TEM) Server, TEM Relay and TEM Agent download caches? A. 2 GB B. 10 MB C. 100 MB D. 1024 MB

Answer: D

Question: 111
A Windows software package has several prerequisites for installation. Some client systems have the package and some do not. What is the best method for ensuring a successful software roll out to all agent systems? A. Create a multiple action group to reinstall the prerequisites and then install the package. B. Create a task for each package and use scheduling to install the prerequisites before the package. C. Create a baseline consisting of one component for each prerequisite and one component for the software package. D. Use the Windows Software Distribution Wizard to create a multiple action group consisting of each prerequisite and the software package.

Answer: C Question: 112


Click the Exhibit button.

A customer is implementing Asset Discovery within their IBM Tivoli Endpoint Manager V8.1 (TEM) environment. They have previously run a scan and based on the exhibit, what can be concluded about the system using IP Address 192.168.1.43? A. This system has a TEM Agent installed. B. The system's TEM Agent may not be functional. C. This system does not have a TEM Agent installed. D. It is not possible to determine if the TEM Agent is installed or not.

Answer: C

Question: 113

What is the best way to apply multiple operating system and application patches? A. create a baseline that groups a number of patches together B. apply multiple patches one after the other with a specific utility C. select all required patches and double-click on them to launch the installation D. create an activity plan to install patches embedded in individual software packages

Answer: A

Question: 114

Asset Discovery scans must be implemented within a customer's IBM Tivoli Endpoint Manager V8.1 deployment. Which warnings should the customer be aware of as part of the documentation for Policies and Procedures? A. Inform any Security or Network Operations Center that the Asset Discovery scans use Nmap and may trigger Intrusion Detection Devices.Reduce scans to Class C networks to increase the speed of the actual scans.Nmap scans are completely safe and should never impact devices on the network. B. Inform any Security or Network Operations Center that the Asset Discovery scans use Nmap and may trigger Intrusion Detection Devices. Always perform scans across the entire network to increase the speed of the actual scans. Nmap scans are completely safe and should never impact devices on the network.

C. Inform the Security or Network Operations Center that the Asset Discovery scans use Nmap and may trigger Intrusion Detection Devices. Reduce scans to Class C networks to increase the speed of the actual scans. Network scans may cause certain legacy network devices, such as old network printer devices, to fail if scanned. D. Using a low frequency scan such as Paranoid will not trigger Intrusion Detection Devices so there is no need to inform the Security or Network Operations Center or the scans. Reduce scans to Class C networks to increase the speed of the actual scans. Network scans may cause certain legacy network devices, such as old network printer devices, to fail if scanned.

Answer: C

Question: 115

How should operating system and application patches be tested? A. contact the right software vendor B. install them on specific test systems C. rely on bulletins from specific vendors D. review the Fixlet code that performs the patching

Answer: B

Question: 116

Power Management is visible in which domain in the IBM Tivoli Endpoint Manager V8.1 Console? A. Systems Lifecycle B. Patch Management C. Endpoint Protection D. Power Management

Answer: A

Question: 117

How is the IBM Tivoli Endpoint Manager Analytics (TEMA) component accessed after installation? A. there is no interface to TEMA B. open the TEMA application from the Start menu C. on the TEMA Server go to http://localhost in a supported browser D. from the IBM Tivoli Endpoint Manager Console go the TEMA Dashboard

Answer: C

Question: 118
Which two vendors are supported by IBM Tivoli Endpoint Manager Client Manager for Endpoint Protection? (Choose two.) A. HP B. Sophos C. Symantec D. Kaspersky E. BMC Software

Answer: B, C Question: 119


What are three required actions to determine the IBM Tivoli Endpoint Manager client deployment method? (Choose three.) A. determine endpoint operating systems B. determine client hardware specifications C. determine if off-LAN installations will occur D. determine existing firewall policies for the network E. determine IBM Tivoli Endpoint Manager Server hardware F. determine Microsoft Windows Server Update Services status

Answer: A, C, D

Question: 120

Which statement accurately describes one of the requirements for running the Client Deployment Tool for Windows? A. The target should have port 52311 open. B. The target must be in an Active Directory domain. C. The target must have file and print sharing services enabled. D. The deployment system should be any UNIX or Windows relay.

Answer: C

Question: 121

An IBM Tivoli Endpoint Manager V8.1 architecture should be created prior to implementation. What is needed in that architecture to handle large files/payloads? A. relay hierarchy B. DMZ firewall(s) C. RAID configuration D. TCP/IP addressing scheme

Answer: A Question: 122


By default, which port must be opened to prepare the firewalls between the IBM Tivoli Endpoint Manager Server and the DMZ relays and agents? A. 443 B. 1433 C. 8080 D. 52311

Answer: D

Question: 123

Just prior to an IBM Tivoli Endpoint Manager V8.1 (TEM) deployment, a customer wants to have all content initially hidden from non-master operators and use Custom Sites to publish content. How should this requirement be handled? A. By default all content is initially hidden until the TEM master operator selects the content to be published. B. Using a Master Operator account, globally hide all content. Through the Master Operator account, work with the customer to establish the correct Custom Sites for copying desired content. C. Using the TEM Administration Tool, set the Default Fixlet Visibility item to hide all content. Through a master operator account, work with the customer to establish the correct Custom Sites for copying desired content. D. Using a master operator account, ensure that no non-master operator accounts have read access to any content. Through the master operator account, work with the customer to establish the correct Custom Sites for copying desired content.

Answer: C

Question: 124

What are the minimum recommended hardware requirements given an implementation of approximately 100,000 computers? A. 2-3 GHz - 2 Cores, 4 GB RAM, 1 RAID B. 2-3 GHz , 2 GB RAM, standard hard drives C. 2-3 GHz - 2-4 Cores, 8 GB RAM, 1-2 RAID 10 D. 2-3 GHz - 4-8 Cores, 16-32 GB RAM, 2 RAID 10

Answer: D

Question: 125

How is the the current version of the IBM Tivoli Endpoint Manager Relays checked? A. All Content > Relays > By Retrieved Properties > Relay Version B. BigFix Management > Relays > Relay Health Check > Relay Version C. All Tasks > Deployment Health Checks and review BES Relay Version D. BigFix Management > Deployment Health Checks and review BES Relay Version

Answer: D

Question: 126
How is the IBM Tivoli Endpoint Manager (TEM) Relay installation initiated? A. Install the TEM Relay from the TEM Client Deploy tool. B. Execute the IBM Tivoli Endpoint Manager Relay 8.1.x task from the TEM Console. C. In the TEM Installer, select Install Tivoli Endpoint Manager Components > Install Relays > Install Remotely. D. Log in to the desired computer with administrator privileges and copy the BES Installers\Relay folder from the TEM Server to the local hard drive.

Answer: B Question: 127


What are three uses for the IBM Tivoli Endpoint Manager (TEM) Installation Generator? (Choose three.) A. to create a clientsettings.cfg file B. to generate TEM Agent license keys C. to push the TEM Agent to remote machines D. to install TEM components with an existing masthead E. to install TEM components with an existing production license F. to install TEM components with a TEM license authorization file

Answer: D, E, F

Question: 128

When adding new users with the IBM Tivoli Endpoint Manager Administration Tool, what is the default key size? A. 8 bits B. 512 bits C. 1024 bits D. 4096 bits

Answer: D

Question: 129

An administrator is looking at the Computers section of the Navigation Tree and wants to quickly confirm that communications work between the listed computers and server. Which two actions confirm communications without having a negative impact on the environment? (Choose two.) A. Create a Computer Property with a requirement to report back every 5 minutes. B. Select a few systems and use the right-click menu to send a refresh to the selected systems. C. Click Tools > Take Custom Action to create a NULL Task and take action against all systems D. Examine the Last Report time; this is only updated when the agent collects data and reports back. E. Locate a Fixlet that is applicable to the desired computers and take action against those systems.

Answer: B, C

Question: 130
Which three components can be installed with the IBM Tivoli Endpoint Manager (TEM) Installation Guide (Component Installer)? (Choose three.) A. TEM Relay B. TEM Server C. TEM Console D. TEM Agents for UNIX E. TEM Agents for Windows F. TEM for Software Usage Analysis

Answer: B, C, E Question: 131


IBM Tivoli Endpoint Manager (TEM) Relay Selections must be checked to ensure all clients are automatically selecting the relay. What is the quickest way to determine this information? A. Open Web Reports and execute the report BES Relay Selection Method B. All Content > Deployment Overview and review the BES Relay Selection Method C. BigFix Management > Deployment Overview and review the BES Relay Selection Method D. All Content > Computers and click the BES Relay Selection column to count the systems that are reporting automatic and manual

Answer: C Question: 132


What are three supported methods for installing the IBM Tivoli Endpoint Manager (TEM) Agent? (Choose three.) A. the Asset Discovery NMAP tool B. the Active Directory Group Policy C. the built-in TEM Agent Deploy task D. a 3rd party software distribution tool E. the IBM Tivoli Endpoint Manager Client Deploy tool F. the included Software Package to Fixlets converter

Answer: B, D, E

Question: 133

Which tool is used to create users and their management roles in the IBM Tivoli Endpoint Manager (TEM) Console? A. TEM Server B. TEM Web Server C. TEM Administration Tool D. TEM User Management Tool

Answer: C Question: 134


Why would a customer want to put a Relay in a DMZ? A. To provide Internet-based management functionality without the need for a VPN. B. To relay Remote Desktop or Tivoli Remote Control connections from within the corporate firewall out to mobile users computers. C. To setup an entry point to manage the stream of content from IBM's content servers so that new Fixlets can be downloaded onto the server. D. For customers who have purchased the Trend CPM module, network traffic can be captured to improve the quality of Trend Micro's Web Reputation metrics.

Answer: A Question: 135


Where is the IBM Tivoli Endpoint Manager Console installed by default on a 64-bit operating system? A. C:\TEM\Console B. C:\Program Files (x86)\IBM\TEM Console C. C:\Program Files\BigFix Enterprise\BES Console D. C:\Program Files (x86)\BigFix Enterprise\BES Console

Answer: D

Question: 136

Which two relevance statements determine if a Windows IBM Tivoli Endpoint Manager (TEM) Agent is a TEM Relay? (Choose two.) A. exists relay service B. exists regapp relay.exe C. exists service "BESRelay" D. exists service "TEMRelay" E. exists main gather service

Answer: A, C Question: 137


What is required to add an additional solution to the IBM Tivoli Endpoint Manager environment? A. a Fixlet for the site B. a license for the site C. a fixpack for the site D. an installer file for the site

Answer: B Question: 138


When an IBM Tivoli Endpoint Manager (TEM) Agent is connected to a TEM relay, what does the Distance to Relay computer property indicate? A. The total number of hops between the TEM Agent and the TEM Server regardless of the Relay Selection used by the TEM Agent. B. The number of hops between the TEM Agent and the associated TEM Relay regardless of the Relay Selection used by the TEM Agent. C. The number of hops between the TEM Agent and the associated TEM Relay only when Manual Relay Selection is used by the TEM Agent. D. The number of hops between the TEM Agent and the associated TEM Relay only when Automatic Relay Selection is used by the TEM Agent.

Answer: B

Question: 139

Are there any restrictions on role names within IBM Tivoli Endpoint Manager Web Reports? A. there are no restrictions B. must have at least 1 number C. must have at least 1 symbol D. must have at least 1 upper case letter

Answer: A Question: 140


What can a Web Reports user with a Normal role do? A. create users B. manage roles C. create reports D. change global user options

Answer: C Question: 141


IBM Tivoli Endpoint Manager V8.1 (TEM) is being deployed in a highly distributed environment, and there are many remote locations with very slow WAN links back to a company's headquarters. How should relays be deployed to avoid excessive WAN traffic?

A. Use a single relay in each remote location and use bandwidth throttling set to maximum. B. Use redundant relays in each remote location to ensure that Agents have a fail-over relay. C. Use a single relay in each remote location because multiple relays will congest the WAN connection. D. Use redundant relays at headquarters to ensure remote location WAN connections are not congested.

Answer: B

Question: 142

After logging in to the IBM Tivoli Endpoint Manager (TEM) Console only the All Content and BigFix Management domains are visible What could cause this? A. Sites must be subscribed to first. B. Master Operator access is required. C. Console Operator access is required. D. Site Administrator access is required.

Answer: A

Question: 143

What are the default roles available in IBM Tivoli Endpoint Manager Web Reports? A. Root, Normal, Read-only B. Root, Read/Write, Read-only C. Administrator, Normal, Read-only D. Administrator, Read/Write, Read-only

Answer: C Question: 144


How can an IBM Tivoli Endpoint Manager (TEM) master operator allow a TEM Console operator to manage a group of computers? A. deploy the Assign Management Rights Fixlet B. right-click on the operator and select the Assign User Management Rights option C. right-click on the operator and select the Change User Management Rights option D. use the Administration Tool to change the operator type from non-master to master

Answer: B

Question: 145

How can an IBM Tivoli Endpoint Manager operator add computers to a manual group? A. by importing a list of computers from an external file B. by modifying the Group property of the computers to add to the group C. by deploying the Join Group Fixlet to all the computers to add to the group D. by right-clicking the desired computers and selecting the Add To Manual Group option

Answer: D

Question: 146

How is the membership of an automatic group defined in IBM Tivoli Endpoint Manager (TEM)? A. on the version of the TEM Agent B. on an action run on the TEM Agent C. on the values of specific computer properties D. the value of the AUTOMATIC_GROUP retrieved property = true

Answer: C Question: 147


An IBM Tivoli Endpoint Manager (TEM) Console operator has been assigned management rights to all computers belonging to GroupA. Which computers will the TEM Console operator see in the TEM Console? A. all enterprise computers B. only those computers belonging to GroupA C. all computers belonging to GroupA which do not have deny permissions set elsewhere D. all the enterprise computers, but the operator will only have management rights on computers belonging to GroupA

Answer: B

Question: 148

When creating Affiliation Groups what does the asterisk (*) mean? A. All Affiliation Groups B. No Affiliation Groups C. Default Affiliation Group D. Unassigned Affiliation Groups

Answer: D

Question: 149

How is the command polling interval enabled? A. use the BES Fixlet called Enable Polling B. use the BES Relay Setting task called Enable Polling C. use the BES Client Setting task called Enable Command Polling D. use the BES Server Setting task called Enable Command Polling

Answer: C

Question: 150
Where can the results of the analysis be viewed? A. in the log file of the client B. in the action generated by the activation of the analysis C. in the computer property of the computer the operator is interested in D. in the e-mail sent to the master operator who activate it according to the period defined

Answer: C

Question: 151

What does this password complexity rule mean in Tivoli Endpoint Manager Web Reports:{8,15 } ? A. It must be between 8 and 15 characters. B. It must contain 8 characters and keeps a history of 15 passwords. C. It must contain 15 characters and keeps a history of 8 passwords. D. The password age is 8 days and keeps a history of 15 passwords.

Answer: A

Question: 152
An IBM Tivoli Endpoint Manager (TEM) Server is located in a private network without Internet connectivity. The administrator set up a proxy and wants to configure the TEM Server to connect to the internet. Which TEM Service must be configured to allow the TEM Server to access the Internet? A. BES GatherDB B. BES Root Server C. BES Gather Service D. BES Web Reports Server

Answer: C Question: 153


In a custom Fixlet site, which operator permissions are required to grant other operators rights to the site? A. Writer B. Owner C. Reader D. Master Operator

Answer: B

Question: 154

In which language can the Retrieved Properties be written that underlies each analyses? A. Python B. Javascript C. Relevance D. Action Script

Answer: C

Question: 155

What is the best reason to setup Affiliation Groups in an IBM Tivoli Endpoint Manager V8.1 deployment? A. multiple tiers of relays B. relays on different subnets C. geographically dispersed relays D. relays that are the same operating systems as certain agents

Answer: C

Question: 156
By default, where is the IBM Tivoli Endpoint Manager Console installed on a 32-bit operating system? A. C:\Tivoli\Console\ B. C:\Program Files\IBM\Tivoli\TEM\Console\ C. C:\Program Files\TEM Enterprise\TEM Console\ D. C:\Program Files\BigFix Enterprise\BES Console\

Answer: D

Question: 157

Why would the SHA1 of an action downloaded on the agent need to be checked? A. to troubleshoot why an action failed to be run by an agent B. to troubleshoot why the agent service has stopped running C. to troubleshoot if the pre-cache setting was successfully turned on D. to troubleshoot whether FIPS mode was turned on during the deployment

Answer: A

Question: 158

During the deployment of IBM Tivoli Endpoint Manager V8.1 (TEM), it is discovered that the customer has a number of remote sites connected by WAN connections. The WAN connections are highly saturated during business hours but have very little usage on weeknights and weekends. Which measures should be implemented? A. Implement Dynamic Bandwidth Throttling between the TEM Relays at each side of the WAN Connections. B. Implement Static Bandwidth Throttling between the TEM Relays at each side of the WAN Connections. Using the correct values will permit the TEM Relay at a remote site to collect the file over time. C. Implement a documented process to copy any large files (such as any file over 50 MB in size) to a CD-ROM and have it mailed to a local administrator at the remote sites to copy the file to the TEM Relay to service the remote TEM Agents. D. Implement TEM Relays on both sides of the WAN Connections. During Business Hours, the TEM Relay will download the file using whatever available bandwidth exists over the WAN while during off hours it will use the entire available WAN bandwidth.

Answer: A

Question: 159

Which IBM Tivoli Endpoint Manager (TEM) utility is used to remove duplicate computer names from the TEM Database? A. BigFix Remove Utility B. BigFix Audit Trail Cleaner C. BigFix Computer Remover D. BigFix Duplicate Computer Remover

Answer: C

Question: 160

How is the cache cleared on a single IBM Tivoli Endpoint Manager (TEM) Console? A. Clear the Java cache in the Java Control Panel. B. Clear the cache in the Internet Properties Window in Control Panel. C. Open the TEM Console and go to File > Preferences and click the Clear Cache button. D. Run the Clear TEM Console Cache Fixlet and target the desired TEM Console computer.

Answer: C

Question: 161

An IBM Tivoli Endpoint Manager (TEM) Relay service is installed on a system. A Fixlet that deploys a 35 MB patch is about to be deployed. It is determined that some of the TEM Relays have limited disk space available on the drive where the TEM Relay is installed. How can this issue be corrected? A. Run the task to configure the TEM Relay to use a different drive. This will allow the download cache to be moved to the drive with additional space.

B. Run the task to configure the download cache size. Specify a value that is larger than the space actually available on the drive where the TEM Relay service is installed. C. Run the task to install the TEM Relay service onto the drive with the most disk space. This will reinstall the TEM Relay service and remove the requirement to reinstall it. D. Turn on file compression for the TEM Relay folder. This will increase the amount of disk space available to the download cache without impacting the performance of the TEM Relay.

Answer: A

Question: 162

An IBM Tivoli Endpoint Manager (TEM) Relay is installed on a Windows XP system at a remote office. This system was chosen as there are only seven systems and no server at this remote office. Instructions are provided to the remote office that this system should never be turned off so that it is available 24 hours a day, seven days a week.Over the next few days, none of the remote systems are connecting to this Windows XP Relay. Various steps are taken to ensure that this TEM Relay should be chosen but the remote systems continue to connect to other TEM Relays across the WAN. What is the likely issue stopping the remote systems from connecting to the Windows XP Relay? A. Someone is likely turning the Windows XP system off or placing it into standby mode forcing the remote systems to select a TEM Relay across the WAN. B. A non-server operating system should never be used for a TEM Relay because there are not enough concurrent connections available for the remote systems. C. The TEM Relay Service on the Windows XP system is likely corrupted. Uninstall the TEM Relay and then reinstall it and this will permit the remote systems to connect. D. There is no DNS entry for the Windows XP System so the remote systems cannot locate the TEM Relay. These systems must be entered into the corporate DNS systems.

Answer: D

Question: 163

An IBM Tivoli Endpoint Manager V8.1 (TEM) deployment will utilize Message Level Encryption (MLE). Which basic workflow must be executed to enable and maintain encryption? A. Enable MLE via the TEM Administration Tool and establish top level decryption relays as needed. B. The only requirement is to establish a policy within the TEM Console to set the TEM Agent Settings for encrypting reports. C. Generate the encryption key from the TEM Console and then establish a policy to set the TEM Agent Settings for encrypting reports. D. Generate the encryption key using the TEM Administration Tool. Then using the TEM Console, establish a policy to set the TEM Agent Settings for encrypting reports.

Answer: D

Question: 164

How is the IBM Tivoli Endpoint Manager (TEM) Console cache cleared for all consoles? A. reboot the system running the TEM Console B. run the command BESAdmin /resetDatabaseEpoch C. run the Clear TEM Console Cache Task and target all computers running the TEM Console D. run the Clear TEM Console Cache Fixlet and target all computers running the TEM Console

Answer: B

Question: 165
The agent service on the endpoint is running, but an agent appears grayed out in the IBM Tivoli Endpoint Manager Console once or twice a day. What might cause this? A. port 52311 is blocked by a firewall B. the agent does not have a default relay C. agent polling is set at too long an interval D. ICMP pings are not allowed on the network

Answer: C Question: 166


Why would an agent not appear on the IBM Tivoli Endpoint Manager (TEM) Console after a new deployment? A. UDP on the agent system is blocked. B. The agent masthead is incorrect or missing. C. The TEM Console is running on the TEM Server. D. The agent system was not rebooted after install.

Answer: B Question: 167


In IBM Tivoli Endpoint Manager V8.1 (TEM) what are two causes of this error: Web Reports database not compatible? (Choose two.) A. The ODBC drivers on the TEM Server are not compatible with the database server. B. The database specified in the Web Reports database configuration page does not exist. C. The BFEnterprise database on the TEM Server did not get updated in the updated process. D. The version of Apache running the Web Reports is not compatible with the database server. E. The database specified in the Web Reports database configuration page is not pointing to a BFEnterprise database.

Answer: C, E

Question: 168

An IBM Tivoli Endpoint Manager (TEM) Agent has been notified that there is new content available. What must the TEM Agent do next? A. Establish a connection to the parent TEM Relay and download a new masthead. B. Establish a connection to the parent TEM Relay and collect only the differences from the previous gather. C. The parent TEM Relay establishes a connection to the TEM Agent and pushes the new content to the TEM Agent. D. Establish a connection to the parent TEM Relay and collect either the full site or differences from the previous gather.

Answer: D Question: 169


Which statement best describes the bufferdir used by the BES FillDB service on the IBM Tivoli Endpoint Manager (TEM) Server? A. It should always be empty in a healthy environment. B. It is used to store downloaded files from the Internet used by Actions. C. It may take several minutes for the files to be consumed in a large and active environment. D. It is used to populate the Fixlet details collected from external sites into the TEM database.

Answer: C Question: 170


How can the default cost assumptions in the Power Management for cost per KwH be changed to match a specific environment? A. use the Default Power Analysis Fixlet B. use the Power Profile Deployment Wizard C. use the Power Management Configuration Wizard D. use the Manage Custom Assumptions Tasks Wizard

Answer: D

Question: 171

What is the expected behavior of the IBM Tivoli Endpoint Manager (TEM) Agent for this software distribution command: download http://www.microsoft.com/download/KB12345 x86.exe? A. The TEM Agent will wait for the TEM Relay to push the patch down. B. The TEM Agent will download the payload through the TEM infrastructure. C. The TEM Agent will download the payload from the Microsoft site directly. D. The TEM Agent will download the payload from the nearest TEM Agent using Peer to Peer sharing functions.

Answer: B

Question: 172
A customer wants to collect details about their Windows environment, including: computer manufacturer, number of processors in each system, number of fixed drives installed, and screen resolution. What is the fastest way this requirement can be satisfied? A. Create a custom Fixlet using custom Relevance statements B. Use the BES Asset Discovery scans to provide this information. C. Create a series of Computer Properties using custom Relevance statements. D. Activate the BES Inventory and License Hardware Information (Windows) Analysis.

Answer: D Question: 173


What does the BES Inventory and License Site include? A. Tasks that collect various inventory details for Windows systems. B. Analyses that report on software usage on targeted Windows systems. C. Analyses that report on various inventory details for only Windows systems. D. Analyses that report on inventory details on Windows, UNIX, Linux, and Mac systems.

Answer: D

Question: 174

What is the recommended way for an IBM Tivoli Endpoint Manager Console operator to apply a patch to a specific group of computers? A. They need the approval of a release manager. B. There is nothing to do once required patches are on a Content Server. C. Use IBM Tivoli Remote Control to apply recommended patches to each computer in the group. D. Select the correct Fixlet that contains the patch to be applied, select an action that initiates the Deployment Process, and then select a group of computers.

Answer: D Question: 175


How is IBM Tivoli Endpoint Manager for Security and Compliance Analytics enabled? A. click Enable in the License Overview Dashboard B. log in to IBM Passport Advantage an download the installation media C. run the Enable IBM Tivoli Endpoint Manager for Security and Compliance Analytics Fixlet D. download the IBM Tivoli Endpoint Manager for Security and Compliance Analytics Masthead

Answer: A Question: 176


Where are the original files used to patch a system stored in an IBM Tivoli Endpoint Manager V8.1 (TEM) environment? A. on the TEM Server B. on the TEM Database Server C. on content servers reachable by a TEM Server D. directly on TEM Relays in order to save bandwidth

Answer: C

Question: 177

The Linux Administrator created an action to patch several RHEL5 servers over the weekend. Upon review, the packages did not install due to a dependency problem. Which tool can the administrator use to get the systems updated? A. Create a custom shell script to install each Linux Red Hat Package Manager (RPM) in the proper order. B. Use the Install Dependencies option in the Action dialog for the patch Fixlet. C. Utilize the Linux RPM deployment dashboard to install the prerequisite package individually. D. Utilize the appropriate Linux RPM patching dashboard to distribute the update and dependencies.

Answer: D

Question: 178

Which two vendors are supported by IBM Tivoli Endpoint Manager Client Manager for Endpoint Protection? (Choose two.) A. HP B. Cisco C. McAfee D. AVG Technologies E. Computer Associates

Answer: C, E

Question: 179

What are two requirements for IBM Tivoli Endpoint Manager for Security and Compliance Analytics? (Choose two.) A. IBM Tivoli Endpoint Manager Analytics B. Enabled Security and Compliance Analytics Site C. Security and Compliance Analytics Reporting Tool D. IBM Tivoli Endpoint Manager for Security and Compliance Analytics E. IBM Tivoli Endpoint Manager for Security and Compliance Database Tools

Answer: A, B

Question: 180

Which tool provides an end-user the ability to track their power usage and potential cost savings? A. Client-side Dashboard B. Power Management Dashboard C. Potential Savings User Interface D. Power Management Web Report

Answer: A

You might also like