多选题What are two functions of a custom mapping module?()Arecords the token assertionBmaps a STSUUSER input to a SAML tokenClooks up attributes in an external data sourceDmaps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 p

题目
多选题
What are two functions of a custom mapping module?()
A

records the token assertion

B

maps a STSUUSER input to a SAML token

C

looks up attributes in an external data source

D

maps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 protocol

E

maps a GUI XML attributes into UI controls that are used by the IBM Tivoli Federated Identity Manager Console to collect the input data

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()

  • A、The input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. 
  • B、The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. 
  • C、The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. 
  • D、The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.

正确答案:C

第2题:

Consider the following command to create a tablespace in your production database (which is using an Automatic Storage Management [ASM] instance to manage the database files):  CREATE TABLESPACE user_tbsp  DATAFILE ’+dgroup3(user_temp)/user_files/user_tbsp’ SIZE 200M;  What would be the result of this command?()

  • A、It would result in an error because the template cannot be used along with the disk group.
  • B、It would result in an error because the path cannot be specified while creating a tablespace in a disk group.
  • C、It would create a tablespace with a data file that has an alias, and its attributes are set by the user-defined template.
  • D、It would create a tablespace with a data file that does not have an alias, and its attributes are set by the user-defined template.

正确答案:C

第3题:

You install a custom application on a computer that runs Microsoft Windows XP. The application stores each user’s data in the %programfiles%\app1\data folder on the computer. You install the custom application on a computer that runs Windows Vista.On the Windows Vista computer, you back up the %programfiles%\app1\data folder and notice that the backup contains no data.You need to back up the application’s user data on the Windows Vista computer.What should you do?()

A.A

B.B

C.C

D.D


参考答案:D

第4题:

Which two are the uses of the ASM metadata backup and restore (AMBR) feature?()

  • A、 It can be used to back up all data on ASM disks.
  • B、 It can be used to recover the damaged ASM disk group along with the data.
  • C、 It can be used to gather information about a preexisting ASM disk group with disk paths,disk name,failure groups,attributes templates,and alias directory structure.
  • D、 It can be used to re-create the ASM disk group with its attributes.

正确答案:C,D

第5题:

Which security token may carry user attribute information as part of the defined token format?()

  • A、Kerberos
  • B、RACF Token
  • C、SAML Assertion
  • D、Username Token

正确答案:C

第6题:

What are two functions of a custom mapping module?()

  • A、records the token assertion
  • B、maps a STSUUSER input to a SAML token
  • C、looks up attributes in an external data source
  • D、maps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 protocol
  • E、maps a GUI XML attributes into UI controls that are used by the IBM Tivoli Federated Identity Manager Console to collect the input data

正确答案:A,C

第7题:

Which XSL if statement checks for the existence of a homepage attribute within an STS Universal User XML structure?()

  • A、<xsl:if test="//stsuuser:AttributeList/stsuuser:Attribute[attr='homepage']">
  • B、<xsl:if test="//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage']">
  • C、<xsl:if-exists="//stsuuser:AttributeList/stsuuser:Attribute/custom:Homepage">
  • D、<xsl:if-exists="//stsuuser:AttributeList/stsuuser:Attribute[@name='homepage'])>

正确答案:B

第8题:

controls the operation of the computer and performs it's data processing functions.

A.CPU

B.Hard disk

C.Memory

D.Database system


正确答案:A

第9题:

Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()

  • A、LDAP
  • B、S/Key
  • C、TACACS+
  • D、RADIUS
  • E、SiteMinder

正确答案:A,D,E

第10题:

Which two statements are true regarding the Oracle Data Pump export and import operations()

  • A、You cannot export data from a remote database.
  • B、You can rename tables during an import operation.
  • C、You can overwrite existing dump files during an export operation.
  • D、You can compress the data during export but not the metadata because it is not supported.

正确答案:B,C

更多相关问题