1.
Which information is stored in a certificate used to secure the connection between IBM Tivoii Identity Manager Server and its adapters?
2.
Which steps are needed to create the password policy design?
3.
Which sequence of actions best describes a secure practice for sensitive data in an IBM Tivoll Identity Manager (Tivoli Identity Manager) database?

 
4.
A simple IBM Tivoli Identity Manager (Tivoli Identity Manager) implementation running on a Windows-based server includes a single AIX platform with two adapters (UNIX and DB2). What are two necessary considerations when creating an upgrade planning document for this scenario?
5.
What is the proper ordering of tasks during an IBM Tivoli Identity Manager V5.1 solution project?
6.
When can an IBM Tivoli Identity Manager (Tivoli Identity Manager) functional test case be executed on a Tivoli Identity Manager adapter?
7.
Which steps are needed to create an organization structure design from an existing organization and reporting structure?
8.
Which option would be most appropriate to include in a lifecycle management design?
9.
Where do the assembly lines associated with RMI-based adapter functions reside?
10.
On a single-server WebSphere configuration, where is the SelfServiceUI.properties file located?