An access type is a configuration for a communication protocol used by & resource manager. The configuration consists of the protocol type, the port number to use, and the path to the program needed to access data.
Which two protocols are required when a new resource manager is defined in the system administration client?
Correct Answer:
AB
🗳️
Which of the following administrative operations can be performed by using the resource manager administration console?
Correct Answer:
A
🗳️
Reference:
http://www-01.ibm.com/support/docview.wss?uid=swg21290037
IBM Content Manager Java components (for example, Content Manager API, Content Manager resource manager application server and DB2 Text Search document constructor) support a set of security levels based on federal standards From lowest to highest security, these levels are:
None
FIPS (Federal Information Processing Standard), defined as FIPS 140-2 - Transitional, defined as SP 000-131 Transitional
Strict, defined as SP 80O-131 Strict
Suite-B-128. defined as CNSSP-1G (Committee on Matronal Security Systems Policy Number 15)
Suite B-192. defined as CNSSP-15
If a system administrator uses an Oracle database and configures all connections for TLS, which is the highest overall security setting that can be applied?
Correct Answer:
B
🗳️
A company has deployed IBM Content Manager V8.5 for their image management platform and uses Tivoli Storage Manager (TSM) to manage archived data. The administrator has found that a network bottleneck exists whenever data is migrated to the dedicated TSM server. The administrator wants to improve network performance and begins by checking the parameters or all network adaptors.
Which of the following will best maximize network performance in IBM Content Managerservers?
Correct Answer:
D
🗳️