Security Mode Flashcards

1
Q

A Person could be associated with both a user record and a labor record

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A user can only be a member of one independent security group, but can a member me part of more than one dependent gruop?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A user must have access to at least one site within a labor’s organization before the system adds the assigned labor authorization to the user’s security profile?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user must have access to both storeroom and the storerooms site boefre the system adds the authorization to the user’s security profile?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any individual who might appear in a text field in Maximo should have a person record?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Apart from LDAP, a user can change their own password in Maximo?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is authentication?

A

Is the validation of user credentials (username and password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For the CMMSYNC Crontask, the principal parameter is the IBM WebSphere user id.

True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

For which of the following is the best use of the mxe.sec.IPblock.num property?

A

to set the number of block intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

For which one of the following would you typically use a global data restriction?

A. To control data access for a specific security group
B. To control data access for a specific user
C. To control data access into the system
D. To control data access for all users
E. All of the above.

A

To control data access for all users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

For which one of the following would you typically use conditional security?

a. To control data access for a specific security group
b. To control data access for a specific user
c. To control data access into the system
d. To control data access for all users
e. All of the above

A

To control data access for a specific security group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For which to types of conditions can you create a conditional security restriction?

a. CLASS
b. GLOBAL
c. LOGICAL
d. EXPRESSION
e. CONDITIONAL

A

EXPRESSION, CLASS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For which two TYPES of conditions can you create a global data restriction?

a. CLASS
b. GLOBAL
c. LOGICAL
d. EXPRESSION
e. CONDITIONAL

A

CLASS, EXPRESSION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you determine the name of the attribute for a fileds in an application?

a. By its label
b. Use the F3 key
c. Double click on the field
d. Use the Alt+F1 key combination
e. You can only find the attribute name in the database

A

Alt+F1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you remove self-registration from Maximo in a local environment?

a. Change the properties in the maximo.properties file
b. Change the properties, and rebuild then redeploy the EAR file
c. Use the Database Configuration Application to change the value of two newuserlabel and newuserlink messages to $nbsp
d. None of the above. You cannot remove the label nor the link from the Maximo sign-in page

A

Use the datbase configuration application to change the value of two newuserlabel and newuserlink messages to: $nbsp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How would you view the access and privileages of one or more security groups?

a. View the Person record of the individual.
b. Use the Security Group Access Report.
c. Use the Groups tab of the User’s Application.
d. Use the Security Group’s Application’s View Security Profile window.

A

Use the security group access report?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In order for a user to have access to an application, they must have access to at least one site among their assigned security groups?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

LDAP Authentication uses what Cron Tasks?

a. Is not used by Maximo
b. Uses only the VMMSYNC cron task
c. Uses only the LDAPSYNC cron task
d. Uses either the VMMSYNC or LDAPSYNC cron task

A

VMMSYNC or LDAPSYNC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Login tracking allows you to specify maximum number of login attemps and is required for electronic auditing?

A

True

20
Q

Native authentication uses what type of encryption?

a. Is not used by Maximo
b. Is controlled by a Maximo cron task
c. Bypasses IBM Websphere and communicates with an LDAP tool
d. Uses java encryption to check user credentials against the Maximo database

A

Native Java encryption to check against the DB

21
Q

NEWREG is the only initial status allowed for self-registered users?

A

False

22
Q

Security can be configured to block IP Addresses for which of the following?

a. Too many logins, only.
b. Too many forgotten passwords, only.
c. Too many logins or too many forgotten passwords, only.
d. Too many logins, too many forgotten passwords, or too many self-registration attempts.

A

too many logins, too many forgotten passwords, or too many self-registratoin attempts

23
Q

The default security group for new users is the security group to which Maximo automatically assigns new users, including those who self-register.

Select one:

a. True
b. False

A

True

24
Q

The labor application is at the organization level and therefor any user who has labor authorization, and access to one site in the organization can view labor for all sites in the organization, regardless of their site access?

A

True

25
Q

the LDAP cronttask can be used with:

a. Microsoft Active Directory (MSAD)
b. IBM Trivoli Directory Server (TDS)
c. Neither IBM TDS and MSAD
d. Both IBM TDS and MSAD

A

IBM TDS and MSAD

26
Q

The limits and tolerances that you specify for a group are at the organization level, however, users inherit only authorizations for those sites to which they have access?

A

True

27
Q

Security controls window accessed from the users application is the same as the security controls window accessed from the security groups application?

A

True

28
Q

The VMMSYNC cron task can be used with:

a. Microsoft Active Directory (MSAD)
b. IBM Trivoli Directory Server (TDS)
c. Neither IBM TDS and MSAD
d. Both IBM TDS and MSAD

A

IBM Trivoli directory server

29
Q

One way to build a security model is to use two independent groups with one independent security group to configured for site access and another for application access?

A

True

30
Q

Use the security groups application to set a user’s authorization.

A

True

31
Q

What happens when a user exceeds the forgotten password allowed attempts?

A

The user becomes blocked

32
Q

What is the purpose of self-registration?

a. To shorten the approval process for administrators
b. To allow users to begin working with Maximo
c. To allow users to request access to Maximo
d. All of the above

A

To allow users to request access to Maximo

33
Q

What is the purpose of the Authorize group reassignment function?

a. To assign a user to the security group
b. To authorize users for a security group
c. To authorize a user to modify a security group
d. To authorize a user to assign users to a security group

A

The authorize a user to assign users to a security group

34
Q

What is the strategy or strategiesss that you could use to design a ndcreate security groups?

a. Create a group for each criterion and assign users to a combination of groups.
b. Create a group for each role and assign users to their applicable role or roles.
c. Create both dependent and independent groups.
d. All of the above could be used.

A

All of the above could be used

35
Q

What status does a User (record) require to access Maximo?

Select one:

a. Active
b. Licensed
c. Approved
d. Operational

A

Active

36
Q

When creating a new user, what other entity must also exist?

A

Person record

37
Q

When LDAP is used, which two elements cannot be changed in Maximo?

Select one or more:

a. Passwords
b. Usernames
c. Security Group Privileges
d. User’s Email Address

A

Passwords, usernames

38
Q

When there is conflict among combine (dependent) security groups, Maximo’s business process calculates and grants the highest level access?

A

True

39
Q

When using LDAP with Maximo, which of the following is authenticated?

A

Password, username

40
Q

When you create a user record, you must also create the associated person record If one does not exists?

A

True

41
Q

Which of the following statements is true when a user has application access but no site access?

Select one:

a. The user cannot open the application.
b. The user can open the application, but cannot view nor create records.
c. The user can open the application and view records, but cannot create records.
d. The user can open the application and view records, but must specify a site to view or create records.

A

The user can open the application, but cannot view nor create records

42
Q

Which of the following steps is not used to convert from Native Maximo authentication to LDAP authentication?

Select one:

a. Configure IBM Websphere
b. Configure Maximo web.xml files
c. Configure a Maximo cron task for synchronization
d. Configure the Maximo database with an LDAP tool

A

Configure the Maximo database with an LDAP tool

43
Q

Which type of object level restriction would you use to HIDE records?

Select one:

a. HIDDEN
b. QUALIFIED
c. RESTRICTED
d. READ ONLY

A

QUALIFIED

44
Q

Which type of object level restriction would you use to HIDE records?

A

QUALIFIED

45
Q

You can only use the IBM WebSphere console to view Maximo LDAP users and groups

A

false