An access type is a configuration for a communication protocol used by & resource manager. The configuration consists of the protocol type, the port number to use, and the path to the program needed to access data.
Which two protocols are required when a new resource manager is defined in the system administration client?
FTP
HTTP
JDBC
LSRM
HTTPS
Correct answer: AB
Question 2
Which of the following administrative operations can be performed by using the resource manager administration console?
IBM Content Manager Java components (for example, Content Manager API, Content Manager resource manager application server and DB2 Text Search document constructor) support a set of security levels based on federal standards From lowest to highest security, these levels are:
None
FIPS (Federal Information Processing Standard), defined as FIPS 140-2 - Transitional, defined as SP 000-131 Transitional
Strict, defined as SP 80O-131 Strict
Suite-B-128. defined as CNSSP-1G (Committee on Matronal Security Systems Policy Number 15)
Suite B-192. defined as CNSSP-15
If a system administrator uses an Oracle database and configures all connections for TLS, which is the highest overall security setting that can be applied?