YouTube Icon

Interview Questions.

Top 100+ Ibm Bigfix Interview Questions And Answers - May 31, 2020

fluid

Top 100+ Ibm Bigfix Interview Questions And Answers

Question 1. What Is Bigfix?

Answer :

BigFix, previously IBM Tivoli Endpoint Manager is software program that runs on your laptop and collects data approximately your pc. BigFix collects hardware and software program information to assist IT inventory gadgets which might be connected to the network. Knowing what is connected to the USA network is important to discover and remediate safety vulnerabilities.  At UCSF, registration of computers and laptops connected to the community is achieved by using putting in BigFix.

Question 2. Will Bigfix Cause Any Harm To My Computer? Will It Uninstall Any Of My Existing Programs?

Answer :

The BigFix customer will not damage your PC or uninstall your applications. In a totally small range of incidents (less than 1%), BigFix can be incompatible with an utility and motive some minor trouble. We will paintings with you to resolve these as troubles as essential.

IBM - CGIDEV2 Interview Questions
Question 3. Why Is Ucsf Requiring The Installation Of Bigfix On All Desktops And Laptops On The Network?

Answer :

Having visibility into all gadgets at the network is vital to defensive UCSF information and computing sources. This will offer UCSF IT with an accurate inventory of what gadgets are on the network, their patch reputation, and to whom they belong. Unknown or unidentified (i.E. Unregistered) devices on the UCSF network are a threat to every other device on the UCSF community and could be issue to elimination from the united states community.

Question four. What To Expect After Installing Bigfix?

Answer :

The BigFix icon will seem at the System Tray (Windows) or Menu Bar (Mac OS X. The BigFix Client will run in the history and document the preliminary reputation of your device to the BigFix Server. If the machine desires patching, you will be induced to simply accept the patching project. You can defer the challenge, but if the task is deferred for too lengthy, the patching task window will live inside the foreground, and you will now not be capable of dismiss it. The machine will reboot after the patching assignment has finished. If the gadget is significantly at the back of in patching, more than one reboots can be important. BigFix will run in the heritage, consuming minimum CPU resources, periodically checking in with the server to provide ongoing updates of the device reputation in addition to test for brand spanking new duties.

IBM - RPG Tutorial
Question 5. How Come A Previously Discovered Asset Will Not Be Discovered On Subsequent Scans, Disappear From My Unmanaged Assets List Only To Appear On A New Scan?

Answer :

Any wide variety of factors should cause this conduct – for example:


    The asset has been deleted and ignoredeletedassets is about to one within the registry (HKLMSOFTWAREBigFixEnterprise ServerAssetDiscoveryNMAP)
    The asset has turn out to be controlled, then unmanaged from experiment to experiment.
    Firewall guidelines changed on said workstations from scan to test.
If you test one asset that is unmanaged – that asset may be saved in the database and seem in the unmanaged assets table. If you experiment the same asset when it's miles down (e.G. That IP is unresponsive to ping), it'll nevertheless persist within the unmanaged asset desk. If the asset is scanned all over again, it's going to once more, still remain in the table however have an updated closing experiment time.

IBM - RPG Interview Questions
Question 6. How Does The Unmanaged Asset Importer Match Previously Scanned Assets With Newly Scanned Assets?

Answer :

The algorithm for figuring out if two scanned devices match is as follows:

    if they each have mac addresses that are same, then they suit
    if they both have hostnames that are same, then they in shape
    in the event that they have neither mac cope with facts nor hostname statistics, then they match if their ip addresses match
Finally, if the newly scanned asset does now not in shape on any of the above, it will be considered a new asset.

Question 7. Who Has Access To The Administrator Controls For Bigfix System?

Answer :

Designated UCSF IT Staff has access to the administrator controls for BigFix. All get admission to to BigFix, and movements done inside, are logged and regularly audited.

IBM DB2 Tutorial IBM DB2 Interview Questions
Question 8. What Processes Are In Place To Prevent Unauthorized Use Of The Bigfix System Both From Internal And External Users?

Answer :

In accordance with the University of California Electronic Communication Policy, administrator rights are limited to expert IT body of workers that observe industry pleasant practices for system administration, which include gaining access to the minimum quantity of information to do their work. The BigFix gadget is housed within the Data Center with constrained bodily get admission to and continuous tracking. Regular patches are implemented to ensure system integrity. Administrator get entry to logs are reviewed frequently to ensure appropriate get admission to.

Question 9. Do The Requirements And Tools Used To Protect Patient Data Differ For Students From Faculty And Staff?

Answer :

No, the tools are the same and allow parity and efficiency for reporting at the posture of UCSF protection and danger. The identical regulations and strategies apply to all students, college and workforce.

IBM Maximo Asset Management Interview Questions
Question 10. Why Do I Have To Issue A Zero-dollar Purchase Order To Obtain Lmt?

Answer :

Customers can avoid the need to trouble a zero-dollar PO by means of having their PA/PAE web site contact location an order via PA Online. For facts on PA Online and management of website contact facts, refer to IBM Passport Advantage Online for Customers.

Question eleven. Why Do I Need To Order Lmt? Why Can't I Just Download It?

Answer :

Most simple download products provide little, if any, technical aid. They are furnished on the "as-is" foundation. IBM gives the equal support for LMT that we do for our different challenge-critical middleware. Even though LMT is a no-rate product presenting, an order must be nevertheless placed to establish an IBM entitlement document for the license as well as software subscription and technical assist.

IBM AIX Interview Questions
Question 12. What Is The Difference Between The Bigfix Client And The Scanner?

Answer :

The BigFix patron is commonplace for all IBM merchandise which might be based on the BigFix platform, and it is used to perform more than one responsibilities at the endpoints. The client affords information about a fixed of pc properties just like the host call or the IP cope with, and it's far a tool that is used to install the scanner at the computer systems, and control the scanner via fixlets.
The scanner, on the other hand, is an unbiased element that is utilized by LMT/BFI. It collects information approximately the hardware and software program that is established on the computer systems for your infrastructure. The records that is then sent to the BigFix server, can be imported to the LMT/BFI server.

IBM - CGIDEV2 Interview Questions
Question thirteen. Should The Lmt/bfi Server Run All The Time?

Answer :

Yes. The LMT/BFI server have to run all of the time to method statistics from endpoints in real time and make certain reporting accuracy. IBM pricing calls for the ability test to run each thirty minutes on all endpoints for sub-potential licensing. The ability scans for as much as 5 days back are stored at the BigFix server. Consequently, the server have to now not be stopped for a duration longer than 5 days. The ultimate a hit software program scan from every endpoint is likewise stored on the BigFix server. If new software program scans are performed more than as soon as at some point of server preservation, no longer a majority of these scans are processed after restart.

Question 14. What Will It Be Doing With Bigfix On My Server?

Answer :

BigFix will gather device configuration information such as running machine, CPU, RAM, difficult power space, patch fame, and list of nearby accounts at the server. BigFix will now not collect any non-public information or records, which include browser history or person facts, saved on the server. IT will not installation patches, or regulate files, with out consulting with the machine owner. However, IT reserves the proper to disconnect servers from the community or deploy patches if the system owner has not replied in a timely manner.

Question 15. What Is The Upload Maintenance Service And Why Do Dashboards Show Warnings Of “upload In Progress”?

Answer :

The Upload Maintenance provider is a application that should be installation at the Tivoli Endpoint Manager server to control file uploads. When the server software is set up, document fame is up to date on the server mechanically. You may want to refresh your console to see the updates.

Network Monitoring Interview Questions
Question sixteen. How Do I Import A Custom .Wim File?

Answer :

You can import from the Image Library dashboard below Manage Images in the navigation tree. You can manually enter running gadget, architecture, and size on disk.
Size on disk in this example suggests the extracted size of the .Wim document. This is commonly about two and a half instances the size of the real .Wim report.

Question 17. What Impact Does Running Bigfix On My Server Have On System Performance?

Answer :

The default CPU usage settings are optimized to avoid the usage of too much CPU on your server. You can assume the BigFix patron to use at maximum 2% of the CPU, calculated based on a unmarried processor, so if you have multiple processors, the overall % of agent CPU is decreased drastically.

IBM AIX 7 Administration Interview Questions
Question 18. How Can I Determine Which Type Of Server Installation Would Suit My Environment?

Answer :

See the IBM Endpoint Manager for Remote Control Installation Guide for a few suggestions for attention whilst making plans your installation.

IBM - RPG Interview Questions
Question 19. How Compatible Is Bigfix With Other Processes/services That Typically Run On Most Servers?

Answer :

BigFix is a widely used system control tool with a tested song document to no longer interfere other server approaches. UCSF has skilled running BigFix on tens of hundreds of computers and loads of servers over the last few years with minimum issues.

Question 20. Are There Compliance Evaluation Reports Or Mechanisms That Compare A Laptop Or Server Against Fisma/nist/disa Standards?

Answer :

Tivoli Endpoint Manager Configuration Management assesses servers, laptops, and computers in opposition to a predefined set of configuration standards along with DISA STIG (Standard Technical Implementation Guides) and FDCC (Federal Desktop Core Configuration). Tivoli Endpoint Manager can also help configuration requirements from NIST, NSA, and other standards corporations. Regulatory compliance regulations which includes FISMA, PCI, and others may be supported by way of using the same old configuration controls furnished through the Tivoli Endpoint Manager across Windows and UNIX environments.

IBM BPM Interview Questions
Question 21. What Are Some Of The Things I Cannot Do Using This Content?

Answer :

The Tivoli Endpoint Manager Confirmation Management solution is designed to be flexible. However, the remediation functionality on both Windows and UNIX is limited to specific configuration settings. In some cases, there are controls that can't be remediated. The parameter capability on both Windows and UNIX is likewise restrained to unique configuration settings. Similar to remediation, not everything can and have to be parameterized.

Question 22. How Do I Recognize Or See A Definitive Package In My Catalog?

Answer :

When you are adding package data to a software title version,Note area to indicate the bundle datasource (assets) that this facts comes from.

Question 23. How Do I Un-delete A Deleted Software Artifact?

Answer :

You may see that items have been deleted whilst you have a look at the Audit Log under Catalog Tools inside the left pane of the Software Catalog tab. Each level inside the Catalog hierarchy contains a View Deleted motion. Click this link to view after which restore the deleted gadgets.

IBM Tivoli Interview Questions
Question 24. Do I Need To Re-import Every Time I Make A Change To My Software Catalog?

Answer :

Yes. Click Import Options beneath Datasource in the Control Panel, and click Run Now, or await the following scheduled import. Some modifications to the catalog require that you Reset Import Sequences, handy at the Import Options tab of the Control Panel.

IBM DB2 Interview Questions
Question 25. Is Sua Designed To Be Used In Lieu Of An Audit?

Answer :

No. SUA approaches and applications are designed as a tool to defend your organization inside the event of an audit, and to make certain your ongoing compliance.

Question 26. How Can I Track These Savings?

Answer :

Perform an internal audit on how tons your organization currently spends on the continuing preservation of software program asset management and software program publisher license compliance. Create before and after metrics to track how much the automation of your SUA software is saving you normal in terms of direct costs, labor charges, and maintenance.

Ibm Tivoli Netcool Omnibus Interview Questions
Question 27. How Do Software License Trade Associations And Regulatory Agencies Decide Who And When To Audit? Are Agencies Contacted By Software Publishers?

Answer :

Very regularly, license regulators initiate software program license investigations primarily based on customer leads. Each association and corporation has their own standards. To find out about these and a way to hold your business enterprise blanketed, take a look at their character websites.

IBM Maximo Asset Management Interview Questions
Question 28. What Is The Difference Between Itam And Software Asset Management?

Answer :

ITAM stands for facts generation asset management, which includes an accounting of all IT belongings, together with hardware, software program, community centers, telecommunications, and digital assets. SAM, however, stands for software asset control, a exercise that commonly specializes in the “software” asset area of ITAM.

Question 29. What Kinds Of User Accounts Should I Set Up For My Deployment?

Answer :

Ideally you've got one area person account with the subsequent permissions:

    Permission to put in the utility on your SUA server.
    Permission to hook up with your database server and create databases.
    Permission to hook up with your IBM Endpoint Manager database and examine facts.
    Permission to examine information from the IBM Endpoint Manager server add supervisor directory.
IBM API Connect Interview Questions
Question 30. Can Two Management Extenders Be Installed On One Relay?

Answer :

Yes. You could have  distinctive control extenders at the same relay, but they cannot be the same form of extender. For instance, you could have iOS and Lotus Traveler extenders at the identical relay, however not two iOS extenders.

Question 31. Why Does The Name Of The Install Application On My Android Device Show Up As Unreadable Characters?

Answer :

The Android Agent (IBM Mobile Client app) will haven't any understanding of the code page (language) of the TEM Deployment, even after it is enrolled. The present day IANA consumer putting on Android gadgets defaults to English (Windows-1252), except it is configured. If this placing is not the same as the TEM deployment, statistics despatched from the Android gadgets may be unreadable even if the gadgets have the identical code web page (language) because the TEM deployment.

To set the IANA Client placing routinely for all Android gadgets upon enrollment, create a coverage motion from the Android Device Language Setting wizard. Click Create Policy Action.

The listing under highlights the currently supported languages/IANA settings:

ENU - windows-1252

CHS - gh2312

JPN - Shift_JIS

ESN - home windows-1252

ITA - windows-1252

FRA - home windows-1252

DEU - home windows-1252

CHT - big5

KOR - ks_c_5601-1987

Question 32. How Do I Enable Or Disable Data Usage Tracking On Ios Devices?

Answer :

You can use Fixlets 195 and 196 to enable or disable information utilization tracking through creating a patron placing on a focused iOS device. To get right of entry to these Fixlets, click on All Mobile Device Management Content from the navigation tree, click Fixlets and Tasks and type the Fixlet variety inside the seek box on the proper.

In case you disable region monitoring on an iOS App, it'll additionally disable the facts monitoring, which means that the iOS App will no longer music any facts utilization.

Question 33. I've Set Up An Offline Patch Window But I'm Seeing Unusual Behavior. What Might Be Wrong?

Answer :

Check to look that a TEM agent is installed on every of the machines centered by the offline patch window. Check to look when you have a couple of actions in the action records of the 'Enforce Offline Patch Window project' affecting the equal endpoints.

IBM AIX Interview Questions
Question 34. What Should I Configure To Have A Running Offline Window?

Answer :

Check which you have the subsequent items setup:

   The TEM agent is mounted on each of the machines centered by way of the offline patch window.
   A patch window is ready through the offline patch window dashboard.
   The Enforce Offline Patch window task is about as a coverage motion.
Question 35. My Virtual Machines Are No Longer Powering On During A Patch Window. What Happened?

Answer :

Check to peer in case you are at the most number of concurrent going for walks machines. That setting can be determined through default in this directory: C:Program Files BigFix Enterprise Management Extender Plugins VMware ESXi Patch Windows. For 64-bit structures, it is found in C:Program Files BigFix Enterprise Management Extender Plugins VMware ESXi Patch Windows. The range inner represents the wide variety of simultaneously walking digital machines according to host. If the number is on the restrict that turned into to start with set, remember setting a higher concurrent digital device range.

Question 36. Why Can't I Apply Any Esxi Patches?

Answer :

The Patches for ESXi content material is audit simplest. In order to solve ESXi problems, use the VMware Update Manager or down load and follow patches manually from the VMware internet site.

Network Monitoring Interview Questions
Question 37. What Is The Difference Between Proxied Machines And Normal Machines On The Tem Console?

Answer :

Normal machines have a full TEM agent mounted on them, with the total wellknown set of inspectors and moves. Instead of a full TEM agent, proxied machines use APIs to tug back information about gadgets and feed that information into the console as a pc document. Proxied machines have a greater restrained set of inspectors and movements.

Question 38. Why Are Some Fields Different Between What A Proxied Vm Reports And What The Tem Agent Reports?

Answer :

The vCenter plug-in grabs statistics immediately from the VMware APIs after which interprets them into TEM properties. However, due to the fact a whole lot of those fields are set with the aid of the user, once in a while they can mismatch what gets pronounced within the TEM Agent. For instance, it is possible to set the Guest Operating System version to be some thing very distinct from what's without a doubt mounted on virtual device.

Question 39. What Kind Of Best Practices Or Highly Suggested Settings Do You Have For This Management Extender?

Answer :

The device refresh c programming language ought to be at least 5 minutes. On a medium to big length deployment, this refresh c programming language time must be set to fifteen mins or beyond. The Enforce Management Extender policy movement should be set to but lengthy it takes to run a significant amount of TEM actions before it's far forced to electricity down. The most time limit that may be set is an hour long.

Question forty. What Kind Of Machine Should The Management Extender Be?

Answer :

For medium to large size deployments, the main limiting thing is maximum likely going to be the CPU. As long as it is some thing running quad cores, the system need to be able to handle all of the management extender responsibilities.

IBM AIX 7 Administration Interview Questions




CFG