If you are an expert in Ibm Bigfix then this is for you. Let us know if you looking for a job change? Then do not worry, we have a right answer for your job interview preparation. If you are preparing for Ibm Bigfix job interview then go through Wisdomjobs interview questions and answers page. Ibm Bigfix is the system management software product developed by IBM to handle the several computers running on different Operating systems like Windows, OS X, VMWare, Linux or Unix. It helps you cut operational costs, compress endpoint management cycles and enforce compliance in real-time. Good knowledge on the Ibm Bigfix is must to crack the interview. Below are the Ibm Bigfix interview questions and answers which makes you comfortable to face the interviews:
Answer :
BigFix, formerly IBM Tivoli Endpoint Manager is software that runs on your computer and collects information about your computer. BigFix collects hardware and software information to help IT inventory devices that are attached to the network. Knowing what is attached to the UCSF network is critical to identify and remediate security vulnerabilities. At UCSF, registration of desktops and laptops connected to the network is accomplished by installing BigFix.
Answer :
The BigFix client will not harm your PC or uninstall your applications. In a very small number of incidents (less than 1%), BigFix may be incompatible with an application and cause some minor issue. We will work with you to resolve these as issues as necessary.
Answer :
Having visibility into all devices on the network is critical to protecting UCSF data and computing resources. This will provide UCSF IT with an accurate inventory of what devices are on the network, their patch status, and to whom they belong. Unknown or unidentified (i.e. unregistered) devices on the UCSF network are a risk to every other device on the UCSF network and will be subject to removal from the UCSF network.
Question 4. What To Expect After Installing Bigfix?
Answer :
The BigFix icon will appear on the System Tray (Windows) or Menu Bar (Mac OS X. The BigFix Client will run in the background and report the initial status of your system to the BigFix Server. If the system needs patching, you will be prompted to accept the patching task. You can defer the task, but if the task is deferred for too long, the patching task window will stay in the foreground, and you will not be able to dismiss it. The system will reboot after the patching task has completed. If the system is significantly behind in patching, multiple reboots may be necessary. BigFix will run in the background, consuming minimal CPU resources, periodically checking in with the server to provide ongoing updates of the system status as well as check for new tasks.
Answer :
Any number of things could cause this behavior – for example:
If you scan one asset that is unmanaged – that asset will be stored in the database and appear in the unmanaged assets table. If you scan the same asset when it is down (e.g. that IP is unresponsive to ping), it will still persist in the unmanaged asset table. If the asset is scanned once again, it will again, still remain in the table but have an updated last scan time.
Answer :
The algorithm for determining if two scanned devices match is as follows:
Finally, if the newly scanned asset does not match on any of the above, it will be considered a new asset.
Question 7. Who Has Access To The Administrator Controls For Bigfix System?
Answer :
Designated UCSF IT Staff has access to the administrator controls for BigFix. All access to BigFix, and actions performed within, are logged and regularly audited.
Answer :
In accordance with the University of California Electronic Communication Policy, administrator rights are limited to professional IT staff that follow industry best practices for system administration, including accessing the minimum amount of data to do their work. The BigFix system is housed in the Data Center with restricted physical access and continuous monitoring. Regular patches are applied to ensure system integrity. Administrator access logs are reviewed regularly to ensure appropriate access.
Answer :
No, the tools are the same and allow parity and efficiency for reporting on the posture of UCSF security and risk. The same policies and procedures apply to all students, faculty and staff.
Question 10. Why Do I Have To Issue A Zero-dollar Purchase Order To Obtain Lmt?
Answer :
Customers can avoid the need to issue a zero-dollar PO by having their PA/PAE site contact place an order via PA Online. For information on PA Online and management of site contact information, refer to IBM Passport Advantage Online for Customers.
Question 11. Why Do I Need To Order Lmt? Why Can't I Just Download It?
Answer :
Most simple download products provide little, if any, technical support. They are provided on the "as-is" basis. IBM provides the same support for LMT that we do for our other mission-critical middleware. Even though LMT is a no-charge product offering, an order must be still placed to establish an IBM entitlement record for the license as well as software subscription and technical support.
Question 12. What Is The Difference Between The Bigfix Client And The Scanner?
Answer :
The BigFix client is common for all IBM products that are based on the BigFix platform, and it is used to perform multiple tasks on the endpoints. The client provides information about a set of computer properties like the host name or the IP address, and it is a tool that is used to install the scanner on the computers, and manage the scanner through fixlets.
The scanner, on the other hand, is an independent component that is used by LMT/BFI. It collects information about the hardware and software that is installed on the computers in your infrastructure. The data that is then sent to the BigFix server, can be imported to the LMT/BFI server.
Question 13. Should The Lmt/bfi Server Run All The Time?
Answer :
Yes. The LMT/BFI server should run all the time to process data from endpoints in real time and ensure reporting accuracy. IBM pricing requires the capacity scan to run every thirty minutes on all endpoints for sub-capacity licensing. The capacity scans for up to five days back are kept on the BigFix server. Consequently, the server should not be stopped for a period longer than five days. The last successful software scan from each endpoint is also stored on the BigFix server. If new software scans are executed more than once during server maintenance, not all these scans are processed after restart.
Question 14. What Will It Be Doing With Bigfix On My Server?
Answer :
BigFix will collect system configuration data such as operating system, CPU, RAM, hard drive space, patch status, and list of local accounts on the server. BigFix will not collect any personal data or information, such as browser history or user data, stored on the server. IT will not install patches, or alter files, without consulting with the system owner. However, IT reserves the right to disconnect servers from the network or install patches if the system owner has not responded in a timely manner.
Answer :
The Upload Maintenance service is a utility that must be set up on the Tivoli Endpoint Manager server to manage file uploads. When the server utility is set up, file status is updated on the server automatically. You might need to refresh your console to see the updates.
Question 16. How Do I Import A Custom .wim File?
Answer :
You can import from the Image Library dashboard under Manage Images in the navigation tree. You can manually input operating system, architecture, and size on disk.
Size on disk in this case indicates the extracted size of the .wim file. This is typically about two and a half times the size of the actual .wim file.
Question 17. What Impact Does Running Bigfix On My Server Have On System Performance?
Answer :
The default CPU usage settings are optimized to avoid using too much CPU on your server. You can expect the BigFix client to use at most 2% of the CPU, calculated based on a single processor, so if you have multiple processors, the overall % of agent CPU is reduced significantly.
Question 18. How Can I Determine Which Type Of Server Installation Would Suit My Environment?
Answer :
See the IBM Endpoint Manager for Remote Control Installation Guide for some guidelines for consideration when planning your installation.
Answer :
BigFix is a widely used system management tool with a proven track record to not interfere other server processes. UCSF has experienced running BigFix on tens of thousands of desktops and hundreds of servers over the past few years with minimal issues.
Answer :
Tivoli Endpoint Manager Configuration Management assesses servers, laptops, and desktops against a predefined set of configuration standards such as DISA STIG (Standard Technical Implementation Guides) and FDCC (Federal Desktop Core Configuration). Tivoli Endpoint Manager can also support configuration standards from NIST, NSA, and other standards organizations. Regulatory compliance regulations such as FISMA, PCI, and others can be supported by using the standard configuration controls provided through the Tivoli Endpoint Manager across Windows and UNIX environments.
Question 21. What Are Some Of The Things I Cannot Do Using This Content?
Answer :
The Tivoli Endpoint Manager Confirmation Management solution is designed to be flexible. However, the remediation functionality on both Windows and UNIX is limited to specific configuration settings. In some cases, there are controls that cannot be remediated. The parameter functionality on both Windows and UNIX is also limited to specific configuration settings. Similar to remediation, not everything can and must be parameterized.
Question 22. How Do I Recognize Or See A Definitive Package In My Catalog?
Answer :
When you are adding package data to a software title version,Note field to indicate the package datasource (property) that this data comes from.
Question 23. How Do I Un-delete A Deleted Software Artifact?
Answer :
You might see that items were deleted when you look at the Audit Log under Catalog Tools in the left pane of the Software Catalog tab. Each level in the Catalog hierarchy contains a View Deleted action. Click this link to view and then restore the deleted items.
Question 24. Do I Need To Re-import Every Time I Make A Change To My Software Catalog?
Answer :
Yes. Click Import Options under Datasource in the Control Panel, and click Run Now, or wait for the next scheduled import. Some changes to the catalog require that you Reset Import Sequences, accessible on the Import Options tab of the Control Panel.
Question 25. Is Sua Designed To Be Used In Lieu Of An Audit?
Answer :
No. SUA processes and applications are designed as a tool to protect your enterprise in the event of an audit, and to ensure your ongoing compliance.
Question 26. How Can I Track These Savings?
Answer :
Perform an internal audit on how much your organization currently spends on the ongoing maintenance of software asset management and software publisher license compliance. Create before and after metrics to track how much the automation of your SUA application is saving you overall in terms of direct costs, labor costs, and maintenance.
Answer :
Very often, license regulators initiate software license investigations based on consumer leads. Each association and agency has their own criteria. To learn about these and how to keep your enterprise protected, check their individual websites.
Question 28. What Is The Difference Between Itam And Software Asset Management?
Answer :
ITAM stands for information technology asset management, which includes an accounting of all IT assets, such as hardware, software, network facilities, telecommunications, and digital assets. SAM, on the other hand, stands for software asset management, a practice that primarily focuses on the “software” asset area of ITAM.
Question 29. What Kinds Of User Accounts Should I Set Up For My Deployment?
Answer :
Ideally you have one domain user account with the following permissions:
Question 30. Can Two Management Extenders Be Installed On One Relay?
Answer :
Yes. You can have two different management extenders on the same relay, but they cannot be the same type of extender. For example, you could have iOS and Lotus Traveler extenders on the same relay, but not two iOS extenders.
Answer :
The Android Agent (IBM Mobile Client app) will have no knowledge of the code page (language) of the TEM Deployment, even after it is enrolled. The current IANA client setting on Android devices defaults to English (Windows-1252), unless it is configured. If this setting is not the same as the TEM deployment, data sent from the Android devices may be unreadable even if the devices have the same code page (language) as the TEM deployment.
To set the IANA Client setting automatically for all Android devices upon enrollment, create a policy action from the Android Device Language Setting wizard. Click Create Policy Action.
The list below highlights the currently supported languages/IANA settings:
ENU - windows-1252
CHS - gh2312
JPN - Shift_JIS
ESN - windows-1252
ITA - windows-1252
FRA - windows-1252
DEU - windows-1252
CHT - big5
KOR - ks_c_5601-1987
Question 32. How Do I Enable Or Disable Data Usage Tracking On Ios Devices?
Answer :
You can use Fixlets 195 and 196 to enable or disable data usage tracking by creating a client setting on a targeted iOS device. To access these Fixlets, click All Mobile Device Management Content from the navigation tree, click Fixlets and Tasks and type the Fixlet number in the search box on the right.
if you disable location tracking on an iOS App, it will also disable the data tracking, which means that the iOS App will not track any data usage.
Answer :
Check to see that a TEM agent is installed on each of the machines targeted by the offline patch window. Check to see if you have multiple actions in the action history of the 'Enforce Offline Patch Window task' affecting the same endpoints.
Question 34. What Should I Configure To Have A Running Offline Window?
Answer :
Check that you have the following items setup:
Question 35. My Virtual Machines Are No Longer Powering On During A Patch Window. What Happened?
Answer :
Check to see if you are at the maximum number of concurrent running machines. That setting can be found by default in this directory: C:Program Files BigFix Enterprise Management Extender Plugins VMware ESXi Patch Windows. For 64-bit systems, it is found in C:Program Files BigFix Enterprise Management Extender Plugins VMware ESXi Patch Windows. The number inside represents the number of concurrently running virtual machines per host. If the number is at the limit that was initially set, consider setting a higher concurrent virtual machine number.
Question 36. Why Can't I Apply Any Esxi Patches?
Answer :
The Patches for ESXi content is audit only. In order to resolve ESXi issues, use the VMware Update Manager or download and apply patches manually from the VMware website.
Question 37. What Is The Difference Between Proxied Machines And Normal Machines On The Tem Console?
Answer :
Normal machines have a full TEM agent installed on them, with the full standard set of inspectors and actions. Instead of a full TEM agent, proxied machines use APIs to pull back information about devices and feed that information into the console as a computer report. Proxied machines have a more limited set of inspectors and actions.
Answer :
The vCenter plug-in grabs data directly from the VMware APIs and then translates them into TEM properties. However, because a lot of these fields are set by the user, sometimes they can mismatch what gets reported in the TEM Agent. For example, it is possible to set the Guest Operating System version to be something very different from what is actually installed on virtual machine.
Answer :
The device refresh interval should be at least 5 minutes. On a medium to large size deployment, this refresh interval time should be set to 15 minutes or beyond. The Enforce Management Extender policy action should be set to however long it takes to run a substantial amount of TEM actions before it is forced to power down. The maximum time limit that can be set is an hour long.
Question 40. What Kind Of Machine Should The Management Extender Be?
Answer :
For medium to larger size deployments, the main limiting factor is most likely going to be the CPU. As long as it is something running quad cores, the machine should be able to handle all of the management extender tasks.
IBM BigFix Related Tutorials |
|
---|---|
IBM - RPG Tutorial | IBM DB2 Tutorial |
All rights reserved © 2020 Wisdom IT Services India Pvt. Ltd
Wisdomjobs.com is one of the best job search sites in India.