A company is upgrading its existing IBM Security Access Manager (ISAM) environment to ISAM 9.0. Based on the requirements for the upgrade, activation keys have been procured for different ISAM modules.
Which two features require an activation key? (Choose two.)
The web security department of an organization has found that their site is vulnerable to Denial of Service, Brute Force, Buffer Overflow and decided to use the Web Application Firewall (WAF) feature available in IBM Security Access Manager V9.0.
Even after enabling WAF, the site is still vulnerable to the above attacks. The deployment professional is pretty sure that the signature for these attacks have been released and has decided to check for X-Force updates.
How should the deployment professional check and update this?
A system is configured with two IBM Security Access Manager (ISAM) V9.0 reverse proxy servers behind a load balancer, and it is planned to use forms-based user authentication. It is a requirement that if a reverse proxy were to fail, users that were already logged in would not be required to log in again.
Which two configurations can the deployment professional use to achieve this? (Choose two.)
Prior to installing a firmware update the deployment professional creates a snapshot of the appliance configuration. During acceptance testing of the new firmware it is discovered that the update introduced a bug.
How should the deployment professional restore the previous configuration?
An IBM Security Access Manager V9.0 deployment professional executes the following steps:
1. Navigate to Edit SSL Certificate Database - embedded_ldap_keys
2. Select the embedded LDAP server certificate
3. Click Manage->Export
4. Save the resulting .cer file onto local desktop
Which task was the deployment professional performing?
A customer's IBM Security Access Manager V9.0 deployment consists of a cluster with Primary and Secondary masters. The Primary master fails and becomes unavailable and prevents any policy updates.
Which action is required to ensure policy updates can be applied?
Which two protocols does the federation module in IBM Security Access Manager V9.0 support?
(Choose two.)
The IBM Security Access Manager V9.0 high-volume database stores data for which component?
In a customer environment, a REST API client is being developed to carry out Reverse Proxy configuration and maintenance. As part of one of the activities the customer needs to update the junction information with an additional Backend Server. The customer has written a REST API client but is not able modify the junction.
Which HTTP headers should the customer pass?
As part of installing a fixpack a deployment professional wants to back up the appliance configuration.
How is this done?
A deployment professional in charge of a large deployment with replicated reverse proxy instances needs to keep junctions, template files, and configuration settings in sync between the instances.
How can this be done?
The customer requires high availability of its IBM Security Access Manager (ISAM) V9.0 WebSEAL infrastructure. The environment includes two WebSEAL appliances, two appliances for Policy Server and other ISAM services. All ISAM appliances are configured into a cluster which includes replicating the ISAM runtime and certificate files, the Policy Server, Runtime and Configuration databases, and the Distributed Session Cache. The complete LDAP configuration uses the embedded LDAP and externally federated IBM Security Directory Server (ISDS).
Which failover scenario is supported with this configuration?
A deployment professional is configuring IBM Security Access Manager V9.0 for Management Authentication using remote LDAP.
Which configuration field value is optional?
During testing of an application the deployment professional is receiving frequent alerts about high disk utilization.
What action can be taken to resolve this issue?
The security deployment professional of an IBM Security Access Manager V9.0 solution has been using routing files to customize message logging.
Which aspect of the logging activity can be controlled?
IBM Security Access Manager (ISAM) V9.0 provides an External Authentication Interface (EAI) that enables the extension of the authentication process for WebSEAL The identity information returned by the EAI service is used to generate user credentials. This can be used as one of the methods to implement step-up authentication-How is this authentication information returned from the EAI server?
The IBM Security Access Manager V9.0 Advanced Access Control module can perform Context-Based Authorization based on the contents of a POST parameter.
Which two configuration steps need to be performed to do this? (Choose two.)
A customer has an IBM Security Access Manager V9.0 appliance cluster spanning two data centers A and B. Data center A has the Primary Master and two Restricted nodes. Data center B has a Secondary Master and two Restricted Nodes. A Load Balancer with redundancy across data centers provides sticky load balancing to reverse proxies in both data centers.
What is true if a disaster recovery testing scenario takes down all appliances in data center A?
An IBM Security Access Manager V9.0 systems deployment professional needs to protect a back-end web applications from SQL injection attacks that match signatures from the IBM X-Force signature database.
Which action needs to be performed?
The deployment professional wants to back up the embedded LDAP personal certificate, including the private key. They navigate to Manage System Settings -> SSL Certificates -> and select the "extract" option.
Which file format is the resulting certificate backup?