Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Note! Following C2150-609 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

Verified By IT Certified Experts

CertsTopics.com Certified Safe Files

Up-To-Date Exam Study Material

99.5% High Success Pass Rate

100% Accurate Answers

Instant Downloads

Exam Questions And Answers PDF

Try Demo Before You Buy

Certification Exams with Helpful Questions And Answers

IBM Security Access Manager V9.0 Deployment Questions and Answers

Question 1

The deployment professional wants to back up the embedded LDAP personal certificate, including the private key. They navigate to Manage System Settings -> SSL Certificates -> and select the "extract" option.

Which file format is the resulting certificate backup?

Options:

A.

.p12

B.

.kdb

C.

jks

D.

cer

Buy Now
Question 2

A customer has an IBM Security Access Manager V9.0 appliance cluster spanning two data centers A and B. Data center A has the Primary Master and two Restricted nodes. Data center B has a Secondary Master and two Restricted Nodes. A Load Balancer with redundancy across data centers provides sticky load balancing to reverse proxies in both data centers.

What is true if a disaster recovery testing scenario takes down all appliances in data center A?

Options:

A.

The Secondary Master will automatically be promoted to Primary Master

B.

Reverse Proxies in Data Center B will service all end-users with no intervention

C.

The Secondary Master has to be promoted to Primary for Data Center B to service end-users

D.

Reverse Proxies in Data Center B need to be recycled sequentially to handle users assigned Data Center A reverse proxies

Question 3

A company is upgrading its existing IBM Security Access Manager (ISAM) environment to ISAM 9.0. Based on the requirements for the upgrade, activation keys have been procured for different ISAM modules.

Which two features require an activation key? (Choose two.)

Options:

A.

REST APIs

B.

Web Reverse Proxy

C.

Authorization Server

D.

Local Management Interface

E.

Distributed Session Cache