New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

IBM C2150-609 Online Access

Page: 5 / 5
Total 137 questions

IBM Security Access Manager V9.0 Deployment Questions and Answers

Question 17

The IBM Security Access Manager V9.0 Advanced Access Control module can perform Context-Based Authorization based on the contents of a POST parameter.

Which two configuration steps need to be performed to do this? (Choose two.)

Options:

A.

Attach an appropriate Access Control List to the required URL

B.

Attach an appropriate Access Control Policy to the required URL

C.

Attach an appropriate Protected Information Point to the required URL

D.

Add an entry to the [user-agents) stanza in the reverse proxy configuration file.

E.

Add an entry to the [user-attribute-definitions] stanza in the reverse proxy configuration file

Question 18

A customer has an IBM Security Access Manager V9.0 appliance cluster spanning two data centers A and B. Data center A has the Primary Master and two Restricted nodes. Data center B has a Secondary Master and two Restricted Nodes. A Load Balancer with redundancy across data centers provides sticky load balancing to reverse proxies in both data centers.

What is true if a disaster recovery testing scenario takes down all appliances in data center A?

Options:

A.

The Secondary Master will automatically be promoted to Primary Master

B.

Reverse Proxies in Data Center B will service all end-users with no intervention

C.

The Secondary Master has to be promoted to Primary for Data Center B to service end-users

D.

Reverse Proxies in Data Center B need to be recycled sequentially to handle users assigned Data Center A reverse proxies

Question 19

An IBM Security Access Manager V9.0 systems deployment professional needs to protect a back-end web applications from SQL injection attacks that match signatures from the IBM X-Force signature database.

Which action needs to be performed?

Options:

A.

Simulation Mode must be enabled and a Risk Profile must be specified.

B.

Web Content Protection must be enabled and a Risk Profile must be specified.

C.

Simulation Mode must be enabled and a Registered Resource must be specified.

D.

Web Content Protection must be enabled and a Registered Resource must be specified.

Question 20

The deployment professional wants to back up the embedded LDAP personal certificate, including the private key. They navigate to Manage System Settings -> SSL Certificates -> and select the "extract" option.

Which file format is the resulting certificate backup?

Options:

A.

.p12

B.

.kdb

C.

jks

D.

cer

Page: 5 / 5
Total 137 questions