You are designing a network topology for IBM Security Web Gateway Appliance. The customer is using the appliance.
Where do you place the appliance?
Answer : C
A customer is not allowing the usage of self-signed certificates in its production environment. The customer has its own Public Key Infrastructure (PKI), and all certificates should be issued by this Certification Authority using their internal processes.
What needs to be done when going into production with the IBM Security products from the
Identity and Access Assurance software bundle?
Answer : B
A health care facility requires its physicians and staff to complete certain courses offered through its learning management system, prior to getting accounts and access in its patient management application.
Which functional requirement aligns with this business requirement?
Answer : D
A retail customer wants employees to be able to access all IT-related resources by providing one single user ID and password combination on a distributed number of
Microsoft Windows-based kiosks throughout the retail floor and in individual office environments.
Which product will help the customer accomplish this?
Answer : D
A corporate policy states that the service desk resets passwords after five failed logon attempts.
Which IBM Security Access Manager report provides the user identity qualifying for a password reset?
Answer : A
An analyst is designing an optimized web architecture for an IBM Security Access Manager for Web based solution that provides context based authorization.
Which statement about authorization decisions is true in this situation?
Answer : C
Which operating system must be selected when creating a virtual machine to install IBM
Security QRadar Log Manager V7.1?
Answer : C
What is the log-in account type requirement for installing IBM Security Access Manager for
Web on a UNIX system?
Answer : A
When designing an organization's tree structure in IBM Security Identity Manager, why is it advisable to put users and services in different containers?
Answer : A
The customer is considering implementing IBM Security Identity Manager.
What is the benefit of adding IBM Security Identity Manager to the customer's existing environment?
Answer : B
All of a customer's business applications run on either IBM WebSphere Application Server or Microsoft Internet Information Services. The employees using these applications use a mixture of laptops running Windows, laptops running Linux, iPads, and Android tablets.
What Single Sign-On solution do you propose?
Answer : B
A company plans to deploy an IBM Security Access Manager for Enterprise Single Sign-On solution to help address security and productivity issues. According to its corporate security policy, the organization has detailed requirements related to password management for its enterprise applications.
Which security requirements (with regard to user ID and password) need to be captured?
Answer : D
A large manufacturing company has employees in many different countries in the world.
The information security team is looking to deploy the IBM QRadar Log Manager.
Which requirement can be met by this solution?
Answer : A
A customer wants to use integrated solutions comprising of IBM Tivoli Federated Identity
Manager STS in a SOA environment.
Which solution can help in deploying fully integrated TFIM in this situation?
Answer : C
A client has these requirements:
1. Enterprise, web. and federated single sign-on, inside, outside, and between organizations, including cloud deployments.
2. Identity and access support for files, operating platforms, web. social networks, and cloud-based applications.
3. Integration with stronger forms of authentication (smart cards, tokens, one-time passwords, and so forth).
4. Automated monitoring, investigating
Which combination of security products will fulfill the client's needs?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us