Where would you browse in the ISAM for Mobile GUI to manually enable trace?
Answer : D
Which two extensions does a fix pack have? (Choose two.)
Answer : A,D
How much space is assigned to the primary partition after installing a new virtual appliance with 100GB of hard disk space?
Answer : B
As the administrator for ISAM for Mobile, you are tasked with setting up risk based policies that allow access to resources outside of normal hours after additional authentication. The landing pages for the resources are on different servers that are in different domains. You add info.js to the landing pages for each resource.
Which mechanism should be used to ensure the risk based policies are evaluated correctly for each resource?
Answer : C
When you use the web based (LMI) installation wizard, how does the appliance get the initial IP address of the management interface?
Answer : B
Which step should be completed after completing the installation wizard?
Answer : D
During testing and configuration activities in the development environment a security analyst mistakenly deleted some of the new attributes needed for one of the policies. The security analyst became aware of this mistake after deploying the changes.
Assuming the analyst followed best practices, which action restores the inadvertently deleted attributes?
Answer : C
Which reliable backup procedure is appropriate for cluster maintenance?
Answer : A
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSPREK_8.0.0.2/com.ibm.amweb.doc_8.0.0.2/admi n/concept/con_cluster_backup.html?lang=es
Which two types of risk profiles are supported? (Choose two.)
Answer : BC
Reference:http://www-01.ibm.com/support/docview.wss?uid=swg27042973&aid=8(Chapter
2 Risk Management overview)
Which two elements can be shown in the output of an IBM_SECURITY_CBA_AUDIT_RTE event? (Choose two.)
Answer : CD
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSELE6_8.0.0.5/com.ibm.isam.doc_8.0.0.5/audit/ref/ ref_security_cba_audit_rte_events.html
Which rule must a policy include to require an unauthenticated user to consent to register a device?
Answer : D
Reference:http://www.ibm.com/developerworks/library/se-accessmanager/
Which two valid predefined obligations are provided to use in policy authoring? (Choose two.)
Answer : AC
Which three actions are available underfirmare settings? (Choose three.)
Answer : ABD
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSPREK_7.0.0/com.ibm.isam.doc_70/ameb_webse al_appl_pdf.pdf(page 269)
Which protocol is used to access the hardware console through the network?
Answer : A
Which two dashboard widgets can be used for troubleshooting the ISAM for Mobile appliance? (Choose two.)
Answer : AE
Have any questions or issues ? Please dont hesitate to contact us