The appliance dashboard Reverse Proxy Health widget indicates a problem with the /snoop junction on the Test instance.
Which log file can be examined to find product errors?
Answer : C
A customer has configured the IBM Security Access Manager V9.0 appliance authentication to an external LDAP server. The customer wants to allow support staff with LDAP accounts that are members of the HelpDesk group to view appliance and audit logs.
Where should the deployment professional configure a new role and map it to the HelpDesk LDAP group for the support staff?
Answer : B
An attacker has compromised the private key associated with a certificate.
Which two methods can be used to ensure that certificates have not been revoked by the Certification authority that issued it? (Choose two.)
Answer : AE
A large bank has multiple applications protected by two identically configured WebSEAL servers. One junction supports a reporting application that frequently expenses performance issues which slows response time. The worst case results in the entire site becoming unresponsive when all WebSEAL worker threads on all WebSEAL instances are consumed on the junctions to this one reporting application.
Which configuration change will prevent this situation from occurring without impacting the behavior of any other application (junction), and keeping the entire site up?
Answer : C
A company has deployed an IBM Security Access Manager V9.0 solution for protecting web resources and has enabled auditing for monitoring purposes. A security deployment professional has observed that audit records are using large quantities of disk space due to the large number of audit events related to HTTP access.
Which two strategies will help to reduce the volume of audit events in above scenario? (Choose two.)
Answer : BE
Reference:
http://www-01.ibm.com/support/docview.wss?uid=swg27049642&aid=1
(15)
During testing of an application the deployment professional is receiving frequent alerts about high disk utilization.
What action can be taken to resolve this issue?
Answer : C
The Distributed Session Cache has been enabled to replace the Session Management Server in a recently migrated IBM Security Access Manager V9.0 environment. Several Reverse Proxies have not yet been migrated from ISAM V7.0.
The help desk is now receiving user complaints due to multiple logins required for applications protected by the ISAM V7.0 Reverse Proxies.
Which Distributed Session Cache option should be checked?
Answer : C
In an organization"™s testing environment, the IBM Security Access Manager V9.0 deployment professional is required to deploy the virtual appliance on Amazon
EC2 with a single reverse proxy instance with a single network interface.
How should the deployment professional configure the reverse proxy so that end-users can access the reverse proxy without specifying a non-standard port (other than 80 and 443)?
Answer : C
A company has deployed an IBM Security Manager V9.0 solution to protect web resources and now wants to secure access to enterprise resources from mobile devices. The security deployment professional needs to run a utility to configure the existing WebSEAL with the instance of the appliance that provides the authorization server for Advanced Access Control.
Which utility tool will perform this configuration?
Answer : A
Reference:
https://www.ibm.com/support/knowledgecenter/SSPREK_9.0.3/com.ibm.isam.doc/config/concept/con_isamcfg.html
A customer deployment consists of a large number of virtual host functions definitions. During a troubleshooting session the deployment professional realizes the
WebSEAL logs do not distinguish between requests to different virtual hosts.
How can this be remediated?
Answer : D
A company is upgrading its existing IBM Security Access Manager (ISAM) environment to ISAM 9.0. Based on the requirements for the upgrade, activation keys have been procured for different ISAM modules.
Which two features require an activation key? (Choose two.)
Answer : BE
Reference:
https://www.ibm.com/support/knowledgecenter/SSPREK_9.0.0/com.ibm.isam.doc/admin/concept/con_activation_levels.html
Multiple hostnames are mapped to a single IP address used by a WebSEAL instance, listening on the default HTTPS port. For each host name requested in the browser, WebSEAL needs to present a different certificate.
What can the deployment professional do to meet this requirement?
Answer : A
Reference:
http://www-01.ibm.com/support/docview.wss?uid=swg27043085&aid=4
(352)
A customer"™s IBM Security Access Manager V9.0 deployment consists of a cluster with Primary and Secondary masters. The Primary master fails and becomes unavailable and prevents any policy updates.
Which action is required to ensure policy updates can be applied?
Answer : B
Reference:
https://www.ibm.com/support/knowledgecenter/SSPREK_9.0.2/com.ibm.isam.doc/admin/concept/con_cluster_policy_svr_ha.html
Which action must be completed for an external high volume runtime database after upgrading a Security Access Manager appliance?
Answer : B
Which settings"™ default value needs to be changed to prevent loss of data when using a SolidDB external database for the runtime?
Answer : C
Reference:
https://www.ibm.com/support/knowledgecenter/en/SSELE6_8.0.0/com.ibm.ammob.doc_8.0/task/tsk_deploy_extnl_hvdb.html
Have any questions or issues ? Please dont hesitate to contact us