Passguide.C2150-202.70 questions Number: C2150-202 Passing Score: 800 Time Limit: 120 min File Version: 5.1

http://www.gratisexam.com/

C2150-202 IBM Security Access Manager for Mobile V8.0 Implementation Excellent Questions, I pass with 90% with these questions. Guys just read this only. I have corrected few questions and now score will be 95% above Guaranteed. Best stuff I have ever used for my exam preparation. I love Examcollection guys. Added Explanations and Exhibits most of the questions. Finally, I got right questions for this exam and share with you guys. Best Wishes.

Exam A QUESTION 1 Which two features require a product license key? (Choose two.) A. B. C. D. E.

Access Manager for Web Access Manager for Mobile Access Manager Session Cache Access Manager for Load Balancing Access Manager Risk-based Authentication

Correct Answer: AB Section: (none) Explanation Explanation/Reference: References: QUESTION 2 You are tasked with designing a solution that meets the following requirements: 1. Allow authenticated users to access web resources for transaction amounts less than $1.000 2. Require additional authentication for transaction amounts greater than or equal to $1.000 Which features of ISAM for Mobile will help meet the above requirements when designing the plan to deploy ISAM for Mobile? A. B. C. D.

Custom attributes,Policy,OTP Predefined attributes,Policy,OTP Custom attributes,Policy,Device registration Predefined attributes,Policy,Device registration

Correct Answer: A Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 3 As the administrator for ISAM for Mobile, you are tasked with setting up risk based policies that allow access to resources outside of normal hours after additional authentication. The landing pages for the resources are on different servers that are in different domains. You add info.js to the landing pages for each resource. Which mechanism should be used to ensure the risk based policies are evaluated correctly for each resource? A. B. C. D.

Cross Site Scripting Cross Script Java Sharing Cross Site Request Forgery Cross Origin Resource Sharing

Correct Answer: C Section: (none) Explanation Explanation/Reference: correct answer. QUESTION 4

Which rule must a policy include to require an unauthenticated user to consent to register a device? A. The userConsent attribute is set to true and that permits access with Obligation Register Device. B. The registeredDeviceCount is missing or set to zero and that permits access with Obligation Register Device. C. The userConsent attribute is not present and that will permit access with Authentication Consent Register Device. D. The riskScore attribute is below a configured threshold and that will permit access with ObligationRegister Device. Correct Answer: D Section: (none) Explanation Explanation/Reference: References: QUESTION 5 What are two advantages of redundancy? (Choose two.)

http://www.gratisexam.com/

A. B. C. D. E.

Price Security Capacity Reliability Simplicity

Correct Answer: BC Section: (none) Explanation Explanation/Reference: good choice of answers. QUESTION 6 A customer has the following limitation for OAuth2 workflow: OAuth clients shall keep their client credentials confidential when authenticating with the authorization server. Which authorization grant type is suitable for this work flow limitation? A. B. C. D. E.

Client credential flow Authorization code flow Access token with refresh token flow Client authorization code credential flow Resource owner password credentials flow

Correct Answer: AB Section: (none) Explanation Explanation/Reference: References:

QUESTION 7 Which component (if any) has only a single instance on the appliance? A. B. C. D.

The console port The application port The management port All components are redundant.

Correct Answer: D Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 8 A highly-available deployment of IBM Security Access Manager for Mobile makes use of cluster configurations to replicate certain data from designated masters to configured nodes. Secondary masters are defined as failover points in the event that the primary master fails. Additional masters are defined to scale with growth or to meet redundancy needs. In a four-master cluster, what would a failover from the primary master result in? A. The secondary master assumes responsibility of primary master. During this time, configuration changes cannot be made. When the primary master is restored, transactional data is synchronized back to the primary master. B. The failover scheduler selects the next master, which assumes responsibility of primary master. During this time, configuration changes cannot be made. When the primary master is restored,transactional data is synchronized back to the primary master. C. The secondary master assumes responsibility of primary master. During this time, geolocation updates and configuration changes configuration changes may still be made. When the primary master is restored, transactional data is synchronized back to the primary master. D. The tertiary master, which is primary master to the quaternary master, assumes responsibility of primary master. During this time, configuration changes configuration changes may not be made. When the primary master is restored, transactional data is synchronized back to the primary master. Correct Answer: C Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 9 How is the IP reputation database updated? A. B. C. D.

Download a quarterly update from Fix Central Configure automatic updates in the IP Reputation Database screen Download the latest update from IBM X-Force and install as a fix pack Configure IP Reputation Database updates in the Mobile Security Settings screen

Correct Answer: D Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 10 A security analyst created the following ISAM for Mobile policy and attached the policy to a protected resource:

Precedence: Deny - Attributes: Optional -Rule 1: If riskScore >40 or ipReputation has member Malware Then Deny Access to the protected resource is always denied. What should be done to troubleshoot the policy evaluation? A. Add com.ibm.sec.auth.'=all to your trace string on the Monitor > Runtime Tracing. The trace file is available at Monitor > Application Log Files and then navigating to mga/runtime/trace.log in the file picker. B. Add com.ibm.mga.auth.'=all to your trace string on the Monitor > Runtime Tracing. The trace file is available at Monitor > Application Log Files and then navigating to mga/runtime/trace.log in the file picker. C. Add com.ibm.sec.authz.'=all to your trace string on the Monitor > Runtime Tracing. The trace file is available at Monitor > Application Log Files and then navigating to mga/runtime/trace.log in the file picker. D. Add com.ibm.mga.authz.'=all to your trace string on the Monitor > Runtime Tracing. The trace file is available at Monitor > Application Log Files andthen navigating tomga/runtime/trace.log in the file picker. Correct Answer: C Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 11 During testing and configuration activities in the development environment a security analyst mistakenly deleted some of the new attributes needed for one of the policies. The security analyst became aware of this mistake after deploying the changes. Assuming the analyst followed best practices, which action restores the inadvertently deleted attributes? A. Use the "Roll Back" feature in the "Deploy Changes" dialogue B. Recreate the attributes from memory in the "Secure Mobile Settings / Policy /Attributes" section C. Restore the most recent Snapshot in the "Manage System Settings / System Settings / Snapshots" screen D. Activate the other inactive partition under 'Manage System Settings / Updates and Licensing / Firmware Settings" Correct Answer: C Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 12 Which system alert object can be added? A. B. C. D.

SMS SMTP Event sog Remote syslog

Correct Answer: D Section: (none) Explanation

Explanation/Reference: References: QUESTION 13 Which two authentication methods are available between ISAM Web and ISAM Mobile application interface? (Choose two.) A. B. C. D. E.

SPNEGO IP address HTTP headers Client certificate authentication UserID and password authentication

Correct Answer: CE Section: (none) Explanation Explanation/Reference: References: QUESTION 14 Which three outcomes are possible after calculating the risk score? (Choose three.) A. B. C. D. E. F.

Deny Permit Redirect Deny with obligation Deny with authentication Permit with obligation or authentication

Correct Answer: ABF Section: (none) Explanation Explanation/Reference: appropriate answer. QUESTION 15 Which two components are accessible from the back panel? (Choose two.) A. B. C. D. E.

Fan modules USB connector Power supplies Network interfaces Serial connector for a terminal

Correct Answer: CE Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 16 What needs to be imported in order to enable the Security Access Manager for Mobile features? A. Support key B. License key C. Activation key

D. Serial number Correct Answer: C Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 17 How many application interfaces does the appliance have?

http://www.gratisexam.com/

A. B. C. D.

1 2 4 8

Correct Answer: B Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 18 You have recently installed the latest general available fix pack. All known tests where passed successfully. However after a few weeks some field reports come in quoting that one of the previous working features fails. Extra testing on this specific feature learns that the new fix pack introduced a bug. You raise a PMR. however your business would like you to resolve this issue directly by drawing back this fix pack update. Which step will solve this issue? A. B. C. D.

Activate the other partition Install an older fix pack that lacks this bug Use the reset button using a paperclip during reboot Use the Promote Option on your development appliance to make it a production appliance

Correct Answer: B Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 19 Which member of the IBM Security Access Manager product family provides form-based authentication? A. B. C. D.

IBM Security Access Manager for Web IBM Security Access Manager for Mobile IBM Security Access Manager for Business Integration IBM Security Access Manager for Enterprise Single Sign-on

Correct Answer: B Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 20 Which three forms of information can be obtained from the partition information wizard dashboard on the appliance? (Choose three.) A. B. C. D. E. F. G.

Last boot Installation date Installation type Installation mode Installation status Firmware fix pack Active firmware partition

Correct Answer: ABC Section: (none) Explanation Explanation/Reference: References: QUESTION 21 Which two one-time password providers are supported by Security Access Manager for Mobile? (Choose two.) A. B. C. D. E.

RSA one-time password provider Email one-time password provider SOTP one-time password provider HOTP one-time password provider Mobile one-time password provider

Correct Answer: AB Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 22 You are tasked with planning an ISAM for Mobile deployment for external clients. What should be part of your plan? A. B. C. D.

Request a DMZ IP address for the application interface Request an internal IP address for the application interface Request an external IP address for the application interface Request a broadcast IP address for the application interface

Correct Answer: D Section: (none) Explanation Explanation/Reference: Explanation:

QUESTION 23 What is the recommended sequence of steps to remove all the data from the runtime database? A. B. C. D. E.

Remove all data from the runtime database, restart runtime Stop runtime, remove all data from the runtime database, start runtime Remove all data from the runtime database, refresh status, restart runtime Remove all data from the runtime database, refresh status, restart runtime Stop runtime, remove all data from the runtime database, refresh status, restart runtime

Correct Answer: E Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 24 Which two features are available in ISAM for Mobile V8? (Choose two.) A. B. C. D. E.

Web API Management Layer-6 load balancing Session Management Server Risk evaluation based on IP reputation Step up Authentication using out-of-the-box OTP's

Correct Answer: CD Section: (none) Explanation Explanation/Reference: updated answer. QUESTION 25 Which two SSL certificate file types are supported by ISAM for Mobile? (Choose two.) A. B. C. D. E.

.der .kdb .p12 .arm .pern

Correct Answer: BC Section: (none) Explanation Explanation/Reference: References: QUESTION 26 Testing and acceptance on virtual ISAM appliances has been completed and the Web security solution is promoted to the actual production environment. In this production environment a set of physical ISAM appliances are protecting and servicing the company's website. Although multiple appliances are setup and configured it is also good practice to make regular backups. What would be the best possible solution to ensure that a recent backup is available? A. Install the Tivoli Storage Manager on the Appliance using the LMI and schedule weekly backups B. Schedule a weekly backup using the "Manage System Settings / System Settings / Backup or Restore"

screen C. Swap the Active and Inactive partition weekly using the "Manage System Settings / Updates and Licensing / Firmware Settings" D. Make weekly snapshots using "Manage System Settings / System Settings / Snapshots" screen and download them to an external disk Correct Answer: D Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 27 What is the correct series of activities needed to deploy ISAM for Mobile on a virtual machine? A. Unbox the appliance, place it in the rack, connect all peripheralsDownload iso-file from Passport AdvantageBurn CD from iso-filePower on the machineFollow instructions on the screen B. Create a virtual machineDownload zip-file from Passport Advantage and unzip itBurn CD from isofilePower on the machineFollow instructions on the screen C. Create a virtual machineDownload zip-file from Passport Advantage and unzip itPower on the machineClick setup.exeFollow instructions on the screen D. Create a virtual machineDownload iso-file from Passport AdvantageMount the iso on the machinePower on the machineFollow instructions on the screen Correct Answer: A Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 28 How is sensitive information filtered from trace logs? A. B. C. D.

By setting the sensitive data mask field By setting log content protection to true By setting OWASP log compliance to true By setting suppress sensitive trace to true

Correct Answer: A Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 29 A security analyst is assigned to architect cluster configuration for IBM Security Access Manager for Mobile for one of the clients. The analyst decides on adding one primary master and one supplementary master node in this cluster configuration. Which cluster architecture rule is valid in this scenario? A. B. C. D.

The analyst must specify the master external reference entity. The analyst must specify the primary external reference entity. The analyst must specify the secondary external reference entity. The analyst must specify the replica master external reference entity.

Correct Answer: D

Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 30 Which two dashboard widgets can be used for troubleshooting the ISAM for Mobile appliance? (Choose two.) A. B. C. D. E.

Certificate expiry Reverse proxy health Reverse proxy output Firmware information Application interfaces

Correct Answer: AE Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 31 Which two values are valid for the self-diagnostic test command for hardware appliances? (Choose two.) A. B. C. D. E.

Stat Disk Blocks Storage Network

Correct Answer: DE Section: (none) Explanation Explanation/Reference: References: QUESTION 32 The Appliance Dashboard shows a high-level view of current operations and statistics. One of these statistics is the current network activity. Before enabling tracing, which set of steps may be used to diagnose an error if one of the configured application networks is showing unexpected results?

http://www.gratisexam.com/

A. Expand the network interfaces widget and double-click the suspected interface. Filter the results by condition. Select the first error result and view the trace to identify the error. B. Expand the system notifications widget and click the interface errors link. Click the link for theproblematic interface to open the application log. Move backwards in time up to the point of the error. C. Expand the network traffic widget and click the suspected interface. Filter the results by errorcondition.

Select the first result and then click view log. Navigate through the filtered log entries to identify the error. D. Expand the network traffic widget and click the suspected interface. Increase the range to identifywhen the unexpected behavior began. Open the application log and move backwards in time up to the point of the error. Correct Answer: C Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 33 What is the first required step in the LMI after installing the ISO and booting the new virtual appliance? A. B. C. D.

Enter the activation key Change the default admin password Enter the unconfigured login password Accept the Software License Agreement

Correct Answer: A Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 34 You are tasked with designing a solution that meets the following requirements: 1. Allow authenticated users to access web resources from registered devices 2. Require additional authentication for access from unregistered devices 3. Lower the cost of installation and maintenance Which features of ISAM for Mobile will help meet these requirements when designing the plan to deploy ISAM for Mobile? A. B. C. D.

Appliance, Custom attributes,Policy,OTP Appliance,Device registration,Policy,OTP Appliance,Custom attributes,Policy,Risk profile Appliance,Device registration, Policy,Risk profile

Correct Answer: B Section: (none) Explanation Explanation/Reference: proper answer. QUESTION 35 Which step should be completed after completing the installation wizard? A. B. C. D.

Import the activation key Check for the latest fix packs Configure the Risk-based Access Policies Run the isaincfg tool to configure Mobile for use with a WebSEAL instance

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation: QUESTION 36 Which reliable backup procedure is appropriate for cluster maintenance? A. B. C. D.

Use appliance snapshots to back up the cluster Use VMWare snapshots to back up virtual machines Run pdbackupcluster utility after any change to the cluster configuration Complete a VMWare snapshot on each cluster member to effectively back up the cluster

Correct Answer: A Section: (none) Explanation Explanation/Reference: References: QUESTION 37 Which two actions convert an active firmware partition to an inactive partition? (Choose two.) A. B. C. D. E. F.

Set active on inactive partition Set inactive on active partition Install firmware update and restart the appliance Edit active and inactive partitions and restart the appliance Click Set active under Manage System Settings > System Settings > Firmware Settings Click Set inactive under Manage System Settings > System Settings > Firmware Settings

Correct Answer: BF Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 38 What is the purpose of snapshots? A. B. C. D.

To restore prior partitions to the appliance To restore prior firmware settings to the appliance To restore prior configuration or policy settings to the appliance To restore prior configuration and policy settings to the appliance

Correct Answer: D Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 39 Where are SSL certificate databases managed in ISAM for Mobile web console? A. B. C. D.

Manage System Settings > Secure Settings > Certificates Manage Security Settings > System Settings > Certificates Manage System Settings > Secure Settings > SSL Certificates Manage Security Settings > System Settings > SSL Certificates

Correct Answer: C Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 40 How is NIST SP800-131a compliance configured? A. B. C. D.

Enable NIST SP800 mode, disable FIPS mode Enable NIST mode, set FIPS to active mode, enable TLS 1.2 Enable NIST mode, disable FIPS mode, optionally enable TLS 1.2 Enable FIPS mode, set the tuning parameter to strict mode, optionally enable TLS 1.2

Correct Answer: A Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 41 What are two of the ISAM for Mobile runtime profile services? (Choose two.) A. B. C. D. E.

Security token service Attribute collection service Restful management APIs Authentication protocol service Runtime Security services EAS

Correct Answer: BE Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 42 Which two elements can be shown in the output of an IBM_SECURITY_CBA_AUDIT_RTE event? (Choose two.) A. B. C. D. E. F.

majorStatus minorStatus appUserName globallnstanceld restManagement RESTInvocationURI

Correct Answer: CD Section: (none) Explanation Explanation/Reference: References: QUESTION 43 Where would you browse in the ISAM for Mobile GUI to manually enable trace?

A. B. C. D.

Monitor Analysis and Diagnostics > Logs > Runtime Tracing Monitor Analysis and Diagnostics > Logs > Runtime Logging Secure Mobile Settings > Manage > Runtime Parameters > Runtime Status Secure Mobile Settings > Manage > Runtime Parameters > Runtime Logging

Correct Answer: D Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 44 Which two audit event types record actions such as creation of risk profiles and device registration? (Choose two.) A. B. C. D. E.

IBM_SECURITY_RUNTIME_MGMT IBM_SECURITY_CBA_AUDIT_RTE IBM_SECURITY_CBA_AUDIT_MGMT IBM_SECURITY_CBA_AUDIT_AUTHZ IBM_SECURITY_RTSS_AUDIT_MGMT

Correct Answer: C Section: (none) Explanation Explanation/Reference: References: QUESTION 45 When you use the web based (LMI) installation wizard, how does the appliance get the initial IP address of the management interface? A. B. C. D.

Provided through DHCP Specified manually in the installation wizard Input through a keyboard on the front panel of the appliance Specified manually through a terminal connected to the appliance

Correct Answer: B Section: (none) Explanation Explanation/Reference: suitable answer. QUESTION 46 When configuring one-time password in ISAM for Mobile. Customer A's requirements are to use a provider that generates a one-time password by using a specified algorithm with a time-based one-time password application. Which provider is configured to meet customer A's one-time password requirements? A. B. C. D.

RSA MAC TOTP HOTP

Correct Answer: C Section: (none)

Explanation Explanation/Reference: References: QUESTION 47 The Appliance Dashboard shows a high-level view of current operations and statistics. One of these statistics is the current CPU activity. Which set of steps is used if the CPU activity of a hardware appliance shows constant use and averages above sixty percent? A. Review the current trace level, the number of policies, and the use of PIPs. Then, add another CPU to the redundant CPU slot. B. Review the current trace level, the number policies, and the use of PIPs. Then, increase capacity by adding another hardware appliance. C. Disable all traces, clear out all logs, and switch partitions to allow the primary partition to be defragmented. Then, update the CPU to the latest current supported architecture. D. Disable all traces, clear out all logs, and switch partitions to allow the primary partition to bedefragmented. Then, purchase and load the Enterprise CPU Feature key to enable the secondary CPU. Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 48 A security analyst has developed and successfully tested an adjusted Trusteer Policy Information Point (PIP) in the Development environment. The next step is to deploy this new Trusteer PIP in the Acceptance environment so the proper testing can be executed. How is this new Trusteer PIP deployed?

http://www.gratisexam.com/

A. Log into the Environment Dashboard. Select the Trusteer PIP in the Development area and use the Propagate option to deploy in on the Acceptance environment. B. Select on your Development environment in the "Secure Mobile Settings / Policy / Information Points" screen the Trusteer PIP,choose the Export option, move the file to the Acceptance environment and use the Import option on the equivalent screen. C. Select on your Development environment in the "Secure Mobile Settings / Policy / Information Points" screen the Trusteer PIP,choose the Download option, move the file to the Acceptance environment and use the Upload option on the equivalent screen. D. Select the Trusteer PI P in the "Secure Mobile Settings / Policy / Information Points" screen on the Development environment, use the Promote option to enable it to be received by another environment. Next login to the Acceptance environment and use the Receive option. Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation: QUESTION 49 Which two attributes may be automatically set during device registration? (Choose two.) A. B. C. D. E.

stepUp deviceld isRegistered userConsent authenticationLevel

Correct Answer: DE Section: (none) Explanation Explanation/Reference: References: QUESTION 50 Which member of the IBM Security Access Manager product family acts as a Policy Enforcement Point (PEP)? A. B. C. D.

IBM Tivoli Federated Identity Manager IBM Security Access Manager for Web IBM Security Access Manager for Mobile IBM Security Access Manager of Enterprise Single Sign-on

Correct Answer: BC Section: (none) Explanation Explanation/Reference: References: QUESTION 51 Which two factors are relevant to capacity planning when using IBM Security Access Manager for Mobile as a separate appliance? (Choose two.) A. B. C. D. E.

Total number of users Total new sessions per minute Authorization decisions per minute Authentication decisions per minute Throughput in megabytes per second

Correct Answer: BE Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 52 What is a potential cause for corrupted JSON data in an API response? A. A PIP returned an error message that was notUTF-8 encoded. B. A policy contains a custom attribute with incorrect FORM or JSON data. C. A device registration includes a custom attribute whole value includes unescaped quotes.

D. A corrupt FORM or JSON parameter was sent to the API,and the appliance included it as part of the error response. Correct Answer: D Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 53 You are tasked with designing a solution that meets the following requirements: 1. Allow authenticated users to access web resources during normal business hours 2. Require additional OTP authentication for access outside business hours 3. Lockout a user after three invalid OTP authentication attempts 4. Automatically unlock the user after five minutes Which features of ISAM for Mobile will help meet these requirements when designing the plan to deploy ISAM for Mobile? A. B. C. D.

Risk profile,OTP,Policy Device registration,OTP,Policy Risk profile,OTP,Policy,Advanced configuration Device registration,OTP,Policy,Advanced configuration

Correct Answer: C Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 54 What is the initial administrative account password of the appliance? A. B. C. D.

admin password superadmin supersecret

Correct Answer: A Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 55 Which three types of application logs are available? (Choose three.) A. B. C. D. E. F.

Fsck Mga Cluster System Performance Management_ui

Correct Answer: BCF Section: (none) Explanation

Explanation/Reference: appropriate answer. QUESTION 56 Which two types of risk profiles are supported? (Choose two.) A. B. C. D. E.

Custom risk profiles Obligated risk profiles Pre-defined risk profiles Content-based risk profiles Consent-based risk profiles

Correct Answer: BC Section: (none) Explanation Explanation/Reference: References: QUESTION 57 How many DMZ network segments can the appliance support? A. B. C. D.

2 4 6 8

Correct Answer: A Section: (none) Explanation Explanation/Reference: References: QUESTION 58 Which two valid predefined obligations are provided to use in policy authoring? (Choose two.) A. B. C. D. E.

One-time password Consent select device Consent register device Consent unregister device POTP one-time password

Correct Answer: AC Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 59 How much space is assigned to the primary partition after installing a new virtual appliance with 100GB of hard disk space? A. B. C. D.

50GB 75GB 90GB 100GB

Correct Answer: B Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 60 A security analyst created an ISAM for Mobile policy to perform context based authorization checks based on custom attributes and attached it to a protected resource. The security analyst discovered that access to the protected resource is always getting denied. To troubleshoot you check: Which change in data format will resolve this issue? A. B. C. D.

2013-05-20 06:00 2013-05-20:06:00 2013-05-20-06-00 2013-05-20-06:00

Correct Answer: A Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 61 What are two tasks are performed by the isamcfg tool? (Choose two.) A. Creates a junction that points to the IBMSecurity Access Manager for Webruntime endpoint B. Modifies WebSEAL or the Web Gateway Appliance authentication configuration to support custom attributes C. Modifies WebSEAL or the Web Gateway Appliance authentication configuration to support the authentication service D. Configures the plug-in on the Mobile Gateway Appliance that communicates to the IBM Security Access Manager for Mobile authorization server E. Configures the plug-in on WebSEAL or the Web Gateway Appliance that communicates to the IBMSecurity Access Manager for Mobile authorization server Correct Answer: AC Section: (none) Explanation Explanation/Reference: References: QUESTION 62 Which advanced configuration key value should be modified to specify the authentication level for consentbased device registration? A. B. C. D.

consentDeviceRegistration.authLevelEnabled consentDeviceRegistration.authLevelHeaderValue consentDeviceRegistration.authenticationLevelHeaderValue consentDeviceRegistration.authenticationLevelHeaderEnabled

Correct Answer: D Section: (none)

Explanation Explanation/Reference: References: QUESTION 63 Which three actions are available under firmare settings? (Choose three.) A. B. C. D. E. F.

Edit Set active Set inactive Create backup Restore backup Configure partitionG Unconfigure partition

Correct Answer: ABD Section: (none) Explanation Explanation/Reference: References: QUESTION 64 Which protocol is used to access the hardware console through the network? A. B. C. D.

ssh rlogin Telnet Remote desktop

Correct Answer: A Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 65 You are tasked with planning an ISAM for Mobile deployment for external clients. Requests between ISAM for Mobile Appliance and ISAM for Web components will be controlled via a firewall. Assuming default ports are used, which ports do you need to open in the firewall to allow the ISAM for Mobile Appliance to function correctly? A. B. C. D.

80,443 443,636 389,443 443,7135

Correct Answer: C Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 66 What are two categories of policy attributes? (Choose two.) A. Global

B. C. D. E.

Shared Subject Resource Application

Correct Answer: AD Section: (none) Explanation Explanation/Reference: References: QUESTION 67 What is the minimum recommend virtual hardware setting? A. One virtual network interface and 100 gigabytes of disk space B. Two virtual network interfaces and 200 gigabytes of disk space C. Three virtual network interfaces and 100 gigabytes of disk space

http://www.gratisexam.com/ D. Four virtual network interfaces and 200 gigabytes of disk space Correct Answer: C Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 68 Which virtualization software could be used when planning on deploying a test environment on a laptop for ISAM for Mobile V8? A. B. C. D.

Xen Microsoft Virtual PC VMware Workstation Oracle VM VirtualBox

Correct Answer: C Section: (none) Explanation Explanation/Reference: valid answer. QUESTION 69 Which two extensions does a fix pack have? (Choose two.) A. B. C. D. E.

jar tar iso pkg gzip

Correct Answer: AD Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 70 As the administrator for ISAM for Mobile, you are tasked with setting up a risk based policy to limit the ability for an attacker to use stolen credentials. Which step should be taken in this situation? A. Setup a policy that requires silent device registration and delete the device registration for the stolen credentials B. Setup a policy that requires checking the isStolen attribute of the device and delete the device registration for the stolen credentials C. Setup a policy that requires OTP authentication prior to device registration and delete the device registration for the stolen credentials D. Setup a policy that requires UserID and Password authentication prior to device registration and delete the device registration for the stolen credentials Correct Answer: A Section: (none) Explanation Explanation/Reference: References:

http://www.gratisexam.com/