A global health care organization is looking to streamline and extend its security framework. There are just few departments that use the identity and access management framework at this time. They have asked the security officer of those departments to summarize the findings that need to be considered when designing and deploying a security framework.
Which two features of the identity and access management solution should be considered in this situation? (Choose two.)
Answer : A,D
A company is planning to design an identity and access management solution across multiple data centers which will automate the user life cycle management and streamline their access management process.
Which two key design principles should be factored in for designing a comprehensive identity and access management solution? (Choose two.)
Answer : C,D
A customer wants to do a phased deployment of IBM Security Identity Manager setup starting with few platform and provisioning policies. Subsequent phases will increase complexity.
Which stage can be implemented without an external production system?
Answer : A
A customer has a requirement which is currently unavailable in an out-of-the-box product.
Who would be able to assist in troubleshooting the customer when developing a custom solution?
Answer : C
Social media is an increasing threat to an organization's policies and network; company employees are the ones who are most likely to fall victim to social engineering based threats, and serve as entry points for Advanced Persistent Threats.
Which bundled product provides situational awareness and compliance support through security event correlation and analysis?
Answer : B
The customer has an ongoing implementation of IBM Security Access Manager for
Enterprise Single Sign-On. The implementer needs to create, import, and view the access profiles that will be used and loaded.
Which component needs to be installed to help the administrator create, import, and view the access profiles?
Answer : A
A company is in the process of extending the setup of its master-replica directory server environment to include more subtrees to meet the growing needs of the organization.
What can be used to add subtrees to the existing setup using web admin tool?
Answer : C
Which software component is relevant to an IBM Security Identity Manager deployment when considering a high-availability solution?
Answer : B
A customer's IT infrastructure includes ten different directories, one for each country branch. The customer now needs a single directory for some centralized applications. The customer would like to make as few changes in the environment as possible.
Which product do you recommend?
Answer : C
In an existing IT environment, the customer has decided to use an SSL certificates for the secure communication among its components. One of the certificates that is used in the organization has been compromised which make it vulnerable to attack. The decision has been made to revoke to compromised certificate.
Which method does GSKit support to check whether the certificate is revoked?
Answer : D
A customer has a requirement for the recommended settings for the product in context of
Operating System, Network, LDAP services, and Database parameters.
Where can the recommended settings be found?
Answer : A
A company is using IBM Security Access Manager for Web solution for all applications.
What is the business advantage of this solution?
Answer : C
A company hosts a number of web applications which are protected using IBM Security
Access Manager. The company needs to step up authentication for some of the mission critical applications.
Which WebSEAL functionality is used to ask the user to perform additional login (re- authentication)?
Answer : D
You are tasked to design a web Single Sign-On solution to significantly reduce help desk costs. Which product would meet this requirement?
Answer : C
In the customer environment administrators often provision accounts without waiting for approval, which is against company policy.
What two solutions would you offer to detect this? (Choose two.)
Answer : A,E