IBM Security Access Manager for Mobile V8.0 Implementation v6.0 (C2150-202)

Page:    1 / 5   
Total 75 questions

How is NIST SP800-131a compliance configured?

  • A. Enable NIST SP800 mode, disable FIPS mode
  • B. Enable NIST mode, set FIPS to active mode, enable TLS 1.2
  • C. Enable NIST mode, disable FIPS mode, optionally enable TLS 1.2
  • D. Enable FIPS mode, set the tuning parameter to strict mode, optionally enable TLS 1.2


Answer : A

What is the correct series of activities needed to deploy ISAM for Mobile on a virtual machine?

  • A. Unbox the appliance, place it in the rack, connect all peripherals Download iso-file from Passport Advantage Burn CD from iso-file Power on the machine Follow instructions on the screen
  • B. Create a virtual machine Download zip-file from Passport Advantage and unzip it Burn CD from iso-file Power on the machine Follow instructions on the screen
  • C. Create a virtual machine Download zip-file from Passport Advantage and unzip it Power on the machine Click setup.exe Follow instructions on the screen
  • D. Create a virtual machine Download iso-file from Passport Advantage Mount the iso on the machine Power on the machine Follow instructions on the screen


Answer : A

What are two advantages of redundancy? (Choose two.)

  • A. Price
  • B. Security
  • C. Capacity
  • D. Reliability
  • E. Simplicity


Answer : B,C

Which advanced configuration key value should be modified to specify the authentication level for consent-based device registration?

  • A. consentDeviceRegistration.authLevelEnabled
  • B. consentDeviceRegistration.authLevelHeaderValue
  • C. consentDeviceRegistration.authenticationLevelHeaderValue
  • D. consentDeviceRegistration.authenticationLevelHeaderEnabled


Answer : D

Reference:http://www-01.ibm.com/support/docview.wss?uid=swg27042973&aid=8(page
125)

The Appliance Dashboard shows a high-level view of current operations and statistics. One of these statistics is the current network activity.
Before enabling tracing, which set of steps may be used to diagnose an error if one of the configured application networks is showing unexpected results?

  • A. Expand the network interfaces widget and double-click the suspected interface. Filter the results by condition. Select the first error result and view the trace to identify the error.
  • B. Expand the system notifications widget and click the interface errors link. Click the link for theproblematic interface to open the application log. Move backwards in time up to the point of the error.
  • C. Expand the network traffic widget and click the suspected interface. Filter the results by errorcondition. Select the first result and then click view log. Navigate through the filtered log entries to identify the error.
  • D. Expand the network traffic widget and click the suspected interface. Increase the range to identifywhen the unexpected behavior began. Open the application log and move backwards in time up to the point of the error.


Answer : C

Which virtualization software could be used when planning on deploying a test environment on a laptop for ISAM for Mobile V8?

  • A. Xen
  • B. Microsoft Virtual PC
  • C. VMware Workstation
  • D. Oracle VM VirtualBox


Answer : C

Reference:http://www-01.ibm.com/common/ssi/cgi-
bin/ssialias?infotype=AN&subtype=CA&htmlfid=897/ENUS213-435

When configuring one-time password in ISAM for Mobile. Customer A's requirements are to use a provider that generates a one-time password by using a specified algorithm with a time-based one-time password application.
Which provider is configured to meet customer A's one-time password requirements?

A. RSA -

B. MAC -

C. TOTP -

D. HOTP -



Answer : C //www- 01.ibm.com/support/knowledgecenter/SSELE6_8.0.0/com.ibm.ammob.doc_8.0/concept/otp .html(see TOTP)

How is sensitive information filtered from trace logs?

  • A. By setting the sensitive data mask field
  • B. By setting log content protection to true
  • C. By setting OWASP log compliance to true
  • D. By setting suppress sensitive trace to true


Answer : A

You are tasked with planning an ISAM for Mobile deployment for external clients. Requests between ISAM for Mobile Appliance and ISAM for Web components will be controlled via a firewall.
Assuming default ports are used, which ports do you need to open in the firewall to allow the ISAM for Mobile Appliance to function correctly?

  • A. 80,443
  • B. 443,636
  • C. 389,443
  • D. 443,7135


Answer : C

What needs to be imported in order to enable the Security Access Manager for Mobile features?

  • A. Support key
  • B. License key
  • C. Activation key
  • D. Serial number


Answer : C

Which member of the IBM Security Access Manager product family acts as a Policy
Enforcement Point(PEP)?

  • A. IBM Tivoli Federated Identity Manager
  • B. IBM Security Access Manager for Web
  • C. IBM Security Access Manager for Mobile
  • D. IBM Security Access Manager of Enterprise Single Sign-on


Answer : B,C

Reference:http://www-01.ibm.com/common/ssi/cgi-
bin/ssialias?infotype=an&subtype=ca&appname=gpateam&supplier=872&letternum=ENUS

AP14-0399 -

You are tasked with planning an ISAM for Mobile deployment for external clients.
What should be part of your plan?

  • A. Request a DMZ IP address for the application interface
  • B. Request an internal IP address for the application interface
  • C. Request an external IP address for the application interface
  • D. Request a broadcast IP address for the application interface


Answer : D

What is the initial administrative account password of the appliance?

  • A. admin
  • B. password
  • C. superadmin
  • D. supersecret


Answer : A

You are tasked with designing a solution that meets the following requirements:
1. Allow authenticated users to access web resources for transaction amounts less than
$1.000
2. Require additional authentication for transaction amounts greater than or equal to $1.000
Which features of ISAM for Mobile will help meet the above requirements when designing the plan to deploy ISAM for Mobile?

  • A. Custom attributes,Policy,OTP
  • B. Predefined attributes,Policy,OTP
  • C. Custom attributes,Policy,Device registration
  • D. Predefined attributes,Policy,Device registration


Answer : A

What is the minimum recommend virtual hardware setting?

  • A. One virtual network interface and 100 gigabytes of disk space
  • B. Two virtual network interfaces and 200 gigabytes of disk space
  • C. Three virtual network interfaces and 100 gigabytes of disk space
  • D. Four virtual network interfaces and 200 gigabytes of disk space


Answer : C

Page:    1 / 5   
Total 75 questions