How is NIST SP800-131a compliance configured?
Answer : A
What is the correct series of activities needed to deploy ISAM for Mobile on a virtual machine?
Answer : A
What are two advantages of redundancy? (Choose two.)
Answer : B,C
Which advanced configuration key value should be modified to specify the authentication level for consent-based device registration?
Answer : D
Reference:http://www-01.ibm.com/support/docview.wss?uid=swg27042973&aid=8(page
125)
The Appliance Dashboard shows a high-level view of current operations and statistics. One of these statistics is the current network activity.
Before enabling tracing, which set of steps may be used to diagnose an error if one of the configured application networks is showing unexpected results?
Answer : C
Which virtualization software could be used when planning on deploying a test environment on a laptop for ISAM for Mobile V8?
Answer : C
Reference:http://www-01.ibm.com/common/ssi/cgi-
bin/ssialias?infotype=AN&subtype=CA&htmlfid=897/ENUS213-435
When configuring one-time password in ISAM for Mobile. Customer A's requirements are to use a provider that generates a one-time password by using a specified algorithm with a time-based one-time password application.
Which provider is configured to meet customer A's one-time password requirements?
A. RSA -
B. MAC -
C. TOTP -
D. HOTP -
Answer : C //www- 01.ibm.com/support/knowledgecenter/SSELE6_8.0.0/com.ibm.ammob.doc_8.0/concept/otp .html(see TOTP)
How is sensitive information filtered from trace logs?
Answer : A
You are tasked with planning an ISAM for Mobile deployment for external clients. Requests between ISAM for Mobile Appliance and ISAM for Web components will be controlled via a firewall.
Assuming default ports are used, which ports do you need to open in the firewall to allow the ISAM for Mobile Appliance to function correctly?
Answer : C
What needs to be imported in order to enable the Security Access Manager for Mobile features?
Answer : C
Which member of the IBM Security Access Manager product family acts as a Policy
Enforcement Point(PEP)?
Answer : B,C
Reference:http://www-01.ibm.com/common/ssi/cgi-
bin/ssialias?infotype=an&subtype=ca&appname=gpateam&supplier=872&letternum=ENUS
AP14-0399 -
You are tasked with planning an ISAM for Mobile deployment for external clients.
What should be part of your plan?
Answer : D
What is the initial administrative account password of the appliance?
Answer : A
You are tasked with designing a solution that meets the following requirements:
1. Allow authenticated users to access web resources for transaction amounts less than
$1.000
2. Require additional authentication for transaction amounts greater than or equal to $1.000
Which features of ISAM for Mobile will help meet the above requirements when designing the plan to deploy ISAM for Mobile?
Answer : A
What is the minimum recommend virtual hardware setting?
Answer : C