IBM C2150-202 - IBM Security Access Manager for Mobile V8.0 Implementation Exam
Page: 2 / 14
Total 70 questions
Question #6 (Topic: )
You are tasked with designing a solution that meets the following requirements:
1. Allow authenticated users to access web resources during normal business hours
2. Require additional OTP authentication for access outside business hours
3. Lockout a user after three invalid OTP authentication attempts
4. Automatically unlock the user after five minutes
Which features of ISAM for Mobile will help meet these requirements when designing the
plan to deploy ISAM for Mobile?
1. Allow authenticated users to access web resources during normal business hours
2. Require additional OTP authentication for access outside business hours
3. Lockout a user after three invalid OTP authentication attempts
4. Automatically unlock the user after five minutes
Which features of ISAM for Mobile will help meet these requirements when designing the
plan to deploy ISAM for Mobile?
A. Risk profile,OTP,Policy
B. Device registration,OTP,Policy
C. Risk profile,OTP,Policy,Advanced configuration
D. Device registration,OTP,Policy,Advanced configuration
Answer: C
Question #7 (Topic: )
Which two audit event types record actions such as creation of risk profiles and device
registration? (Choose two.)
registration? (Choose two.)
A. IBM_SECURITY_RUNTIME_MGMT
B. IBM_SECURITY_CBA_AUDIT_RTE
C. IBM_SECURITY_CBA_AUDIT_MGMT
D. IBM_SECURITY_CBA_AUDIT_AUTHZ
E. IBM_SECURITY_RTSS_AUDIT_MGMT
Answer: C
Question #8 (Topic: )
Where are SSL certificate databases managed in ISAM for Mobile web console?
A. Manage System Settings > Secure Settings > Certificates
B. Manage Security Settings > System Settings > Certificates
C. Manage System Settings > Secure Settings > SSL Certificates
D. Manage Security Settings > System Settings > SSL Certificates
Answer: C
Question #9 (Topic: )
You have recently installed the latest general available fix pack. All known tests where
passed successfully. However after a few weeks some field reports come in quoting that
one of the previous working features fails. Extra testing on this specific feature learns that
the new fix pack introduced a bug. You raise a PMR. however your business would like you
to resolve this issue directly by drawing back this fix pack update.
Which step will solve this issue?
passed successfully. However after a few weeks some field reports come in quoting that
one of the previous working features fails. Extra testing on this specific feature learns that
the new fix pack introduced a bug. You raise a PMR. however your business would like you
to resolve this issue directly by drawing back this fix pack update.
Which step will solve this issue?
A. Activate the other partition
B. Install an older fix pack that lacks this bug
C. Use the reset button using a paperclip during reboot
D. Use the Promote Option on your development appliance to make it a production appliance
Answer: B
Question #10 (Topic: )
A security analyst has developed and successfully tested an adjusted Trusteer Policy
Information Point (PIP) in the Development environment.
The next step is to deploy this new Trusteer PIP in the Acceptance environment so the
proper testing can be executed.
How is this new Trusteer PIP deployed?
Information Point (PIP) in the Development environment.
The next step is to deploy this new Trusteer PIP in the Acceptance environment so the
proper testing can be executed.
How is this new Trusteer PIP deployed?
A. Log into the Environment Dashboard. Select the Trusteer PIP in the Development area and use the Propagate option to deploy in on the Acceptance environment.
B. Select on your Development environment in the "Secure Mobile Settings / Policy / Information Points" screen the Trusteer PIP,choose the Export option, move the file to the Acceptance environment and use the Import option on the equivalent screen.
C. Select on your Development environment in the "Secure Mobile Settings / Policy / Information Points" screen the Trusteer PIP,choose the Download option, move the file to the Acceptance environment and use the Upload option on the equivalent screen.
D. Select the Trusteer PI P in the "Secure Mobile Settings / Policy / Information Points" screen on the Development environment, use the Promote option to enable it to be received by another environment. Next login to the Acceptance environment and use the Receive option.
Answer: D