IBM C2150-609 - IBM Security Access Manager V9.0 Deployment Exam
Page: 1 / 28
Total 138 questions
Question #1 (Topic: Topic 1)
A customer has a developed an OAuth 2.0 Client application to access resources on behalf of a user. The customer states that the OAuth client has the following
two constraints:
1. The OAuth client is not capable of maintaining its credentials confidential for authentication with the authorization server.
2. The resources owner does not have a trust relationship with the client.
What is the suitable OAuth 2.0 grant type for the API Protection Policy if the user resource accessed by the OAuth 2.0 client is to be protected by IBM Security
Access Manager V9.0?
two constraints:
1. The OAuth client is not capable of maintaining its credentials confidential for authentication with the authorization server.
2. The resources owner does not have a trust relationship with the client.
What is the suitable OAuth 2.0 grant type for the API Protection Policy if the user resource accessed by the OAuth 2.0 client is to be protected by IBM Security
Access Manager V9.0?
A. Implicit Grant
B. Client Credential Grant
C. Authorization Code Grant
D. Resource Owner Password Credentials Grant
Answer: B
Question #2 (Topic: Topic 1)
In a customer environment, a REST API client is being developed to carry out Reverse Proxy configuration and maintenance. As part of one of the activities the
customer needs to update the junction information with an additional Backend Server. The customer has written a REST API client but is not able to modify the
junction.
Which HTTP headers should the customer pass?
customer needs to update the junction information with an additional Backend Server. The customer has written a REST API client but is not able to modify the
junction.
Which HTTP headers should the customer pass?
A. Host, Authorization
B. Host, Accept: Application/json
C. Authorization, Accept: Application/json
D. content-type: application/json, Authorization
Answer: C
Question #3 (Topic: Topic 1)
During installation WebSEAL provides a default certificate key database that is used to authenticate both clients and junctioned servers.
Which stanza entry of the WebSEAL configuration file points to the default certificate key database (i.e. kdb file)?
Which stanza entry of the WebSEAL configuration file points to the default certificate key database (i.e. kdb file)?
A. ssl-keyfile
B. jct-cert-keyfile
C. webseal-cert-keyfile
D. webseal-cert-keyfile-label
Answer: C
Question #4 (Topic: Topic 1)
A company has a large number of users who use mobile applications. The company wants to implement context-aware access controls for these resources.
Which module of IBM Security Access Manager V9.0 should the company enable to support this requirement?
Which module of IBM Security Access Manager V9.0 should the company enable to support this requirement?
A. Federation module
B. Protocol Analysis module
C. Mobile Access Control module
D. Advanced Access Control module
Answer: D
Question #5 (Topic: Topic 1)
A request for a virtual host junction shows an unexpected source IP address.
Which troubleshooting tool can be used to investigate this issue?
Which troubleshooting tool can be used to investigate this issue?
A. Host File
B. Snapshots
C. Support Files
D. Packet Tracing
Answer: A