Download IBM Security Access Manager V9.0 Deployment.C2150-609.ExamTopics.2025-05-13.66q.vcex

Vendor: IBM
Exam Code: C2150-609
Exam Name: IBM Security Access Manager V9.0 Deployment
Date: May 13, 2025
File Size: 332 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
A customer has a developed an OAuth 2.0 Client application to access resources on behalf of a user. The customer states that the OAuth client has the following two constraints:
  1. The OAuth client is not capable of maintaining its credentials confidential for authentication with the authorization server.
  2. The resources owner does not have a trust relationship with the client.
What is the suitable OAuth 2.0 grant type for the API Protection Policy if the user resource accessed by the OAuth 2.0 client is to be protected by IBM Security Access Manager V9.0?
  1. Implicit Grant
  2. Client Credential Grant
  3. Authorization Code Grant
  4. Resource Owner Password Credentials Grant
Correct answer: B
Question 2
An IBM Security Access Manager V9.0 Reverse Proxy has a stateful junction to a Portal application called "/wps" There is no web server in front of Portal. This junction has three Portal servers defined behind it. The Portal team needs to do maintenance on each of the three servers. The team wants to accomplish with least impact to end users.
Which pdadmin "server task" based steps will accomplish this?
  1. Stop a server, have Portal team apply maintenance, bring server online-repeat for the other two servers.
  2. Delete a server, have Portal team apply maintenance then add server back-repeat for the other two servers.
  3. Take a server offline, have Portal team apply maintenance, bring server online- repeat for the other two servers.
  4. Throttle a server, ensure activity has ceased for that server, have Portal team apply maintenance, bring server online-repeat for the other two servers.
Correct answer: C
Question 3
A customer wants to replace an IBM Security Access Manager V7.0 Session Management Server with the ISAM 9.0 Distributed Session Cache.
Which DSC configuration must be completed to allow SSL communication?
  1. Create new replica set
  2. Configure DSC to listen on port 443
  3. Select "Support internal clients only" in the Session Cache tab of the LMI.
  4. Select "Enable SSL" and choose a certificate in the Session Cache tab of the LMI.
Correct answer: A
Question 4
A customer's IBM Security Access Manager V9.0 deployment consists of reverse proxy appliances situated in the DMZ and primary master and secondary master appliances situated in the internal corporate network.
Which port and direction of the network traffic flow is required to support cluster services between the appliances situated in the DMZ and the internal corporate network segment?
  1. Port 22; Bidirectional
  2. Port 22; Unidirectional
  3. Port 2020; Bidirectional
  4. Port 2020; Unidirectional
Correct answer: B
Question 5
A customer received a replacement hardware appliance, but on boot up it has a different firmware than that for IBM Security Access Manager (ISAM) V9.0. The appliance needs to be flashed to ISAM V9.0. The appliance needs to be rebooted with a bootable USB drive formatted as FAT32.
Which file format is needed to create the bootable drive?
  1. .iso
  2. .ova
  3. .pkg
  4. .img
Correct answer: A
Question 6
A customer has expressed the requirement that users accessing online-banking application must first authenticate using a userid/password and successfully enter a one-time PIN which is texted to a cell phone.
Which two IBM Security Access Manager (ISAM) V9.0 modules are required to fully implement the solution? (Choose two.)
  1. ISAM PAM Module
  2. ISAM Cloud Module
  3. ISAM Federation Module
  4. ISAM Advanced Control Module
  5. ISAM Access Manager Platform
Correct answer: CE
Question 7
What are two capabilities of Security Access Manager Platform of IBM Security Access Manager V9.0? (Choose two.)
  1. Single Sign On
  2. Identity mediation
  3. Credential Lease Management
  4. Session Recording and Playback
  5. User Access Management of web, mobile and cloud applications
Correct answer: AC
Question 8
A company wants to use a different authentication option than username and password to access the company's web portal. The security deployment professional is in the process of deploying an IBM Security Access Manager 9.0.0 solution for the company to protect its web portal.
Which authentication method should the deployment professional consider?
  1. NTLM Authentication
  2. Basic Authentication
  3. Form based Authentication
  4. Client-side certificate authentication
Correct answer: B
Question 9
A risk officer of an organization discovered that a site protected by the IBM Security Access Manager V9.0 solution might be vulnerable to common attacks like cross-site scripting (XSS) and SQL injection.
Which optional component should be configured to protect against these attacks?
  1. Federation
  2. Secure Web Settings
  3. Advanced Access Control
  4. Web Application Firewall
Correct answer: C
Question 10
The IBM Security Access Manager (ISAM) V9.0 deployment professional is setting up a new junction. The back-end junctioned server listens on port 443 (SSL), but does not require mutual certificate authentication.
Which keystore does the deployment professional need to update?
  1. The WebSEAL signer certificate needs to be imported into the keystore used by the back-end server.
  2. The WebSEAL Test-Only certificate needs to be imported into the keystore used by the back-end server.
  3. The back-end signer certificate needs to be imported into the WebSEAL keystore on the ISAM appliance.
  4. The back-end signer certificate needs to be imported into the "Imi_trust_store" keystore on the ISAM appliance.
Correct answer: A
Question 11
The IBM Security Access Manager (ISAM) V9.0 deployment professional is attempting to strike the correct balance between ease of administration/configuration and security, and wants to limit where in the environment security policy can be changed.
On which ISAM component is the Secure Web Settings -> Policy Administration tool automatically disabled?
  1. Runtime cluster restricted node
  2. Master External Reference Entity
  3. Distributed Session Cache primary node
  4. Runtime cluster Standby Policy Server node
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!