Download IBM Security Access Manager V9.0 Deployment.C2150-609.ExamsKey.2018-10-03.41q.vcex

Vendor: IBM
Exam Code: C2150-609
Exam Name: IBM Security Access Manager V9.0 Deployment
Date: Oct 03, 2018
File Size: 150 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
The IBM Security Access Manager V9.0 deployment professional has enabled the Reverse proxy pdweb, sescache statistic to troubleshoot a problem. 
What is the problem?
  1. HTTP sessions are being timed our prematurely.
  2. HTTP requests are taking longer than expected.
  3. User sessions are terminated sooner than expected.
  4. Document caching is not as effective as anticipated.
Correct answer: B
Question 2
The deployed IBM Security Access Manager (ISAM) V9.0 solution in a company already contains a federated LDAP server. However, the dynamic group support is disabled. A deployment professional is required to change the existing federated LDAP server configuration to support the dynamic groups. 
How should the deployment professional do this?
  1. Re-federate the LDAP server with dynamic group support enabled
  2. Manually modify the ldap.conf file and add ‘dynamic-groups-enabled=yes’
  3. Manually modify the activedir.conf file and add ‘dynamic-groups-enabled=yes’
  4. Edit the federated directory configuration using LMI method and select the checkbox “Enable dynamic group”
Correct answer: B
Explanation:
Reference: http://www-01.ibm.com/support/docview.wss?uid=swg27043984&aid=12 (173)
Reference: http://www-01.ibm.com/support/docview.wss?uid=swg27043984&aid=12 (173)
Question 3
A company is using the embedded LDAP server to store IBM Security Access Manager V9.0 user data. However, there is a requirement to create another suffix to hold a set of user data. 
Which two suffix elements are supported when creating a top level entry for the suffix? (Choose two.)
  1. c
  2. l
  3. dn
  4. st
  5. cn
Correct answer: AB
Explanation:
Reference: http://www-01.ibm.com/support/docview.wss?uid=swg27043085&aid=10 (35)
Reference: http://www-01.ibm.com/support/docview.wss?uid=swg27043085&aid=10 (35)
Question 4
After a test cycle the deployment professional wants to search the WebSEAL WGA1 instance request log for HTTP 404 responses. 
Where can this log be found in the Local Management Interface?
  1. Monitor> Manage Reverse Proxy Log Files, select the WGA1 instance, select the request.log file and click View
  2. Monitor> Application Log Files, expand the var/logs/pdweb/WGA 1 folder, select the request.log file and click View
  3. From the Home page, click on the WGA1 instance in Reverse Proxy Health widget, select the request.log file and click View.
  4. Secure Web Settings> Reverse Proxy, select the WGA1 instance, access the Manage> Troubleshooting> Tracing menu item, select the request.log file and click View
Correct answer: B
Question 5
The appliance dashboard Reverse Proxy Health widget indicates a problem with the /snoop junction on the Test instance. 
Which log file can be examined to find product errors?
  1. agent.log
  2. referer.log
  3. request.log
  4. msg_webseald-test.log
Correct answer: C
Question 6
A customer has configured the IBM Security Access Manager V9.0 appliance authentication to an external LDAP server. The customer wants to allow support staff with LDAP accounts that are members of the HelpDesk group to view appliance and audit logs. 
Where should the deployment professional configure a new role and map it to the HelpDesk LDAP group for the support staff?
  1. Manage System Settings-> Management Delegation
  2. Manage System Settings-> Administrator Settings
  3. Manage System Settings-> Management Authorization
  4. Manage System Settings-> Management Authentication
Correct answer: B
Question 7
An attacker has compromised the private key associated with a certificate. 
Which two methods can be used to ensure that certificates have not been revoked by the Certification authority that issued it? (Choose two.)
  1. Public Key Information
  2. Online Status Certificate Protocol
  3. Online Certificate Status Protocol
  4. Certificate Rejection List located in LDAP
  5. Certificate Revocation List located in LDAP
Correct answer: AE
Question 8
A large bank has multiple applications protected by two identically configured WebSEAL servers. One junction supports a reporting application that frequently expenses performance issues which slows response time. The worst case results in the entire site becoming unresponsive when all WebSEAL worker threads on all WebSEAL instances are consumed on the junctions to this one reporting application. 
Which configuration change will prevent this situation from occurring without impacting the behavior of any other application (junction), and keeping the entire site up?
  1. Change worker-thread-hard-limit to 75 in WebSEAL configuration file on both WebSEAL servers.
  2. Use the “throttle” option on the “pdadmin server task” command for the reporting application junction on both WebSEAL instances.
  3. Use the –L 75 and –f options on the “pdadmin server task” command for the reporting application junction on both WebSEAL instances.
  4. Create a third WebSEAL instance supporting only this one reporting application and load balance requests across all three WebSEAL instances.
Correct answer: C
Question 9
A company has deployed an IBM Security Access Manager V9.0 solution for protecting web resources and has enabled auditing for monitoring purposes. A security deployment professional has observed that audit records are using large quantities of disk space due to the large number of audit events related to HTTP access. 
Which two strategies will help to reduce the volume of audit events in above scenario? (Choose two.)
  1. Generate audit records for specific groups only
  2. Generate events for unsuccessful HTTP accesses only
  3. Generating selective audit records using authorization rules
  4. Reconfigure WebSEAL to use CARS auditing, instead of native auditing.
  5. Selectively disable the generation of events by using attached protected object policies (POPs)
Correct answer: BE
Explanation:
Reference: http://www-01.ibm.com/support/docview.wss?uid=swg27049642&aid=1 (15)
Reference: http://www-01.ibm.com/support/docview.wss?uid=swg27049642&aid=1 (15)
Question 10
During testing of an application the deployment professional is receiving frequent alerts about high disk utilization. 
What action can be taken to resolve this issue?
  1. Enable log rotation and compression
  2. Resize the virtual disk and extend the active partition
  3. Configure the appliance to store log and trace to a remote server
  4. Enable the appliance background scheduler to clear unused log and trace files on a periodic basis.
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!