Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following C2150-609 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

C2150-609 Exam Dumps - IBM Security Access Manager V9.0 Deployment

Question # 4

The request in a customer environment is IDP Initiated unsolicited SSO. The initial URL is:

https://POCIDP/FIM/sps/saml2idp/sam120/logininitial? RequestBinding=HTTPPost &Partnerld=https://POCSP/isam/sps/abc/saml20 &NameIdFormat=email

The POCIDP is Point of Contact for Identity Provider and POCSP is Point of Contact for Service Provider. The customer wants to configure TargetURL within the Service Provide' Federation configuration in IBM Security Access Manager V9.0.

What will satisfy this requirement?

A.

poc.signin.responseTargetURL

B.

Target_URL in the mapping rule

C.

Federation Runtime property TargetURL

D.

itfim_override_targeturl_attr in the mapping rule

Full Access
Question # 5

What are two key benefits of deploying IBM Security Access Manager V9.0? (Choose two.)

A.

Session Management Server module

B.

Enhanced user life-cycle management

C.

Enhanced Session Recording features

D.

Federated Single Sign On capabilities

E.

Secure user access to web and mobile applications

Full Access
Question # 6

The IBM Security Access Manager (ISAM) V9.0 LMI SSL certificate is auto-generated by default.

When the LMI certificate is due to expire, how is it renewed?

A.

The ISAM Appliance will renew LMI certificate automatically.

B.

The ISAM deployment professional must issue reset_lmi_cert using command line interface

C.

The ISAM deployment professional must re-generate it using LMI Manage System Settings -> SSL panels.

D.

The ISAM deployment professional must create a new self sign certificate using LMI Manage System Settings -> SSL panels.

Full Access
Question # 7

A customer has deployed an IBM Security Access Manager V9.0 solution to protect web applications. After the initial authentication between the client and WebSEAL, WebSEAL can build a new Basic Authentication header and use the —b option to provide the authenticated Security Access Manager user name (client's original identity) together with a predefined static password across the junction to the back-end server.

Which configuration option will accomplish this?

A.

–b gso

B.

–b filter

C.

–b ignore

D.

–b supply

Full Access
Question # 8

What feature or capability of IBM Security Access Manager V9.0 can be utilized for inserting a static (pre-defined) HTTP header tag/value pair into the request flowing from WebSEAL to the backend application?

A.

HTTP Transformation rule

B.

HTTP-Tag-Value extended attribute

C.

AuthzRule in LMI Policy Administration

D.

[header-names] stanza in WebSEAL conf file

Full Access
Question # 9

A customer is migrating from TAM v6.1 running on AIX to IBM Security Access Manager (ISAM) V9.0 hardware appliances.

Which information from the TAM v6.1 environment will be useful in sizing the new ISAM V9.0 hardware configuration?

A.

WebSEAL request logs

B.

WebSEAL CDAS specifics

C.

Number of LDAP replicas

D.

Number of objects in the protected object space

Full Access
Question # 10

The IBM Security Access Manager (ISAM) V9.0 deployment professional tries to login to the LMI and discovers user "admin" no longer works, even though the correct password is also provided. The ISAM deployment professional must use "admin@local”.

What ISAM application configuration change has occurred to cause this behavior?

A.

The LMI certificate has expired.

B.

The LMI Dashboard was incorrectly configured.

C.

Management Authorization has been configured.

D.

Management Authentication has been configured.

Full Access
Question # 11

An IBM Security Access Manager (ISAM) V9.0 environment is defined with multiple WebSEAL servers defined for high availability. They protect the same set of backend junctions.

Which parameter needs to be configured in each WebSEAL's configuration file to force all replicated WebSEAL servers to perform authorization checks against the same protected object space?

A.

host-name

B.

server-name

C.

domain-name

D.

virtual-host-name

Full Access
Question # 12

The customer currently maintains all its users in Active Directory. As part of its new IBM Security Access Manager (ISAM) V9.0 deployment, the customer understands it will have to implement the ISAM "Global Sign-on (GSO)" to achieve SSO with certain backend applications which do their own authentication and cannot be modified.

Which federated repositories configuration will address the customer requirements?

A.

Use an external ISDS LDAP as the ISAM Primary LDAP, federate with the AD and import all AD users into the ISAM TDS

B.

Configure the AD as the ISAM Primary LDAP, which will create the necessary secauthority=default suffix. Import all users into the ISAM AD

C.

Use the ISAM embedded LDAP as the Primary LDAP, federate with the AD and configure "basic user", and specify "basic-user-principal-attribute = samAccountName"

D.

Use an external ISDS LDAP as the Primary LDAP, federate with the AD, configure "basic user”, specify "basic-user-principal-attribute = samAccountName" and "basic-user-search-suffix = secauthority=default"

Full Access
Question # 13

An IBM Security Access Manager V9.0 deployment professional needs to create the HTTP-Tag-Value attribute to pass values to a backend server as headers.

How can this be done?

A.

By creating an HTTP rule which is attached to the ACL

B.

By creating an AuthzRule which pulls the header from the ADI

C.

By creating an extended attribute on a POP protecting the junction

D.

By creating an extended attribute on the junction protected object

Full Access
Question # 14

The IBM Security Access Manager V9.0 deployment professional has enabled the Reverse Proxy pdweb.sescache statistic to troubleshoot a problem.

What is the problem?

A.

HTTP sessions are being timed out prematurely.

B.

HTTP requests are taking longer than expected.

C.

User sessions are terminated sooner than expected.

D.

Document caching is not as effective as anticipated.

Full Access
Question # 15

As part of installing a fixpack a deployment professional wants to back up the appliance configuration.

How is this done?

A.

Click on the Create Backup link of the active partition

B.

Select the active partition, select the Backup option from the Edit menu

C.

Create a new snapshot, download the snapshot to the deployment professional's workstation, install the fixpack

D.

Install the fixpack. The installation will copy the configuration and install the fixpack to the inactive partition, set it active and restart

Full Access
Question # 16

A deployment professional needs to configure a JavaScript into an application before a user can access a resource protected by an IBM Security Access Manager V9.0 Advanced Access Control policy which calculates a Risk Score.

What is the name of this JavaScript?

A.

info.js

B.

init_acc.js

C.

setup_riskscore.js

D.

dynamic.attributes.js

Full Access
Question # 17

A deployment professional has a requirement to configure an OpenID Connect federation which does not allow the Relying Party to access the token endpoint.

Which grant type must be enabled when creating the federation?

A.

Implicit

B.

Refresh Token

C.

Client Credentials

D.

Authorization code

Full Access
Question # 18

A system is configured with two IBM Security Access Manager (ISAM) V9.0 reverse proxy servers behind a load balancer, and it is planned to use forms-based user authentication. It is a requirement that if a reverse proxy were to fail, users that were already logged in would not be required to log in again.

Which two configurations can the deployment professional use to achieve this? (Choose two.)

A.

Configure the system to use LTPA cookies

B.

Configure the system to use session cookies

C.

Configure the system to use failover cookies

D.

Configure the system to use the global signon (GSO) cache

E.

Configure the system to use the Distributed Session Cache (DSC)

Full Access
Question # 19

The customer requires high availability of its IBM Security Access Manager (ISAM) V9.0 WebSEAL infrastructure. The environment includes two WebSEAL appliances, two appliances for Policy Server and other ISAM services. All ISAM appliances are configured into a cluster which includes replicating the ISAM runtime and certificate files, the Policy Server, Runtime and Configuration databases, and the Distributed Session Cache. The complete LDAP configuration uses the embedded LDAP and externally federated IBM Security Directory Server (ISDS).

Which failover scenario is supported with this configuration?

A.

The embedded LDAP on the WebSEAL appliances is available in read-only mode if the Primary Policy Server is unavailable.

B.

Policy Server failover is automatic without manual intervention and the WebSEALs automatically detect the new active Policy Server.

C.

An LDAP federation implies high availability therefore the external ISDS is always available with no additional configuration.

D.

Distributed Session Cache (DSC) failover requires manual intervention at which point the WebSEALs automatically detect the new active DSC.

Full Access
Question # 20

A deployment professional in charge of a large deployment with replicated reverse proxy instances needs to keep junctions, template files, and configuration settings in sync between the instances.

How can this be done?

A.

Setup appliance clustering and issue server sync all

B.

Setup appliance clustering and issue server cluster sync

C.

Setup a master reverse proxy instance and issue server task source-instance sync target-instance

D.

Setup a master reverse proxy instance and issue server task target-instance sync source-instance

Full Access