Monday, December 21, 2020

Pass IBM C2150-609 Exam with 100% Passing Assurance | Realexamdumps.com





 Question #:1


A customer has a developed an OAuth 2.0 Client application to access resources on behalf of a user. The

customer states that the OAuth client has the following two constraints:


1. The OAuth client is not capable of maintaining its credentials confidential for authentication with the

authorization server.


2. The resource owner does not have a trust relationship with the client

What is the suitable OAuth 2.0 grant type for the API Protection Policy if the user resource accessed by the

OAuth 2.0 client is to be protected by IBM Security Access Manager V9.0?


A. Implicit Grant

B. Client Credentials Grant

C. Authorization Code Grant

D. Resource Owner Password Credentials Grant


Answer: B


Question #:2


During installation WebSEAL provides a default certificate key database that is used to authenticate both

clients and junctioned servers.

Which stanza entry of the WebSEAL configuration file points to the default certificate key database (i.e. kdb

file)?



A. ssl-keyfile

B. jct-cert-keyfile

C. webseal-cert-keyfile

D. webseal-cert-keyfile-label


Answer: B


Question #:3


A company has a large number of users who use mobile applications. The company wants to implement

context-aware access controls for these resources.

Which module of IBM Security Access Manager V9.0 should the company enable to support this

requirement?


A. Federation module

B. Protocol Analysis module

C. Mobile Access Control modulo

D. Advanced Access Control module


Answer: A


Question #:4


A request for a virtual host junction shows an unexpected source IP address.

Which troubleshooting tool can be used to investigate this issue?


A. Host File

B. Snapshots

C. Support Files

D. Packet Tracing


Answer: A


Question #:5


An IBM Security Access Manager V9.0 deployment professional is charged with monitoring request response

times from WebSEAL to the backend. The deployment professional wants the flexibility to see response times

per request, per junction, per HTTP return code, or other criteria that may come up in the future.


What action will generate the required data for this analysis?


A. Customize the request.log to include response times

B. Run pdadmin "stats get pdweb.jct" on all junctions on a regular basis

C. Run pdadmin "stats get pdweb.https" and "stats get pdweb.http" on a regular basis

D. Write a REST API script to pull "application interface statistics" on a regular basis


Answer: D


Question #:17


A deployment professional attempts to log into an appliance which is part of a cluster to run pdadmin

commands and receives the following message:


pdadmin> login -a sec_master -p password


2016-03-03-02:04:38.683-06:001------0x1354A420 pdadmin ERROR ivc socket mtsclient.cpp 2376


0x7fc2b7b0c720


HPDCO1056E Could not connect to the server 192.168.254.11, on port 7135.


Error: Could not connect to the server. (status 0x1354a426)


What should the deployment professional check concerning the login target?


A. Login was attempted on a special node

B. Login was attempted on a restricted node

C. Login was attempted on a secondary master that has not been promoted to the primary

D. Login was attempted on a non-primary master of a cluster and the primary policy server is down


Answer: A


Question #:3


A customer is migrating from TAM v6.1 running on AIX to IBM Security Access Manager (ISAM) V9.0

hardware appliances.


Which information from the TAM v6.1 environment will be useful in sizing the new ISAM V9.0 hardware

configuration?


A. WebSEAL request logs

B. WebSEAL CDAS specifics

C. Number of LDAP replicas

D. Number of objects in the protected object space


Answer: D


No comments:

Post a Comment