Which configuration option will accomplish this?

A customer has deployed an IBM Security Access Manager V9.0 solution to protect web applications. After the initial authentication between the client and WebSEAL, WebSEAL can build a new Basic Authentication header and use the Cb option to provide the authenticated Security Access Manager user name (client’s original identity) together...

February 28, 2019 No Comments READ MORE +

Which pdadmin “server task” based steps will accomplish this?

An IBM Security Access Manager V9.0 Reverse Proxy has a stateful junction to a Portal application called “/wps” There is no web server in front of Portal. This junction has three Portal servers defined behind it. The Portal team needs to do maintenance on each of the three servers. The...

February 27, 2019 No Comments READ MORE +

What should the deployment professional check concerning the login target?

A deployment professional attempts to log into an appliance which is part of a cluster to run pdadmin commands and receives the following message: pdadmin> login-a sec_master Cp password 2016-03-03-02:04:38:.683-06:001 ---0x1354A420 pdadmin ERROR ivc socket mtsclient.cpp 2376 0x7fc2b7b0c720 HPDCO1056E Could not connect to the server 192.168.254.11, on port 7135. Error:...

February 25, 2019 No Comments READ MORE +

How should the deployment professional do this?

The deployed IBM Security Access Manager (ISAM) V9.0 solution in a company already contains a federated LDAP server. However, the dynamic group support is disabled. A deployment professional is required to change the existing federated LDAP server configuration to support the dynamic groups. How should the deployment professional do this?A...

February 21, 2019 No Comments READ MORE +

Which two suffix elements are supported when creating a top level entry for the suffix?

A company is using the embedded LDAP server to store IBM Security Access Manager V9.0 user data. However, there is a requirement to create another suffix to hold a set of user data. Which two suffix elements are supported when creating a top level entry for the suffix? (Choose two.)A...

February 19, 2019 No Comments READ MORE +

authority that issued it?

An attacker has compromised the private key associated with a certificate. Which two methods can be used to ensure that certificates have not been revoked by the Certification authority that issued it? (Choose two.)A . Public Key InformationB . Online Status Certificate ProtocolC . Online Certificate Status ProtocolD . Certificate...

February 17, 2019 No Comments READ MORE +

Which two strategies will help to reduce the volume of audit events in above scenario?

A company has deployed an IBM Security Access Manager V9.0 solution for protecting web resources and has enabled auditing for monitoring purposes. A security deployment professional has observed that audit records are using large quantities of disk space due to the large number of audit events related to HTTP access....

February 12, 2019 No Comments READ MORE +

Which log file can be examined to find product errors?

The appliance dashboard Reverse Proxy Health widget indicates a problem with the /snoop junction on the Test instance. Which log file can be examined to find product errors?A . agent.logB . referer.logC . request.logD . msg_webseald-test.logView AnswerAnswer: C

February 12, 2019 No Comments READ MORE +

How should the disk space occupied by the several large support files be reduced?

How should the disk space occupied by the several large support files be reduced?A . Configure automatic roll over of support files using the LMIB . Download the support files and delete them from the applianceC . Download the support files which will also delete them from the applianceD ....

February 12, 2019 No Comments READ MORE +

Which parameter needs to be added to the configuration file so that “Third Party Not Responding” error page is not rendered and the user is connected to the backend server that is responding?

A stateful junction /WebApp is added to a Web reverse proxy instance with two backend HTTP servers. When one of the backend server stops responding to the requests, the users are getting the “Third Party Not Responding” error message even though one of the backend server continues to respond. Which...

February 5, 2019 No Comments READ MORE +