Which three methods can be used to create user groups in vRealize Operations? (Choose three.)

Which three methods can be used to create user groups in vRealize Operations? (Choose three.)A . The import user groups dialog in Access ControlB . The import user groups dialog in Authentication SourcesC . Add groups dialog in Access ControlD . The vRealize Operations product APIE . The import user...

February 4, 2019 No Comments READ MORE +

What is the suitable OAuth 2.0 grant type for the API Protection Policy if the user resource accessed by the OAuth 2.0 client is to be protected by IBM Security Access Manager V9.0?

The resources owner does not have a trust relationship with the client. What is the suitable OAuth 2.0 grant type for the API Protection Policy if the user resource accessed by the OAuth 2.0 client is to be protected by IBM Security Access Manager V9.0?A . Implicit GrantB . Client...

February 2, 2019 No Comments READ MORE +

Which Two troubleshooting commands under Tools in the application SSH interface can be used to validate the Reverse Proxy can successfully connect to the backend host: secure-port?

There is an SSL connectivity issue between the IBM Security Access Manager V9.0 Reverse Proxy and the backend business application. Which Two troubleshooting commands under Tools in the application SSH interface can be used to validate the Reverse Proxy can successfully connect to the backend host: secure-port? (Choose two.)A ....

January 29, 2019 No Comments READ MORE +

Which two configurations can the deployment professional use to achieve this?

A system is configured with two IBM Security Access Manager (ISAM) V9.0 reverse proxy servers behind a load balancer, and it is planned to use forms-based user authentication. It is a requirement that if a reverse proxy were to fail, users that were already logged in would not be required...

January 29, 2019 No Comments READ MORE +

Which utility tool will perform this configuration?

A company has deployed an IBM Security Manager V9.0 solution to protect web resources and now wants to secure access to enterprise resources from mobile devices. The security deployment professional needs to run a utility to configure the existing WebSEAL with the instance of the appliance that provides the authorization...

January 27, 2019 No Comments READ MORE +

Which task was the deployment professional performing?

Save the resulting .cer file onto local desktop Which task was the deployment professional performing?A . Renewing the embedded LDAP server certificateB . Replacing the embedded LDAP server certificateC . Creating a backup of the embedded LDAP server certificateD . Preparing to configure SSL for a local LDAP client to...

January 23, 2019 No Comments READ MORE +

Which two things need to be configured to achieve Single Log Out (SLO) in the SAML 2.0 Federation?

A deployment professional has configured Federated Single Sign-On using IBM Security Access Manager V9.0 with WebSEAL as point of contact. Which two things need to be configured to achieve Single Log Out (SLO) in the SAML 2.0 Federation? (Choose two.)A . The page displayed after pkmslogout is called (logout.html)B ....

January 16, 2019 No Comments READ MORE +

What is the problem?

The IBM Security Access Manager V9.0 deployment professional has enabled the Reverse proxy pdweb, sescache statistic to troubleshoot a problem. What is the problem?A . HTTP sessions are being timed our prematurely.B . HTTP requests are taking longer than expected.C . User sessions are terminated sooner than expected.D . Document...

January 9, 2019 No Comments READ MORE +

What can the deployment professional do to meet this requirement?

Multiple hostnames are mapped to a single IP address used by a WebSEAL instance, listening on the default HTTPS port. For each host name requested in the browser, WebSEAL needs to present a different certificate. What can the deployment professional do to meet this requirement?A . Configure WebSEAL to use...

January 9, 2019 No Comments READ MORE +

Which settings’ default value needs to be changed to prevent loss of data when using a SolidDB external database for the runtime?

Which settings’ default value needs to be changed to prevent loss of data when using a SolidDB external database for the runtime?A . Driver TypeB . Cluster ConfigC . Durability LevelD . Tuning ParametersView AnswerAnswer: C Explanation: Reference: https://www.ibm.com/support/knowledgecenter/en/SSELE6_8.0.0/com.ibm.ammob.doc_8.0/ task/tsk_deploy_extnl_hvdb.html

December 27, 2018 No Comments READ MORE +