Welcome to download the newest Examwind 70-496 dumps:
Important Info — IBM C2150-202 new study guide are designed to help you pass the exam in a short time.Everything you need can be found in the new version IBM C2150-202 exam dumps.Visit Flydumps.com to get more valid information.
QUESTION 1
Which two features require a product license key? (Choose two.)
A. Access Manager for Web
B. Access Manager for Mobile
C. Access Manager Session Cache
D. Access Manager for Load Balancing
E. Access Manager Risk-based Authentication
Correct Answer: AB
QUESTION 2
You are tasked with designing a solution that meets the following requirements:
1.
Allow authenticated users to access web resources for transaction amounts less than $1.000
2.
Require additional authentication for transaction amounts greater than or equal to $1.000
Which features of ISAM for Mobile will help meet the above requirements when designing the plan to deploy ISAM for Mobile?
A. Custom attributes, Policy, OTP
B. Predefined attributes, Policy, OTP
C. Custom attributes, Policy, Device registration
D. Predefined attributes, Policy, Device registration
Correct Answer: A
QUESTION 3
As the administrator for ISAM for Mobile, you are tasked with setting up risk based policies that allow access to resources outside of normal hours after additional authentication. The landing pages for the resources are on different servers that are in different domains. You add info.js to the landing pages for each resource.
Which mechanism should be used to ensure the risk based policies are evaluated correctly for each resource?
A. Cross Site Scripting
B. Cross Script Java Sharing
C. Cross Site Request Forgery
D. Cross Origin Resource Sharing
Correct Answer: C
QUESTION 4
A security analyst has developed and successfully tested an adjusted Trusteer Policy Information Point (PIP) in the Development environment.
The next step is to deploy this new Trusteer PIP in the Acceptance environment so the proper testing can be executed.
How is this new Trusteer PIP deployed?
A. Log into the Environment Dashboard. Select the Trusteer PIP in the Development area and use the Propagate option to deploy in on the Acceptance environment.
B. Select on your Development environment in the “Secure Mobile Settings / Policy / Information Points” screen the Trusteer PIP, choose the Export option, move the file to the Acceptance environment and use the Import option on the equivalent screen.
C. Select on your Development environment in the “Secure Mobile Settings / Policy / Information Points” screen the Trusteer PIP, choose the Download option, move the file to the Acceptance environment and use the Upload option on the equivalent screen.
D. Select the Trusteer PI P in the “Secure Mobile Settings / Policy / Information Points” screen on the Development environment, use the Promote option to enable it to be received by another environment. Next login to the Acceptance environment and use the Receive option.
Correct Answer: D
QUESTION 5
Which two attributes may be automatically set during device registration? (Choose two.)
A. stepUp
B. deviceld
C. isRegistered
D. userConsent
E. authenticationLevel
Correct Answer: DE
QUESTION 6
Which member of the IBM Security Access Manager product family acts as a Policy Enforcement Point (PEP)?
A. IBM Tivoli Federated Identity Manager
B. IBM Security Access Manager for Web
C. IBM Security Access Manager for Mobile
D. IBM Security Access Manager of Enterprise Single Sign-on
Correct Answer: BC
QUESTION 7
Which rule must a policy include to require an unauthenticated user to consent to register a device?
A. The userConsent attribute is set to true and that permits access with Obligation Register Device.
B. The registeredDeviceCount is missing or set to zero and that permits access with Obligation Register Device.
C. The userConsent attribute is not present and that will permit access with Authentication Consent Register Device.
D. The riskScore attribute is below a configured threshold and that will permit access with ObligationRegister Device.
Correct Answer: D
QUESTION 8
Which three types of application logs are available? (Choose three.)
A. Fsck
B. Mga
C. Cluster
D. System
E. Performance
F. Management_ui
Correct Answer: BCF
QUESTION 9
Which two types of risk profiles are supported? (Choose two.)
A. Custom risk profiles
B. Obligated risk profiles
C. Pre-defined risk profiles
D. Content-based risk profiles
E. Consent-based risk profiles
Correct Answer: BC
QUESTION 10
How many DMZ network segments can the appliance support?
A. 2
B. 4
C. 6
D. 8
Correct Answer: A
QUESTION 11
Which two valid predefined obligations are provided to use in policy authoring? (Choose two.)
A. One-time password
B. Consent select device
C. Consent register device
D. Consent unregister device
E. POTP one-time password
Correct Answer: AC
QUESTION 12
What are two advantages of redundancy? (Choose two.)
A. Price
B. Security
C. Capacity
D. Reliability
E. Simplicity
Correct Answer: BC
QUESTION 13
A customer has the following limitation for OAuth2 workflow: OAuth clients shall keep their client credentials confidential when authenticating with the authorization server.
Which authorization grant type is suitable for this work flow limitation?
A. Client credential flow
B. Authorization code flow
C. Access token with refresh token flow
D. Client authorization code credential flow
E. Resource owner password credentials flow
Correct Answer: AB
QUESTION 14
Which component (if any) has only a single instance on the appliance?
A. The console port
B. The application port
C. The management port
D. All components are redundant.
Correct Answer: D
QUESTION 15
A highly-available deployment of IBM Security Access Manager for Mobile makes use of cluster configurations to replicate certain data from designated masters to configured nodes. Secondary masters are defined as failover points in the event that the primary master fails. Additional masters are defined to scale with growth or to meet redundancy needs.
In a four-master cluster, what would a failover from the primary master result in?
A. The secondary master assumes responsibility of primary master. During this time, configuration changes cannot be made. When the primary master is restored, transactional data is synchronized back to the primary master.
B. The failover scheduler selects the next master, which assumes responsibility of primary master. During this time, configuration changes cannot be made. When the primary master is restored, transactional data is synchronized back to the primary master.
C. The secondary master assumes responsibility of primary master. During this time, geolocation updates and configuration changes configuration changes may still be made. When the primary master is restored, transactional data is synchronized back to the primary master.
D. The tertiary master, which is primary master to the quaternary master, assumes responsibility of primary master. During this time, configuration changes configuration changes may not be made. When the primary master is restored, transactional data is synchronized back to the primary master.
Correct Answer: C
QUESTION 16
How is the IP reputation database updated?
A. Download a quarterly update from Fix Central
B. Configure automatic updates in the IP Reputation Database screen
C. Download the latest update from IBM X-Force and install as a fix pack
D. Configure IP Reputation Database updates in the Mobile Security Settings screen
Correct Answer: D
QUESTION 17
A security analyst created the following ISAM for Mobile policy and attached the policy to a protected resource: Precedence: Deny
-Attributes: Optional -Rule 1: If riskScore >40 or ipReputation has member Malware Then Deny
Access to the protected resource is always denied.
What should be done to troubleshoot the policy evaluation?
A. Add com.ibm.sec.auth.’=all to your trace string on the Monitor > Runtime Tracing. The trace file is available at Monitor > Application Log Files and then navigating to mga/runtime/trace.log in the file picker.
B. Add com.ibm.mga.auth.’=all to your trace string on the Monitor > Runtime Tracing. The trace file is available at Monitor > Application Log Files and then navigating to mga/runtime/trace.log in the file picker.
C. Add com.ibm.sec.authz.’=all to your trace string on the Monitor > Runtime Tracing. The trace file is available at Monitor > Application Log Files and then navigating to mga/runtime/trace.log in the file picker.
D. Add com.ibm.mga.authz.’=all to your trace string on the Monitor > Runtime Tracing. The trace file is available at Monitor > Application Log Files and then navigating to mga/runtime/trace.log in the file picker.
Correct Answer: C
QUESTION 18
Which protocol is used to access the hardware console through the network?
A. ssh
B. rlogin
C. Telnet
D. Remote desktop
Correct Answer: A QUESTION 19
You are tasked with planning an ISAM for Mobile deployment for external clients. Requests between ISAM for Mobile Appliance and ISAM for Web components will be controlled via a firewall.
Assuming default ports are used, which ports do you need to open in the firewall to allow the ISAM for Mobile Appliance to function correctly?
A. 80, 443
B. 443, 636
C. 389, 443
D. 443, 7135
Correct Answer: C QUESTION 20
What are two categories of policy attributes? (Choose two.)
A. Global
B. Shared
C. Subject
D. Resource
E. Application
Correct Answer: AD QUESTION 21
What is the minimum recommend virtual hardware setting?
A. One virtual network interface and 100 gigabytes of disk space
B. Two virtual network interfaces and 200 gigabytes of disk space
C. Three virtual network interfaces and 100 gigabytes of disk space
D. Four virtual network interfaces and 200 gigabytes of disk space
Correct Answer: C QUESTION 22
Which virtualization software could be used when planning on deploying a test environment on a laptop for ISAM for Mobile V8?
A. Xen
B. Microsoft Virtual PC
C. VMware Workstation
Examwind IBM C2150-202 material details are researched and created by the most professional certified authors who are regularly using current exams experience to create precise and logical dumps. You can get questions and answers from many other websites or books, but logic is the main key of success. And Examwind will give you this key of success.
Welcome to download the newest Examwind 70-496 dumps: http://www.examwind.com/70-496.html
http://www.ducktown.org/sasinstitute-a00-250-questions-and-answers-high-quality-sasinstitute-a00-250-dumps-pdf-on-our-store/