The web security department of an organization has found that their site is vulnerable to Denial of Service, Brute Force, Buffer Overflow and decided to use the Web Application Firewall (WAF) feature available in IBM Security Access Manager V9.0.
Even after enabling WAF, the site is still vulnerable to the above attacks. The deployment professional is pretty sure that the signature for these attacks have been released and has decided to check for X-Force updates.
How should the deployment professional check and update this?
A. Using CLI, firmware -> ips_updt_install
B. Using CLI, updates -> xforce_updt_install
C. Using LMI, Manage System Settings -> Updates and Licensing -> Available Updates
D. Using LMI, Manage System Settings -> Updates and Licensing -> Intrusion Prevention updates
A network contains an additional network segment between the user segment and the appliance. This causes traffic to flow in and out on different interfaces.
How can this be overcome?
A. Use static route
B. Use a default gateway
C. Use vector based routing
D. Use Virtual Host junctions
Which one is supported to externalize the Advanced Access Control runtime database?
A. DB2
B. MySQL
C. PostgreSQL
D. Berkeley DB
To configure IBM Security Access Manager V9.0 for Windows desktop single sign-on using Kerberos authentication, the Reverse Proxy's identity in the Active Directory Kerbros Domain must be associated with a Service Principal name (SPN).
Given the following information:
AD Kerberos Realm Name: company.com ISAM Reverse Proxy DNS Domain: ws1.company.com
What is the correct SPN?
A. HTTP/ws1.company.com
B. HTTP/[email protected]
C. HTTP/[email protected]
D. HTTP/[email protected]
In a testing environment of an organization where IBM Security Access Manager V9.0 is deployed, there is a requirement that the reverse proxy instance should listen on port 10443 on all the configured network interfaces. The appliance is configured with only two management interfaces.
How can the deployment professional achieve this?
A. During configuration of runtime environment, assign IP 0.0.0.0 to primary interface.
B. During configuration of a new reverse proxy instance, assign IP 0.0.0.0 to primary interface.
C. During configuration of a reverse proxy instance, add a secondary interface with IP 255.255.255.255
D. During configuration of a reverse proxy instance, assign one of the management IPs to the primary interface
A development professional needs to set up automatic monitoring for the Appliance Event log.
Which method should be used to accomplish this?
A. Use the Event Log Start Live Streaming
B. Implement a monitoring solution using a REST API
C. Log into the Admin Console and tail the event log
D. Access the appliance via sftp and retrieve the log file
A deployment professional needs to achieve sign-on between Virtual Host Junctions https://abc.ibm.com and https://xyz.ibm.com which are on separate WebSEAL instances.
Which option requires the least amount of configuration and no changes to the application?
A. Use the Distributed Session Cache
B. Use Cross-Domain Single Sign-On (CDSSO)
C. Use the option "use-same-session = yes"
D. Use the option "shared-domain-cookie = xyz.ibm.com"
An older, software based deployment has several active Policy Servers set up behind a load-balancer.
An IBM Security Access Manager V9.0 appliance cluster supports how many active Policy Servers?
A. 1
B. 2
C. 3
D. 4
An IBM Security Access Manager (ISAM) V9.0 environment is defined with multiple WebSEAL servers defined for high availability. They protect the same set of backend junctions.
Which parameter needs to be configured in each WebSEAL's configuration file to force all replicated WebSEAL servers to perform authorization checks against the same protected object space?
A. host-name
B. server-name
C. domain-name
D. virtual-host-name
A company is concerned that it possesses data in the user registry which belongs to several companies that are sharing an IBM Security Access Manager (ISAM) V9.0 deployment. The ISAM deployment professional wants to separate the user registry data so there is no data overlap and data integrity is maintained.
How can this be achieved in an ISAM environment?
A. By configuring junctions
B. By creating custom domains
C. By applying authorization rules
D. By using appropriate authentication methods
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IBM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C2150-609 exam preparations and IBM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.