[Free] 2017(Oct) Latesttests Dumpsleader IBM C2150-202 V13 Dumps with VCE and PDF Download 11-20

Latesttests 2017 Oct IBM Official New Released C2150-202 V13
100% Free Download! 100% Pass Guaranteed!
http://www.Latesttests.com/C2150-202 V13.html

IBM Security Access Manager for Mobile V8.0 Implementation

Question No: 11

As the administrator for ISAM for Mobile, you are tasked with setting up a risk based policy to limit the ability for an attacker to use stolen credentials.

Which step should be taken in this situation?

  1. Setup a policy that requires silent device registration and delete the device registration for the stolen credentials

  2. Setup a policy that requires checking the isStolen attribute of the device and delete the device registration for the stolen credentials

  3. Setup a policy that requires OTP authentication prior to device registration and delete the device registration for the stolen credentials

  4. Setup a policy that requires UserID and Password authentication prior to device registration and delete the device registration for the stolen credentials

Answer: A

Reference:http://www- 01.ibm.com/support/knowledgecenter/SS4J57_6.2.2.6/com.ibm.tivoli.fim.doc_6226/rbaOve rviewFeatures.html

Question No: 12

Which two features require a product license key? (Choose two.)

  1. Access Manager for Web

  2. Access Manager for Mobile

  3. Access Manager Session Cache

  4. Access Manager for Load Balancing

  5. Access Manager Risk-based Authentication

Answer: A,B

Reference:http://www- 01.ibm.com/common/ssi/ShowDoc.wss?docURL=/common/ssi/rep_ca/6/897/ENUS214- 036/index.htmlamp;lang=enamp;request_locale=en

Question No: 13

Which two factors are relevant to capacity planning when using IBM Security Access Manager for Mobile as a separate appliance? (Choose two.)

  1. Total number of users

  2. Total new sessions per minute

  3. Authorization decisions per minute

  4. Authentication decisions per minute

  5. Throughput in megabytes per second

Answer: B,E

Question No: 14

Which system alert object can be added?

  1. SMS

  2. SMTP

  3. Event sog

  4. Remote syslog

Answer: D

Reference:http://www- 01.ibm.com/support/knowledgecenter/SSPREK_8.0.0.2/com.ibm.amweb.doc_8.0.0.2/admi n/task/alps_configuring_system_alerts.html?lang=zh-tw

Question No: 15

Testing and acceptance on virtual ISAM appliances has been completed and the Web security solution is promoted to the actual production environment.

In this production environment a set of physical ISAM appliances are protecting and servicing the company#39;s website. Although multiple appliances are setup and configured it is also good practice to make regular backups.

What would be the best possible solution to ensure that a recent backup is available?

  1. Install the Tivoli Storage Manager on the Appliance using the LMI and schedule weekly backups

  2. Schedule a weekly backup using the quot;Manage System Settings / System Settings / Backup or Restorequot; screen

  3. Swap the Active and Inactive partition weekly using the quot;Manage System Settings / Updates and Licensing / Firmware Settingsquot;

  4. Make weekly snapshots using quot;Manage System Settings / System Settings / Snapshotsquot; screen and download them to an external disk

Answer: D

Question No: 16

Which two authentication methods are available between ISAM Web and ISAM Mobile application interface? (Choose two.)

  1. SPNEGO

  2. IP address

  3. HTTP headers

  4. Client certificate authentication

  5. UserID and password authentication

Answer: C,E

Reference:http://www.ibm.com/developerworks/library/se-accessmanager/

Question No: 17

What are two categories of policy attributes? (Choose two.)

  1. Global

  2. Shared

  3. Subject

  4. Resource

  5. Application

Answer: A,D

Reference:http://www- 01.ibm.com/support/knowledgecenter/SSPREK_7.0.0/com.ibm.isam.doc_70/ameb_adminj ava_guide/concept/con_attr.html

Question No: 18

Which member of the IBM Security Access Manager product family provides form-based authentication?

  1. IBM Security Access Manager for Web

  2. IBM Security Access Manager for Mobile

  3. IBM Security Access Manager for Business Integration

  4. IBM Security Access Manager for Enterprise Single Sign-on

Answer: B

Question No: 19

What is the purpose of snapshots?

  1. To restore prior partitions to the appliance

  2. To restore prior firmware settings to the appliance

  3. To restore prior configuration or policy settings to the appliance

  4. To restore prior configuration and policy settings to the appliance

Answer: D

Question No: 20

Which component (if any) has only a single instance on the appliance?

  1. The console port

  2. The application port

  3. The management port

  4. All components are redundant.

Answer: D

100% Free Download!
Download Free Demo:C2150-202 V13 Demo PDF
100% Pass Guaranteed!
Download 2017 Latesttests C2150-202 V13 Full Exam PDF and VCE

Latesttests ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Latesttests IT Certification PDF and VCE