[Free] 2017(Oct) Latesttests Dumpsleader IBM C2150-202 V13 Dumps with VCE and PDF Download 31-40

Latesttests 2017 Oct IBM Official New Released C2150-202 V13
100% Free Download! 100% Pass Guaranteed!
http://www.Latesttests.com/C2150-202 V13.html

IBM Security Access Manager for Mobile V8.0 Implementation

Question No: 31

Where would you browse in the ISAM for Mobile GUI to manually enable trace?

  1. Monitor Analysis and Diagnostics gt; Logs gt; Runtime Tracing

  2. Monitor Analysis and Diagnostics gt; Logs gt; Runtime Logging

  3. Secure Mobile Settings gt; Manage gt; Runtime Parameters gt; Runtime Status

  4. Secure Mobile Settings gt; Manage gt; Runtime Parameters gt; Runtime Logging

Answer: D

Question No: 32

Which two extensions does a fix pack have? (Choose two.)

  1. jar

  2. tar

  3. iso

  4. pkg

  5. gzip

Answer: A,D

Question No: 33

How much space is assigned to the primary partition after installing a new virtual appliance with 100GB of hard disk space?

  1. 50GB

  2. 75GB

  3. 90GB

  4. 100GB

Answer: B

Question No: 34

As the administrator for ISAM for Mobile, you are tasked with setting up risk based policies that allow access to resources outside of normal hours after additional authentication. The landing pages for the resources are on different servers that are in different domains. You add info.js to the landing pages for each resource.

Which mechanism should be used to ensure the risk based policies are evaluated correctly for each resource?

  1. Cross Site Scripting

  2. Cross Script Java Sharing

  3. Cross Site Request Forgery

  4. Cross Origin Resource Sharing

Answer: C

Question No: 35

When you use the web based (LMI) installation wizard, how does the appliance get the initial IP address of the management interface?

  1. Provided through DHCP

  2. Specified manually in the installation wizard

  3. Input through a keyboard on the front panel of the appliance

  4. Specified manually through a terminal connected to the appliance

Answer: B

Question No: 36

Which step should be completed after completing the installation wizard?

  1. Import the activation key

  2. Check for the latest fix packs

  3. Configure the Risk-based Access Policies

  4. Run the isaincfg tool to configure Mobile for use with a WebSEAL instance

Answer: D

Question No: 37

During testing and configuration activities in the development environment a security analyst mistakenly deleted some of the new attributes needed for one of the policies. The security analyst became aware of this mistake after deploying the changes.

Assuming the analyst followed best practices, which action restores the inadvertently deleted attributes?

  1. Use the quot;Roll Backquot; feature in the quot;Deploy Changesquot; dialogue

  2. Recreate the attributes from memory in the quot;Secure Mobile Settings / Policy /Attributesquot; section

  3. Restore the most recent Snapshot in the quot;Manage System Settings / System Settings / Snapshotsquot; screen

  4. Activate the other inactive partition under #39;Manage System Settings / Updates and Licensing / Firmware Settingsquot;

Answer: C

Question No: 38

Which reliable backup procedure is appropriate for cluster maintenance?

  1. Use appliance snapshots to back up the cluster

  2. Use VMWare snapshots to back up virtual machines

  3. Run pdbackupcluster utility after any change to the cluster configuration

  4. Complete a VMWare snapshot on each cluster member to effectively back up the cluster

Answer: A

Reference:http://www-

01.ibm.com/support/knowledgecenter/SSPREK_8.0.0.2/com.ibm.amweb.doc_8.0.0.2/admi n/concept/con_cluster_backup.html?lang=es

Question No: 39

Which two types of risk profiles are supported? (Choose two.)

  1. Custom risk profiles

  2. Obligated risk profiles

  3. Pre-defined risk profiles

  4. Content-based risk profiles

  5. Consent-based risk profiles

Answer: B,C

Reference:http://www-01.ibm.com/support/docview.wss?uid=swg27042973amp;aid=8(Chapter 2 Risk Management overview)

Question No: 40

Which two elements can be shown in the output of an IBM_SECURITY_CBA_AUDIT_RTE event? (Choose two.)

  1. majorStatus

  2. minorStatus

  3. appUserName

  4. globallnstanceld

  5. restManagement

  6. RESTInvocationURI

Answer: C,D

Reference:http://www- 01.ibm.com/support/knowledgecenter/SSELE6_8.0.0.5/com.ibm.isam.doc_8.0.0.5/audit/ref/ ref_security_cba_audit_rte_events.html

100% Free Download!
Download Free Demo:C2150-202 V13 Demo PDF
100% Pass Guaranteed!
Download 2017 Latesttests C2150-202 V13 Full Exam PDF and VCE

Latesttests ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Latesttests IT Certification PDF and VCE