[Free] 2017(Oct) Latesttests Dumpsleader IBM C2150-202 V13 Dumps with VCE and PDF Download 41-50

Latesttests 2017 Oct IBM Official New Released C2150-202 V13
100% Free Download! 100% Pass Guaranteed!
http://www.Latesttests.com/C2150-202 V13.html

IBM Security Access Manager for Mobile V8.0 Implementation

Question No: 41

Which rule must a policy include to require an unauthenticated user to consent to register a device?

  1. The userConsent attribute is set to true and that permits access with Obligation Register Device.

  2. The registeredDeviceCount is missing or set to zero and that permits access with Obligation Register Device.

  3. The userConsent attribute is not present and that will permit access with Authentication Consent Register Device.

  4. The riskScore attribute is below a configured threshold and that will permit access with ObligationRegister Device.

Answer: D

Reference:http://www.ibm.com/developerworks/library/se-accessmanager/

Question No: 42

Which two valid predefined obligations are provided to use in policy authoring? (Choose two.)

  1. One-time password

  2. Consent select device

  3. Consent register device

  4. Consent unregister device

  5. POTP one-time password

Answer: A,C

Question No: 43

Which three actions are available underfirmare settings? (Choose three.)

  1. Edit

  2. Set active

  3. Set inactive

  4. Create backup

  5. Restore backup

  6. Configure partition G Unconfigure partition

Answer: A,B,D

Reference:http://www- 01.ibm.com/support/knowledgecenter/SSPREK_7.0.0/com.ibm.isam.doc_70/ameb_webse al_appl_pdf.pdf(page 269)

Question No: 44

Which protocol is used to access the hardware console through the network?

  1. ssh

  2. rlogin

  3. Telnet

  4. Remote desktop

Answer: A

Question No: 45

Which two dashboard widgets can be used for troubleshooting the ISAM for Mobile appliance? (Choose two.)

  1. Certificate expiry

  2. Reverse proxy health

  3. Reverse proxy output

  4. Firmware information

  5. Application interfaces

Answer: A,E

Question No: 46

How is NIST SP800-131a compliance configured?

  1. Enable NIST SP800 mode, disable FIPS mode

  2. Enable NIST mode, set FIPS to active mode, enable TLS 1.2

  3. Enable NIST mode, disable FIPS mode, optionally enable TLS 1.2

  4. Enable FIPS mode, set the tuning parameter to strict mode, optionally enable TLS 1.2

Answer: A

Question No: 47

What is the correct series of activities needed to deploy ISAM for Mobile on a virtual machine?

  1. Unbox the appliance, place it in the rack, connect all peripherals Download iso-file from Passport Advantage

    Burn CD from iso-file Power on the machine

    Follow instructions on the screen

  2. Create a virtual machine

    Download zip-file from Passport Advantage and unzip it Burn CD from iso-file

    Power on the machine

    Follow instructions on the screen

  3. Create a virtual machine

    Download zip-file from Passport Advantage and unzip it Power on the machine

    Click setup.exe

    Follow instructions on the screen

  4. Create a virtual machine

Download iso-file from Passport Advantage Mount the iso on the machine

Power on the machine

Follow instructions on the screen

Answer: A

Question No: 48

What are two advantages of redundancy? (Choose two.)

  1. Price

  2. Security

  3. Capacity

  4. Reliability

  5. Simplicity

Answer: B,C

Question No: 49

Which advanced configuration key value should be modified to specify the authentication level for consent-based device registration?

  1. consentDeviceRegistration.authLevelEnabled

  2. consentDeviceRegistration.authLevelHeaderValue

  3. consentDeviceRegistration.authenticationLevelHeaderValue

  4. consentDeviceRegistration.authenticationLevelHeaderEnabled

Answer: D

Reference:http://www-01.ibm.com/support/docview.wss?uid=swg27042973amp;aid=8(page 125)

Question No: 50

The Appliance Dashboard shows a high-level view of current operations and statistics. One of these statistics is the current network activity.

Before enabling tracing, which set of steps may be used to diagnose an error if one of the configured application networks is showing unexpected results?

  1. Expand the network interfaces widget and double-click the suspected interface. Filter the results by condition. Select the first error result and view the trace to identify the error.

  2. Expand the system notifications widget and click the interface errors link. Click the link for theproblematic interface to open the application log. Move backwards in time up to the point of the error.

  3. Expand the network traffic widget and click the suspected interface. Filter the results by errorcondition. Select the first result and then click view log. Navigate through the filtered log entries to identify the error.

  4. Expand the network traffic widget and click the suspected interface. Increase the range to identifywhen the unexpected behavior began. Open the application log and move backwards in time up to the point of the error.

Answer: C

100% Free Download!
Download Free Demo:C2150-202 V13 Demo PDF
100% Pass Guaranteed!
Download 2017 Latesttests C2150-202 V13 Full Exam PDF and VCE

Latesttests ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Latesttests IT Certification PDF and VCE