[Free] 2018(Jan) Dumps4cert Pass4sure IBM C2150-201 Dumps with VCE and PDF Download 21-30

Dumps4cert.com : Latest Dumps with PDF and VCE Files 2018 Jan IBM Official New Released C2150-201
100% Free Download! 100% Pass Guaranteed!

Fundamentals of Applying IBM Security Systems Identity and Access Assurance

Question No: 21

What is the advantage of using a token based authentication model?

  1. Better audit controls

  2. Strong authentication

  3. Simplifies the authorization process

  4. Easier to integrate legacy applications

Answer: A

Question No: 22

A division is a part of the federal ministry of commerce in Country A. The federal ministry of taxes is the designated identity provider (IdP) for all ministries in Country A. The division wants to use this IdP functionality for their new web portal to improve the compensation requests. The new web portal is the most important business project at this division.

The security officer of the division wants to resolve the problem of accumulated access rights for all employees at the division. He also needs to streamline the approvals for access to financial applications.

The security officer found out that audit trails of the financial applications are not centrally collected, and not used for any reporting.

Which combination of products out of the IBM Security Identity and Access Assurance offering would you recommend to be implemented?

  1. QRadar SIEM. IBM Security Identity Manager. Tivoli Federated Identity Manager

  2. QRadar Log Manager. Tivoli Federated Identity Manager. IBM Security Identity Manager

  3. QRadar SIEM, Tivoli Federated Identity Manager, IBM Security Access Manager for Web

  4. QRader Log Manager, IBM Security Access Manager for Web. Tivoli Federated Identity Manager

Answer: D

Question No: 23

What is a pre-requisite when planning an IBM Security Access Manager for Enterprise Sign-On implementation?

  1. The customer environment should contain one or more AIX servers.

  2. Users must use only Windows desktops or laptops to access applications.

  3. IBM Security Identity Manager must already be deployed in the environment.

  4. Active Directory or a generic LDAP server must be available for user validation.

Answer: A

Question No: 24

Which three points of contact configuration options are available when installing IBM Tivoli Federated Identity Manager? (Choose three.)

  1. WebSEAL

  2. JBoss Application Server

  3. Internet Information Services

  4. Generic point of contact server

  5. Apache Tomcat Application Server

  6. IBM WebSphere Application Server

Answer: A,F

Question No: 25

What is an example of IBM#39;s user-based licensing type?

  1. Public user

  2. Private user

  3. Authorized user

  4. Authenticated user

Answer: C

Question No: 26

A bank conducted online surveys for its customers to discover how it can improve its services.

One of the most common complaints from the bank#39;s customers was that they have to remember so many passwords when using the bank#39;s partner services (like stock trading, credit card point systems, and retirement investment management). The argument

generally was quot;the bank wantedme to join the partner and even though they introduced me to them. I had to register independently and then remember another username and password.quot; The bank would like to setup proper controls to address this most common complaint from its customers.

Which function does the bank need to use to solve this issue?

  1. Federated single sign-on

  2. Role Based Access Control

  3. Cross domain single sign-on

  4. Strong password encryption techniques

Answer: A

Question No: 27

A customer uses IBM Security Access Manager (ISAM) for Web Application protection and Single Sign-On. Because of recent mergers and acquisitions, many more applications have been configured with ISAM and the user base has almost doubled in last two months. After the merger, a number of users reported website down issues on a daily basis.

Which two issues need to be taken into consideration after such a change in the system configuration? (Choose two.)

  1. Scalability of ISAM components

  2. Availability of ISAM components

  3. Reduction of data handled by the ISAM components

  4. Encryption of communication between ISAM components

  5. Improvement in the hardware used by the users to access the websites

Answer: B,D

Question No: 28

A company has a full deployment of the IBM Security Identity and Access Assurance software bundle.

IBM Security Access Manager for Web is configured to use IBM Directory Server as user

repository. IBM Security Access Manager for Enterprise Single Sign-On is integrated with Microsoft Active Directory. IBM Security Access Manager for Web is also protecting access to the IBM Security Identity Manager Self-Service and Console webportals. IBM Security Identity Manager is using IBM Directory Server as directory store and IBM DB2 as database store. HR feed is configured through IBM Security Directory Integrator polling the HR system#39;s database.

IBM Security Identity Manager Self-Service web portal is not accessible. Which knowledge would be required to troubleshoot this problem?

  1. Webserver fundamentals, Windows auditing, LDAP, and DB2

  2. LDAP. IBM Security Access Manager for Web Access Control List Policies, syslog, and DB2

  3. IBM Security Identity Manager provisioning policies. TCP/IP, Windows domain authentication, and LDAP

  4. WebSphere fundamentals. IBM Security Access Manager for Web Access Control List Policies, and LDAP

Answer: D

Question No: 29

A company is using IBM Security Access Manager and wants to extend the functionality of the help desk users so that they can assist the end user in troubleshooting and diagnostics.

Which WebSEAL functionality is used to allow help desk users to assume the identity of the user who is a member of the Security Access Manager Domain?

  1. Switch User function

  2. Switch Admin function

  3. Transfer User function

  4. Switch Application function

Answer: A

Question No: 30

What is a prerequisite for installing an IBM Security Identity Manager fix pack?

  1. Stop the LDAP server that is used to contain the Security Identity Manager data

  2. Make sure that the WebSphere server that is running the Security Identity Managerapplication is running

  3. Install the WebSphere Update installer for the appropriate WebSphere version as per the readme file of the fixpack

  4. Ensure that the SOAP request timeout value is set to 150 or less by using the com.ibm.SOAP.requestTimeout property

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:C2150-201 Demo PDF
100% Dumps4cert Free Guaranteed!
C2150-201 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.