1.
You are tasked with designing a solution that meets the following requirements:
1. Allow authenticated users to access web resources for transaction amounts less than $1.000
2. Require additional authentication for transaction amounts greater than or equal to $1.000
Which features of ISAM for Mobile will help meet the above requirements when designing the plan to deploy ISAM for Mobile?
2.
As the administrator for ISAM for Mobile, you are tasked with setting up risk based policies that allow access to resources outside of normal hours after additional authentication. The landing pages for the resources are on different servers that are in different domains. You add info.js to the landing pages for each resource. Which mechanism should be used to ensure the risk based policies are evaluated correctly for each resource?
3.
Which rule must a policy include to require an unauthenticated user to consent to register a device?
4.
A customer has the following limitation for OAuth2 workflow: OAuth clients shall keep their client credentials confidential when authenticating with the authorization server. Which authorization grant type is suitable for this work flow limitation?
5.
Which component (if any) has only a single instance on the appliance?
6.
A highly-available deployment of IBM Security Access Manager for Mobile makes use of cluster configurations to replicate certain data from designated masters to configured nodes. Secondary masters are defined as failover points in the event that the primary master fails. Additional masters are defined to scale with growth or to meet redundancy needs. In a four-master cluster, what would a failover from the primary master result in?
7.
How is the IP reputation database updated?
8.
A security analyst created the following ISAM for Mobile policy and attached the policy to a protected resource:
Precedence: Deny
- Attributes: Optional
-Rule 1: If riskScore >40 or ipReputation has member Malware Then Deny
Access to the protected resource is always denied.
What should be done to troubleshoot the policy evaluation?
9.
During testing and configuration activities in the development environment a security analyst mistakenly deleted some of the new attributes needed for one of the policies. The security analyst became aware of this mistake after deploying the changes. Assuming the analyst followed best practices, which action restores the inadvertently deleted attributes?
10.
Which system alert object can be added?