1.
Which two elements can be shown in the output of an IBM_SECURITY_CBA_AUDIT_RTE event? (Choose two.)
2.
Where would you browse in the ISAM for Mobile GUI to manually enable trace?
3.
When you use the web based (LMI) installation wizard, how does the appliance get the initial IP address of the management interface?
4.
When configuring one-time password in ISAM for Mobile. Customer A's requirements are to use a provider that generates a one-time password by using a specified algorithm with a time-based one-time password application. Which provider is configured to meet customer A's one-time password requirements?
5.
The Appliance Dashboard shows a high-level view of current operations and statistics. One of these statistics is the current CPU activity. Which set of steps is used if the CPU activity of a hardware appliance shows constant use and averages above sixty percent?
6.
A security analyst has developed and successfully tested an adjusted Trusteer Policy Information Point (PIP) in the Development environment. The next step is to deploy this new Trusteer PIP in the Acceptance environment so the proper testing can be executed. How is this new Trusteer PIP deployed?

 
7.
Which member of the IBM Security Access Manager product family acts as a Policy Enforcement Point (PEP)?
8.
What is a potential cause for corrupted JSON data in an API response?
9.
You are tasked with designing a solution that meets the following requirements:
1. Allow authenticated users to access web resources during normal business hours
2. Require additional OTP authentication for access outside business hours
3. Lockout a user after three invalid OTP authentication attempts
4. Automatically unlock the user after five minutes
Which features of ISAM for Mobile will help meet these requirements when designing the plan to deploy ISAM for Mobile?
10.
What is the initial administrative account password of the appliance?