1.
A deployment professional wants to ensure traffic from a Reverse Proxy to a junction backend application server goes out over a specific interface. How can this be accomplished?
2.
A deployment professional is developing a script using REST APIs to monitor the status of WebSEAL instances. Which attribute and value indicates a WebSEAL instance is down?
3.
There is a connectivity issue between the IBM Security Access Manager V9.0 Reverse Proxy and the backend business application. What troubleshooting command under Tools in the application SSH interface can be used to validate the Reverse Proxy can successfully connect to the backend host:port?
4.
An OAuth client intermittently receives an error related to maximum number of tokens exceeded. What property should be adjusted to prevent this error?
5.
An IBM Security Access Manager V9.0 deployment at a customer has enabled audit.authz, audit.authn, audit.http for meeting auditing requirements and results in large volume of audit records and poses significant data management challenges to the client. The customer wants to exclude the audit events to certain static resources such as images. What action should be taken to implement this?
6.
The security deployment professional of an IBM Security Access Manager V9.0 solution has been using routing files to customize message logging. Which aspect of the logging activity can be controlled?
7.
Which one is supported to externalize the Advanced Access Control runtime database?
8.
To configure IBM Security Access Manager V9.0 for Windows desktop single sign-on using Kerberos authentication, the Reverse Proxy's identity in the Active
Directory Kerbros Domain must be associated with a Service Principal name (SPN).
Given the following information:
AD Kerberos Realm Name: company.com
ISAM Reverse Proxy DNS Domain: ws1.company.com
What is the correct SPN?
9.
The web security department of an organization has found that their site is vulnerable to Denial of Service, Brute Force, Buffer Overflow and decided to use the
Web Application Firewall (WAF) feature available in IBM Security Access Manager V9.0.
Even after enabling WAF, the site is still vulnerable to the above attacks. The deployment professional is pretty sure that the signature for these attacks have been released and has decided to check for X-Force updates.
How should the deployment professional check and update this?
10.
IBM Security Access Manager (ISAM) V.90 provides an External Authentication Interface (EAI) that enables the extension of the authentication process for
WebSEAL. The identity information returned by the EAI service is used to generate user credentials. This can be used as one of the methods to implement step-up authentication.
How is this authentication information returned from the EAI server?