[Free] 2017(Jan) EnsurePass Testking IBM C2150-202 Dumps with VCE and PDF 1-10

Ensurepass.com : Ensure you pass the IT Exams
2017 Jan IBM Official New Released C2150-202
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/C2150-202.html

IBM Security Access Manager for Mobile V8.0 Implementation

Question No: 1

Which two values are valid for the self-diagnostic test command for hardware appliances? (Choose two.)

  1. Stat

  2. Disk

  3. Blocks

  4. Storage

  5. Network

Answer: D,E

Reference:http://www-01.ibm.com/support/docview.wss?uid=swg27042973amp;aid=14

Question No: 2

A security analyst created the following ISAM for Mobile policy and attached the policy to a protected resource:

Precedence: Deny

– Attributes: Optional

-Rule 1: If riskScore gt;40 or ipReputation has member Malware Then Deny Access to the protected resource is always denied.

What should be done to troubleshootthe policy evaluation?

  1. Add com.ibm.sec.auth.#39;=all to your trace string on the Monitor gt; Runtime Tracing. The trace file is available at Monitor gt; Application Log Files and then navigating to mga/runtime/trace.log in the file picker.

  2. Add com.ibm.mga.auth.#39;=all to your trace string on the Monitor gt; Runtime Tracing. The trace file is available at Monitor gt; Application Log Files and then navigating to mga/runtime/trace.log in the file picker.

  3. Add com.ibm.sec.authz.#39;=all to your trace string on the Monitor gt; Runtime Tracing. The trace file is available at Monitor gt; Application Log Files and then navigating to mga/runtime/trace.log in the file picker.

  4. Add com.ibm.mga.authz.#39;=all to your trace string on the Monitor gt; Runtime Tracing. The

trace file is available at Monitor gt; Application Log Files andthen navigating tomga/runtime/trace.log in the file picker.

Answer: C

Question No: 3

A security analyst created an ISAM for Mobile policy to perform context based authorization checks based on custom attributes and attached it to a protected resource.

The security analyst discovered that access to the protected resource is always getting denied.

To troubleshoot you check:

-> The WebSEAL configuration file contains a post-data entry in the [azn-decision- info] stanza.

-> The datatype entry is specified in the [user-attribute-definitions] stanza for this azn-

decision-info attribute is of type date.

-> WebSEAL trace shows that the lt;post-data-namegt; value found for the post-data entry is #39;May 20. 2013′.

Which change in data format will resolve this issue?

A. 2013-05-20 06:00

B. 2013-05-20:06:00

C. 2013-05-20-06-00

D. 2013-05-20-06:00

Answer: A

Question No: 4

A customer has the following limitation for OAuth2 workflow: OAuth clients shall keep their client credentials confidential when authenticating with the authorization server.

Which authorization grant type is suitable for this work flow limitation?

  1. Client credential flow

  2. Authorization code flow

  3. Access token with refresh token flow

  4. Client authorization code credential flow

  5. Resource owner password credentials flow

Answer: A,B

Reference:https://www- 304.ibm.com/support/knowledgecenter/SSELE6_8.0.0.3/com.ibm.ammob.doc_8.0.0.3/confi g/concept/con_oauth20_workflow.html#con_oauth20_workflow(authorization code flow, first para)

Note: Thisquestionhas two answers according to the reference given above.

Question No: 5

Which two SSL certificate file types are supported by ISAM for Mobile? (Choose two.)

  1. .der

  2. .kdb

  3. .p12

  4. .arm

  5. .pern

    Answer: B,C

    Reference:https://www.google.com.pk/url?sa=tamp;rct=jamp;q=amp;esrc=samp;source=webamp;cd=4amp;cad

    =rjaamp;uact=8amp;ved=0CEIQFjADamp;url=http://www- 01.ibm.com/support/knowledgecenter/SSELE6_8.0.0/com.ibm.ammob.doc

    _8.0/appliance_pdf.pdfamp;ei=3KJfVMHhFcWqgwSS3IKgDwamp;usg=AFQjCNHJ_OPB3THF Kg9R-fEhtk8u4t0nfwamp;sig2=D9hJkISMhfo94RND3Ks53Qamp;bvm=bv.79189006,d.eXY(p.61, 62)

    Question No: 6

    You are tasked with designing a solution that meets the following requirements:

    1. Allow authenticated users to access web resources during normal business hours

    2. Require additional OTP authentication for access outside business hours

    3. Lockout a user after three invalid OTP authentication attempts

    4. Automatically unlock the user after five minutes

      Which features of ISAM for Mobile will help meet these requirements when designing the plan to deploy ISAM for Mobile?

      1. Risk profile,OTP,Policy

      2. Device registration,OTP,Policy

      3. Risk profile,OTP,Policy,Advanced configuration

      4. Device registration,OTP,Policy,Advanced configuration

Answer: C

Question No: 7

Which two audit event types record actions such as creation of risk profiles and device registration? (Choose two.)

  1. IBM_SECURITY_RUNTIME_MGMT

  2. IBM_SECURITY_CBA_AUDIT_RTE

  3. IBM_SECURITY_CBA_AUDIT_MGMT

  4. IBM_SECURITY_CBA_AUDIT_AUTHZ

  5. IBM_SECURITY_RTSS_AUDIT_MGMT

Answer: C

Reference:http://www-01.ibm.com/support/docview.wss?uid=swg27042973amp;aid=12(p.29)

Question No: 8

Where are SSL certificate databases managed in ISAM for Mobile web console?

  1. Manage System Settings gt; Secure Settings gt; Certificates

  2. Manage Security Settings gt; System Settings gt; Certificates

  3. Manage System Settings gt; Secure Settings gt; SSL Certificates

  4. Manage Security Settings gt; System Settings gt; SSL Certificates

Answer: C

Question No: 9

You have recently installed the latest general available fix pack. All known tests where passed successfully. However after a few weeks some field reports come in quoting that one of the previous working features fails. Extra testing on this specific feature learns that the new fix pack introduced a bug. You raise a PMR. however your business would like you to resolve this issue directly by drawing back this fix pack update.

Which step will solve this issue?

  1. Activate the other partition

  2. Install an older fix pack that lacks this bug

  3. Use the reset button using a paperclip during reboot

  4. Use the Promote Option on your development appliance to make it a production appliance

Answer: B

Question No: 10

A security analyst has developed and successfully tested an adjusted Trusteer Policy Information Point (PIP) in the Development environment.

The next step is to deploy this new Trusteer PIP in the Acceptance environment so the proper testing can be executed.

How is this new Trusteer PIP deployed?

  1. Log into the Environment Dashboard. Select the Trusteer PIP in the Development area and use the Propagate option to deploy in on the Acceptance environment.

  2. Select on your Development environment in the quot;Secure Mobile Settings / Policy / Information Pointsquot; screen the Trusteer PIP,choose the Export option, move the file to the Acceptance environment and use the Import option on the equivalent screen.

  3. Select on your Development environment in the quot;Secure Mobile Settings / Policy / Information Pointsquot; screen the Trusteer PIP,choose the Download option, move the file to the Acceptance environment and use the Upload option on the equivalent screen.

  4. Select the Trusteer PI P in the quot;Secure Mobile Settings / Policy / Information Pointsquot; screen on the Development environment, use the Promote option to enable it to be received by another environment. Next login to the Acceptance environment and use the Receive option.

Answer: D

100% Ensurepass Free Download!
Download Free Demo:C2150-202 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass C2150-202 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply