Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > IBM > IBM Certifications > C2150-609 > C2150-609 Online Practice Questions and Answers

C2150-609 Online Practice Questions and Answers

Questions 4

There is an SSL connectivity issue between the IBM Security Access Manager V9.0 Reverse Proxy and the backend business application.

Which Two troubleshooting commands under Tools in the application SSH interface can be used to validate the Reverse Proxy can successfully connect to the backend host: secure-port? (Choose two.)

A. Ping

B. Session

C. Connect

D. Traceout

E. Connections

Buy Now

Correct Answer: BC

Reference: https://www.ibm.com/support/knowledgecenter/SSPREK_9.0.2/com.ibm.isam.doc/admin/concept/ con_appliance_cli.html

Questions 5

A risk officer of an organization discovered that a site protected by the IBM Security Access Manager V9.0 solution might be vulnerable to common attacks like cross-site scripting (XSS) and SQL injection.

Which optional component should be configured to protect against these attacks?

A. Federation

B. Secure Web Settings

C. Advanced Access Control

D. Web Application Firewall

Buy Now

Correct Answer: C

Questions 6

The appliance dashboard Reverse Proxy Health widget indicates a problem with the /snoop junction on the Test instance.

Which log file can be examined to find product errors?

A. agent.log

B. referer.log

C. request.log

D. msg_webseald-test.log

Buy Now

Correct Answer: C

Questions 7

Which hypervisor supports hosting the IBM Security Access Manager (ISAM) 9.0 virtual appliance?

A. QNX

B. Hyper-V

C. VMware ESXi

D. RHEL Workstation

Buy Now

Correct Answer: C

Reference: https://www.ibm.com/support/knowledgecenter/en/SSELE6_8.0.0/com.ibm.ammob.doc_8.0/ isam80_quickstart_virtual.html

Questions 8

The security deployment professional of an IBM Security Access Manager V9.0 solution has been using routing files to customize message logging.

Which aspect of the logging activity can be controlled?

A. Size of log file

B. Delete log files

C. Log compression

D. HTML formatting

Buy Now

Correct Answer: A

Questions 9

A deployment professional is configuring IBM Security Access Manager V9.0 for Management Authentication using remote LDAP.

Which configuration field value is optional?

A. Enable SSL to LDAP

B. Configure Administrative Group DN

C. Specify whether or not to bind anonymously

D. Select Local Database or Remote LDAP Server

Buy Now

Correct Answer: A

Reference: https://www.google.com/url? sa=tandrct=jandq=andesrc=sandsource=webandcd=1andcad=rjaanduact=8andved=2ahUKEwjsm9_xxpDeAhVktYsKHeFaB JAQFjAAegQIChACandurl=https%3A%2F%2Fwww.ibm.com%2Fdeveloperworks%2Fcommunity %2Fforums %2Fatom%2Fdownload%2FISAM9-Management%2520Authentication%2520and%2520Authorization.pdf %3FnodeId%3D0ac9cd08-fcb9-45bc-bb36-db459d6420c3andusg=AOvVaw1RS5LdoX9DU3vMbb7qRZx8

(13)

Questions 10

In an IBM Security Access Manager (ISAM) V9.0 Federated SSO flow, the ISAM V9.0 appliance is used as the Service Provider. The SSO is IDP initiated. The IDP initiated unsolicited SSO doesn't have the target URL specified where Service Provider should be sending the user after consuming the SAML2.0 Assertion. The implementer of the SSO provider has been given the task of providing Target URL through a mapping rule in the Service Provider configuration.

How should this requirement be achieved in the mapping URL?

A. login-redirect in .conf

B. local-response-redirect in .conf

C. itfim_override_targeturl in .js

D. ITFIM attribute target_url IN .xslt

Buy Now

Correct Answer: D

Questions 11

A customer has expressed the requirement that users accessing online-banking application must first authenticate using a userid/password and successfully enter a one-time PIN which is texted to a cell phone.

Which two IBM Security Access Manager (ISAM) V9.0 modules are required to fully implement the solution? (Choose two.)

A. ISAM PAM Module

B. ISAM Cloud Module

C. ISAM Federation Module

D. ISAM Advanced Control Module

E. ISAM Access Manager Platform

Buy Now

Correct Answer: CE

Questions 12

The deployment professional wants to back up the embedded LDAP personal certificate, including the private key. They navigate to Manage System Settings -> SSL Certificates -> and select the "extract" option.

Which file format is the resulting certificate backup?

A. .p12

B. .kdb

C. .jks

D. .cer

Buy Now

Correct Answer: A

Questions 13

Which method provides the ability to delete all support files from an IBM Security Access Manager V9.0 appliance?

A. Use the delete command found under the logs menu in Command Line Interface (LCI)

B. Use the purge command found under the support menu in Command Line Interface (LCI)

C. Use the delete command found under the support menu in Command Line Interface (LCI)

D. Use the deleteall command found under the support menu in Command Line Interface (LCI)

Buy Now

Correct Answer: B

Exam Code: C2150-609
Exam Name: IBM Security Access Manager V9.0 Deployment
Last Update: Jun 11, 2025
Questions: 138

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.