There is an SSL connectivity issue between the IBM Security Access Manager V9.0 Reverse Proxy and the backend business application.
Which Two troubleshooting commands under Tools in the application SSH interface can be used to validate the Reverse Proxy can successfully connect to the backend host: secure-port? (Choose two.)
A. Ping
B. Session
C. Connect
D. Traceout
E. Connections
A risk officer of an organization discovered that a site protected by the IBM Security Access Manager V9.0 solution might be vulnerable to common attacks like cross-site scripting (XSS) and SQL injection.
Which optional component should be configured to protect against these attacks?
A. Federation
B. Secure Web Settings
C. Advanced Access Control
D. Web Application Firewall
The appliance dashboard Reverse Proxy Health widget indicates a problem with the /snoop junction on the Test instance.
Which log file can be examined to find product errors?
A. agent.log
B. referer.log
C. request.log
D. msg_webseald-test.log
Which hypervisor supports hosting the IBM Security Access Manager (ISAM) 9.0 virtual appliance?
A. QNX
B. Hyper-V
C. VMware ESXi
D. RHEL Workstation
The security deployment professional of an IBM Security Access Manager V9.0 solution has been using routing files to customize message logging.
Which aspect of the logging activity can be controlled?
A. Size of log file
B. Delete log files
C. Log compression
D. HTML formatting
A deployment professional is configuring IBM Security Access Manager V9.0 for Management Authentication using remote LDAP.
Which configuration field value is optional?
A. Enable SSL to LDAP
B. Configure Administrative Group DN
C. Specify whether or not to bind anonymously
D. Select Local Database or Remote LDAP Server
In an IBM Security Access Manager (ISAM) V9.0 Federated SSO flow, the ISAM V9.0 appliance is used as the Service Provider. The SSO is IDP initiated. The IDP initiated unsolicited SSO doesn't have the target URL specified where Service Provider should be sending the user after consuming the SAML2.0 Assertion. The implementer of the SSO provider has been given the task of providing Target URL through a mapping rule in the Service Provider configuration.
How should this requirement be achieved in the mapping URL?
A. login-redirect in
B. local-response-redirect in
C. itfim_override_targeturl in
D. ITFIM attribute target_url IN
A customer has expressed the requirement that users accessing online-banking application must first authenticate using a userid/password and successfully enter a one-time PIN which is texted to a cell phone.
Which two IBM Security Access Manager (ISAM) V9.0 modules are required to fully implement the solution? (Choose two.)
A. ISAM PAM Module
B. ISAM Cloud Module
C. ISAM Federation Module
D. ISAM Advanced Control Module
E. ISAM Access Manager Platform
The deployment professional wants to back up the embedded LDAP personal certificate, including the private key. They navigate to Manage System Settings -> SSL Certificates -> and select the "extract" option.
Which file format is the resulting certificate backup?
A. .p12
B. .kdb
C. .jks
D. .cer
Which method provides the ability to delete all support files from an IBM Security Access Manager V9.0 appliance?
A. Use the delete command found under the logs menu in Command Line Interface (LCI)
B. Use the purge command found under the support menu in Command Line Interface (LCI)
C. Use the delete command found under the support menu in Command Line Interface (LCI)
D. Use the deleteall command found under the support menu in Command Line Interface (LCI)