An IBM Security Access Manager V9.0 Reverse Proxy has a stateful junction to a Portal application called "/wps" There is no web server in front of Portal. This junction has three Portal servers defined behind it. The Portal team needs to do maintenance on each of the three servers. The team wants to accomplish with least impact to end users.
Which pdadmin "server task" based steps will accomplish this?
A. Stop a server, have Portal team apply maintenance, bring server online-repeat for the other two servers.
B. Delete a server, have Portal team apply maintenance then add server back-repeat for the other two servers.
C. Take a server offline, have Portal team apply maintenance, bring server online- repeat for the other two servers.
D. Throttle a server, ensure activity has ceased for that server, have Portal team apply maintenance, bring server online-repeat for the other two servers.
An IBM Security Access Manager V9.0 systems deployment professional needs to protect a back-end web applications from SQL injection attacks that match signatures from the IBM X-Force signature database.
Which action needs to be performed?
A. Simulation Mode must be enabled and a Risk Profile must be specified.
B. Web Content Protection must be enabled and a Risk Profile must be specified.
C. Simulation Mode must be enabled and a Registered Resource must be specified.
D. Web Content Protection must be enabled and a Registered Resource must be specified.
During testing of an application the deployment professional is receiving frequent alerts about high disk utilization.
What action can be taken to resolve this issue?
A. Enable log rotation and compression
B. Resize the virtual disk and extend the active partition
C. Configure the appliance to store log and trace to a remote server
D. Enable the appliance background scheduler to clear unused log and trace files on a periodic basis.
Due to regulatory statues, the customer must limit a user to one session.
Which IBM Security Access Manager V9.0 capability is required to address this customer requirement?
A. Authorization Server
B. Advanced Access Control
C. Distributed Session Cache
D. Session Management Server
The request in a customer environment is IDP Initiated unsolicited SSO. The initial URL is:
https://POCIDP/FIM/sps/saml2idp/saml20/loginitial?
RequestBinding =HTTPPostandPartnerId= https://POCSP/isam/sps/abc/saml20andNameIdFormat =Email
The POCIDP is Point of Contact for Identity Provider and POCSP is Point of Contact for Service Provider.
The customer wants to configure TargetURL within the Service Provider Federation configuration in IBM
Security Access Manager V9.0.
What will satisfy this requirement?
A. poc.sigin.responseTargetURL
B. Target_URL in the mapping rule
C. Federation Runtime property TargetURL
D. itfim_override_targeturl_attr in the mapping rule
Which hardware component is included in an IBM Security Access Manager V9.0 hardware appliance?
A. UPS
B. IPMI port
C. LCD Panel
D. InfiniBand port
The SSL connection from browser to the IBM Security Access Manager V9.0 Reverse Proxy is broken and the deployment professional suspects an expired certificate.
In which location will the "Certificate expired" warning message that contains additional information to isolate the issue be seen?
A. LMI Home Dashboard
B. Systems message log
C. pdweb.debug trace file
D. Reverse proxy request log
A deployment professional needs to achieve sign-on between Virtual Host Junctions https://abc.ibm.com and https://xyz.ibm.com which are on separate WebSEAL instances.
Which option requires the least amount of configuration and no changes to the application?
A. Use the Distributed Session Cache
B. Use Cross-Domain Single Sign-On (CDSSO)
C. Use the option "use-same-session = yes"
D. Use the option "shared-domain-cookie = xyz.ibm.com"
A customer requirement stipulates the use of a second factor authentication to access certain resources.
Which two policy constructs cab be used to implement two-factor authentication using IBM Security Access Manager V9.0 Advanced Access Control? (Choose two.)
A. Permit
B. Deny with Obligation
C. Permit with Obligation
D. Permit with Authentication
E. Permit with Risk Based Access
An IBM Security Access Manager V9.0 deployment specialist is getting reports of failing requests. Analysis of a support file shows many connections to the backend server in TIME_WAIT state?
Where is the setting "sysctl.net.ipv4.tcp_tw_reuse = 1" added?
A. In the [tcp] stanza of the reverse proxy instance conf file
B. In the [server] stanza of the reverse proxy instance conf file
C. In the LMI "Manage System Settings -> Network Settings -> Tuning" panel
D. In the LMI "Manage System Settings -> System Settings -> Advanced Tuning Parameters" panel