C2150-609試験無料問題集「IBM Security Access Manager V9.0 Deployment 認定」

CORRECT TEXT
A customer has expressed the requirement that users accessing online banking application must first authenticate using a userid/password and successfully enter a one-time PIN which is texted to a cell phone.
Which two IBM Security Access Manager (ISAM) V9.0 modules are required to fully implement the solution? (Choose two.)

An IBM Security Access Manager (ISAM) V9.0 environment is defined with multiple WebSEAL servers defined for high availability. They protect the same set of backend junctions.
Which parameter needs to be configured in each WebSEAL's configuration file to force all replicated WebSEAL servers to perform authorization checks against the same protected object space?

Prior to installing a firmware update the deployment professional creates a snapshot of the appliance configuration. During acceptance testing of the new firmware it is discovered that the update introduced a bug.
How should the deployment professional restore the previous configuration?

Which two protocols does the federation module in IBM Security Access Manager V9.0 support?
(Choose two.)

The IBM Security Access Manager V9.0 high-volume database stores data for which component?

The security deployment professional of an IBM Security Access Manager V9.0 solution has been using routing files to customize message logging.
Which aspect of the logging activity can be controlled?

What method can be used to upload firmware to an IBM Security Access Manager V9.0 virtual appliance? .

Which one is supported to externalize the Advanced Access Control runtime database?

IBM Security Access Manager V9.0 will be configured as Service Provider (SP) in a SAML Federation. The same user that logs in at the Identity Provider (IdP) will be logged in fen the SP side after the Single Sign-On, for example UserA on IdP will be UserA on the SP side.
Which name identifier format meets this requirement?

A deployment professional needs to update the certificate used by the LMU Which steps should the deployment professional follow to complete this task?