IBM C2150-202 - IBM Security Access Manager for Mobile V8.0 Implementation Exam

Page:    1 / 14   
Total 70 questions

Which two values are valid for the self-diagnostic test command for hardware appliances?
(Choose two.)

  • A. Stat
  • B. Disk
  • C. Blocks
  • D. Storage
  • E. Network


Answer : D,E

Reference:http://www-01.ibm.com/support/docview.wss?uid=swg27042973&aid=14

A security analyst created the following ISAM for Mobile policy and attached the policy to a protected resource:

Precedence: Deny -
- Attributes: Optional
-Rule 1: If riskScore >40 or ipReputation has member Malware Then Deny
Access to the protected resource is always denied.
What should be done to troubleshootthe policy evaluation?

  • A. Add com.ibm.sec.auth.'=all to your trace string on the Monitor > Runtime Tracing. The trace file is available at Monitor > Application Log Files and then navigating to mga/runtime/trace.log in the file picker.
  • B. Add com.ibm.mga.auth.'=all to your trace string on the Monitor > Runtime Tracing. The trace file is available at Monitor > Application Log Files and then navigating to mga/runtime/trace.log in the file picker.
  • C. Add com.ibm.sec.authz.'=all to your trace string on the Monitor > Runtime Tracing. The trace file is available at Monitor > Application Log Files and then navigating to mga/runtime/trace.log in the file picker.
  • D. Add com.ibm.mga.authz.'=all to your trace string on the Monitor > Runtime Tracing. The trace file is available at Monitor > Application Log Files andthen navigating tomga/runtime/trace.log in the file picker.


Answer : C

A security analyst created an ISAM for Mobile policy to perform context based authorization checks based on custom attributes and attached it to a protected resource.
The security analyst discovered that access to the protected resource is always getting denied.
To troubleshoot you check:
-> The WebSEAL configuration file contains a post-data entry in the [azn-decision- info] stanza.
-> The datatype entry is specified in the [user-attribute-definitions] stanza for this azn- decision-info attribute is of type date.
-> WebSEAL trace shows that the <post-data-name> value found for the post-data entry is 'May 20. 2013.
Which change in data format will resolve this issue?

  • A. 2013-05-20 06:00
  • B. 2013-05-20:06:00
  • C. 2013-05-20-06-00
  • D. 2013-05-20-06:00


Answer : A

A customer has the following limitation for OAuth2 workflow: OAuth clients shall keep their client credentials confidential when authenticating with the authorization server.
Which authorization grant type is suitable for this work flow limitation?

  • A. Client credential flow
  • B. Authorization code flow
  • C. Access token with refresh token flow
  • D. Client authorization code credential flow
  • E. Resource owner password credentials flow


Answer : A,B

Reference:https://www-
304.ibm.com/support/knowledgecenter/SSELE6_8.0.0.3/com.ibm.ammob.doc_8.0.0.3/confi g/concept/con_oauth20_workflow.html%23con_oauth20_workflow(authorization code flow, first para)
Note: Thisquestionhas two answers according to the reference given above.

Which two SSL certificate file types are supported by ISAM for Mobile? (Choose two.)

  • A. .der
  • B. .kdb
  • C. .p12
  • D. .arm
  • E. .pern


Answer : B,C

Reference:https://www.google.com.pk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&cad
=rja&uact=8&ved=0CEIQFjAD&url=http%3A%2F%2Fwww-
01.ibm.com%2Fsupport%2Fknowledgecenter%2FSSELE6_8.0.0%2Fcom.ibm.ammob.doc
_8.0%2Fappliance_pdf.pdf&ei=3KJfVMHhFcWqgwSS3IKgDw&usg=AFQjCNHJ_OPB3THF
Kg9R-fEhtk8u4t0nfw&sig2=D9hJkISMhfo94RND3Ks53Q&bvm=bv.79189006,d.eXY(p.61,
62)

Page:    1 / 14   
Total 70 questions