C2150-609 無料問題集「IBM Security Access Manager V9.0 Deployment」
A stateful junction /WebApp is added to a Web reverse proxy instance with two backend HTTP servers. When one of the backend server stops responding to the requests, the users are getting the "Third Party Not Responding" error message even though one of the backend server continues to respond.
Which parameter needs to be added to the configuration file so that "Third Party Not Responding" error page is not rendered and the user is connected to the backend server that is responding?
Which parameter needs to be added to the configuration file so that "Third Party Not Responding" error page is not rendered and the user is connected to the backend server that is responding?
正解:B
解答を投票する
A risk officer of an organization discovered that a site protected by the IBM Security Access Manager V9.0 solution might be vulnerable to common attacks like cross-site scripting (XSS) and SQL injection.
Which optional component should be configured to protect against these attacks?
Which optional component should be configured to protect against these attacks?
正解:C
解答を投票する
A customer has deployed an IBM Security Access Manager V9.0 solution to protect web applications. After the initial authentication between the client and WebSEAL, WebSEAL can build a new Basic Authentication header and use the -b option to provide the authenticated Security Access Manager user name (client's original identity) together with a predefined static password across the junction to the back-end server.
Which configuration option will accomplish this?
Which configuration option will accomplish this?
正解:B
解答を投票する
The IBM Security Access Manager V9.0 system deployment professional is configuring context-based access to a protected resource, and has configured an Access Control Policy made up of four rules. The Precedence is set to First.
How are the four rules combined to produce an authorization decision?
How are the four rules combined to produce an authorization decision?
正解:A
解答を投票する
A customer has setup IBM Security Access Manager V9.0 hardware appliances (AP. A1, A2) in a cluster. The appliances (A1, A2) that host reverse proxies are labeled as
"restricted" in the cluster. AP is the Primary of the cluster.
There is one reverse proxy in appliance A1 and two in appliance A2. These reverse proxies are being tuned for performance. The appliance A1 and A2 max socket range has been set to 64510.
What is true in this situation?
"restricted" in the cluster. AP is the Primary of the cluster.
There is one reverse proxy in appliance A1 and two in appliance A2. These reverse proxies are being tuned for performance. The appliance A1 and A2 max socket range has been set to 64510.
What is true in this situation?
正解:C
解答を投票する