Vendor: IBM
Exam Code: C2150-198
Exam Name: IBM Security Access Manager V7.0 Implementation
QUESTION 1
Which statement is FALSE regarding local response redirection?
A. We need to use External authentication interface to implement local response redirection.
B. When local response redirection is enabled, change password must be handled by WebSEAL.
C. When using local response redirection, WebSEAL no longer has the responsibility of generating
responses to client requests.
D. When local response redirection is enabled, the redirection is used for all local WebSEAL
response types: login, error, informational, and
password management.
Answer: A
QUESTION 2
Which statement is true for the ISAM appliance snapshot?
A. It is only a backup of the LMI.
B. It is a backup of all WebSEAL instances.
C. It is a copy of the state of the appliance at a certain time.
D. It is a backup of the Policy Server and WebSEAL instances.
Answer: C
QUESTION 3
What is the correct archive file If pdbackup -a backup -list C:\Program Files\Tivoli\Policy Director\etc\pdbackup.lst is executed using ISAM on a Windows Server?
A. C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_30aug2013.11.30.dar
B. C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_30.08.2013.11.30.dar
C. C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_30aug2013.11_30.dar
D. C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_30.08.2013.11_30.dar
Answer: C
QUESTION 4
You have a default setup of ISAM, ITDS and a Microsoft SharePoint backend. A Web environment is experiencing performance issues. In order conduct analysis, tracing is temporarily switched on using the following commands:
server task web04-webseald-unix08 trace set pdweb.debug 2 file path=/tmp/trace.log server task web04-webseald-unix08 trace set pdweb.debug 0 During analysis of the trace.log various common occurrences appear, the following trace.log extract displays only the lines important for this question.
2013-05-26-22:08:01.681+02:00I —————– Browser ===> PD —————– 2013-05-26-
22:08:01.684+02:00I —————– Browser <=== PD —————– 2013-05-26-22:08:09.283+02:00I — ————— Browser ===> PD —————– 2013-05-26-22:08:16.682+02:00I —————– PD ===> BackEnd —————– 2013-05-26-22:08:17.049+02:00I —————– PD <=== BackEnd —————– 2013-05-26-22:08:17.051+02:00I —————– Browser <=== PD —————– What can be concluded by analyzing this trace excerpt? You indicate you wish to make this a sample question, remove the reference here.
A. This excerpt indicates no performance or other issues.
B. This excerpt indicates that ITDS has a performance issue.
C. This excerpt indicates that the user has given a wrong password.
D. This excerpt indicates that the backend has a performance issue
Answer: B
QUESTION 5
You have a default setup of ISAM, ITDS and a Microsoft SharePoint backend. A Web environment is experiencing performance issues. In order conduct analysis, tracing is temporarily switched on using the following commands:
server task web04-webseald-unix08 trace set pdweb.debug 2 file path=/tmp/trace.log server task web04-webseald-unix08 trace set pdweb.debug 0 During analysis of the trace.log various common occurrences appear, the following trace.log extract displays only the lines important for this question.
2013-05-26-22:08:01.681+02:00I —————– Browser ===> PD —————– 2013-05-26-
22:08:01.682+02:00I —————– PD ===> BackEnd —————– 2013-05-26-22:08:07.216+02:00I — ————— PD <=== BackEnd —————– 2013-05-26-22:08:07.217+02:00I —————– Browser <=== PD —————–
What can be concluded by analyzing this trace excerpt?
A. This excerpt indicates no performance or other issues.
B. This excerpt indicates that ITDS has a performance issue.
C. This excerpt indicates that the user has given a wrong password.
D. This excerpt indicates that the backend has a performance issue.
Answer: D
QUESTION 6
Which configuration enables the day time error page?
A. [acnt-mgt]
client-alert-tod = yes
B. [acnt-mgt]
client-alert-dot = yes
C. [acnt-mgt]
client-notify-tod = yes
D. [acnt-mgt]
client-notify-dot = yes
Answer: C
QUESTION 7
Which utility provides backup, restore, and extract capabilities for Security Access Manager data?
A. pdinfo
B. pdbackup
C. pdservice
D. pd_backup
Answer: B
QUESTION 8
What pdbackup command restores the contents of an Access Manger archived file on a Windows operating system to a specific folder?
A. pdbackup -a extract
B. pdabckup -a backup
C. pdbackup -a restore
D. pdbackup -a retrieve
Answer: A
QUESTION 9
When performing an upgrade, which utility is used to back up the information in Tivoli Directory Server?
A. ldapadd
B. bulkload
C. idsdb2ldif
D. idscreateldif
Answer: C
QUESTION 10
Which registry is NOT supported by ISAM 7?
A. Lotus?Domino?Lotus?Domino
B. IBM?Tivoli?Directory Server
C. Microsoft Active Directory 2008
D. Sun Java?System Directory Server 7
Answer: A
QUESTION 11
What is the default credential to log on to ISAM 7 WGA command-line interface?
A. root, root
B. admin, admin
C. superadmin, secret
D. sec_master, object00
Answer: B
QUESTION 12
What will help reduce the volume of audit event, while preserving important audit information?
A. complete disablement of event generation
B. generation of events for successful HTTP accesses only
C. generation of events for unsuccessful HTTP accesses only
D. reconfiguration of WebSEAL to use CARS auditing instead of native auditing
Answer: C
QUESTION 13
Recently the Risk Officer of your organization discovered that all key databases containing web certificates in the organization are protected with a very weak password. You are assigned to change the password on every key database into a more complex one. How can this be accomplished?
A. Open iKeyman, open the appropriate key database, enter the current password, and select
“Change Password”.
B. Generate a new stash file using command “ibmstash -db key.kdb -stash key.sth -password
<current password> -newpassword <new
password>”
C. This is not possible, a new key database has to be created; the current certificates can be exported
from the old KDB into the new one.
D. Edit the webseald-default.conf configuration file and change the pointers to the key database
password from a stash file to a plain text
password and specify the password.
Answer: A
QUESTION 14
How are ISAM users and groups logically separated within a single policy server?
A. By creating multiple object spaces.
B. By installing multiple user registries.
C. By creating multiple secure domains.
D. By installing multiple policy proxy servers.
Answer: C
QUESTION 15
What are two installable components of the Common Auditing and Reporting Serve? (Choose two.)
A. Audit Service.
B. Report Service
C. Audit Client Setup Utilities
D. Audit Configuration Console
E. Report Configuration Console
Answer: AD
If you want to pass IBM C2150-198 successfully, donot missing to read latest lead2pass IBM C2150-198 practice exams.
If you can master all lead2pass questions you will able to pass 100% guaranteed.