최신 C2150-198 무료덤프 - IBM Security Access Manager V7.0 Implementation
Which statement is true when referencing WebSEAL Certificate Revocation List (CRL) and Online Certificate Status Protocol (OCSP) support?
정답: A
What WebSEAL functionality is supported by the IBM Security Access Manger Web Gateway Appliance?
정답: C
Given the following conditions:
pdweb.authn
For the pdweb.authn component:
1.The frequency is set to 40 seconds.
2.The destination for the statistics report is the /tmp/auth.log file.
pdweb.jct.1
For the pdweb.jct.1 component:
1.The frequency is set to 50 seconds,
2.The destination for the statistics report is the /tmp/jct.log file.
pdweb.jmt
For the pdweb.jmt component:
1.The frequency is set to 20 seconds.
2.The destination for the statistics report is the /tmp/jmtA.log and the /tmp/jmtB.log files
What would the configuration in the stanza [aznapi-configuration] look like?

pdweb.authn
For the pdweb.authn component:
1.The frequency is set to 40 seconds.
2.The destination for the statistics report is the /tmp/auth.log file.
pdweb.jct.1
For the pdweb.jct.1 component:
1.The frequency is set to 50 seconds,
2.The destination for the statistics report is the /tmp/jct.log file.
pdweb.jmt
For the pdweb.jmt component:
1.The frequency is set to 20 seconds.
2.The destination for the statistics report is the /tmp/jmtA.log and the /tmp/jmtB.log files
What would the configuration in the stanza [aznapi-configuration] look like?

정답: D
What are two advantages of using persistent connections between WebSEAL and a junctioned backend server? (Choose two.)
정답: B,D
What is the minimum memory requirement for IBM Security Access Manager Gateway virtual appliance?
정답: D
When final URL on the external authentication interface (EAI) web server is either final_step_passwd.php or final_step_onetime.php, which trigger would work?
정답: D
What is the correct archive file If pdbackup -a backup -list C:\Program Files\Tivoli\Policy Director\etc\pdbackup.lst is executed using ISAM on a Windows Server?
정답: C
What two user interfaces manage security policies and Security Access manager Servers? (Choose two.)
정답: A,B
What command is used to apply necessary ACLs to an ldap suffix in order for Security Access Manager to be able to manage user and group information within that suffix?
정답: D
What is the default port number of LDAP traffic encrypted using SSL?
정답: C