Free C2150-609 Exam Braindumps (page: 4)

Page 3 of 19

There is an SSL connectivity issue between the IBM Security Access Manager V9.0 Reverse Proxy and the backend business application.
Which two troubleshooting commands under Tools in the application SSH interface can be used to validate the Reverse Proxy can successfully connect to the backend host:secure-port? (Choose two.)

  1. ping
  2. session
  3. connect
  4. traceroute
  5. connections

Answer(s): B,C



An IBM Security Access Manager V9.0 Reverse Proxy has a stateful junction to a Portal application called "/wps". There is no web server in front of Portal. This junction has three Portal servers defined behind it. The Portal team needs to do maintenance on each of the three servers. The team wants to accomplish this with least impact to end users.
Which pdadmin "server task" based steps will accomplish this?

  1. Stop a server, have Portal team apply maintenance, bring server online - repeat for the other two servers
  2. Delete a server, have Portal team apply maintenance then add server back - repeat for the other two servers
  3. Take a server offline, have Portal team apply maintenance, bring server online - repeat for the other two servers
  4. Throttle a server, ensure activity has ceased for that server, have Portal team apply maintenance, bring server online - repeat for the other two servers

Answer(s): C



A customer received a replacement hardware appliance, but on boot up it has a different firmware than that for IBM Security Access Manager (ISAM) V9.0. The appliance needs to be flashed to ISAM V9.0. The appliance needs to be rebooted with a bootable USB drive formatted as FAT32.
Which file format is needed to create the bootable drive?

  1. .iso
  2. .ova
  3. .pkg
  4. .img

Answer(s): A



A risk officer of an organization discovered that a site protected by the IBM Security Access Manager V9.0 solution might be vulnerable to common attacks like cross-site scripting (XSS) and SQL injection.
Which optional component should be configured to protect against these attacks?

  1. Federation
  2. Secure Web Settings
  3. Advanced Access Control
  4. Web Application Firewall

Answer(s): D






Post your Comments and Discuss IBM C2150-609 exam with other Community members:

C2150-609 Exam Discussions & Posts