Which troubleshooting tool can be used to investigate this issue?

A request for a virtual host junction shows an unexpected source IP address. Which troubleshooting tool can be used to investigate this issue?A . Host FileB . SnapshotsC . Support FilesD . Packet TracingView AnswerAnswer: A

December 25, 2018 No Comments READ MORE +

What action will generate the required data for this analysis?

An IBM Security Access Manager V9.0 deployment professional is charged with monitoring request response times from WebSEAL to the backend. The deployment professional wants the flexibility to see response times per request, per junction, per HTTP return code, or other criteria that may come up in the future. What action...

December 21, 2018 No Comments READ MORE +

Which Distributed Session Cache option should be checked?

The Distributed Session Cache has been enabled to replace the Session Management Server in a recently migrated IBM Security Access Manager V9.0 environment. Several Reverse Proxies have not yet been migrated from ISAM V7.0. The help desk is now receiving user complaints due to multiple logins required for applications protected...

December 12, 2018 No Comments READ MORE +

How can this be remediated?

A customer deployment consists of a large number of virtual host functions definitions. During a troubleshooting session the deployment professional realizes the WebSEAL logs do not distinguish between requests to different virtual hosts. How can this be remediated?A . Customize the message log to include the relative URLB . Customize...

December 8, 2018 No Comments READ MORE +

How should the deployment professional configure the reverse proxy so that end-users can access the reverse proxy without specifying a non-standard port (other than 80 and 443)?

In an organization’s testing environment, the IBM Security Access Manager V9.0 deployment professional is required to deploy the virtual appliance on Amazon EC2 with a single reverse proxy instance with a single network interface. How should the deployment professional configure the reverse proxy so that end-users can access the reverse...

December 3, 2018 No Comments READ MORE +

Which parameter needs to be added to the configuration file so that “Third Party Not Responding” error page is not rendered and the user is connected to the backend server that is responding?

A stateful junction /WebApp is added to a Web reverse proxy instance with two backend HTTP servers. When one of the backend server stops responding to the requests, the users are getting the “Third Party Not Responding” error message even though one of the backend server continues to respond. Which...

December 2, 2018 No Comments READ MORE +

What action can be taken to resolve this issue?

During testing of an application the deployment professional is receiving frequent alerts about high disk utilization. What action can be taken to resolve this issue?A . Enable log rotation and compressionB . Resize the virtual disk and extend the active partitionC . Configure the appliance to store log and trace...

December 1, 2018 No Comments READ MORE +

Which parameter needs to be added to the configuration file so that “Third Party Not Responding” error page is not rendered and the user is connected to the backend server that is responding?

A stateful junction /WebApp is added to a Web reverse proxy instance with two backend HTTP servers. When one of the backend server stops responding to the requests, the users are getting the “Third Party Not Responding” error message even though one of the backend server continues to respond. Which...

November 19, 2018 No Comments READ MORE +

Which information form the TAM v6.1 environment will be useful in sizing the new ISAM V9.0 hardware configuration?

A customer is migrating from TAM v6.1 running on AIX to IBM Security Access Manager (ISAM) V9.0 hardware appliance. Which information form the TAM v6.1 environment will be useful in sizing the new ISAM V9.0 hardware configuration?A . WebSEAL request logsB . WebSEAL CDAS specificsC . Number of LDAP replicasD...

November 19, 2018 No Comments READ MORE +

Which action needs to be performed?

An IBM Security Access Manager V9.0 systems deployment professional needs to protect a back-end web applications from SQL injection attacks that match signatures from the IBM X-Force signature database. Which action needs to be performed?A . Simulation Mode must be enabled and a Risk Profile must be specified.B . Web...

November 16, 2018 No Comments READ MORE +