A company has deployed an IBM Security Access Manager V9.0 solution for protecting web resources and has enabled auditing for monitoring purposes. A security deployment professional has observed that audit records are using large quantities of disk space due to the large number of audit events related to HTTP access.
Which two strategies will help to reduce the volume of audit events in above scenario? (Choose two.)
A . Generate audit records for specific groups only
B . Generate events for unsuccessful HTTP accesses only
C . Generating selective audit records using authorization rules
D . Reconfigure WebSEAL to use CARS auditing, instead of native auditing.
E . Selectively disable the generation of events by using attached protected object policies (POPs)
Answer: BE
Explanation:
Reference: http://www-01.ibm.com/support/docview.wss?uid=swg27049642&aid=1 (15)
Latest C2150-609 Dumps Valid Version with 138 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund