Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
C2150-202 Latest Exam (Nov 2017)

[Free] 2017(Nov) EnsurePass Dumpsleader IBM C2150-202 Dumps with VCE and PDF 21-30

November 2, 2017

EnsurePass
2017 Nov IBM Official New Released C2150-202
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/C2150-202.html

IBM Security Access Manager for Mobile V8.0 Implementation

Question No: 21

What is the first required step in the LMI after installing the ISO and booting the new virtual appliance?

  1. Enter the activation key

  2. Change the default admin password

  3. Enter the unconfigured login password

  4. Accept the Software License Agreement

Answer: A

Question No: 22

How many application interfaces does the appliance have?

  1. 1

  2. 2

  3. 4

  4. 8

Answer: B

Question No: 23

A highly-available deployment of IBM Security Access Manager for Mobile makes use of cluster configurations to replicate certain data from designated masters to configured nodes. Secondary masters are defined as failover points in the event that the primary

master fails. Additional masters are defined to scale with growth or to meet redundancy needs.

In a four-master cluster, what would a failover from the primary master result in?

  1. The secondary master assumes responsibility of primary master. During this time, configuration changes cannot be made. When the primary master is restored, transactional data is synchronized back to the primary master.

  2. The failover scheduler selects the next master, which assumes responsibility of primary master. During this time, configuration changes cannot be made. When the primary master is restored,transactional data is synchronized back to the primary master.

  3. The secondary master assumes responsibility of primary master. During this time, geolocation updates and configuration changes configuration changes may still be made. When the primary master is restored, transactional data is synchronized back to the primary master.

  4. The tertiary master, which is primary master to the quaternary master, assumes responsibility of primary master. During this time, configuration changes configuration changes may not be made. When the primary master is restored, transactional data is synchronized back to the primary master.

Answer: C

Question No: 24

What is the recommended sequence of steps to remove all the data from the runtime database?

  1. Remove all data from the runtime database, restart runtime

  2. Stop runtime, remove all data from the runtime database, start runtime

  3. Remove all data from the runtime database, refresh status, restart runtime

  4. Remove all data from the runtime database, refresh status, restart runtime

  5. Stop runtime, remove all data from the runtime database, refresh status, restart runtime

Answer: E

Question No: 25

The Appliance Dashboard shows a high-level view of current operations and statistics. One of these statistics is the current CPU activity.

Which set of steps is used if the CPU activity of a hardware appliance shows constant use and averages above sixty percent?

  1. Review the current trace level, the number of policies, and the use of PIPs. Then, add another CPU to the redundant CPU slot.

  2. Review the current trace level, the number policies, and the use of PIPs. Then, increase capacity by adding another hardware appliance.

  3. Disable all traces, clear out all logs, and switch partitions to allow the primary partition to be defragmented. Then, update the CPU to the latest current supported architecture.

  4. Disable all traces, clear out all logs, and switch partitions to allow the primary partition to bedefragmented. Then, purchase and load the Enterprise CPU Feature key to enable the secondary CPU.

Answer: C

Question No: 26

Which two features are available in ISAM for Mobile V8? (Choose two.)

  1. Web API Management

  2. Layer-6 load balancing

  3. Session Management Server

  4. Risk evaluation based on IP reputation

  5. Step up Authentication using out-of-the-box OTP#39;s

Answer: C,D

Question No: 27

Which two components are accessible from the back panel? (Choose two.)

  1. Fan modules

  2. USB connector

  3. Power supplies

  4. Network interfaces

  5. Serial connector for a terminal

Answer: C,E

Question No: 28

Which three outcomes are possible after calculating the risk score? (Choose three.)

  1. Deny

  2. Permit

  3. Redirect

  4. Deny with obligation

  5. Deny with authentication

  6. Permit with obligation or authentication

Answer: A,B,F

Reference:http://www- 01.ibm.com/support/knowledgecenter/SSELE6_8.0.0/com.ibm.ammob.doc_8.0/cpt/rbaAdm inRiskScoreCalculationandMatching.html

Question No: 29

Which two one-time password providers are supported by Security Access Manager for Mobile? (Choose two.)

  1. RSA one-time password provider

  2. Email one-time password provider

  3. SOTP one-time password provider

  4. HOTP one-time password provider

  5. Mobile one-time password provider

Answer: A,B

Question No: 30

Which two attributes may be automatically set during device registration? (Choose two.)

  1. stepUp

  2. deviceld

  3. isRegistered

  4. userConsent

  5. authenticationLevel

Answer: D,E

Reference:http://www- 01.ibm.com/support/knowledgecenter/SSELE6_8.0.0.4/com.ibm.isam.doc_8.0.0.4/admin/c pt/consent_based_device_registration.html(Content-based devise registration 3rd Para)

100% Free Download!
Download Free Demo:C2150-202 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass C2150-202 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE