Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
C2150-201 Latest Exam (Nov 2017)

[Free] 2017(Nov) EnsurePass Passguide IBM C2150-201 Dumps with VCE and PDF 1-10

November 1, 2017

EnsurePass
2017 Nov IBM Official New Released C2150-201
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/C2150-201.html

Fundamentals of Applying IBM Security Systems Identity and Access Assurance

Question No: 1

Which two factors affect Security Access Manager for Enterprise Single Sign-On performance? (Choosetwo.)

  1. The total number of users with cached wallets

  2. The number of cached wallets on a workstation

  3. The synchronization schedule with the IMS server

  4. The number of times a user logs into the same workstation

  5. The number of concurrent users logged on with cached wallets

Answer: C,D

Question No: 2

Which component of the IBM Security Access Manager for Web Appliance performs front end load balancing?

  1. IBM Security Manager WebSEAL

  2. IBM Security Manager Policy Server

  3. IBM Security Web Gateway Appliance

  4. IBM Security Manager Authorization Server

Answer: C

Question No: 3

A company has a requirement that all account creations be logged into the ticketing system.

What is needed to send the new account information to the ticketing system in near-real- time?

  1. IBM Security Identity Manager Service

  2. IBM Security Identity Manager Adapter

  3. IBM Security Identity Manager Operation

  4. IBM Security Identity Manager JavaScript extension

Answer: B

Question No: 4

A customer has multiple Active Directory sites across the globe. The customer has to provision users to these sites that are geographically dispersed.

Which policy would be appropriate to use to achieve using IBM Security Identity Manager?

  1. Provisioning Policy

  2. Recertification Policy

  3. Service Selection Policy

  4. Separation of Duty Policy

Answer: A

Question No: 5

In the customer#39;s environment, a group of seven employees work within a room that has four PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU.

The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks.

Which IBM Security Access Manager for Enterprise Single Sign-On session management configuration would be used for three PCs for optimum performance?

  1. Citrix workstation

  2. Personal workstation

  3. Shared workstation, private desktop

  4. Shared workstation, shared desktop

Answer: C

Question No: 6

Which two statements are relevant when planning a scalable Security Access Manager for Enterprise Single Sign-On deployment? (Choose two.)

  1. Fingerprint authentication is not supported in a virtual appliance deployment.

  2. As the number of users increases, appropriate sizing and tuning become very important.

  3. A single instance of IMS server on a Websphere Application Server is all that is required.

  4. A clustered deployment of Websphere Application Servers allows for easy addition of IMS servers.

  5. A combination of AD and other LDAP directory servers is not supported and you must select one or the other.

Answer: A,D

Question No: 7

A large public insurance company#39;s employees have a wide variety of roles, from accounting to adjusting claims, to customer service. When employees switch departments and jobs, significant time can pass before the employee is removed from old systems and added to new systems. The delays create security issues and decrease productivity.

Which product can help this insurance company to deal with user accounts and security issues?

  1. IBM Security Identity Manager

  2. IBM Tivoli Federated Identity Manager

  3. IBM Security Access Manager for Web

  4. IBM Security Access Manager for Enterprise Single Sign-On

Answer: D

Question No: 8

A customer is using Microsoft Active Directory to manage access to all the applications in the organization. When an employee joins the organization, in order to set up his/her access to the applications through Active Directory, as a regular practice, the administrator would clone the Active Directory permissions from an existing employee in the same job role and assign it to the new employee. Over the years, employees have been changing their job roles within the organization. Whenever a job role change occurs, the same

practice of cloning the access from an existing employee in the new job role is followed. As the AD permissions are cloned, the existing permissions for the employee changing the job role are not removed.

What is the potential problem and solution for this customer?

  1. As the existing access is never cleaned up when an employee changes job roles and new access is assigned as per the new job role, many employees may be violating SoD policies. This problem can be identified and addressed by deploying IBM Security Access Manager and designing specific SoD policies.

  2. An annual revalidation of access will require a lot of manual effort in validating required access for an employee based on his/her job role. Also to maintain compliance, any access associated with the previous job role needs to be revoked. This problem can be addressed by deploying IBM Security Identity Manager to implement a Role Based Access Control (RBAC) model and automate role revalidation.

  3. An annual revalidation of access will require a lot of manual effort in validating required access for an employee based on his/her job role. Also to maintain compliance, any access associated with the previous job role needs to be revoked. This problem can be addressed by deploying IBM Security Access Manager to implement a Role Based Access Control (RBAC) model and automate role revalidation.

  4. An annual revalidation of access will require a lot of manual effort in validating required access for an employee based on his/her job role. Also to maintain compliance, any access associated with the previous job role needs to be revoked. This problem can be addressed by deploying IBM Security Access Manager to manage fine grained access on Active Directory, implement Single Sign-On and automate role revalidation.

Answer: A

Question No: 9

A company wants a high-performance system for collecting, analyzing, archiving and storing large volumes of security event logs.

Which IBM product will satisfy this need?

  1. IBM Security Identity Manager

  2. IBM Security Directory Server

  3. IBM Security Access Manager

  4. IBM Security QRadar Log Manager

Answer: D

Question No: 10

Which scenario is typical for onboarding a new web application into IBM Security Access Manager for Enterprise Single Sign-On?

  1. Use AccessStudio to create a profile in the test environment. Confirm the profile works and use it directly in the production environment.

  2. Create a junction configuration in the test environment, confirm successful authentication, export configuration from test import into production environment.

  3. Use AccessStudio directly in production environment to create a new application profile, confirm by using the test functionality in AccessStudio, and upload new application profile to production IMS server.

  4. Use AccessStudio to create a new application profile. Add a condition so the profile is only available to your test users. After confirmation of the test users, remove the condition to enable the profile for all users in the production environment.

Answer: D

100% Free Download!
Download Free Demo:C2150-201 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass C2150-201 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE