Which three actions are available underfirmare settings? (Choose three.)
A. Set inactive
B. Restore backup
C. Set active
D. Configure partition G Unconfigure partition
E. Edit
F. Create backup
正解:C,E,F
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
What is the initial administrative account password of the appliance?
A. password
B. supersecret
C. admin
D. superadmin
正解:C
質問 3:
A highly-available deployment of IBM Security Access Manager for Mobile makes use of cluster configurations to replicate certain data from designated masters to configured nodes. Secondary masters are defined as failover points in the event that the primary master fails. Additional masters are defined to scale with growth or to meet redundancy needs.
In a four-master cluster, what would a failover from the primary master result in?
A. The secondary master assumes responsibility of primary master. During this time, geolocation updates and configuration changes configuration changes may still be made. When the primary master is restored, transactional data is synchronized back to the primary master.
B. The tertiary master, which is primary master to the quaternary master, assumes responsibility of primary master. During this time, configuration changes configuration changes may not be made. When the primary master is restored, transactional data is synchronized back to the primary master.
C. The failover scheduler selects the next master, which assumes responsibility of primary master. During this time, configuration changes cannot be made. When the primary master is restored,transactional data is synchronized back to the primary master.
D. The secondary master assumes responsibility of primary master. During this time, configuration changes cannot be made. When the primary master is restored, transactional data is synchronized back to the primary master.
正解:A
質問 4:
Which rule must a policy include to require an unauthenticated user to consent to register a device?
A. The riskScore attribute is below a configured threshold and that will permit access with ObligationRegister Device.
B. The registeredDeviceCount is missing or set to zero and that permits access with Obligation Register Device.
C. The userConsent attribute is not present and that will permit access with Authentication Consent Register Device.
D. The userConsent attribute is set to true and that permits access with Obligation Register Device.
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
Which two actions convert an active firmware partition to an inactive partition? (Choose two.)
A. Click Set active under Manage System Settings > System Settings > Firmware Settings
B. Set active on inactive partition
C. Set inactive on active partition
D. Edit active and inactive partitions and restart the appliance
E. Click Set inactive under Manage System Settings > System Settings > Firmware Settings
F. Install firmware update and restart the appliance
正解:C,E
質問 6:
A customer has the following limitation for OAuth2 workflow: OAuth clients shall keep their client credentials confidential when authenticating with the authorization server.
Which authorization grant type is suitable for this work flow limitation?
A. Client credential flow
B. Resource owner password credentials flow
C. Authorization code flow
D. Client authorization code credential flow
E. Access token with refresh token flow
正解:A,C
解説: (Pass4Test メンバーにのみ表示されます)
質問 7:
As the administrator for ISAM for Mobile, you are tasked with setting up risk based policies
that allow access to resources outside of normal hours after additional authentication. The landing pages for the resources are on different servers that are in different domains. You add info.js to the landing pages for each resource.
Which mechanism should be used to ensure the risk based policies are evaluated correctly for each resource?
A. Cross Site Scripting
B. Cross Script Java Sharing
C. Cross Site Request Forgery
D. Cross Origin Resource Sharing
正解:C
Sakuragawa -
C2150-202試験に受かりました!!Pass4Test本当に有難うございます!C1000-132また買いに来ます。