There is a connectivity issue between the IBM Security Access Manager V9.0 Reverse Proxy and the backend business application.
What troubleshooting command under Tools in the application SSH interface can be used to validate the Reverse Proxy can successfully connect to the backend host:port?
Correct Answer:
B
A customer's IBM Security Access Manager V9.0 deployment consists of a cluster with Primary and Secondary masters. The Primary master fails and becomes unavailable and prevents any policy updates.
Which action is required to ensure policy updates can be applied?
Correct Answer:
B
The appliance dashboard Reverse Proxy Health widget indicates a problem with the /snoop junction on the Test instance.
Which log file can be examined to find product errors?
Correct Answer:
C
Prior to installing a firmware update the deployment professional creates a snapshot of the appliance configuration. During acceptance testing of the new firmware it is discovered that the update introduced a bug.
How should the deployment professional restore the previous configuration?
Correct Answer:
A
A company is concerned that it possesses data in the user registry which belongs to several companies that are sharing an IBM Security Access Manager (ISAM) V9.0 deployment. The ISAM deployment professional wants to separate the user registry data so there is no data overlap and data integrity is maintained.
How can this be achieved in an ISAM environment?
Correct Answer:
B