An IBM Security Access Manager (ISAM) V9.0 deployment professional has downloaded a snapshot from an ISAM virtual appliance configured with reverse proxy. This snapshot is being applied to another virtual appliance.
Which condition must be met before applying a snapshot form one virtual appliance to another?
Correct Answer:
D
A deployment professional has a requirement to configure an OpenID provider which does not expose tokens to the end user.
Which grant type should be enabled when creating the federation?
Correct Answer:
D
The security deployment professional of an IBM Security Access Manager V9.0 solution has been using routing files to customize message logging.
Which aspect of the logging activity can be controlled?
Correct Answer:
A
An older, software based deployment has several active Policy Servers set up behind a load-balancer. An IBM Security Access Manager V9.0 appliance cluster supports how many active Policy Servers?
Correct Answer:
A
A customer's IBM Security Access Manager V9.0 deployment consists of reverse proxy appliances situated in the DMZ and primary master and secondary master appliances situated in the internal corporate network.
Which port and direction of the network traffic flow is required to support cluster services between the appliances situated in the DMZ and the internal corporate network segment?
Correct Answer:
A