A customer's IBM Security Access Manager V9.0 deployment consists of reverse proxy appliances situated in the DMZ and primary master and secondary master appliances situated in the internal corporate network.Which port and direction of the network traffic flow is required to support cluster services between the appliances situated in the DMZ and the internal corporate network segment?
A customer is deploying an IBM Security Access Manager V9.0 solution to protect back end resources and is planning to use an LDAP Server that is set up to useSSL server authentication.What is required to enable SSL to secure communications with LDAP?
A customer has expressed the requirement that users accessing online-banking application must first authenticate using a userid/password and successfully enter a one-time PIN which is texted to a cell phone.Which two IBM Security Access Manager (ISAM) V9.0 modules are required to fully implement the solution? (Choose two.)
A company wants to accelerate cloud adoption by integrating with popular public SaaS applications. The IBM Security Access Manager V9.0 deployment professional has determined there are Quick Connectors available for the chosen SaaS applications.Which task does the deployment professional need to perform?
A deployment professional has configured SNMP on all IBM Security Access Manager V9.0 appliances and is using the agentless adapter from Tivoli Monitoring to pull OS level CPU, Memory, Disk and Processes information.Which alert can be setup in Tivoli Monitoring based on the data extracted?
A customer has an IBM Security Access Manager V9.0 appliance cluster spanning two data centers A and B. Data center A has the Primary Master and twoRestricted nodes. Data center B has a Secondary Master and two Restricted Nodes. A Load Balancer with redundancy across data centers provides sticky load balancing to reverse proxies in both data centers.What is true if a disaster recovery testing scenario takes down all appliances in data center A?