A customer is migrating from TAM v6.1 running on AIX to IBM Security Access Manager (ISAM) V9.0 hardware appliance.Which information form the TAM v6.1 environment will be useful in sizing the new ISAM V9.0 hardware configuration?
There is an SSL connectivity issue between the IBM Security Access Manager V9.0 Reverse Proxy and the backend business application.Which Two troubleshooting commands under Tools in the application SSH interface can be used to validate the Reverse Proxy can successfully connect to the backend host: secure-port? (Choose two.)
An IBM Security Access Manager V9.0 Reverse Proxy has a stateful junction to a Portal application called "/wps" There is no web server in front of Portal. This junction has three Portal servers defined behind it. The Portal team needs to do maintenance on each of the three servers. The team wants to accomplish with least impact to end users.Which pdadmin "server task" based steps will accomplish this?
A customer received a replacement hardware appliance, but on boot up it has a different firmware than that for IBM Security Access Manager (ISAM) V9.0. The appliance needs to be flashed to ISAM V9.0. The appliance needs to be rebooted with a bootable USB drive formatted as FAT32.Which file format is needed to create the bootable drive?
A risk officer of an organization discovered that a site protected by the IBM Security Access Manager V9.0 solution might be vulnerable to common attacks like cross-site scripting (XSS) and SQL injection.Which optional component should be configured to protect against these attacks?
A customer has a developed an OAuth 2.0 Client application to access resources on behalf of a user. The customer states that the OAuth client has the following two constraints:1. The OAuth client is not capable of maintaining its credentials confidential for authentication with the authorization server.2. The resources owner does not have a trust relationship with the client.What is the suitable OAuth 2.0 grant type for the API Protection Policy if the user resource accessed by the OAuth 2.0 client is to be protected by IBM SecurityAccess Manager V9.0?