01. Which user name must be used to log in to the local administrator account when using external LDAP management authentication?
a) admin@isva
b) admin@local
c) admin@internal
d) admin@appliance
02. Complex authentication scenarios based on custom conditions can be implemented in Advanced Access Control. To add a branching workflow to a policy, a Decision can be added to the policy workflow steps.
Select three references a Decision can contain.
a) Risk profile
b) API contract
c) URI mapping
d) Mapping rule
e) Template page
f) List of branches
03. What is the purpose of adding a branching decision to an Advanced Access Control authentication policy?
a) It allows a decision point to be included in an authentication policy.
b) It allows an authentication mechanism to use multiple different template files.
c) It allows one authentication mechanism to call another authentication mechanism.
d) It allows an authentication policy to use multiple instances of the same authentication mechanism.
04. Which two capabilities are part of the Advanced Access Control offering?
a) SAML authentication
b) Application firewall
c) Security Token Service
d) Advanced authentication service
e) API protection (OAuth and OIDC)
05. Alex wants the latest firmware upgrades to be automatically available for installation on an IBM Security Verify Access deployment. Alex set up network connectivity between the appliance and an online update server.
Which additional step is necessary for this to succeed?
a) Install a valid license file.
b) Apply at least one activation level to the appliance.
c) Obtain latest version of eAssembly from IBM Passport Advantage.
d) Configure a new IP address on the appliance for downloading from update server.
06. Why are multiple IP addresses in an IBM Security Verify Access appliance recommended?
a) To assure correct routing of requests
b) To make the appliance easier to configure and manage
c) To clearly and securely separate management traffic from runtime traffic
d) To prevent congestion when communication is restricted to a single IP address
07. When identifying federated single sign-on scenarios, what key piece of information is essential in building out an authentication flow?
a) What to name the federation partners
b) Whether to use RSA or Elliptic Curve signing and verification
c) Whether or not the partner has a highly available solution
d) Whether IBM Security Verify Access is acting as an identity provider or service provider
08. As part of user registration through the SCIM API, Alex wants to ensure that the userName attribute can be set only once. Which attribute mode allows this requirement to be enforced?
a) UserWrite
b) ReadWrite
c) Immutable
d) AdminWrite
09. Which core IBM Security Verify Access capability is supported for basic users?
a) Failover cookies
b) Per-user password policy
c) Global sign-on (GSO) lockbox
d) Access control lists (ACL) for individual users
10. IBM Security Verify Access is configured to use the IBM Security Directory Server with forms-based login for user authentication. What are the three primary sizing considerations for the IBM Directory Server scenario?
a) Authentication rate
b) High volume database
c) Session management server database
d) IBM Security Verify Access data model
e) DB2 high availability and disaster recovery
f) Size and number of LDAP attributes inserted in the credential