Description
This intermediate stage certification is supposed for deployment experts running with IBM Security Access Manager V9.0 (ISAM).
These deployment experts plan, deployation, configure, administer, hold, song and troubleshoot ISAM installations.
To achieve the IBM Certified Deployment Professional – Security Access Manager V9.0 certification, applicants should byskip 1 check. To put together for the check, it’s far endorsed to consult the activity function description and endorsed prerequisite skills, and click on the hyperlink to the check beneath to consult the check targets and the check guidance tab.
Recommended Skills
Basic understanding of:
working structures and databases.
hardware or digital machines.
networking and protocols.
auditing and compliance.
statistics protection regulations (HIPPA, SOX).
Public Key Infrastructure fundamentals (PKI).
Directory offerings fundamentals.
Web server fundamentals
Firewall concepts
Authentication and authorization concepts
Single Sign-On protocols (Kerberos, SAML, OAuth, OpenID Connect)
Multi-element authentication (One-time password)
Requirements
Exam C2150-609: IBM Security Access Manager V9.0 Deployment
The check:
carries questions requiring unmarried and more than one solutions. For more than one-solution questions, you want to select all required alternatives to get the solution correct. You can be recommended what number of alternatives make up the ideal solution.
is designed to offer diagnostic comments at the Examination Score Report, correlating lower back to the check targets, informing the check taker how she or he did on every phase of the check. As a result, to hold the integrity of every check, questions and solutions aren’t distributed.
Exam Objectives
Please be aware this examination has been withdrawn and could get replaced with the aid of using the examination C1000-129
The check includes 5 sections containing a complete of about 69 more than one-preference questions. The possibilities after every phase identify mirror the approximate distribution of the full query set throughout the sections.
Number of questions: 69
Number of inquiries to byskip: 44
Time allowed: 105 minutes
Status: Withdrawn
Section 1: Plan14�monstrate a understanding of the functions and talents of the ISAM Base, ISAM Advanced Access Control Module, and ISAM Federation Module.
Demonstrate understanding of ISAM deployment patterns, along with designing for excessive availability and figuring out potential requirements.
Apply specific community layout principles, along with suitable subnets interface, static routing, ports (firewall) and default gateway.
Section 2: Install12%
Setup DNS, time, license, activation, firmware, and fixpack degrees on the preliminary installation.
Prepare for rack space, power, cabling, and control interface IP and deployation the hardware equipment.
Prepare and deployation the equipment in unique digital environments.
Prepare an outside excessive quantity database to be used with ISAM.
Section 3: Configure, personalize and integrate39%
Use PKI, along with finishing the undertaking of producing certificates requests and/or uploading certificate into the proper certificates repository (KDB document).
Configure Web Components – Runtime and Reverse Proxy the usage of LMI and REST API, along with making use of difficult and gentle limits to junctions, Single Sign-On technique and junction type; configure Kerberos.
Configure the Advanced Access Control Module the usage of LMI and REST API, along with Risk Profiles, Authentication, Policies, Custom Attributes, Obligations, PIP, and isamcfg.
Configure Federation Components the usage of LMI and REST API, along with Federations, Partners, and Runtime along with switch of metadata, mapping rules, cloud connectors and isamcfg.
Configure Federated Directory(s).
Configure Protocol Analysis Module (PAM).
Create custom roles for delegated management of the ISAM equipment functionality; externalize equipment authentication and authorization.
Configure rather to be had ISAM environments the usage of clustering, replicated proxies, DSC, front-quit load balancer.
Section 4: Administer and maintain22%
Monitor crucial overall performance metrics and availability, along with occasions and alerts.
Demonstrate an know-how of numerous backup and healing strategies, along with snapshots.
Configure log files, along with their roll over settings.
Maintain SSL keystores, along with figuring out expired certificate.
Use the ISAM stop, start, failover functions to intention for constrained down-time at some point of upkeep slots.
Perform coverage management.
Monitor IBM help internet site for announcements and fixpacks; observe as necessary.
Section 5: Troubleshoot and tune13%
Examine and song settings, along with superior parameters for TCP/IP.
Navigate to and consider logs at the equipment and search for applicable messages.
Enable and assessment community and ISAM-unique lines and recognize auditing talents; carry out community troubleshooting the usage of ping, traceroute, connect.
Take a help document extract and ship and/or take a look at for troubles and add them to IBM Support as a part of the PMR process
Reviews
0.0 Average Rating Rated ( 0 Review )
There are no reviews yet.