C2150-201 Fundamentals of Applying IBM Security Systems Identity and Access Assurance

By
With
Comments Off on C2150-201 Fundamentals of Applying IBM Security Systems Identity and Access Assurance

Test information:
Number of questions: 64
Time allowed in minutes: 105
Required passing score: 62%
Languages: English, French, Latin American Spanish, Portuguese (Brazil)

Related certifications:
IBM Certified Solution Advisor – Security Systems Identity and Access Assurance

Discovery (21%)
Application: Discover customers needs.
Application: Discover problems the customer is trying to solve.
Application: Analyze the maturity of the customer environment as related to security and IT process.
Application: Assess the current environment and map it to the technical requirements.
Application: Identify and map requirements into product capabilities.
Application: Prioritize the capabilities based on business value drivers and analysis.
Application: List the existing limitations of the customer environment.

Planning (23%)
Application: Prepare a conceptual view of the architecture.
Application: Prioritize and document the technical requirements.
Application: Plan requirements for performance, security, reporting, usability, availability, logging, and regulations. – performance includes product sizing
Comprehension: Identify general requirements for performance, security, reporting, usability, availability, logging, and regulations.
Application: Identify the feasibility requirements in terms of integration.
Application: Define integration points for in scope products with their existing architecture.
Comprehension: Describe product licensing models.
Application: Determine the cost benefit analysis for hardware and software implementation.

Design (26%)
Application: Prepare a Logical view of the architecture.
Application: Create scenarios that address customer’s use cases.
Application: Provide suggestions based on product capability.
Application: Streamline and standardize the design based on industry best practices.
Application: Determine data flow model.
Application: Identify the scope and effort involved for customization.
Application: Demonstrate a proof-of-concept to showcase solution capabilities.
Application: Document solution customizations requirements and scope.
Application: Describe business/technical advantages of IBM Security Identity and Access Assurance solutions.
Application: Apply security and compliance concepts to the solution document.
Comprehension: Identify the prerequisites for software installation and configuration.

Develop (17%)
Application: Perform customizations that meet specific needs.
Application: Develop the Physical view from the Logical view.
Comprehension: Describe the basic installation and configuration options.
Application: Describe the basic performance tuning options.
Application: Determine the robustness and scaleability of the solution.

Transition (12%)
Application: Create a go-live plan based on UAT / pre-prod implementation steps including identifying potential pitfalls.

Comprehension: Identify skills a customer needs to have to maintain the solution.

Application: Identify best practices and work around to maintain the solution. – includes backup and restore. These topics are covered in the operational guide.

IBM Certified Solution Advisor – Security Systems Identity and Access Assurance

Job Role Description / Target Audience
An IBM Certified Solution Advisor – IBM Security Identity and Access Assurance is a person who identifies opportunities and influences direction for IBM security solutions within the customer environment and is responsible for educating and influencing key decision makers.

Recommended Prerequisite Skills
Map customer business requirements to IBM Security solutions.
Apply security and compliance concepts and standards to a customer’s IT infrastructure.
Assess IT process maturity.
Assess the IT environment for security and compliance gaps.
Align IBM and business partner products and services to security and compliance opportunities.
Assess requirements and create a solution document.
Describe business/technical advantages of IBM Security Identity and Access Assurance solutions.
Apply security and compliance concepts to the solution document.
Recommend education opportunities to customer based on the IBM Security Identity and Access Assurance solutions.
Supply a transition document to interested parties.
Align the security solution with the architectural framework of the customer.
Understand the customer’s business needs for identity and access management.
Understand government and industry regulatory compliance needs and requirements.

Requirements
Knowledge of IT security and compliance services (authorization, authentication, confidentiality, data integrity, non-repudiation). – Skill Level 3
Knowledge of IT process model (i.e. Information Technology Infrastructure Library (ITIL)). – Skill Level 2
Knowledge of process maturity models (i.e. Six Sigma). – Skill Level 1
Knowledge of IT security and compliance standards (government and civil), regulations, and certifications (PKI, SSL, SAML, Liberty, etc.). – Skill Level 2
Knowledge of IT professional security and compliance certifications such as CISSP. – Skill Level 1
Knowledge of IT directory/LDAP functionality. – Skill Level 2
Knowledge of IBM Pricing Model – Skill Level 2
Familiarity with key IBM Security Partner products (PKI – VeriSign etc.). – Skill Level 1
Understanding of IBM IBM Security Identity and Access Assurance products -DB2, Directory Integrator, WebSphere, IBM HTTP Server etc.). – Skill Level 2
Conceptual knowledge of networking environments and operating systems.


QUESTION 1
A customer has a requirement which is currently unavailable in an out-of-the-box product.
Who would be able to assist in troubleshooting the customer when developing a custom solution?

A. IBM Sales
B. IBM Support
C. IBM LAB Services
D. Raise an enhancement request with IBM

Answer: C

Explanation:


QUESTION 2
A customer’s IT infrastructure includes ten different directories, one for each country branch. The
customer now needs a single directory for some centralized applications. The customer would like
to make as few changes in the environment as possible.
Which product do you recommend?

A. IBM Security Identity Manager
B. IBM Security Directory Server
C. IBM Security Directory Integrator
D. IBM Security Access Manager for Web

Answer: C

Explanation:


QUESTION 3
A company is planning to design an identity and access management solution across multiple data
centers which will automate the user life cycle management and streamline their access
management process.
Which two key design principles should be factored in for designing a comprehensive identity and
access management solution? (Choose two.)

A. Design for integrity
B. Design with single zone
C. Design for accountability
D. Design for single layer of defense
E. Design for single data center and then extend it

Answer: C,D

Explanation:


QUESTION 4
Which scenario is typical for onboarding a new web application into IBM Security Access Manager
for Enterprise Single Sign-On?

A. Use AccessStudio to create a profile in the test environment. Confirm the profile works and use
it directly in the production environment.
B. Create a junction configuration in the test environment, confirm successful authentication,
export configuration from test import into production environment.
C. Use AccessStudio directly in production environment to create a new application profile,
confirm by using the test functionality in AccessStudio, and upload new application profile to
production IMS server.
D. Use AccessStudio to create a new application profile. Add a condition so the profile is only
available to your test users. After confirmation of the test users, remove the condition to enable the
profile for all users in the production environment.

Answer: D

Explanation:


QUESTION 5
A company is using IBM Security Access Manager and wants to extend the functionality of the
help desk users so that they can assist the end user in troubleshooting and diagnostics.
Which WebSEAL functionality is used to allow help desk users to assume the identity of the user
who is a member of the Security Access Manager Domain?

A. Switch User function
B. Switch Admin function
C. Transfer User function
D. Switch Application function

Answer: A

Explanation:

Click here to view complete Q&A of C2150-201 exam
Certkingdom Review
, Certkingdom PDF C2150-201

 

MCTS Training, MCITP Trainnig

 

Best IBM C2150-201 Certification, IBM C2150-201 Training at certkingdom.com