An IBM Security Access Manager V9.0 deployment professional needs to create the HTTP- Tag-Value attribute to pass values to a backend server as headers. How can this be done?
A deployment professional in charge of a large deployment with replicated reverse proxy instances needs to keep junctions, template files, and configuration settings in sync between the instances. How can this be done?
A customer deployment consists of a large number of virtual host junction definitions. During a troubleshooting session the deployment professional realizes the WebSEAL logs do not distinguish between requests to different virtual hosts. How can this be remediated?
An attacker has compromised the private key associated with a certificate. Which two methods can be used to ensure that certificates have not been revoked by the Certification authority that issued it? (Choose two.)
An IBM Security Access Manager V9.0 deployment specialist is getting reports of failing requests. Analysis of a support file shows many connections to the backend server in TIME_WAIT state? Where is the setting "sysctl.net.ipv4.tcp_tw_reuse = 1" added?
There are random network errors occurring so the IBM Security Access Manager V9.0 deployment specialist has decided to enable Packet Tracing and feed the resulting pcap file into Wireshark for analysis. Which information is required to enable this feature?
The security deployment professional of an IBM Security Access Manager V9.0 solution has been using routing files to customize message logging. Which aspect of the logging activity can be controlled?