Thursday, 31 August 2017

C2150-604 IBM Security SiteProtector System V3.1.1 Security Analysis

Test information:
Number of questions: 50
Time allowed in minutes: 90
Required passing score: 62%
Languages: English

Related certifications:
IBM Certified Analyst - Security SiteProtector System V3.1.1

The test consists of 5 sections containing a total of approximately 50 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 - Monitor, analyze, categorize, and manage the events (22%)
View event details, and understand their criticality and security event information. For example, utilize the Guided Questions to gather information about an event or group of events and the Baseline function to monitor changes in the number of events.

Use filters in event analysis including basic filtering, incident/exceptions baseline and events aggregation.
Use the ticketing system to manage security incidents.

Section 2 - Monitor the system�s health (19%)
Monitor the components of the SiteProtector system.
Monitor the agents managed by the SiteProtector system.
Manage system alerts, notifications and health status indicators.
Configure notifications to receive alerts for specific health status.

Section 3 - Tuning (18%)
Manage SiteProtector policies.
Apply and manage PAM tuning parameters.
Manage and maintain the SiteProtector database.

Section 4 - Maintain the SiteProtector system components (22%)
Demonstrate understanding of SiteProtector architecture.
Update SiteProtector components.
Maintain the license.
Correct common SiteProtector error messages.

Section 5 - Report (18%)
Identify the appropriate report template for report generation.
Create a report.
Manage reports.
Schedule the report.
Use the Analysis tab for report generation.
Troubleshoot common report generation issues.

IBM Certified Analyst - Security SiteProtector System V3.1.1

Job Role Description / Target Audience
This intermediate level certification is for security analysts who monitor, analyze, categorize, and manage the events, monitor the system-s health, tune, maintain the SiteProtector system components and create reports. They also perform routine software operational tasks and product maintenance.

These security analysts are generally self-sufficient and able to perform most of the tasks involved in the job role with limited assistance.

To attain the IBM Certified Analyst - Security SiteProtector System V3.1.1 certification, candidates must pass 1 test. To prepare for the test, it is recommended to refer to the job role description and recommended prerequisite skills, and click the test link below to refer to the test objectives (skills measured on the test) and the test preparation tab (for educational sources and sample questions).

Recommended Prerequisite Skills
Basic product knowledge of IBM Security Network Intrusion Prevention System (GX) V4.6.2 and IBM Security Network Protection (XGS) V5.3.1
SQL Server function and basic administration of Windows server operating system
Knowledge of network security

Thursday, 24 August 2017

C5050-300 Foundations of IBM DevOps V1

Test information:
Number of questions: 61
Time allowed in minutes: 90
Required passing score: 70%
Languages: English, Japanese

Related certifications:
IBM Certified Solution Advisor - DevOps V1

Section 1 - DevOps Principles
Define DevOps
Summarize different development approaches
Explain and identify delivery pipelines
Explain lean principles
Explain DevOps practices
Describe Collaborative Development
Describe Continuous Integration
Describe Continuous Delivery
Describe Continuous Deployment
Describe Continuous Availability / Service Management / Monitoring
Describe Continuous Security / Security for DevOps
Explain Shift-Left Test /Continuous Test
Explain Shift Left Ops
Explain Multi-speed IT
Explain Continuous Feedback
Explain the implications of the �12 Factor app� design principles for DevOps
ITIL and DevOps

Section 2 - Adopting DevOps
Describe business and IT drivers of DevOps
Explain the barriers to adoption of DevOps
Explain how to build a roadmap for DevOps adoption
Explain how to adopt DevOps in Multi-speed IT environment
Explain other continuous improvement approaches
Illustrate the cultural & organizational differences when transforming from traditional to DevOps processes
Explain the benefits of Design Thinking for DevOps process adoption

Section 3 - IBM DevOps Reference Architecture & Methods
Describe IBM DevOps Reference Architecture pattern
Explain the IBM point of view on DevOps
Explain DevOps for Microservices
Explain DevOps for Cloud Native
Explain DevOps for Cloud Ready
Explain Cloud Service Management Operations
Describe the IBM Bluemix Garage Method
Define and identify the common components of a DevOps Tool chain
Describe the key architectural decisions made to adopt DevOps
Describe the concepts of Software Defined Environments

Section 4 - Open Standards, Open Source & Other Common Components of DevOps
Identify tools for Build & Deploy
Identify other common tools and their uses
Describe common container technology
Explain the applicability of open standards for DevOps

Section 5 - IBM Solution for DevOps
Describe the IBM solutions for the THINK phase in DevOps
Describe the IBM solutions for the CODE phase in DevOps
Describe the IBM solutions for the DELIVER phase in DevOps
Describe the IBM solutions for the RUN phase in DevOps
Describe the IBM solutions for the MANAGE phase in DevOps
Describe the IBM solutions for the LEARN phase in DevOps
Describe the IBM solutions for the CULTURE phase in DevOps
Describe the IBM solutions for Security in DevOps
Describe the IBM solutions for transformation and connectivity in DevOps
IBM Certified Solution Advisor - DevOps V1

Job Role Description / Target Audience
An IBM Certified Solution Advisor - DevOps V1 is a person who can clearly explain the benefits and underlying concepts of DevOps, and has practical experience of implementing DevOps processes and solutions for clients. They can advise stakeholders on how to adopt DevOps, how to overcome barriers, and how to realize the business benefits of DevOps. They can also demonstrate how the leading industry, Open and IBM solution offerings can help customers realize these benefits.

Key areas of competency include:
Clearly articulate the benefits of DevOps for driving business agility and continuous innovation.
Advise stakeholders on how to remove barriers to the adoption of DevOps, and implement organizational change and continual process improvement.
Have a deep working experience of Continuous delivery (integration, delivery, collaboration, innovation) practices.
Experience of application development lifecycle, operational methods, SCM, version control and common tooling for cloud-ready and cloud-native application development.
Working knowledge of development, test automation and virtualization, deployment, and operational best practices.
Understand the IBM DevOps reference architecture patterns, and can apply them to DevOps solutions.
Recommend the best approach, tooling and consumption models (on premises / public / SaaS) across the IBM solution portfolio (and leading open toolchain components).

Recommended Prerequisite Skills

The following qualifications are requirements for success:
Advanced knowledge of DevOps principles, practices, and development approaches
Advanced experience of Continuous delivery (integration, delivery, collaboration, innovation) practices.
Working knowledge of the IBM DevOps Reference Architecture and associated adoption patterns.
Working knowledge of tooling and consumption models (on-premises / public / SaaS) from the IBM DevOps portfolio.
Working knowledge of the IBM DevOps solution offerings.

Requirements
This certification requires 1 test(s).



QUESTION 1
Which type of tests are designed to verify that security features such as authentication and logout work as expected?

A. build verification
B. network vulnerability
C. functional security
D. synthetic user

Answer: B


QUESTION 2
When long lived source control management (SCM) branches are merged, significant amounts of network can be required to resolve code conflicts. Which DevOps practice addresses this problem?

A. continuous integration
B. test-driven development
C. A/B testing
D. continuous deployment

Answer: B


QUESTION 3
What are two key metrics for cloud native applications? (Choose two.)

A. performance
B. stability
C. mean time between failures (MTBF)
D. first failure data capture (FFDC)
E. speed of change

Answer: A,E

Explanation: References:


QUESTION 4
Which volume of the Information Technology Infrastructure Library (ITIL) should be an integral part of every stage of the ITIL service management framework?

A. ITILService Design
B. ITIL Service Operations
C. ITIL Continual Service Improvement
D. ITIL Service Strategy

Answer: C

Explanation: References:


QUESTION 5
How does adopting DevOps help improve insight into the real value of applications?

A. by using mean time between failure (MTBF) metrics
B. by using customer feedback
C. by using usage statistics for cloud native applications
D. by using analytical analysis for return on investment (ROI) calculations

Answer: A


Friday, 11 August 2017

C2150-210 IBM Security Identity Governance Fundamentals V5.1

Test information:
Number of questions: 47
Time allowed in minutes: 90
Required passing score: 58%
Languages: English, French, Latin American Spanish, Portuguese (Brazil)

Related certifications:
IBM Certified Associate - Security Identity Governance V5.1

Certifications (13%)
Define certification dataset and campaign�
Define signoff options
Define supervisor and reviewer activities
Define notification configuration�

Role Management (9%)
Define role structure
Publish role and define visibility
Consolidate role

Role Mining (15%)
Load Access Optimizer data
Create Role Mining session
Analyse statistics charts to identify candidate role
Analyse assignment map to identify candidate role
Analyse entitlement and user coverage to identify candidate role�
Leverage candidate role in IAG warehouse

Role Maintanence and Health (6%)
Identify unused roles
Retire role
Setup Role Certification campaign

Reporting (13%)
Identify standard report
Customize report layout
Configure scope visibility
customize query and add filter criteria
configure authorization to report for selected users

Separation of Duties (17%)
Define Business Activities
Define SoD Policy
Define Technical Transformation
Analyse Risk Violations
Define Mitigation Controls
Setup Risk Violation Certification Campaign

Installation (9%)
Prepare database server and schema
Configure virtual machine
Install virtual appliance
Configure database connections

Enterprise Integration (4%)
Identity ISIM and ISIG integration options
Identify supported connectors

ISIG Authorization Model (9%)
Define functional authorization for ISIG users
Restrict the data portion for a functional authorization
Define and use Attribute Groups

Access Request Management (9%)
Identify common process activities
Identify UI customization options
Review access request status

IBM Certified Associate - Security Identity Governance V5.1
Job Role Description / Target Audience
An IBM Certified Associate - Security Identity Governance V5.1 is an individual with entry level knowledge and experience with IBM Security Identity Governance V5.1 . This individual is knowledgeable about the fundamental concepts of IBM Security Identity Governance V5.1 through hands on experience. The associate should have an in-depth knowledge of the basic to intermediate tasks required in day-to-day use of IBM Security Identity Governance V5.1 . The individual should be able to complete these tasks with little to not assistance from documentation, peers or support.

Key Areas of Competency
IBM Security Identity Governance UI from an admin and end user perspective
Identify the key ISIG features
Understand the benefits of using ISIG for identity and access governance.

Recommended Prerequisite Skills
Working end user knowledge of IBM Security Identity Governance V5.1
Understand Identity Governance, Risk and Compliance (GRC) infrastructure such as audit, reporting, access
review, and certification.
Experience with role modeling and role mining
Experience with role healthcare and maintenance.
Understand the ISIG entitlement model and how to leverage it to build target application authorization models.
Understand the ISIG authorization model and access governance responsibilities.
Experience performing an RFP in the access governance space.
Understand business activity-based separation of duties modeling for better business and auditor readability.
Understand typical functionality of access request workflows such as manager approvals.

Requirements
This certification requires 1 test(s).


Tuesday, 8 August 2017

C2150-201 Fundamentals of Applying IBM Security Systems Identity and Access Assurance

Test information:
Number of questions: 64
Time allowed in minutes: 105
Required passing score: 62%
Languages: English, French, Latin American Spanish, Portuguese (Brazil)

Related certifications:
IBM Certified Solution Advisor - Security Systems Identity and Access Assurance

Discovery (21%)
Application: Discover customers needs.
Application: Discover problems the customer is trying to solve.
Application: Analyze the maturity of the customer environment as related to security and IT process.
Application: Assess the current environment and map it to the technical requirements.
Application: Identify and map requirements into product capabilities.
Application: Prioritize the capabilities based on business value drivers and analysis.
Application: List the existing limitations of the customer environment.

Planning (23%)
Application: Prepare a conceptual view of the architecture.
Application: Prioritize and document the technical requirements.
Application: Plan requirements for performance, security, reporting, usability, availability, logging, and regulations. - performance includes product sizing
Comprehension: Identify general requirements for performance, security, reporting, usability, availability, logging, and regulations.
Application: Identify the feasibility requirements in terms of integration.
Application: Define integration points for in scope products with their existing architecture.
Comprehension: Describe product licensing models.
Application: Determine the cost benefit analysis for hardware and software implementation.

Design (26%)
Application: Prepare a Logical view of the architecture.
Application: Create scenarios that address customer's use cases.
Application: Provide suggestions based on product capability.
Application: Streamline and standardize the design based on industry best practices.
Application: Determine data flow model.
Application: Identify the scope and effort involved for customization.
Application: Demonstrate a proof-of-concept to showcase solution capabilities.
Application: Document solution customizations requirements and scope.
Application: Describe business/technical advantages of IBM Security Identity and Access Assurance solutions.
Application: Apply security and compliance concepts to the solution document.
Comprehension: Identify the prerequisites for software installation and configuration.

Develop (17%)
Application: Perform customizations that meet specific needs.
Application: Develop the Physical view from the Logical view.
Comprehension: Describe the basic installation and configuration options.
Application: Describe the basic performance tuning options.
Application: Determine the robustness and scaleability of the solution.

Transition (12%)
Application: Create a go-live plan based on UAT / pre-prod implementation steps including identifying potential pitfalls.

Comprehension: Identify skills a customer needs to have to maintain the solution.

Application: Identify best practices and work around to maintain the solution. - includes backup and restore. These topics are covered in the operational guide.

IBM Certified Solution Advisor - Security Systems Identity and Access Assurance

Job Role Description / Target Audience
An IBM Certified Solution Advisor - IBM Security Identity and Access Assurance is a person who identifies opportunities and influences direction for IBM security solutions within the customer environment and is responsible for educating and influencing key decision makers.

Recommended Prerequisite Skills
Map customer business requirements to IBM Security solutions.
Apply security and compliance concepts and standards to a customer's IT infrastructure.
Assess IT process maturity.
Assess the IT environment for security and compliance gaps.
Align IBM and business partner products and services to security and compliance opportunities.
Assess requirements and create a solution document.
Describe business/technical advantages of IBM Security Identity and Access Assurance solutions.
Apply security and compliance concepts to the solution document.
Recommend education opportunities to customer based on the IBM Security Identity and Access Assurance solutions.
Supply a transition document to interested parties.
Align the security solution with the architectural framework of the customer.
Understand the customer's business needs for identity and access management.
Understand government and industry regulatory compliance needs and requirements.

Requirements
Knowledge of IT security and compliance services (authorization, authentication, confidentiality, data integrity, non-repudiation). - Skill Level 3
Knowledge of IT process model (i.e. Information Technology Infrastructure Library (ITIL)). - Skill Level 2
Knowledge of process maturity models (i.e. Six Sigma). - Skill Level 1
Knowledge of IT security and compliance standards (government and civil), regulations, and certifications (PKI, SSL, SAML, Liberty, etc.). - Skill Level 2
Knowledge of IT professional security and compliance certifications such as CISSP. - Skill Level 1
Knowledge of IT directory/LDAP functionality. - Skill Level 2
Knowledge of IBM Pricing Model - Skill Level 2
Familiarity with key IBM Security Partner products (PKI - VeriSign etc.). - Skill Level 1
Understanding of IBM IBM Security Identity and Access Assurance products -DB2, Directory Integrator, WebSphere, IBM HTTP Server etc.). - Skill Level 2
Conceptual knowledge of networking environments and operating systems.


QUESTION 1
A customer has a requirement which is currently unavailable in an out-of-the-box product.
Who would be able to assist in troubleshooting the customer when developing a custom solution?

A. IBM Sales
B. IBM Support
C. IBM LAB Services
D. Raise an enhancement request with IBM

Answer: C

Explanation:


QUESTION 2
A customer's IT infrastructure includes ten different directories, one for each country branch. The
customer now needs a single directory for some centralized applications. The customer would like
to make as few changes in the environment as possible.
Which product do you recommend?

A. IBM Security Identity Manager
B. IBM Security Directory Server
C. IBM Security Directory Integrator
D. IBM Security Access Manager for Web

Answer: C

Explanation:


QUESTION 3
A company is planning to design an identity and access management solution across multiple data
centers which will automate the user life cycle management and streamline their access
management process.
Which two key design principles should be factored in for designing a comprehensive identity and
access management solution? (Choose two.)

A. Design for integrity
B. Design with single zone
C. Design for accountability
D. Design for single layer of defense
E. Design for single data center and then extend it

Answer: C,D

Explanation:


QUESTION 4
Which scenario is typical for onboarding a new web application into IBM Security Access Manager
for Enterprise Single Sign-On?

A. Use AccessStudio to create a profile in the test environment. Confirm the profile works and use
it directly in the production environment.
B. Create a junction configuration in the test environment, confirm successful authentication,
export configuration from test import into production environment.
C. Use AccessStudio directly in production environment to create a new application profile,
confirm by using the test functionality in AccessStudio, and upload new application profile to
production IMS server.
D. Use AccessStudio to create a new application profile. Add a condition so the profile is only
available to your test users. After confirmation of the test users, remove the condition to enable the
profile for all users in the production environment.

Answer: D

Explanation:


QUESTION 5
A company is using IBM Security Access Manager and wants to extend the functionality of the
help desk users so that they can assist the end user in troubleshooting and diagnostics.
Which WebSEAL functionality is used to allow help desk users to assume the identity of the user
who is a member of the Security Access Manager Domain?

A. Switch User function
B. Switch Admin function
C. Transfer User function
D. Switch Application function

Answer: A

Explanation: