Full Name: IBM Security Verify Access V10.0 Deployment
Exam Code: C1000-129
Certification Overview
This intermediate level certification is intended for deployment professionals working with IBM Security Verify Access V10.0. These deployment professionals plan, install, configure, administer, tune and troubleshoot Security Verify Access installations. It is expected that the deployment professional is generally self-sufficient and can perform the tasks involved in the job role with limited assistance from peers, product documentation, and vendor support services.
IBM Security Verify Access Deployment Exam Summary:
Exam Name
|
IBM Certified Deployment Professional - Security Verify Access V10.0
|
Exam Code
|
C1000-129
|
Exam Price
|
$200 (USD)
|
Duration
|
90 mins
|
Number of Questions
|
61
|
Passing Score
|
61%
|
Books / Training | |
Sample Questions
|
|
Practice Exam
|
IBM C1000-129 Exam Syllabus Topics:
Topic | Details | Weights |
Planning | - Conduct planning workshops - Identify feature requirements - Plan firmware upgrade cycle - Perform solution sizing - Assess access control requirements - Assess log retention requirements - Assess federated single sign-on requirements |
12% |
Architecture and Design | - Select deployment patterns and topology - Design High Availability & Disaster Recovery architecture - Design deployment process (automated or manual) - Identify network requirements - Establish backup procedures - Identify server connections - Determine appropriate junction type - Identify required authentication methods - Identify required session failover |
15% |
Installation | - Find and download software and updates - Create virtual machine - Prepare user registry - Prepare database(s) - Deploy Security Verify Access containers - Activate required offerings and install the support license - Perform network configuration - Import necessary personal and signer certificates |
13% |
Configuration | - Configure cluster - Configure base runtime component - Integrate federated directories - Configure reverse proxy instance - Configure authorization server - Configure LMI external authentication and authorization - Configure base authorization policies - Create server connections - Configure multi-factor authentication (MFA) - Configure SCIM (System for Cross-domain Identity Management) - Configure API protection (OAUTH/OIDC) - Configure auditing |
16% |
System integration | - Configure Junction - Protect API endpoints accessed by API clients - Integrate with federated single sign-on partners - Configure desktop SSO (SPNEGO) - Configure token authentication - Setup monitoring framework - Configure external authentication interface - Integrate with SIEM systems |
16% |
Advanced customization | - Implement a context-based access control policy - Create risk profile - Implement identity mapping - Author custom policy information point (PIP) - Configure and customize a user self-care flow - Create JavaScript authentication mechanism - Create HTTP transformation rules - Implement OAUTH/OIDC customization - Configure device registration (Fingerprint) - Modify default template files - Integrate custom login application through External Authentication Interface (EAI) - Implement advanced authenticated user mapping - Implement access policy - Implement authorization (AUTHZ) rules for reverse proxy - Configure single sign-on using Federation STS - Configure mobile multi-factor authentication |
18% |
Testing, troubleshooting, and maintenance | - Apply interim fixes - Apply appliance firmware updates - Resolve common problems - Prepare backup storage system - Perform tuning - Configure logging and tracing - Engage with IBM Support |
10% |
0 comments:
Post a Comment