The administrator needs to identify any security role references and security constraints in a web application.
How can the administrator identify these roles and constraints?
Answer : C
Securing web applications using an assembly tool.
You can use three types of web login authentication mechanisms to configure a web application: basic authentication, form-based authentication and client certificate-based authentication. Protect web resources in a web application by assigning security roles to those resources.
A system administrator has created a wsadmin script with several steps to install and configure an application and some resources in a WebSphere Application Server process. The script executed but the application was not installed successfully. The administrator suspects that the script has problems.
How can the administrator test and debug the script?
Answer : C
A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.
How should the administrator accomplish this?
Answer : A
Authenticate only when the URI is protected
The application server challenges the web client to provide authentication data when the web client accesses a Uniform Resource Identifier (URI) that is protected by a Java Platform, Enterprise Edition (Java EE) role. The authenticated identity is available only when the web client accesses a protected URI.
This option is the default Java EE web authentication behavior that is also available in previous releases of WebSphere Application Server.
A system administrator was asked by the development team to inform them of any warning message which contains a string ''Connection'' on a WebSphere Application Server with High Performance Extensible Logging (HPEL) enabled.
Answer : C
The High Performance Extensible Logging (HPEL) facility writes to the log and trace repositories in a binary format. You can view, query and filter the repository using the LogViewer command.
logviewer.sh -monitor -includeLoggers Connection
-monitor [integer]Specifies that you want the logViewer to continuously monitor the repository and output new log record entries as they are created. You can provide an optional integer argument after this parameter to specify how often you want the LogViewer tool to query the repository for new records. By default the logViewer queries the repository for new records every 5 seconds. When used with other filtering options, only those new records that match the filter criteria are displayed.
A system administrator wants to learn some of the Python scripting commands for the administration of the environment.
Which product feature should the administrator use?
Answer : D
A system administrator ran the backup Config command to backup the configuration using the -nostop option. The administrator changed the properties for the service integration environment by modifying the sib.properties file. During testing the administrator noticed Service Integration Bus related errors and wanted to restore the service integration environment. The administrator used the restore config command, but the tuning properties for the service integration environment were not restored.
How can the administrator prevent this issue?
Answer : B
The application placement controller has been configured with elasticity mode enabled. Intermittently, all instances of a dynamic cluster are removed. After further review, the system administrator noticed that it occurs during peak load on another dynamic cluster.
The administrator wants to keep at least one instance available. Which configuration is needed in the dynamic clusters?
Answer : D
It is not recommended to enable elasticity mode when the following option is set in the administrative console for one or more dynamic clusters:
If other dynamic clusters need resources, stop all instances of this cluster during periods of inactivity.
If you have elasticity mode enabled and the option set, the application placement controller can remove all of the custom nodes in the cell.