Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IBM Exam C9510-401 Topic 2 Question 106 Discussion

Actual exam question for IBM's C9510-401 exam
Question #: 106
Topic #: 2
[All C9510-401 Questions]

The administrator needs to identify any security role references and security constraints in a web application.

How can the administrator identify these roles and constraints?

Show Suggested Answer Hide Answer
Suggested Answer: C

Securing web applications using an assembly tool.

You can use three types of web login authentication mechanisms to configure a web application: basic authentication, form-based authentication and client certificate-based authentication. Protect web resources in a web application by assigning security roles to those resources.

References: https://www.ibm.com/support/knowledgecenter/SS7JFU_8.5.5/com.ibm.websphere.nd.doc/ae/tsec_secweb_atk.html


Contribute your Thoughts:

Na
6 days ago
This is a classic 'look under the hood' kind of question. I'd say the ibmconfig folder is the way to go. Who doesn't love a good ol' command line adventure?
upvoted 0 times
...
Olene
8 days ago
Wait, we have an EARExpander command? Sounds like something out of a magic trick! I'm going with the Web deployment descriptor on this one.
upvoted 0 times
...
An
14 days ago
The Integrated Solutions Console (ISC) is the way to go. Nothing beats a good old GUI for mapping security roles to users/groups.
upvoted 0 times
...
Fredric
18 days ago
The IBM Application Ext file? That's like trying to find a needle in a haystack. I'd go with the Web deployment descriptor - that's the obvious choice, right?
upvoted 0 times
Lanie
10 hours ago
I agree, the Web deployment descriptor is the way to go.
upvoted 0 times
...
...
Juan
24 days ago
I personally prefer mapping security roles to user/groups using the Integrated Solutions Console (ISC).
upvoted 0 times
...
Loreen
26 days ago
I think the Web deployment descriptor using IBM Assembly and Deploy Tools is the way to go.
upvoted 0 times
...
Mireya
27 days ago
I disagree, I believe the administrator should check the ibmconfig folder in the application after using the EARExpander command.
upvoted 0 times
...
Lashawna
1 months ago
I think the administrator can identify roles and constraints using the ibm-application-ext.xml file.
upvoted 0 times
...

Save Cancel