Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IBM Exam C9510-401 Topic 6 Question 104 Discussion

Actual exam question for IBM's C9510-401 exam
Question #: 104
Topic #: 6
[All C9510-401 Questions]

The administrator needs to identify any security role references and security constraints in a web application.

How can the administrator identify these roles and constraints?

Show Suggested Answer Hide Answer
Suggested Answer: C

Securing web applications using an assembly tool.

You can use three types of web login authentication mechanisms to configure a web application: basic authentication, form-based authentication and client certificate-based authentication. Protect web resources in a web application by assigning security roles to those resources.

References: https://www.ibm.com/support/knowledgecenter/SS7JFU_8.5.5/com.ibm.websphere.nd.doc/ae/tsec_secweb_atk.html


Contribute your Thoughts:

Nickolas
18 days ago
The administrator needs to identify security roles? Easy, just dress up as the Hamburglar and steal 'em all!
upvoted 0 times
...
Vince
19 days ago
Wait, there's an EARExpander command? Sounds like a fun little tool to play with. I bet it's hidden in the ibmconfig folder somewhere.
upvoted 0 times
Lacey
2 days ago
C) Web deployment descriptor using IBM Assembly and Deploy Tools.
upvoted 0 times
...
Aracelis
4 days ago
B) ibmconfig folder in the application after using the EARExpander command.
upvoted 0 times
...
Gerald
13 days ago
A) ibm-application-ext.xml file using a text editor.
upvoted 0 times
...
...
Katlyn
26 days ago
Hmm, the ISC might be the way to go if you need to map security roles to users or groups. Gotta love those integrated solutions!
upvoted 0 times
Delsie
7 days ago
D) Security role to user/group mapping by using the Integrated Solutions Console (ISC).
upvoted 0 times
...
Hyun
12 days ago
C) Web deployment descriptor using IBM Assembly and Deploy Tools.
upvoted 0 times
...
Ahmed
13 days ago
B) ibmconfig folder in the application after using the EARExpander command.
upvoted 0 times
...
Justine
14 days ago
A) ibm-application-ext.xml file using a text editor.
upvoted 0 times
...
...
Twanna
1 months ago
I prefer mapping security roles to user/groups using the Integrated Solutions Console (ISC). It's more efficient.
upvoted 0 times
...
Avery
1 months ago
Ahh yes, the good old ibm-application-ext.xml file. That's where I always go when I need to find security roles and constraints. Such a classic!
upvoted 0 times
...
Bernardo
1 months ago
Option C seems like the way to go. I'm pretty sure the Web deployment descriptor is where you can find all the security role and constraint info.
upvoted 0 times
Gregg
6 days ago
I think I'll check out the Web deployment descriptor too. Thanks for the tip!
upvoted 0 times
...
Tamera
7 days ago
Yes, you're right. The Web deployment descriptor is the place to look for that information.
upvoted 0 times
...
Golda
29 days ago
Option C seems like the way to go. I'm pretty sure the Web deployment descriptor is where you can find all the security role and constraint info.
upvoted 0 times
...
...
Louisa
1 months ago
I think the best way is to check the Web deployment descriptor using IBM Assembly and Deploy Tools.
upvoted 0 times
...
Lorean
2 months ago
I think the administrator can identify roles and constraints by using the ibm-application-ext.xml file.
upvoted 0 times
...
Alaine
2 months ago
I disagree, I believe the administrator should check the ibmconfig folder in the application after using the EARExpander command.
upvoted 0 times
...

Save Cancel