The administrator needs to identify any security role references and security constraints in a web application.
How can the administrator identify these roles and constraints?
Securing web applications using an assembly tool.
You can use three types of web login authentication mechanisms to configure a web application: basic authentication, form-based authentication and client certificate-based authentication. Protect web resources in a web application by assigning security roles to those resources.
A system administrator needs to install WebSphere Application Server using response files, so that a silent install can be done. The administrator has ensured that all required prerequisites have already been installed and, has downloaded and expanded the required WebSphere Application Server installation files.
What can the administrator run to install the product?
Example of the use of the response files to install the product.
imcl.exe -acceptLicense
input C:\temp\keyring_response_file.xml
-log C:\temp\keyring_log.xml
References:
The administrator needs to identify any security role references and security constraints in a web application.
How can the administrator identify these roles and constraints?
Securing web applications using an assembly tool.
You can use three types of web login authentication mechanisms to configure a web application: basic authentication, form-based authentication and client certificate-based authentication. Protect web resources in a web application by assigning security roles to those resources.
A system administrator in a bank was asked by business users to determine the most accessed JSP page in a web application at normal work load for marketing purpose.
Which tool should the administrator use to find the most used JSP page?
Summary reports are available for each application server.
Tivoli Performance Viewer provides the following summary reports for each application server:
The servlet summary lists all servlets that are running in the current application server. Use the servlet summary view to quickly find the servlet that consumes the most time and the applications that use them, and to determine which servlets are invoked most often.
Etc.
A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changed so users only have to log in once, while keeping the above mentioned timeouts the same. The authentication mechanism available is Kerberos.
How should the administrator do this?
In WebSphere Application Server Version 6.1, a trust association interceptor (TAI) that uses the Simple and Protected GSS-API Negotiation Mechanism (SPNEGO) to securely negotiate and authenticate HTTP requests for secured resources was introduced. This function was deprecated In WebSphere Application Server 7.0. SPNEGO web authentication has taken its place to provide dynamic reload of the SPNEGO filters and to enable fallback to the application login method.
Zachary
5 days agoLoreen
14 days agoEdda
20 days agoKindra
1 months agoKimi
1 months agoMaile
1 months agoGeoffrey
2 months agoLavonda
2 months agoRoyce
2 months agoCatherin
2 months agoDana
2 months agoOna
3 months agoMarilynn
3 months agoNaomi
3 months agoColeen
4 months agoFloyd
4 months agoMattie
4 months agoBritt
4 months agoMelissa
4 months agoAsha
5 months agoDaryl
6 months agoLoise
7 months agoTiera
7 months ago