A system administrator needs to install WebSphere Application Server Network Deployment V8.5.5 multiple times and would like to automate the task of installing the product. The administrator wants to create a response file based on an initial installation and use this for future installations.
How can the administrator accomplish this task?
Correct Answer:D
Run the command to record a response file for the package installation. This command
uses the -skipInstall
Windows: IBMIM -record
References: https://www.ibm.com/support/knowledgecenter/SS4EKN_7.2.0/com.ibm.itm.doc_6.3/install/ record_resp_file.htm
There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configurator role access to a developer for a single application deployed in that cluster.
How should the administrator meet this requirement and restrict Configurator role access for a single application?
Correct Answer:D
Fine-grained administrative security
In releases prior to WebSphere® Application Server version 6.1, users granted administrative roles could administer all of the resources under the cell. WebSphere Application Server is now more fine-grained, meaning that access can be granted to each user per resource.
For example, users can be granted configurator access to a specific instance of a resource only (an application, an application server or a node).
To achieve this instance-based security or fine-grained security, resources that require the same privileges are placed in a group called the administrative authorization group or authorization group. Users can be granted access to the authorization group by assigning to them the required administrative role.
References: http://www- 01.ibm.com/support/knowledgecenter/SSEQTP_8.5.5/com.ibm.websphere.base.doc/ae/csec_fineg_admsec.html?cp=SSEQTP_8.5.5/1-8-1-30-3-3
An organization updated their LDAP directories and modified user roles. The roles that were configured to have access to a highly secured enterprise application were deleted and new roles with new names were created. The application then had security related exceptions.
How can a system administrator resolve the exceptions and restore security for the
application?
Correct Answer:A
A WebSphere Application Server cell was configured with a deployment manager node and a custom node. An operator manually changed some configuration files in the custom node, and the node became out of synch with the master repository.
The system administrator used the Synchronize button in the system administration session of the Integrated Solutions Console (ISC) to try to resynchronize the node, but the node remained out of sync.
What should the administrator do to fix it?
Correct Answer:A
Select "Full Resynchronize" in the console.
References: https://www-01.ibm.com/support/docview.wss?uid=swg21233075
The administrator needs to identify any security role references and security constraints in a web application.
How can the administrator identify these roles and constraints?
Correct Answer:C
Securing web applications using an assembly tool.
You can use three types of web login authentication mechanisms to configure a web application: basic authentication, form-based authentication and client certificate-based authentication. Protect web resources in a web application by assigning security roles to those resources.
References: https://www.ibm.com/support/knowledgecenter/SS7JFU_8.5.5/com.ibm.websphere.nd.doc/ ae/tsec_secweb_atk.html