Free C9510-401 Exam Dumps

Question 11

A system administrator needs to install WebSphere Application Server Network Deployment V8.5.5 multiple times and would like to automate the task of installing the product. The administrator wants to create a response file based on an initial installation and use this for future installations.
How can the administrator accomplish this task?

Correct Answer:D
Run the command to record a response file for the package installation. This command
uses the -skipInstall argument, which records the installation commands without installing the Tivoli Monitoring packages. Substitute your own file name and location for the response file. Verify that the file paths that you enter exist. Installation Manager does not create directories for the response file:
Windows: IBMIM -record -skipInstall Unix/Linux: ./IBMIM -record -skipInstall
References: https://www.ibm.com/support/knowledgecenter/SS4EKN_7.2.0/com.ibm.itm.doc_6.3/install/ record_resp_file.htm

Question 12

There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configurator role access to a developer for a single application deployed in that cluster.
How should the administrator meet this requirement and restrict Configurator role access for a single application?

Correct Answer:D
Fine-grained administrative security
In releases prior to WebSphere® Application Server version 6.1, users granted administrative roles could administer all of the resources under the cell. WebSphere Application Server is now more fine-grained, meaning that access can be granted to each user per resource.
For example, users can be granted configurator access to a specific instance of a resource only (an application, an application server or a node).
To achieve this instance-based security or fine-grained security, resources that require the same privileges are placed in a group called the administrative authorization group or authorization group. Users can be granted access to the authorization group by assigning to them the required administrative role.
References: http://www- 01.ibm.com/support/knowledgecenter/SSEQTP_8.5.5/com.ibm.websphere.base.doc/ae/csec_fineg_admsec.html?cp=SSEQTP_8.5.5/1-8-1-30-3-3

Question 13

An organization updated their LDAP directories and modified user roles. The roles that were configured to have access to a highly secured enterprise application were deleted and new roles with new names were created. The application then had security related exceptions.
How can a system administrator resolve the exceptions and restore security for the
application?

Correct Answer:A

Question 14

A WebSphere Application Server cell was configured with a deployment manager node and a custom node. An operator manually changed some configuration files in the custom node, and the node became out of synch with the master repository.
The system administrator used the Synchronize button in the system administration session of the Integrated Solutions Console (ISC) to try to resynchronize the node, but the node remained out of sync.
What should the administrator do to fix it?

Correct Answer:A
Select "Full Resynchronize" in the console.
References: https://www-01.ibm.com/support/docview.wss?uid=swg21233075

Question 15

The administrator needs to identify any security role references and security constraints in a web application.
How can the administrator identify these roles and constraints?

Correct Answer:C
Securing web applications using an assembly tool.
You can use three types of web login authentication mechanisms to configure a web application: basic authentication, form-based authentication and client certificate-based authentication. Protect web resources in a web application by assigning security roles to those resources.
References: https://www.ibm.com/support/knowledgecenter/SS7JFU_8.5.5/com.ibm.websphere.nd.doc/ ae/tsec_secweb_atk.html