100 Important IBM WebSphere Application Server 6.1 Interview Question Answer Part-6
QUESTIN 51
What is the minimum administrative role that is required for an enterprise application to be started through the console?
QUESTION 52
The application server is architected to use an existing user registry that stores administrative users and application users. What is needed to setup this architecture?
QUESTION 53
Which two tasks can be performed using the IBM Key Management Utility (IKeyman) for managing SSL for IBM HTTP Server?
QUESTION 54
The Virtual Member Manager (VMM) in WebSphere is NOT able to federate which repository/registry?
QUESTION 55
Which statement most accurately defines the location of where the WebSphere security service runs?
QUESTION 56
When implementing WebSphere security, which statement is true about authentication and authorization credentials?
QUESTION 57
Which three steps are automatically performed to enable SSL between the HTTP plug-in and WebSphere application server?
QUESTION 58
Assume that a federated repository is configured from three existing repositories: A, B and C, A user tries to log in but is denied access. What is a possible reason for the login failure?
QUESTION 59
What is the minimum administrative role required for Java 2 security to be enabled through the administrative console?
QUESTION 60
What are three goals of the Virtual Member Manager (VMM)?
What is the minimum administrative role that is required for an enterprise application to be started through the console?
- Operator
- Administrator
- Configurator
- Monitor
QUESTION 52
The application server is architected to use an existing user registry that stores administrative users and application users. What is needed to setup this architecture?
- Configure the JNDI path to the security database
- Configure the connection to the existing user registry
- Retrieve a list of nodes and node agents contained within the cell
- Generate Web services binding for the existing user registry
QUESTION 53
Which two tasks can be performed using the IBM Key Management Utility (IKeyman) for managing SSL for IBM HTTP Server?
- Install GSKit
- Create a key database file
- Create self-signed certificate
- Edit httpd.conf to use a certificate
- Sign certificates on certificate authority’s (CA) behalf
QUESTION 54
The Virtual Member Manager (VMM) in WebSphere is NOT able to federate which repository/registry?
- The file-based repository that is built into the system
- One or more external LDAP repositories
- A JDBC accessible database repository
- Local operating system registry
QUESTION 55
Which statement most accurately defines the location of where the WebSphere security service runs?
- The security service runs on the LDAP server and is accessed through the application server node agent
- The security service runs in the federated nodes of the cell
- The security service runs on the deployment manager
- The security service runs locally in each of the WebSphere processes (deployment manager, node agent and application server.)
QUESTION 56
When implementing WebSphere security, which statement is true about authentication and authorization credentials?
- Authentication takes place utilizing a user registry, however authorization is done based on properties defined within the .ear file
- Both authentication and authorization require lookups to the security service LDAP database.
- WebSphere security processes run on a centralized security service LDAP database to facilitate single sign on administration of both authentication and authorization credentials.
- Authorization must occur before authentication to ensure the proper J2EE Security roles are utilized for the LDAP lookup.
QUESTION 57
Which three steps are automatically performed to enable SSL between the HTTP plug-in and WebSphere application server?
- Creation of keyrings and keys for the plug-in
- Creation of keyrings and keys for the application server
- Procurement of a certificate from a certificate authority (CA) for the plug-in
- Procurement of a certificate from a certificate authority (CA) for the application server
- Establishment of a trust relationship between the plug-in and the application server
- Importing the application server’s certificate to the trust file
QUESTION 58
Assume that a federated repository is configured from three existing repositories: A, B and C, A user tries to log in but is denied access. What is a possible reason for the login failure?
- The users ID does not exists in all three repositories
- One or more of the three repositories is not accessible
- The users ID is contained in repository A, which is a file-based repository
- The users LDAP Distinguished Name (DN) is not the same across all repositories.
QUESTION 59
What is the minimum administrative role required for Java 2 security to be enabled through the administrative console?
- Administrator
- Configurator
- Operator
- Security
QUESTION 60
What are three goals of the Virtual Member Manager (VMM)?
- Provide a repository that can span multiple WebSphere cells
- Provide a repository-independent programming interface
- Support various pluggable repositories
- Provide the ability for users to achieve a single view of their own multiple repositories in a federated model
- Provide a cache or repository information
Comments
Post a Comment