A system administrator needs to deploy a new enterprise application which requires that application security be enabled, but, the existing applications in the cell cannot be executed with application security enabled. The cell has the global security and Java 2 security disabled.
How can the administrator handle this requirement?
Correct Answer:
C
When Java 2 security is enabled for a WebSphere Application Server, all the applications that run on WebSphere Application Server undergo a security check before accessing system resources. An application might need a was.policy file if it accesses resources that require more permissions than those granted in the default app.policy file
References: https://www-01.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/tsec_ waspolicy.html
A system administrator is required to monitor the application server logs for heap memory issues and determine if the heap memory usage is reaching close to 70% of the maximum heap. The application server is configured with an initial heap of 256 MB and a max heap of 1 GB.
How should the administrator determine if the application server is utilizing 70% of the max allocated heap memory?
Correct Answer:
B
Enabling verboseGC (Garbage Collection) output is often required when diagnosing issues with WebSphere Application Server. Because verboseGC data is critical to troubleshooting memory and performance problems and the overhead is generally very low, you may want to consider proactively enabling it in your environment.
References: http://www-01.ibm.com/support/docview.wss?uid=swg21114927
A system administrator needs to view the list of certificates for unmanaged web server located on a remote system.
How should the administrator do this?
Correct Answer:
C
You do not have a secure network connection until you have created a key for secure network communications and received a certificate from a certificate authority (CA) who is designated as a trusted CA on your server. Use IKEYMAN to create the key database file, public-private key pair, and certificate request. After you receive the CA-signed certificate, use IKEYMAN to receive the certificate into the key database where you created the original certificate request.
References: http://www- 01.ibm.com/software/webservers/httpservers/doc/v10/ibm/9atikeyu.htm
An organization updated their LDAP directories and modified user roles. The roles that were configured to have access to a highly secured enterprise application were deleted and new roles with new names were created. The application then had security related exceptions.
How can a system administrator resolve the exceptions and restore security for the
application?
Correct Answer:
A
A JAX-WS EJB stateless session bean web service needs to be accessed by consumers outside the corporate domain.
Which configuration will help a system administrator meet the requirement?
Correct Answer:
A