QUESTION
NO: 56
A system administrator needs to
enable security auditing. What additional configuration steps arerequired before auditing becomes effective?
A. Configure the types of events that are recorded.
B. Configure the types of events that are recorded, and configure failure notifications.
C. Create a set of users or groups mapped to the Admin Security Manager role.
D. Create a set of users or groups mapped to the Auditor role, and define the notification
mechanism.
Answer: D
QUESTION
NO: 57
A system administrator must
deploy a new application that uses Java 2 security. There are severalapplications installed in the cell that use application security but not Java 2 security. How can the
administrator enable support for Java 2 security without affecting the other applications?
A. Enable Java 2 security at the cell level and grant permissions only to the new application.
B. Configure a security domain with Java 2 security enabled for the application server that will host
the new application.
C. Configure a security domain for the other applications in the cell with both Java 2 security
enabled and application security.
D. Disable global security and configure a security domain with Java 2 security enabled for the
application server that will host the new application.
Answer: B
QUESTION
NO: 58
In a network deployment cell, web
users are prompted several times to authenticate. What shouldthe administrator do so that the users only need to authenticate once during a session?
A. Configure an authentication proxy server in the DMZ.
B. Enable the "Set security cookies to HTTPOnly" property for the global single sign-on
configuration.
C. Enable single sign-on for the global security configuration and provide the necessary DNS
domain names.
D. Increase the default LTPA timeout and the cache timeout values for forwarded credentials
between servers.
Answer: C
QUESTION
NO: 59
A system administrator creates a profile and
selects the option to allow WebSphere
ApplicationServer to create the default certificate. After the certificate is created, what attributes can the
administrator customize, if needed?
A. location and lifespan of the certificate
B. location, type, and password of the keystore
C. Distinguished name (DN) and lifespan of the certificate
D. Distinguished name (DN) and password of the keystore
Answer: C
QUESTION
NO: 60
A system administrator must
configure IBM WebSphere
Application Server Network DeploymentV8.0 to authenticate users with a Windows domain. The administrator should configure a registry
that is:
A. a local operating system (OS).
B. a Virtual Member Manager (VMM).
C. a registry that implements WebSphere Common Configuration Model (WCCM).
D. an Active Directory (AD) domain controller.
Answer: A
QUESTION
NO: 61
A system administrator needs to
backup a WebSphere
Application Server profile withoutdisrupting normal operations.
How can the administrator accomplish this?
A. Execute backupConfig.sh -nostop -profileName <profile>
B. Execute prnt.sh -nostop -backupProfile -profileName <profile>
C. Execute rnanageprofiles.sh -nostop -backupProfile -profileName <profile>
D. Use the administrative agent to configure a backup job without stopping the server.
Answer: A
Hi friends, Are there any dumps for 401 websphere 8.5.5
ReplyDelete