The administrator needs to identify any security role references and security constraints in a web application.
How can the administrator identify these roles and constraints?
Securing web applications using an assembly tool.
You can use three types of web login authentication mechanisms to configure a web application: basic authentication, form-based authentication and client certificate-based authentication. Protect web resources in a web application by assigning security roles to those resources.
A system administrator in a bank was asked by business users to determine the most accessed JSP page in a web application at normal work load for marketing purpose.
Which tool should the administrator use to find the most used JSP page?
Summary reports are available for each application server.
Tivoli Performance Viewer provides the following summary reports for each application server:
The servlet summary lists all servlets that are running in the current application server. Use the servlet summary view to quickly find the servlet that consumes the most time and the applications that use them, and to determine which servlets are invoked most often.
Etc.
A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changed so users only have to log in once, while keeping the above mentioned timeouts the same. The authentication mechanism available is Kerberos.
How should the administrator do this?
In WebSphere Application Server Version 6.1, a trust association interceptor (TAI) that uses the Simple and Protected GSS-API Negotiation Mechanism (SPNEGO) to securely negotiate and authenticate HTTP requests for secured resources was introduced. This function was deprecated In WebSphere Application Server 7.0. SPNEGO web authentication has taken its place to provide dynamic reload of the SPNEGO filters and to enable fallback to the application login method.
A system administrator has deployed an application. The development team has updated a new version of this application. The administrator needs to immediately deploy this updated application and guarantee that only this new edition is used by clients and that any service requests for the application are queued during the deployment of the new application.
How can the administrator achieve this task without any downtime to the application?
Performing an atomic rollout activates the new edition on half of the cluster first, and then activates the edition on the remaining half of the cluster. While the first half of the cluster is taken offline and updated, application requests are routed to the second half of the cluster. Verify that half the cluster can handle the entire load during the rollout period.
The application placement controller has been configured with elasticity mode enabled. Intermittently, all instances of a dynamic cluster are removed. After further review, the system administrator noticed that it occurs during peak load on another dynamic cluster.
The administrator wants to keep at least one instance available. Which configuration is needed in the dynamic clusters?
It is not recommended to enable elasticity mode when the following option is set in the administrative console for one or more dynamic clusters:
If other dynamic clusters need resources, stop all instances of this cluster during periods of inactivity.
If you have elasticity mode enabled and the option set, the application placement controller can remove all of the custom nodes in the cell.
Maile
4 days agoGeoffrey
10 days agoLavonda
12 days agoRoyce
27 days agoCatherin
29 days agoDana
1 months agoOna
1 months agoMarilynn
2 months agoNaomi
2 months agoColeen
2 months agoFloyd
2 months agoMattie
2 months agoBritt
3 months agoMelissa
3 months agoAsha
4 months agoDaryl
5 months agoLoise
5 months agoTiera
6 months ago