A system administrator needs to install WebSphere Application Server using response files, so that a silent install can be done. The administrator has ensured that all required prerequisites have already been installed and, has downloaded and expanded the required WebSphere Application Server installation files.
What can the administrator run to install the product?
Answer : C
Example of the use of the response files to install the product.
imcl.exe -acceptLicense
input C:\temp\keyring_response_file.xml
-log C:\temp\keyring_log.xml
References:
A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.
What should the administrator do to implement the required security configuration?
Answer : C
select the type of user registry that you need for your environment:
References: WebSphere Application Server V8.5 Administration and Configuration Guide for the Full Profile (July 2013), page 212
How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the server's file system?
Answer : C
When Java 2 security is enabled for a WebSphere Application Server, all the applications that run on WebSphere Application Server undergo a security check before accessing system resources. An application might need a was.policy file if it accesses resources that require more permissions than those granted in the default app.policy file
There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configurator role access to a developer for a single application deployed in that cluster.
How should the administrator meet this requirement and restrict Configurator role access for a single application?
Answer : D
Fine-grained administrative security
In releases prior to WebSphere Application Server version 6.1, users granted administrative roles could administer all of the resources under the cell. WebSphere Application Server is now more fine-grained, meaning that access can be granted to each user per resource.
For example, users can be granted configurator access to a specific instance of a resource only (an application, an application server or a node).
To achieve this instance-based security or fine-grained security, resources that require the same privileges are placed in a group called the administrative authorization group or authorization group. Users can be granted access to the authorization group by assigning to them the required administrative role.
A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.
How should the administrator accomplish this?
Answer : A
Authenticate only when the URI is protected
The application server challenges the web client to provide authentication data when the web client accesses a Uniform Resource Identifier (URI) that is protected by a Java Platform, Enterprise Edition (Java EE) role. The authenticated identity is available only when the web client accesses a protected URI.
This option is the default Java EE web authentication behavior that is also available in previous releases of WebSphere Application Server.
Within a WebSphere Application Server Network Deployment cell, a system administrator needs to write a script to determine if a particular server is stopped. It is important that the wsadmin script explicitly return a status of stopped as opposed to just failing.
What wsadmin object should the administrator use to write this script?
Answer : D
Use the AdminControl object to invoke operational commands that manage objects for the application server.
Many of the AdminControl commands have multiple signatures so that they can either invoke in a raw mode using parameters that are specified by Java Management Extensions (JMX), or by using strings for parameters. In addition to operational commands, the AdminControl object supports some utility commands for tracing, reconnecting with a server, and converting data types.
A system administrator wants to learn some of the Jython scripting commands for the administration of the environment.
Which product feature should the administrator use?
Answer : D