1.
An organization updated their LDAP directories and modified user roles. The roles that were configured to have access to a highly secured enterprise application were deleted and new roles with new names were created. The application then had security related exceptions. How can a system administrator resolve the exceptions and restore security for the application?
2.
There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configuration role access to a developer for a single application deployed in that cluster.How should the administrator meet this requirement and restrict Configuration role access for a single application?
3.
A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changes so users only have to log in once, while keeping the above-mentioned timeouts the same. The authentication mechanism available is Kerberos. How should the administrator do this?
4.
How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the server's file system?
5.
A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured. How should the administrator accomplish this?
6.
A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization. How can a system administrator fix the issue ensuring only authorized access?
7.
A system administrator needs to deploy a new enterprise application which requires that application security be enabled, but, the existing applications in the cell cannot be executed with application security enabled. The cell has the global security and Java 2 security disabled. How can the administrator handle this requirement?
8.
A system administrator needs to view the list of certificates for unmanaged web server located on a remote system. How should the administrator do this?
9.
A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users. What should the administrator do to implement the required security configuration?
10.
A web application was deployed on a WebSphere Application Server cluster. While users are using the application, one of the cluster servers fails and the users lose their working data. What can the system administrator configure to ensure users can continue to work if one of the cluster servers fails?