1.
A customer wants to deploy WebSphere DataPower in the DMZ to authenticate and authorize client requests sent by an external partner company before passing these requests to a backend. The employees of the partner company change rapidly so individual partner employee credential data should not be held locally by the customer. To simplify the configuration of the DMZ, DataPower should perform authentication and authorization on the device. Which of the following configurations will allow this?
2.
The implementation of Authentication and Authorization using WebSphere DataPower for a particular project requires a custom stylesheet. Which of the following is a valid reason for this?
3.
For virusscanning message attachment , WebSphere DataPower appliances use which protocol to support integration with 3rdparty virus scanners?
4.
A company has an extensive list of Miscellaneous XML Threats that they require protection from.
This list includes:
XML Entity Expansion and Recursion Attacks
XML Wellformednessbased
Parser Attacks
Memory Space Breach and Buffer Overflow Attacks
Public Key DoS Attacks
Resource Hijack Attacks
Schema Poisoning Attacks
What must this company do to protect SOA Applications exposed via a WSDL and a WSProxy service?
5.
A company wants to implement an XMLbased service that returns customer data. Which of the following configuration steps in an Multi-Protocol Gateway (MPGW) can be used to prevent malicious requests from returning data for multiple customers?
6.
A company is receiving malicious web service payloads that contain thousands of extraneous XML namespaces. What can be done in a WebSphere DataPower service to prevent this type of attack?
7.
A company wants to ensure that all its backend SOAP/HTTPS services are protected from unauthorized internal access. The security architect has recommended SSL mutual authentication to be configured from WebSphere DataPower to the backend services. The SSL profile for mutual authentication is correctly configured on DataPower and the implementer wants to confirm if the backend services have configured their mutual authentication correctly. A successful transaction is run through DataPower to the backend services. Which of the following tests could the solution implementer use to confirm that mutual authentication is working correctly end-toend?
8.
A company is using a DataPower Multi-Protocol Gateway (MPGW) service to dynamically choose between two thirdparty backend service providers, each using SSL for security. Which of the following would be the MOST secure option for the company to connect to either service?
9.
Connectivity to which of the following protocols can be directly protected with SSL mutual authentication in WebSphere DataPower using firmware V3.8.1?
10.
Which is NOT a valid characteristic of a Front Side Handler?