1.
A company wants to query a database to obtain authorization data for an authenticated user from a DB2 database. The parameterized query is of the form SELECT * FROM AUTH_ATTRIBUTE_TABL WHERE REQUESTER_ID=?. Which of the following applies?
2.
An SLM Policy has been associated with a Web Service Gateway Service to restrict access to a backend web service if one of a number of conditions has been met. The conditions are described in a series of SLM statements. What Evaluation Method must be selected in the SLM Policy to ensure that every SLM statement is checked until a throttle condition is executed?
3.
A company wants to use the WebSphere DataPower SLM functionality with a schedule to monitor the number of messages being processed for a particular operation on week days in a Web Service Proxy. Messages should not be counted if they fail Signature Verification, but should be counted whether they pass Authentication and Authorization or not. Which of the following configurations would allow this?
4.
A company wants to use the WebSphere DataPower SLM functionality to monitor messages from particular partners for particular backend functionality. The company needs to set up Credential and Resource Classes. Which of the following configurations would meet the requirements?
5.
A company wants to use the WebSphere DataPower SLM functionality to enforce service levels for access to a backend web service. Which of the following Count and Latency monitor pairs are valid within SLM statements?
6.
In order to notify of policy violations for incoming web services, the solution implementer must:
7.
Review the following default security profile.

xmlns:wsu="http://docs.oasisopen.
org/wss/2004/01/oasis200401wssWS-Securityutility1.0.
xsd">
xmlns:dppolicy="http://www.datapower.com/policy"> http://docs.oasisopen.
org/wssx/
WS-Securitypolicy/
200512


Implements WAS Web Service WS-Security Default








sp:IncludeToken="http://docs.oasisopen.
org/wssx/
WS-Securitypolicy/
200512/IncludeToken/AlwaysToReci
pient">








sp:IncludeToken="http://docs.oasisopen.
org/wssx/
WS-Securitypolicy/
200512/IncludeToken/AlwaysToInitiat
or">
























Namespace="http://www.w3.org/2005/08/addressing"/>








Namespace="http://www.w3.org/2005/08/addressing"/>






Which of the following actions would satisfy the above policy?
8.
A new service is being developed and WebSphere DataPower is tasked with security for the web service. The use of WSPolicy is requested. In order to enforce the security requirements and communicate them to the client, the solution implementer should:
9.
A customer needs message privacy and message integrity on a given transaction, and prefers the use of WSPolicy. WebSphere DataPower must receive a username from each user, but no authentication is required. In order to implement this, without additional custom work, the solution implementer must:
10.
What is the difference between WebSphere Service Registry and Repository (WSRR) Subscription and WSRR Saved Search Subscription?