The solution implementer needs to configure the DataPower appliance to restrict user account access to specific domains. The solution implementer implements this requirement by configuring the Domain Restriction section of the user account. During application execution, the configured user account is able to access a domain that is configured as restricted (no access allowed by this user). What should the solution implementer identify as a valid source of the problem?
A company-wide Certificate Authority (CA) provides its internal CA root and intermediary certificates to the solution implementer to use for the creation of Validation Credentials that validates several back end servers using SSL. The two lines of business in the company provide services on two different domains on DataPower and two different banks of servers on the back end. The requirement is to share a single copy of the CA certificates to create validation credentials in two domains for both the lines of business to simplify maintenance. How can the solution implementer satisfy the requirement?
A solution implementer is deploying four DataPower XI52 appliances in a production environment. The requirement is to evenly distribute client traffic across all four appliances without using an external load balancer. The firmware on these four appliances has the Application Optimization feature enabled. A standby Virtual IP address (VIP) has also been configured on each appliance with self-balancing enabled, and each VIP specifies the same standby group. No other appliance network settings have been changed. What should the solution implementer verify with the network team to ensure that this configuration will work? Ensure the network supports:
A company has DataPower XI52 physical appliances supporting its production environment. The only optional feature that these appliances support is the Option for Application Optimization. The company also uses DataPower Integration Appliance XI52 Virtual Edition for Non Production Environment for its development and test environment. Development management is concerned about their developers using features on the virtual appliance that are not licensed on the production appliances. How can the solution implementer restrict the use of specific features on the virtual appliances?
A solution implementer is configuring a AAA Policy to secure a DataPower service. Why would the solution
implementer configure Mapping Authentication Credentials and Mapping Requested Resources in the
DataPower AAA Policy? (Choose 2)
A solution implementer needs to configure SSL mutual authentication between DataPower and a secure backend server. The secure backend server requires the client to send a certificate for authentication. What step must the solution implementer take to allow SSL mutual authentication when DataPower acts as the client in this scenario?
A company has an extensive list of Miscellaneous XML Threats that they require protection from. The list includes:
- XML Entity Expansion and Recursion Attacks
- XML Wellformedness-based Parser Attacks
- Memory Space Breach and Buffer Overflow Attacks
- Public Key DoS Attacks
- Resource Hijack Attacks
What must the solution implementer do to protect SOA Applications exposed via a WSDL and a Web Service Proxy service?
A customer wants to protect communication between two WebSphere DataPower Appliances against a replay attack. The second DataPower appliance needs to validate that the message received from the first appliance has spent no more than 30 seconds in transit. How should the solution implementer satisfy this requirement?
A solution implementer has been provided the following security requirements to implement a solution for a company to transact business with its business partners. Message Confidentiality none can see the message in transit in clear text between the company and partner end points Message Integrity - no man-in-the-middle tampered with the message between the company and partner end points Non-repudiation - be able to verify the senders are who they say they are What actions should the solution implementer take to satisfy all the requirements?
A service needs to be configured on the DataPower appliance to allow a client to share access to a private
resource. This sharing must be done without the sharing of user credentials. A solution implementer has
decided to implement an OAuth solution for the customer. Which of the following are available to the solution
implementer to implement OAuth? (Choose 3)