A system administrator needs to backup a WebSphere Application Server profile without disrupting normal operations. How can the administrator accomplish this?
A. Execute backupConfig.sh -nostop -profileName
B. Execute prnt.sh -nostop -backupProfile -profileName
C. Execute rnanageprofiles.sh -nostop -backupProfile -profileName
D. Use the administrative agent to configure a backup job without stopping the server.
A system administrator must configure IBM WebSphere Application Server Network Deployment V8.0 to authenticate users with a Windows domain. The administrator should configure a registry that is:
A. a local operating system (OS).
B. a Virtual Member Manager (VMM).
C. a registry that implements WebSphere Common Configuration Model (WCCM).
D. an Active Directory (AD) domain controller.
A system administrator creates a profile and selects the option to allow WebSphere Application Server to create the default certificate. After the certificate is created, what attributes can the administrator customize, if needed?
A. location and lifespan of the certificate
B. location, type, and password of the keystore
C. Distinguished name (DN) and lifespan of the certificate
D. Distinguished name (DN) and password of the keystore
In a network deployment cell, web users are prompted several times to authenticate.
What should the administrator do so that the users only need to authenticate once during a session?
A. Configure an authentication proxy server in the DMZ.
B. Enable the "Set security cookies to HTTPOnly" property for the global single sign-on configuration.
C. Enable single sign-on for the global security configuration and provide the necessary DNS domain names.
D. Increase the default LTPA timeout and the cache timeout values for forwarded credentials between servers.
A system administrator must deploy a new application that uses Java 2 security. There are several applications installed in the cell that use application security but not Java 2 security. How can the administrator enable support for Java 2 security without affecting the other applications?
A. Enable Java 2 security at the cell level and grant permissions only to the new application.
B. Configure a security domain with Java 2 security enabled for the application server that will host the new application.
C. Configure a security domain for the other applications in the cell with both Java 2 security enabled and application security.
D. Disable global security and configure a security domain with Java 2 security enabled for the application server that will host the new application.
A system administrator needs to enable security auditing.
What additional configuration steps are required before auditing becomes effective?
A. Configure the types of events that are recorded.
B. Configure the types of events that are recorded, and configure failure notifications.
C. Create a set of users or groups mapped to the Admin Security Manager role.
D. Create a set of users or groups mapped to the Auditor role, and define the notification mechanism.
A system administrator needs to enable Single Sign On (SSO) using LTPA between WebSphere cells. What must the administrator do to accomplish this?
A. Configure both cells to share LDAP keys.
B. Configure both cells to use the same user registry.
C. Ensure URL requests use only host names or IP addresses.
D. Ensure each cell is in a unique Domain Name System (DNS).
The lead administrator needs to limit access to the Integrated Solutions Console (ISC) by a group of administrators who only need to: ?view the configuration of the WebSphere Application Server. ?monitor its status. ?stop and start the server.
To what administrative role should the lead administrator assign this group?
A. Auditor
B. Monitor
C. Operator
D. Configurator
A system administrator needs to modify the Java 2 security permissions for applications running on a server. How should the administrator perform this task?
A. Use the PolicyTool.
B. Use the iKeyman tool.
C. Edit the was.policy file.
D. Edit the security.xml file.
An application server is configured with the default garbage collection (GC) policy. An administrator needs to load test different GC policies. How can the administrator change the server's GC policy?
A. Start the node agent from the command line using the -Xgcpolicy option, and specify the server name.
B. Start the administrative agent from the command line using the -Xgcpolicy option and specify the server name.
C. Use Integrated Solutions Console (ISC) to navigate to the server's JVM configuration and add an appropriate -Xgcpolicy setting.
D. Use Integrated Solutions Console (ISC) to navigate to the deployment manager's JVM configuration and add an appropriate -Xgcpolicy setting.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IBM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C9510-317 exam preparations and IBM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.