Which of the following is true about certificate expiration monitoring?
A. Must be run manually.
B. Must be run on the deployment manager.
C. Deletes the certificates after they are expired, but does not replace them.
D. Can replace expired certificates or certificates in the expiration threshold with a new certificate
Correct Answer: D
Certificate monitor configuration settings can be configured on the administrative console by selecting Security > SSL certificate and key management > Manage certificate expiration. . On the Manage certificate expiration panel, you can perform the following functions. Set the expiration threshold in the box labeled Expiration replacement threshold. The expiration replacement threshold is the number of days before a certificate expiration that a certificate can be replaced and has a default value of 60 days. Delete the certificates after they are replaced by selecting the Delete expiring certificates and signers after replacement box. This box is selected by default. Etc.
An administrator is using the Guided Troubleshooter in the IBM Support Assistant to troubleshoot IBM WebSphere Application Server issues. After going through data collection and analysis, no reliable solution is found.
What is the administrator's best next step?
A. Call in a new PMR with IBM and upload Troubleshooter data to ECuREP.
B. Open a new PMR with IBM and upload SystemOut.log from the IBM WebSphere Application Server.
C. Submit results to the IBM WebSphere Application Server forum for a quick response from other forum users.
D. Use the Guided Troubleshooter to open a service request with IBM, so all the troubleshooting data analyzed so far is uploaded automatically.
Correct Answer: D
Question 105:
When installing IBM WebSphere Application Server on a network file system, IBM Installation Manager fails with an insufficient disk space error.
How could this be resolved?
A. Increase disk space and try again.
B. Delete temporary files and try again.
C. Reboot operating system and try again.
D. Disable disk space checking in the config.ini and try again.
Correct Answer: D
On some network file systems, disk space might not be reported correctly at times; and you might need to bypass disk-space checking and proceed with your installation. To disable disk-space checking, specify the following system property in the config.ini file in IM_install_root/eclipse/configuration and restart Installation Manager.
Each application-specific directory contains the contents of the original EAR used to install the application.
Note: A node is a logical grouping of managed servers. Nodes can be managed or unmanaged. An unmanaged node does not have a node agent or administrative agent to manage its servers, whereas a managed node does. Both application servers and supported web servers can be on unmanaged or managed nodes.
Reference: WebSphere Application Server V8.5, July 2013, page 17
Question 107:
How can an administrator configure Web services security?
A. Customize WS-Security policy set and bindings and attach to Web services.
B. Configure global security with LDAP authentication and map the configuration to Web services.
C. Request application developer to use Web Services Security API to achieve Web services security.
D. Enable the Web Services Metadata Exchange (WS-MetadataExchange) protocol to enable message-level security.
Correct Answer: C
The Web Services Security specification provides a flexible framework for building secure web services to implement message content integrity and confidentiality. The Web Services Security service programming model supports this flexible framework by providing extension points to integrate new token formats, and methods to obtains keys needed for message protection. The application server programming model provides Web Services Security programming application programming interfaces (WSS API) for securing SOAP messages.
Note: WS-Security is a message-level standard that is based on securing SOAP messages through XML digital signature, confidentiality through XML encryption, and credential propagation through security tokens. The Web services security specification defines the facilities for protecting the integrity and confidentiality of a message and provides mechanisms for associating security-related claims with the message.
A system administrator has just enabled HPEL in the environment.
How can the administrator examine the logged data?
A. Use the ViewLog command.
B. Use the administrative console.
C. Use a text editor to open the systemOut.log file.
D. Use the IBM Support Assistant to analyze the text log.
Correct Answer: B
High Performance Extensible Logging (HPEL) is a log and trace facility that is provided as a part of WebSphere?Application Server. HPEL provides a log data repository, a trace data repository, and a text log file. The HPEL LogViewer is an easy-to-use, command-line tool provided for HPEL users to work with the log data and trace data repositories. Use the following command to view the full contents of your log and trace repositories: [Windows] (Windows) logViewer.bat [AIX HP-UX Solaris] (Unix- full profile) logViewer.sh [AIX HP-UX Solaris] (Unix- Liberty profile) logViewer
What is one way to determine if administrative security for IBM WebSphere Application Server is disabled when logging into the Integrated Solutions Console?
A. A user is not forced to use HTTPS (SSL).
B. An administrator is allowed to type any random password.
C. An administrator is prompted for user name, but not password.
D. When the username wasadmin is used to log in, the password used is the default "password".
Correct Answer: C
Congratulations! You have successfully manually disabled Global Security for your IBM WebSphere Application Server instance. You should now be able to access the WAS Integrated Solutions Console (ISC) without having to specify a password.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IBM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C9510-418 exam preparations and IBM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.