Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IBM Exam C9510-401 Topic 10 Question 82 Discussion

Actual exam question for IBM's C9510-401 exam
Question #: 82
Topic #: 10
[All C9510-401 Questions]

A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization.

How can a system administrator fix the issue ensuring only authorized access?

Show Suggested Answer Hide Answer
Suggested Answer: B

Problem(Abstract)

When setting up IBM Cognos within IBM WebSphere, the URI is not accessible. The error message when trying the Error! Hyperlink reference not valid. port>/p2pd/servlet/dispatch is

SRVE0255E: A WebGroup/Virtual Host to handle /p2pd/servlet/dispatch has not been defined.

Symptom

Unable to start IBM Cognos Business Intelligence

Cause

The virtual host does not contain IBM WebSphere Port that the Application server is listening on. This may be one of several reasons.

References: http://www-01.ibm.com/support/docview.wss?uid=swg21438842


Contribute your Thoughts:

Ardella
1 months ago
I bet the system admin is sitting there thinking, 'Why didn't I just use Azure AD from the start?'
upvoted 0 times
Shelba
4 days ago
C: D) Edit the application using an assembly tool to remove the security constraint defined for the servlet and reinstall the application.
upvoted 0 times
...
Asuncion
10 days ago
B: That sounds like a good solution to ensure only authorized access.
upvoted 0 times
...
Ty
23 days ago
A: B) Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped to groups in the correct user registry.
upvoted 0 times
...
...
Katie
1 months ago
I'm going with B. It's the only option that actually addresses the root cause of the issue without creating new problems.
upvoted 0 times
Emeline
3 days ago
User1: I think B is the best option here.
upvoted 0 times
...
...
Alonzo
2 months ago
C and D are just plain wrong. Editing the application and reinstalling it? That's way too much work for a simple authorization problem.
upvoted 0 times
Johnna
15 days ago
B) Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped to groups in the correct user registry.
upvoted 0 times
...
Lawana
1 months ago
A) Using the Integrated Solutions Console (ISC), map all security roles to the special subject Everyone.
upvoted 0 times
...
...
Craig
2 months ago
Option A is a terrible idea. Mapping everything to the 'Everyone' subject would completely defeat the purpose of having authorization controls in the first place!
upvoted 0 times
Broderick
13 days ago
Definitely, we need to ensure only authorized users can invoke those methods.
upvoted 0 times
...
Gianna
25 days ago
Yeah, that way only users with the correct authorization can access the EJB methods.
upvoted 0 times
...
Deonna
1 months ago
I think option B is the best choice, mapping the security roles correctly.
upvoted 0 times
...
Jesusa
1 months ago
I agree, mapping everything to 'Everyone' is a huge security risk.
upvoted 0 times
...
...
Cecilia
2 months ago
I'm not sure about option B. Maybe we should also consider option C, adding a security constraint for the servlet to ensure authorized access.
upvoted 0 times
...
Oren
2 months ago
The correct answer is B. Mapping the security roles to the correct user registry is the way to fix the authorization issue while ensuring only authorized access.
upvoted 0 times
...
Mila
2 months ago
I agree with Jolanda. Mapping security roles to groups will help in controlling access to the EJB methods from the servlet.
upvoted 0 times
...
Jolanda
2 months ago
I think option B is the best solution. Mapping security roles to groups in the correct user registry will ensure only authorized access.
upvoted 0 times
...

Save Cancel