Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IBM Exam C9510-401 Topic 6 Question 104 Discussion

Actual exam question for IBM's C9510-401 exam
Question #: 104
Topic #: 6
[All C9510-401 Questions]

The administrator needs to identify any security role references and security constraints in a web application.

How can the administrator identify these roles and constraints?

Show Suggested Answer Hide Answer
Suggested Answer: C

Securing web applications using an assembly tool.

You can use three types of web login authentication mechanisms to configure a web application: basic authentication, form-based authentication and client certificate-based authentication. Protect web resources in a web application by assigning security roles to those resources.

References: https://www.ibm.com/support/knowledgecenter/SS7JFU_8.5.5/com.ibm.websphere.nd.doc/ae/tsec_secweb_atk.html


Contribute your Thoughts:

Nickolas
1 months ago
The administrator needs to identify security roles? Easy, just dress up as the Hamburglar and steal 'em all!
upvoted 0 times
...
Vince
1 months ago
Wait, there's an EARExpander command? Sounds like a fun little tool to play with. I bet it's hidden in the ibmconfig folder somewhere.
upvoted 0 times
Lacey
22 days ago
C) Web deployment descriptor using IBM Assembly and Deploy Tools.
upvoted 0 times
...
Aracelis
23 days ago
B) ibmconfig folder in the application after using the EARExpander command.
upvoted 0 times
...
Gerald
1 months ago
A) ibm-application-ext.xml file using a text editor.
upvoted 0 times
...
...
Katlyn
1 months ago
Hmm, the ISC might be the way to go if you need to map security roles to users or groups. Gotta love those integrated solutions!
upvoted 0 times
Delsie
26 days ago
D) Security role to user/group mapping by using the Integrated Solutions Console (ISC).
upvoted 0 times
...
Hyun
1 months ago
C) Web deployment descriptor using IBM Assembly and Deploy Tools.
upvoted 0 times
...
Ahmed
1 months ago
B) ibmconfig folder in the application after using the EARExpander command.
upvoted 0 times
...
Justine
1 months ago
A) ibm-application-ext.xml file using a text editor.
upvoted 0 times
...
...
Twanna
2 months ago
I prefer mapping security roles to user/groups using the Integrated Solutions Console (ISC). It's more efficient.
upvoted 0 times
...
Avery
2 months ago
Ahh yes, the good old ibm-application-ext.xml file. That's where I always go when I need to find security roles and constraints. Such a classic!
upvoted 0 times
...
Bernardo
2 months ago
Option C seems like the way to go. I'm pretty sure the Web deployment descriptor is where you can find all the security role and constraint info.
upvoted 0 times
Phyliss
18 days ago
No problem! It's always good to know where to find important security information in a web application.
upvoted 0 times
...
Gregg
25 days ago
I think I'll check out the Web deployment descriptor too. Thanks for the tip!
upvoted 0 times
...
Tamera
26 days ago
Yes, you're right. The Web deployment descriptor is the place to look for that information.
upvoted 0 times
...
Golda
2 months ago
Option C seems like the way to go. I'm pretty sure the Web deployment descriptor is where you can find all the security role and constraint info.
upvoted 0 times
...
...
Louisa
2 months ago
I think the best way is to check the Web deployment descriptor using IBM Assembly and Deploy Tools.
upvoted 0 times
...
Lorean
2 months ago
I think the administrator can identify roles and constraints by using the ibm-application-ext.xml file.
upvoted 0 times
...
Alaine
2 months ago
I disagree, I believe the administrator should check the ibmconfig folder in the application after using the EARExpander command.
upvoted 0 times
...

Save Cancel