A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changed so users only have to log in once, while keeping the above mentioned timeouts the same. The authentication mechanism available is Kerberos.
How should the administrator do this?
Correct Answer:
B
In WebSphere Application Server Version 6.1, a trust association interceptor (TAI) that uses the Simple and Protected GSS-API Negotiation Mechanism (SPNEGO) to securely
negotiate and authenticate HTTP requests for secured resources was introduced. This function was deprecated In WebSphere Application Server 7.0. SPNEGO web authentication has taken its place to provide dynamic reload of the SPNEGO filters and to enable fallback to the application login method.
References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd. doc/ae/csec_ssovo.html
A system administrator, Admin1, with Administrator privileges has archived full repository checkpoints. Another administrator, Configurator1, with Configurator privileges has copied the checkpoint contents directory from one of the archived check points to its original location. Configurator1 tries to restore the configuration using the copied archived checkpoint contents and the restore fails.
How can Configurator1 restore the configuration using the copied archived full repository checkpoint?
Correct Answer:
A
You must archive both the checkpoint metadata and content directories to store a checkpoint for later restoration.
References: http://www- 01.ibm.com/support/knowledgecenter/SSD28V_8.5.5/com.ibm.websphere.nd.doc/ae/twve_archive_checkpoint.html
A system administrator has configured a network deployment cell containing multiple nodes and global security enabled with an LDAP repository. To increase capacity, the administrator needs to add additional nodes to the cell. After adding the nodes by using both scripts and the Integrated Solutions Console (ISC), the administrator examines the System.out log for the deployment manager and notices the following message:
How can the administrator resolve this problem?
Correct Answer:
B
When nodes are added while LDAP security is enabled, the following exception is generated in the deployment manager System.out log under certain circumstances. If this happens, restart the deployment manager to resolve the problem.
0000004d ORBRas E com.ibm.ws.security.orbssl.WSSSLClientSocketFactoryImpl createSSLSocket ProcessDiscovery : 0 JSSL0080E: javax.net.ssl.SSLHandshakeException -
The client and server could not negotiate the desired level of security. Reason?com.ibm.jsse2.util.h: No trusted certificate found
References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.0.0/com.ibm.websphere.nd. doc/info/ae/ae/tagt_svr_conf_nodes.html
A web application was deployed on a WebSphere Application Server cluster. While users are using the application, one of the cluster servers fails and the users lose their working data.
What can the system administrator configure to ensure users can continue to work if one of the cluster server fails?
Correct Answer:
D
WebSphere eXtreme Scale can dynamically process, partition, replicate, and manage application data and business logic across hundreds of servers. It provides transactional integrity and transparent fail-over to ensure high availability, high reliability, and consistent response times.
References: http://www.ibm.com/developerworks/websphere/techjournal/1301_ying/1301_ying.html
A system administrator runs a Jython script that creates and configures several servers and realize that the script fails before completing. Although many tasks succeeded, they are rolled back when the script fails.
Before running the script again, what can the administrator add to the script after each task so the completed tasks are committed even if other tasks fail?
Correct Answer:
B
AdminConfig.save()to save changes after script execution.