IBM C2180-277 - IBM WebSphere Message Broker V8.0 System Administration Exam
Page: 1 / 12
Total 55 questions
Question #1 (Topic: )
A company has the requirement to have their message flow application running on broker
BRK1 communicate with the CICS Transaction Server. The message flow application
contains CICSRequest node that has security identity defined as mySecurityIdentity. The
CICS Transaction server only accepts the transactions from applications if they are sent by
the userId user1 with password password1. Which command does the system
administrator need to run to set the userId and password on the broker?
BRK1 communicate with the CICS Transaction Server. The message flow application
contains CICSRequest node that has security identity defined as mySecurityIdentity. The
CICS Transaction server only accepts the transactions from applications if they are sent by
the userId user1 with password password1. Which command does the system
administrator need to run to set the userId and password on the broker?
A. mqsisetdbparms BRK1 -n SecurityIdentity -u user1 -p password1
B. mqsisetdbparms BRK1 -n mySecurityIdentity -u user1 -p password1
C. mqsisetdbparms BRK1 -n cics::SecurityIdentity -u user1 -p password1
D. mqsisetdbparms BRK1 -n cics::mySecurityIdentity -u user1 -p password1
Answer: D
Question #2 (Topic: )
A system administrator is configuring Public Key Infrastructure (PKI) for an execution group
EG1 that is deployed to broker BRK1. The development team informed the system
administrator that their requirement is to send the SOAP requests to an external web
service provider. The provider only receives https requests and requires to authenticate the
broker requests as well. Which commands does the system administrator need to run to
configure PKI at the execution group level?
EG1 that is deployed to broker BRK1. The development team informed the system
administrator that their requirement is to send the SOAP requests to an external web
service provider. The provider only receives https requests and requires to authenticate the
broker requests as well. Which commands does the system administrator need to run to
configure PKI at the execution group level?
A. mqsichangeproperties BRK1 -e EG1 -o ComIbmJVMManager -n keystoreFile -v keystore.jksmqsichangeproperties BRK1 -e EG1 -o ComIbmJVMManager -n truststoreFile -v truststore.jks
B. mqsichangeproperties BRK1 -e EG1 -o ComIbmJVMManager -n keystoreFile -v keystore.jksmqsichangeproperties BRK1 -e EG1 -o HTTPSConnector -n truststoreFile -v truststore.jks
C. mqsichangeproperties BRK1 -e EG1 -o ComIbmJVMManager -n keystoreFile -v keystore.jksmqsichangeproperties BRK1 -o BrokerRegistry -n brokerTruststoreFile -v truststore.jks
D. mqsichangeproperties BRK1 -o BrokerRegistry -n brokerKeystoreFile -v keystore.jksmqsichangeproperties BRK1 -o BrokerRegistry -n brokerTruststoreFile -v truststore.jks
Answer: A
Question #3 (Topic: )
A message flow needs to be secured based on the identity credentials. A system
administrator is asked to configure the message flow security for authorization, identity
mapping and authentication. Which one of the following external security providers can the
system administrator use?
administrator is asked to configure the message flow security for authorization, identity
mapping and authentication. Which one of the following external security providers can the
system administrator use?
A. WS-Trust V1.3
B. WS-SecurityPolicy V1.2
C. IBM Tivoli Federated Identity Manager V6.0
D. Lightweight Directory Access Protocol (LDAP) V3
Answer: A
Question #4 (Topic: )
A system administrator has been asked to configure the security profile to the enterprise
TFIM v6.2 security server. The profile is to be used by message flows for authentication
mapping and authorization from WebSphere Message Broker BRK1.
The TFIM server information provided is as follows:
Which command does the system administer need to run to create the profile?
TFIM v6.2 security server. The profile is to be used by message flows for authentication
mapping and authorization from WebSphere Message Broker BRK1.
The TFIM server information provided is as follows:
Which command does the system administer need to run to create the profile?
A. mqsicreateconfigurableservice BRK1 -c SecurityProfiles -o myTFIMv62Profile-n authentication,mapping,authorization,authenticationConfig,-v "TFIM",TRUE,"TFIM",https://TFIM.acme.com:9443/TFIM/services/RequestSecurityToken
B. mqsicreateconfigurableservice BRK1 -c SecurityProfiles -o myTFIMv62Profile-n authentication,mapping,authorization,mappingConfig-v "TFIM v6.2",TRUE,"TFIM v6.2",https://tfim.acme.com:9443/TFIM/services/RequestSecurityToken
C. mqsicreateconfigurableservice BRK1 -c SecurityProfiles -o myTFIMv62Profile-n authentication,mapping,authorization,mappingConfig-v "WS-Trust v1.3 STS","WS-Trust v1.3 STS","WS-Trust v1.3 STS",https://tfim.acme.com:9443/TFIM/services/RequestSecurityToken
D. mqsicreateconfigurableservice BRK1 -c SecurityProfiles -o myTFIMV62Profile-n authentication,mapping, authorization,configURL-v TRUE, "TFIM", TRUE,https://tfim.acme.com:9443/TFIM/services/RequestSecurityToken
Answer: C
Question #5 (Topic: )
A development team has been notified that all the requests serviced by their SOAPInput
node message flow will now contain wsse headers for authentication, encryption and
signatures. The system administrator created the security profile with authentication set to
use LDAP and asked the development team to associate the flow's BAR file with the
security profile and redeploy it to the broker. When the requests were sent to the broker,
they were not processed. What did the system administrator miss?
The system administrator missed: 1. creating the policy set
node message flow will now contain wsse headers for authentication, encryption and
signatures. The system administrator created the security profile with authentication set to
use LDAP and asked the development team to associate the flow's BAR file with the
security profile and redeploy it to the broker. When the requests were sent to the broker,
they were not processed. What did the system administrator miss?
The system administrator missed: 1. creating the policy set
A. 2. creating the consumer policy set binding3. putting key information in the policy set4. adding the private keys to the keystore5. pointing the broker to it and giving the names of the policy set and the policy set binding to the developers forassociating them with the BAR file before the redeploy
B. 2. creating the provider policy set binding3. putting the key information in the policy set binding4. adding the private keys only to the keystore5. pointing the broker to it and giving the names of the policy set and the policy set binding to the developers forassociating them with the BAR file before the redeploy
C. 2. creating the consumer policy set binding3. putting the key information in the policy set4. adding the private and public keys to the keystore and truststore5. pointing the broker to them and giving the names of the policy set and the policy set binding to the developers forassociating them with the BAR file before the redeploy
D. 2. creating the provider policy set binding3. putting the key information in the policy set binding4. adding the private and public keys to the keystore and truststore5. pointing the broker to them and giving the names of the policy set and the policy set binding to the developers forassociating them with the BAR file before the redeploy
Answer: D