单选题The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()A The input to the XSL mapping rules of a WSSM Partner is the binary sec

题目
单选题
The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()
A

The input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. 

B

The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. 

C

The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. 

D

The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.


相似考题
更多“单选题The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()A The input to the XSL mapping rules of a WSSM Partner is the binary sec”相关问题
  • 第1题:

    下列()是XSL根元素。

    • A、xsl:output
    • B、xsl:stylesheet
    • C、documentElement
    • D、HTML

    正确答案:B

  • 第2题:

    下列()标记是调用命名模板的标记

    • A、xsl:apply-templates
    • B、xsl:call-templates
    • C、xsl:apply-template
    • D、xsl:call-template

    正确答案:D

  • 第3题:

    下面()标记是调用模板的标记。

    • A、xsl:apply-templates
    • B、xsl:template
    • C、xsl:for-each
    • D、xsl:if

    正确答案:A

  • 第4题:

    Which two statements about static NAT are true? ()(Choose two.)

    • A、Static NAT can only be used with destination NAT.
    • B、Static NAT rules take precedence over overlapping dynamic NAT rules.
    • C、NAT rules take precedence over overlapping static NAT rules.
    • D、A reverse mapping is automatically created.

    正确答案:B,D

  • 第5题:

    ()指令可以应用匹配的模板规则。

    • A、<xsl:sort>
    • B、<xsl:apply-templates>
    • C、<xsl:value-of>
    • D、<xsl:template>

    正确答案:B

  • 第6题:

    xsl:sort元素一般作为xsl:apply-templates或()的子元素出现。

    • A、xsl:value-of
    • B、xsl:for-each
    • C、xsl:apply-templates
    • D、xsl:template

    正确答案:B

  • 第7题:

    Which statement is true about a Dynamic Chain Selection Module instance?()

    • A、It is the first module in the partner module chain in Web Services Security Management (WSSM).
    • B、It is the last module in the partner module chain in WSSM.
    • C、It is the first module in the application module chain for partner.
    • D、It is the last module in the application module chain for the partner.

    正确答案:B

  • 第8题:

    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()

    • A、LDAP
    • B、S/Key
    • C、TACACS+
    • D、RADIUS
    • E、SiteMinder

    正确答案:A,D,E

  • 第9题:

    Which three authentication resources are grouped within an authentication realm?()

    • A、Authentication enforcer
    • B、Directory server
    • C、Captive authentication
    • D、Authentication policy
    • E、Role-mapping rules

    正确答案:B,D,E

  • 第10题:

    单选题
    The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()
    A

    The input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. 

    B

    The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. 

    C

    The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. 

    D

    The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
    A

    LDAP

    B

    S/Key

    C

    TACACS+

    D

    RADIUS

    E

    SiteMinder


    正确答案: C,E
    解析: 暂无解析

  • 第12题:

    多选题
    Which three authentication resources are grouped within an authentication realm?()
    A

    Authentication enforcer

    B

    Directory server

    C

    Captive authentication

    D

    Authentication policy

    E

    Role-mapping rules


    正确答案: E,C
    解析: 暂无解析

  • 第13题:

    一个学生成绩表的数据(含有Java/VB/VC++/SQL Server/Oracel各门课程的成绩),分别按成绩小于60输出不及格、成绩在60到80分之间输出合格、成绩在80分以上的输出优秀。下列XSL语句能够很好地完成此需求。()

    • A、<xsl:value-of>语句
    • B、<xsl:if>与<xsl:value-of>结合
    • C、<xs:choose>、<xsl:when>、<xsl:otherwise>与<xsl:value-of>语句结合
    • D、<xsl:for-each>与<xsl:value-of>语句结合

    正确答案:C

  • 第14题:

    指定的标记下的内容完全复制到输出文件需用到()标记。

    • A、xsl:if
    • B、xsl:copy
    • C、xsl:choose
    • D、xsl:when

    正确答案:B

  • 第15题:

    The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()

    • A、The input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. 
    • B、The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. 
    • C、The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. 
    • D、The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.

    正确答案:C

  • 第16题:

    在XSL中加入注释,需要用到()标记。

    • A、xsl:comment
    • B、xsl:element
    • C、xsl:attribute
    • D、xsl:processing-instruction

    正确答案:A

  • 第17题:

    在XSL中,()元素用来访问所有符合条件的子节点。

    • A、.slit
    • B、.xsl:for-each
    • C、.xsl:choose
    • D、.xsl:otherwise

    正确答案:A

  • 第18题:

    An authentication realm consists of which three authentication resources?()

    • A、Authentication server
    • B、Session options
    • C、Authentication policy
    • D、End-point security policy
    • E、Role-mapping rules

    正确答案:A,C,E

  • 第19题:

    Which two statements about static NAT are true?()

    • A、Static NAT can only be used with destination NAT.
    • B、Static NAT rules take precedence over overlapping dynamic NAT rules.
    • C、Dynamic NAT rules take precedence over overlapping static NAT rules.
    • D、A reverse mapping is automatically created.

    正确答案:B,D

  • 第20题:

    Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule. Which three changes in the admin GUI will enforce your managers change request?()

    • A、Move the Preferred Members role-mapping rule to the top of the list.
    • B、Remove the Preferred Members role from the role-mapping rule.
    • C、Edit the Preferred Members role-mapping rule so that the username is equal to *.
    • D、Edit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.
    • E、Edit the Preferred Members role-mapping rule and select "Stop processing rules when this rule matches".

    正确答案:A,D,E

  • 第21题:

    单选题
    Which statement is true about a Dynamic Chain Selection Module instance?()
    A

    It is the first module in the partner module chain in Web Services Security Management (WSSM).

    B

    It is the last module in the partner module chain in WSSM.

    C

    It is the first module in the application module chain for partner.

    D

    It is the last module in the application module chain for the partner.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()
    A

    stop all running instances of PDACLD

    B

    log in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) user

    C

    change the TAMeb ACL policy applying to the Web Services namespace

    D

    update the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    An authentication realm consists of which three authentication resources?()
    A

    Authentication server

    B

    Session options

    C

    Authentication policy

    D

    End-point security policy

    E

    Role-mapping rules


    正确答案: B,D
    解析: 暂无解析

  • 第24题:

    单选题
    When using the Call Subflow step, can variables be shared between the parent (calling) flow and the subflow?()
    A

    No.  

    B

    Yes.  

    C

    Yes, but they must be manually passed via input and output mapping.  

    D

    Yes, but they must be manually created in both flows and have the same name. 


    正确答案: A
    解析: 暂无解析