The administrator needs to identify any security role references and security constraints in a web application.How can the administrator identify these roles and constraints?
After installing an enhanced EAR in a WebSphere Application Server environment, a system administrator with Configurator privileges is able to see a JDBC provider and a data source in the Integrated Solution Console (ISC) but is not able to delete these resources.How can the administrator resolve this issue?
A developer created an enterprise application which contained data source and security role information. The developer asked a system administrator to install this application to an application server where global security is enabled using the Integrated Solutions Console (ISC). A new data source was configured at the server scope for the use of this application. While load testing the application, the developer noticed that the attributes configured on the new data source were ignored by the application server.How can the administrator ensure that the attributes configured on the new data source are used by the application server?
A system administrator has started a Liberty profile server using the default values. Later, the administrator modified the server.xml file for the server to include<applicationMonitor updateTrigger="polled" pollingRate="100ms" dropins="${server.config.dir}/applications" dropinsEnabled="true"/>The administrator placed the application ServletApp.war in the apps directory under ${server.config.dir}. While accessing the correct URL for the home page of the application, the error "Context Root Not Found" occurs in the browser.How can the administrator resolve this error?
An application contains a web services client and the application is deployed and running. A system administrator has to add a response timeout to the deployed web services client, so the call fails in a timely fashion.Which artifact should the administrator use?