单选题The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()AThe input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. BThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. CThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. DThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.

单选题
The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()
A

The input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. 

B

The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. 

C

The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. 

D

The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.


参考解析

解析: 暂无解析

相关考题:

下列对XSL描述中,错误的是(61)。A.XSL能够把XML转变成HTNIB.XSL不是XML文档C.XSL与CSS功能相似D.XSL是对XML文档进行排版的语言

An authentication realm consists of which three authentication resources?() A. Authentication serverB. Session optionsC. Authentication policyD. End-point security policyE. Role-mapping rules

下面()标记不能达到筛选数据的作用。A、xsl:ifB、xsl:chooseC、$lt$D、xsl:comment

XSL样式表中用到了许多具有一定功能的XSL元素和指令,()元素可以定义模板规则。A、<xsl:template>B、<xsl:sort>C、<xsl:value-of>D、<xsl:apply-templates>

下列()是XSL根元素。A、xsl:outputB、xsl:stylesheetC、documentElementD、HTML

一个学生成绩表的数据(含有Java/VB/VC++/SQL Server/Oracel各门课程的成绩),分别按成绩小于60输出不及格、成绩在60到80分之间输出合格、成绩在80分以上的输出优秀。下列XSL语句能够很好地完成此需求。()A、<xsl:value-of>语句B、<xsl:if>与<xsl:value-of>结合C、<xs:choose>、<xsl:when>、<xsl:otherwise>与<xsl:value-of>语句结合D、<xsl:for-each>与<xsl:value-of>语句结合

下列()标记是调用命名模板的标记A、xsl:apply-templatesB、xsl:call-templatesC、xsl:apply-templateD、xsl:call-template

指定的标记下的内容完全复制到输出文件需用到()标记。A、xsl:ifB、xsl:copyC、xsl:chooseD、xsl:when

下面()标记是调用模板的标记。A、xsl:apply-templatesB、xsl:templateC、xsl:for-eachD、xsl:if

The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()A、The input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. B、The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. C、The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. D、The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.

Which two statements about static NAT are true? ()(Choose two.)A、Static NAT can only be used with destination NAT.B、Static NAT rules take precedence over overlapping dynamic NAT rules.C、NAT rules take precedence over overlapping static NAT rules.D、A reverse mapping is automatically created.

在XSL中加入注释,需要用到()标记。A、xsl:commentB、xsl:elementC、xsl:attributeD、xsl:processing-instruction

()指令可以应用匹配的模板规则。A、<xsl:sort>B、<xsl:apply-templates>C、<xsl:value-of>D、<xsl:template>

在XSL中,()元素用来访问所有符合条件的子节点。A、.slitB、.xsl:for-eachC、.xsl:chooseD、.xsl:otherwise

xsl:sort元素一般作为xsl:apply-templates或()的子元素出现。A、xsl:value-ofB、xsl:for-eachC、xsl:apply-templatesD、xsl:template

An authentication realm consists of which three authentication resources?()A、Authentication serverB、Session optionsC、Authentication policyD、End-point security policyE、Role-mapping rules

Which statement is true about a Dynamic Chain Selection Module instance?()A、It is the first module in the partner module chain in Web Services Security Management (WSSM).B、It is the last module in the partner module chain in WSSM.C、It is the first module in the application module chain for partner.D、It is the last module in the application module chain for the partner.

Which two statements about static NAT are true?()A、Static NAT can only be used with destination NAT.B、Static NAT rules take precedence over overlapping dynamic NAT rules.C、Dynamic NAT rules take precedence over overlapping static NAT rules.D、A reverse mapping is automatically created.

Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()A、LDAPB、S/KeyC、TACACS+D、RADIUSE、SiteMinder

Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule. Which three changes in the admin GUI will enforce your managers change request?()A、Move the Preferred Members role-mapping rule to the top of the list.B、Remove the Preferred Members role from the role-mapping rule.C、Edit the Preferred Members role-mapping rule so that the username is equal to *.D、Edit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.E、Edit the Preferred Members role-mapping rule and select "Stop processing rules when this rule matches".

Which three authentication resources are grouped within an authentication realm?()A、Authentication enforcerB、Directory serverC、Captive authenticationD、Authentication policyE、Role-mapping rules

单选题Which statement is true about a Dynamic Chain Selection Module instance?()AIt is the first module in the partner module chain in Web Services Security Management (WSSM).BIt is the last module in the partner module chain in WSSM.CIt is the first module in the application module chain for partner.DIt is the last module in the application module chain for the partner.

单选题The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()AThe input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. BThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. CThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. DThe input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.

单选题You have successfully configured EchoClient and EchoApplication secured by Web Services Security Management (WSSM). You want to test that authorization is correctly being performed on the request. Which technique would allow you to do this?()Astop all running instances of PDACLDBlog in to the EchoClient as a different IBM Tivoli Access Manager for e-business (TAMeb) userCchange the TAMeb ACL policy applying to the Web Services namespaceDupdate the authorization module configuration in the Trust Service using the IBM Tivoli Federated Identity Manager Console

多选题Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()ALDAPBS/KeyCTACACS+DRADIUSESiteMinder

多选题An authentication realm consists of which three authentication resources?()AAuthentication serverBSession optionsCAuthentication policyDEnd-point security policyERole-mapping rules

多选题Which three authentication resources are grouped within an authentication realm?()AAuthentication enforcerBDirectory serverCCaptive authenticationDAuthentication policyERole-mapping rules

单选题When using the Call Subflow step, can variables be shared between the parent (calling) flow and the subflow?()ANo.  BYes.  CYes, but they must be manually passed via input and output mapping.  DYes, but they must be manually created in both flows and have the same name.