Question 1. What Is The Value Time Stamp Format In Log Target For?
Timestamp Format: syslog
Question 2. What Is The Default Log Size In The Log Target? What Happens When That Log Size Is Reached?
Log size: 500 kilobytes,
When the log record reached the restriction, the gadget will uploaded it to the FTP server and if it's far successfully uploaded, the appliance will delete the log within the machine to unfastened space.
IBM Websphere Interview Questions
Question 3. Why Do We Need Logtarget When There Is Already A Default Logging Mechanism Available In Datapower?
we want logtarget to seize messages which can be posted by the numerous objects and services which might be going for walks at the appliance. In order to get a particular event or/and item log information, we utilize logtargets.
Question four. What Are The Different Modes Of Archival? Explain Each Mode In Two Lines Each?
Rotate, rotate the log file whilst the maximum length is reached. The appliance creates a duplicate of the record and begins a brand new file. The equipment keeps the archived copies as much as the required quantity of rotations. After achieving the most range of rotations and the log document reaches its most length, the appliance deletes the oldest document and copies the modern-day report.
Upload, add the log record when the maximum length is reached. The equipment uploads the report using the specified upload method.
IBM Websphere Tutorial
Question five. What Is The Difference Between Object Type And Object Name And What Happens When I Keep The Add Referenced Object Option To ‘off’?
Object Type, specify the sort of item. This filter restricts log messages to only the ones messages generated by means of the chosen object.
Whereas, Object name specify the name of an current object of the chosen kind.
When the add referenced object choice is turned ‘off’, the equipment generates no additional item filters anymore and includes occasions for only the specified object.
Linux Interview Questions
Question 6. In The Datapower File System, The Logs Are Stored Default In Log Temp? True/false, Give Appropriate File Directory If The Above Statement Is False.
True: logtemp, default region of log documents, which include the device-wide default log.
Question 7. How To I Collect A Single Log Statement As Alert As A Mail When The Object On Which Log Target Is Enables Goes Down Or Comes Up?
It is executed by putting in place Event triggers. Event triggers perform movements only whilst brought on by a detailed message ID or event code in this example the machine is going up/down. With this clear out, it is viable to create a log goal that collects only the outcomes of the required trigger motion. For example, to trigger the technology of an mistakes file while a positive event occurs use the save blunders-file command and transfer to SMTP goal format to send as an email alert.
Linux Tutorial JMS(Java Message Service) Interview Questions
Question 8. What Is The Difference Between Object Filter And Event Filter?
Object filters allow most effective those log messages for specific objects to be written to the particular log target. Object filters are primarily based on item instructions. With this clear out, you could create a log target that collects simplest log messages generated by means of particular times of the required item classes.
Event Filter allow most effective the ones log messages that incorporate the configured event codes to be written to this log goal. With this filter out, it's miles feasible to create a log goal that collects handiest log messages for a specific set of event codes.
Question nine. What Is The Log Target Type For Sending The Logs To Email, What Is The Field Name That Has To Be Given A Value For Subject Representation Of An Email?
SMTP, forwards log entries as e mail to the configured far flung SNMP servers and email addresses. Before sending, the contents of the log can be encrypted or signed. The processing charge can be restricted.
IBM WAS Administration Interview Questions
Question 10. What Is Cryptography? Why Do We Need It?
Cryptography is to protect private conversation within the public international. For example, entities looking to communicate – Ajitab and Mulu – are shouting their messages in a room complete of people. Everyone can pay attention what they're saying. The goal of cryptography is to guard this conversation so that most effective Ajitab and Mulu can apprehend the content material of the messages.
Question 11. Why Do We Need It?
We need cryptography to proportion data confidentially that is ensuring the secrecy of conversation:
Authentication – Ajitab can signal his message and Mulu can verify that he sent it based on his signature
Integrity checking -Mulu can generate a checksum of the message. Ajitab can either extract it from the message or recalculate it and verify that the message has no longer been changed.
Non-repudiation – if Ajitab signs and symptoms the message he can't deny later that he sent it, due to the fact nobody else ought to generate that equal signature/non-public key.
IBM WebSphere Administration Interview Questions
Question 12. What Are The Weakness Of Symmetric Key Cryptography And What Is The Strength Of The Asymmetric Key Cryptography?
Symmetric key cryptography:-
The biggest obstacle in efficiently deploying a symmetric-key algorithm is the need for a right alternate of personal keys. This transaction have to be completed in a secure way. If face to-face meeting, which proves pretty impractical in many circumstances whilst taking distance and time under consideration, can not be feasible to change private keys. If one assumes that safety is a risk to start with because of the choice for a secret exchange of statistics in the first region, the exchange of keys will become similarly complicated.
Another hassle worries the compromise of a private key. In symmetric key cryptography, each participant has an identical personal key. As the wide variety of participants in a transaction will increase, both the risk of compromise and the consequences of this sort of compromise boom dramatically. Each additional consumer adds every other capability point of weak point that an attacker should take benefit of. If such an attacker succeeds in gaining control of just one of the personal keys on this global, each person, whether or not there are hundreds of customers or only some, is completely compromised.
Both Symmetric and Asymmetric-key cryptography additionally has vulnerabilities to attacks consisting of the person within the center assault. In this case, a malicious 0.33 party intercepts a public key on its way to one of the events concerned. The third celebration can then alternatively pass along his or her own public key with a message claiming to be from the authentic sender. An attacker can use this manner at each step of an change with a view to efficaciously impersonate every member of the communication without any different parties having knowledge of this deception.
Asymmetric cryptography –More cozy!
Asymmetric keys ought to be usually longer than keys in symmetric-cryptography for you to boast security. While producing longer keys in other algorithms will generally prevent a brute pressure attack from succeeding in any meaningful length of time, those computations turn out to be extra computationally extensive. These longer keys can still range in effectiveness relying on the computing power to be had to an attacker.
IBM Websphere Interview Questions
Question 13. Why Do We Need A Digital Signature?
Digital signatures act as a verifiable seal or signature to verify the authenticity of the sender and the integrity of the message. Users who want to verify their identity whilst sending a included message can encrypt the information with their personal key. The recipient can then decrypt the message with the sender’s public key which will verify the sender’s identity and the integrity of the message.
Question 14. Who Issues A Certificate, Explain In Detail?
Certificate authorities act as relied on 1/3 events that verify the identification of the sender of an encrypted message and issue virtual certificate as evidence of authorization. These digital certificate contain the general public key of the sender, that's then passed alongside to the meant recipient. The Certificate authorities do huge heritage exams before giving an employer or a given person a certificates.
Question 15. Give Three Popular Algorithms Used For Encryption?
Triple DES-uses three character keys with 56 bits every. The total key period provides up to 168 bits, but experts would argue that 112-bits in key electricity is more find it irresistible.
RSA- is a public-key encryption algorithm and the usual for encrypting information sent over the internet.
AES-it is extraordinarily efficient in 128-bit shape, AES also makes use of keys of 192 and 256 bits for heavy duty encryption purposes.
IBM Websphere Application Server Interview Questions
Question sixteen. How Do You Gauge The Strength Of The Key, What Is The Parameter Used?
The algorithm must be regarded to the public; however the key wishes to be private:
Performance/ Response time for Encryption or Decryption (relies upon at the system we use)
Mathematical evidence for standardization of protection provided by using that algorithm
Who provided the certificates for the set of rules and the date of expiration date.
Question 17. What Is A Trust Store?
A believe store contains certificates from different parties that we count on to speak with, or from Certificate Authorities that we trust to identify different parties. For example, google (chrome) carries certificates of many companies or web sites. Whenever we browse that website online the browser robotically check the web site for its certificate shape the shop and evaluate it. If it is true, google will upload the ‘s’ on ‘HTTP’. That way we recognise that internet site is secured and accept as true with worth.
IBM WebSphere MQ Interview Questions