Answer Posted / krishna99
Security
| Is This Answer Correct ? | 15 Yes | 1 No |
Post New Answer View All Answers
difference between circular logging and linear logging?
mention what functionality does caching proxy server provides?
what is the content of the configuration manager repository?
My users authenticate with one userid but I want them to be identified with another ID from LDAP. Is that possible?
What is optcounter? How does it work?
Out of memory exception is there, how to handle that exception?
When should I use a custom login module versus a TAI to assert identity information?
What are portlets?
What is the difference between controller and task command.
How many types of deployment descriptors are available? What are they?
how to create broker from command prompt?
What are the two types of rendering portlets ?
how to choose websphere over other application servers?
what is a message and what does it contain?
Mention what is asymmetric clustering in web-sphere?