IBM C2180-274 Exam
IBM WebSphere DataPower SOA Appliances Firmware V5.0 Solution Implementation Exam (Page 2 )

Updated On: 1-Feb-2026

A solution implementer needs to set the Log Priority of log messageswithin a WS- MediationPolicy policy attachment. How can the solution implementer configure the value of Log Priority?

  1. Conformance object
  2. Policy Parameters object
  3. Policy Attachments object
  4. Log Priority of the SLM action object

Answer(s): B



A solution implementeris creating a multi-protocol gateway to proxy SFTP server requests. An AAA Policy is configured on the SFTP front side handler to provide user authentication for the SFTP connection. Which Extract Identity method should the solution implementer configurein the AAA Policy to extract the SFTP user's credentials?

  1. Client IP Address method.
  2. Processing Metadata method, specifying the sftp-metadata metadata item.
  3. Processing Metadata method, specifying the ssh-password-metadata metadata item.
  4. CustomTemplate method, specifying a url to a custom stylesheet that will determine the credentials.

Answer(s): C



A financial services company (Company) is using a DataPower appliance to securely access an external service provider (Partner) that processes SOAP/HTTPS payment transactions and returns the responses to the requesting application in the Company with payment confirmations. The Partner requires that Company establish non-repudiation so that the financial services company cannot deny that the payment transaction was originated by them. The Company requires that the confirmation sent back from the Partner also requires non-repudiation. Which of the following statements is true?

  1. Request Rule must Verify with crypto object containing Company public certificate and Response Rule must Sign with crypto object containing Partner private key
  2. Request Rule must Verify with crypto objectcontaining the private key of Partner and Response Rule must Sign with crypto object containing Company public certificate
  3. Request Rule must Sign with crypto object containing the Company private key and Response Rule must Verify with crypto object containing Partner public certificate
  4. Request Rule must Sign with crypto object containing the public certificate of Partner and Response Rule must Verify with crypto object containing Company private key

Answer(s): C



A company has exposed aweb service to both internal and external clients. Requests from internal clients are sent in plain text and requests from external clients are encrypted in
accordance with the WS-Security specification. A single web service proxy has been created using the WSDL that describes the web service. How can the solution implementer accommodate both the plain text and encrypted requests in the same web service proxy?

  1. Add a Decrypt action to the Default Request Rule, with a Certificate object that is associatedwith the external client's private key.
  2. Provide the company's public certificate to the external client for use in encryption, create a Crypto Key object that points to the company private key, and set the Decrypt Key at the proxy level.
  3. Provide thecompany's public certificate to the external client for use in encryption, create a Crypto Key object that points to the company's public certificate, and use it to add a Decrypt action to the Default Request Rule.
  4. Create a Crypto Certificate object using the external client's public certificate, create a Crypto Validation Credential (valcred) using the Crypto Certificate object, and add a Decrypt action that uses valcred to the Default Request Rule.

Answer(s): B



A company is receiving digitally signed SOAP/HTTPS messages to process payment transactions from its business partner and verifies those messages using the Verify action. There is also a requirement to use the signing certificate sent by the partner to encrypt the confidential response message from the company back to the partner. To satisfy this requirement, the solution implementer creates an Encrypt action with the 'Use Dynamically Configured Recipient Certificate' parameter to 'on'. Which statement related to the scenario above is false?

  1. The certificate created in the 'Recipient Certificate' field takes precedence over the dynamic certificate inputoption.
  2. The encrypt action will use the certificate defined in the variable var://context/transaction/encrypting-cert to encrypt the message.
  3. The dynamic certificate used to encrypt the outgoing message can be user-defined using the syntax 'name:CertificateObjectName'
  4. The public certificate used to encrypt the outgoing message will be automatically extracted from the incoming signed message while the signature is verified in the Verify action.

Answer(s): A



Viewing page 2 of 16
Viewing questions 6 - 10 out of 75 questions



Post your Comments and Discuss IBM C2180-274 exam prep with other Community members:

Join the C2180-274 Discussion