QUESTION NO: 1
An administrator
would like to use the Centralized Installation Manager (CIM) to install
WebSphere
Application
Server Network
Deployment V7.0 on a remote Solaris host. The Solaris host has been updated
with all the
required operating system patches.
What is the next
step the administrator must perform?
A. Configure an
installation target for the Solaris host.
B. Download Solaris
interim fixes to the CIM repository.
C. Use the Job
manager to create a remote installation job.
D. CopyWebSphere
Application Sewer Network Deployment V7.0 software to the Solaris host.
Answer: A
QUESTION NO: 2
Which one of the
following profile related tasks can only be performed using the manage profiles
command line
facility?
A. Delete a profile
B. Secure a profile
C. Federate a
profile
D. Update profile
templates
Answer: A
QUESTION NO: 3
Which of the
following items best gives a reason to perform an unattended installation of
WebSphere
Application Server?
A. The installation
for the particular target platform is being done for the first time.
B. The installation
for the particular target platform has been done before and will be repeated in
the future.
C. The installation
forWebSphere Application Sewer would initially not be able to include
administrative
security.
D. The installation
for the particular target platform is expected to require a lot of adjustments
to be
done over several
installation attempts.
Answer: B
QUESTION NO: 4
A system
administrator has successfully installed WebSphere Application Server V7.0 and
has run
the Installation
Verification Tool (IVT) with a success message. Which additional step can be
taken
to further verify
the installation?
A. Check to see if
theInstallShield application will run again.
B. Check to see if
the installation directory specified exists in the file system.
C. Use a browser to
access the launch page of the IBM HTTP Server.
D. Use a browser to
access the administrative console and log in successfully.
Answer: D
QUESTION NO: 5
A WebSphere
Application Server installation finishes and the primary installation log
indicates an
exit code of
INSTCONFSUCCESS. What is the best conclusion that can be resolved from this
result?
A. The Web server
installed successfully.
B. The WebSphere Application
Server installed successfully.
C. The InstallShield
Wizard executed successfully to launch WebSphere Application Server
installation.
D. The target
operating system determined that it is compatible withWebSphere Application
Server
and had configured
environment variables for it.
Answer: B
QUESTION NO: 6
In order to verify
that a server has started successfully and all of its components have
initialized
without throwing any
exceptions, what steps should an administrator perform?
A. Use the Log Analyzer
to view theservers activity.log file.
B. View theservers
startServer.log and native_stdout.log files.
C. Examine the
SystemOut.log file for the current server process.
D. Log in to the
administrative console and examine the runtime messages.
Answer: C
A stand-alone
application server with hostname HOST and port 1234 is running a Web
application
which is trying to
access EJBs hosted on a cluster. The Web application is throwing a
NameNotFoundException
when attempting to lookup clusters/cluster01/ejbs/MyHome. The
administrator runs
the dumpNameSpace command on the standalone server and gets the
following output:
Linked to URL
Corbaloc::bptenote35:2833,BPTENOTE35:2831/NameServiceServerRoot What
command should the
admin run next to find the MyHome entry?
A. dumpNameSpace
host bptenote35 port 2833
B. dumpNameSpace
startAt clusters/cluster01/ejbs
C. dumpNameSpace
root cluter01
D. dumpNameSpace
root ejbs
Answer: A
QUESTION NO: 8
Which statement
describes WebSphere V7 FFDC feature?
A. The application
server needs to be restarted after enabling FFDC
B. FFDC information
is stored in an optimized relational database
C. FFDC logs are
mainly intended for application development teams
D. FFDC does not
affect the performance of theWebSphere Application Server
Answer: D
QUESTION NO: 9
An application
server is hung and has to be killed and restarted by the administrator. In
order to
troubleshoot the
server hang problem, the administrator decides to reproduce the hang condition
and trigger thread
dumps for further analysis. What is the most effective way to collect the
thread
dump data?
A. Trigger one
thread dump before and one thread dump after the server restart.
B. Take three
consecutive thread dumps 10 seconds apart immediately after the server restart.
C. After server
restart wait for the thread monitor to create the first thread dump, then take
two
more.
D. Wait for the
thread monitor to signal a possible hung thread,then take three thread dumps
several seconds
apart.
Answer: D
QUESTION NO: 10
Data replication
service (DRS) is turned on for replicating in-memory data among WebSphere
processes.
During peak load,
the developer found an OutOfMemoryError in the log. The developer suggests
turning off data
replication service (DRS).
What services would
be impacted?
A. Stateful session
EJB persistence and failover.
B. HTTP session
persistence and failover.
C. JDBC data source
failover.
D. Dynamic cache
replication.
E. JVM in memory
replication and failover.
Answer: A,B,D
QUESTION NO: 11
An administrator has
been asked by IBM Support to gather diagnostic trace data relevant to a
problem involving
some components of the application server. How should the administrator
prepare to gather
the data?
A. Enable the IBM
Service log for the server and set the number of historical logs to 10.
B. Enable verbose
garbage collection for the server and specify that the data be written to the
trace.log file.
C. Configure
Diagnostic Trace for the server by selecting that the trace outputbe written to
a file.
D. Configure
theffdcRun.properties file to trace the specific server components and write
the data
to a memory buffer.
Answer: C
QUESTION NO: 12
Due to network
problems, the IBM Support Assistant (ISA) Agent is not available. Which service
will be inoperable?
A. Case manager tool
B. Guided
troubleshooter
C. Remote debugging,
data collection and file transfer
D. WebSphere
Application Server Network Deployment V7.0 add-on Customization
Answer: C
QUESTION NO: 13
An administrator has
enabled security auditing for the WebSphere Application Server. They wish
to view the audit
records in order to verify that it is working properly. Which tool would best
allow
them to view the
audit data?
A. IBM Support
Assistant using theAuditLogReporter tool
B. wsadmin, using
the AdminTask.binaryAuditLogReader command
C. The
administrative console - they could invoke the Tivoli Audit Viewer (TAV)
D. TheLogAna|yzer
from within the Rational Application Developer Assembly and Deploy Tool.
Answer: B
QUESTION NO: 14
An administrator
manages a cell that is configured to use an LDAP sewer for its user registry.
But,
there are several
cases where he needs certain application servers to authenticate against a file
based registry. How
can this be accomplished?
A. From the
deploymentmanagers administrative console, use the application servers security
configuration wizard
for each application server to override the cell level registry.
B. In the cell level
security configuration panel, define LDAP authentication at the cell scope, and
file based registry
at the application server scope for the desired application servers.
C. Configure Global
security to use an LDAP registry and create a new security domain with a
user realm
definition for the file based registry and assign it to the desired application
servers.
D. Create a global
security repertoire that includes a global definition for the LDAP registry as
well
as entries for each
node is the cell. For those nodes that have application servers that require
file
based registry,
include a registry override.
Answer: C
QUESTION NO: 15
What must an
administrator do before he can create method permissions for an Enterprise
JavaBean (EIB)?
A. Map role to
groups.
B. Define one or
more security roles.
C. Map logical role
name to runtime rule.
D. Exclude a set of
EIB methods from access.
Answer: B
QUESTION NO: 16
A federated cell has
two nodes, Node01 and NodeO2. Global Security is turned on and is using a
file based user
registry. Node01 has servers A, B, C and D. A developer has deployed a new
security check-in
application to servers A and D. As a security requirement, this new application
is
required to use
local operating system registry for user authentications. Identify which one of
the
following is the
most direct way to enable this secured application.
A. Migrate user
information from operating system registry to LDAP registry.
B. Create a security
domain and scope it to application server A and D.
C. Update global
security configuration file security.xml with operating system registry
definition.
D. Merge operating
system registry and file based user registry to a new LDAP and assign the
new LDAP to the
federated cell.
Answer: B
QUESTION NO: 17
In a test cell which
has WebSphere global security disabled, an administrator has created a
service integration
bus (SIBus) with security enabled for testing applications that use messaging
resources. Now the
administrator needs to enable security on the bus for further testing. Which of
the following tasks
must be performed to enable security on the bus?
A. Enable
administrative security for the cell.
B. Configure a
separate security domain for the bus.
C. Delete the bus
and recreate it with security enabled.
D. Require messaging
clients to use SSL protected transpor1s.
Answer: A
QUESTION NO: 18
The application
accesses an external resource using a J2C adaptor. The security credential for
the
external resource
authentication has changed. Which one of the following should be updated?
A. J2C
authentication data.
B. Key stores and
certificates.
C. Web security
trust association.
D. JAAS login module
inWebSphere.
Answer: A
QUESTION NO: 19
An administrator is
troubleshooting a communication problem between two application sewers, on
different nodes
(node-A and node-B), within a cell that has administrative security enabled.
Based
on prior
investigation, they believe that the problem involves a missing signing
certificate on node-
B. What should be
done to verify this theory?
A. Manually
propagate the key.p12 file for node-B to theplugin directory and restart the
application
servers.
B. Verify that
theCellDefaultTrustStore has the appropriate signing certificates in it and run
the
syncNode script on
node-B.
C. Get a new
certificate for the application server from a Certificate Authority and import
it into the
application
serversServerDefaultTrustStore.
D. Update
theNodeDefaultkeyStore for node-B with a new signing certificate, do a Full
Resynchronize of the
cell, and restart the node agents and application servers.
Answer: B
QUESTION NO: 20
An administrator
needs to set up a new employee with administrative access to an existing
WebSphere cell.
What administrative
security roles must the administrator have in order to grant the new employee
operator access'?
A. The operator role
is required to assign another administrator operator access.
B. The administrator
must have administrator role access in order to make the new administrator
an operator.
C. The administrator
must be the primary administrative user in order to grant security roles to new
administrators.
D. The Admin
Security Manager role is required so that the administrator can assign new
users to
administrative
roles.
Answer: D
QUESTION NO: 21
A company maintains
several different LDAP directory servers to contain a registry of user IDs and
passwords.
How can an
administrator make all of the user IDs and passwords in these directories
available to
WebSphere security?
A. Configure the
LDAP directory servers as generic servers.
B. Configure a
federatedrepositow including all of the LDAP directory servers.
C.
ConfigureWebSphere security to authenticate against all of the LDAP servers
D. Configure a
standalone LDAP registry for each directory server and enable multiple realms.
Answer: B
QUESTION NO: 22
In addition to the
normal process for assembling an application, which one of the following tasks
must be performed if
the EAR file contains a Web services-enabled module?
A. Generate EJB
resource mappings.
B. Generate
deployment code for the application.
C. Redefine
thebindings properties.
D Edit the annotations
or deployment descriptors.
Answer: B
QUESTION NO: 23
It is determined
that a single class loader is needed for all of the modules in all of the
enterprise
applications on an
application server. What action should the administrator take to implement this?
A. Set
theClassloader policy on the application server to single
B. Set
theClassloader policy on the application server to Use an isolated class loader
C. Set each
applications EAR class loader policy to Single class loader for application
D. Set each applications
WAR class loader policy to Single class loader for application
Answer: A
QUESTION NO: 24
Which action below
must be performed to ensure that requests routed through the Web server can
reach a Web
application deployed in WebSphere Application Server Network Deployment V7.0?
A. Security is
enabled on the administrative console.
B. An updated
plugin-cfg.xml is generated and propagated to the Web server.
C. The Web server
and the WebSphere Application Server must be installed on the same physical
sewer.
D. The Web server
plug-in and the WebSphere Application Server must be installed on the same
physical server.
Answer: B
QUESTION NO: 25
What is the correct
console command to execute a wsadmin script file in WebSphere Application
Sewer, ND, V7.O?
A. wsadmin -f
<script_file>
B. wsadmin
<script_file>
C. wsadmin /file:
<script_fi|e>
D. wsadmin
@executeScript (script file will be prompted)
Answer: A
QUESTION NO: 26
To use a
messagerdriven bean (MDB) to communicate with the default messaging provider,
the
administrator must
create which one of the following?
A. JDBC provider
B. JCA resource
adapter
C. JMS connection
factory
D. JMS activation
specification
Answer: D
QUESTION NO: 27
In a Java EE
application, how are EIB resources protected?
A. Security
constraints
B. Method
permissions
C. Java 2 security
policy files
D. Administrative
permissions
Answer: B
QUESTION NO: 28
An application which
uses JMS clients will be deployed to a stand--alone application server.
Messages will be
produced by a session EJB and consumed by a message-driven bean (MDB)
via a queue
destination. What
JMS resources must
be configured by an administrator to support this application?
A. Destination,
queue point, mediation
B. Destination,
connection factory, data store
C. Message points,
destination, connection factory
D. Queue, connection
factory, activation specification
Answer: D
QUESTION NO: 29
Applications that
need to create additional persistent bindings of objects associated with a
specific
node can bind those
objects under which of the following types of namespace partition?
A. Server roots
B. Cell persistent
C. Node persistent
D. System namespace
Answer: C
QUESTION NO: 30
Which one of the
following statements is true about scoping resources in WebSphere Application
Server?
A. When a resource
is defined at a more general scope, greater isolation is provided.
B. In the
administrative console,All scopes can be selected to create a new resource.
C. Resources that
are defined at more specific scopes override duplicate resources that are
defined at more
general scopes.
D. Resources such as
Java Database Connectivity (JDBC) providers, namespace bindings, or
shared libraries can
only be defined at a single scope.
Answer: C
QUESTION NO: 31
A developer informs
an administrator that a servlet in one of the Web modules of a new enterprise
application needs to
access code in a native library. The administrator creates a shared library and
adds the native
library to its Native library path. What else does the administrator need to do
to
ensure that the
servlet can access the native library without risk of an UnsatisfiedLinkError?
Using
the administrative
console, select:
A. Use an isolated
class loader for this shared library on the shared library settings page and
associate the shared
library with the Web modules class loader.
B. Classes loaded
with parent class loader first on the settings page for the enterprise
applications
class loader and
associate the shared library with the enterprise applications class loader.
C. Use an isolated
class loader for this shared library on the shared library settings page and
inform the developer
of the name of the shared library so the developer can include it in the
appropriate Java
code.
D. Classes loaded
with local class loader first on the settings page for the Web modules class
loader and associate
the shared library with the Web modules class loader.
Answer: A
QUESTION NO: 32
When an
administrator creates a service integration bus (SIBus) destination, which one
of the
following tasks must
be performed?
A. Scope the bus
destination to a specific cluster.
B. Assign the
destination to a specific bus member.
C. Select an
appropriate mediation for the bus destination.
D. Create the
appropriate message point for the bus destination.
Answer: B
QUESTION NO: 33
If a deployed
application is mapped to a Web server, an updated plug-in configuration file
must be
generated and
propagated. By viewing the plug-in configuration file, how can an administrator
determine if the
mapping was successful? There will be a:
A. Property element
under Transport with a Name attribute equal to the path of the mapped
application.
B. URI element
underUriGroup With a Name attribute equal to the context root of the mapped
application.
C Server element
under ServerCluster with a Name attribute equal to the .ear file of the mapped
application.
D VirtualHost
element under VirtualHostGroup with a Name attribute equal to the assigned port
number of the mapped
application.
Answer: B
QUESTION NO: 34
When adding a new
member to a cluster, why is it necessary for an administrator to select the
option for
generating unique HTTP ports?
A. To enable
encryption over the secure HTTP ports
B. To prevent other
applications from using these ports
C. To avoid port
conflicts with other servers on the same node
D. To ensure that
cluster members on different hosts have unique ports
Answer: C
QUESTION NO: 35
Aside from the
administrative console and the addNode command, what other facilities does
WebSphere Application
Server provide for federating nodes into cells?
A. wsadmin
B. The
administrative agent
C. The Profile
Management Tool (PMT)
D. Rational
Application Developer Assembly and Deploy Module
Answer: C
QUESTION NO: 36
A cluster, Cluster1,
is a member of the service integration bus (SIBus) Bus1 and the host of a
queue destination
Destination1. When Clusterl was added to Busl, the High availability messaging
engine policy was
selected. An administrator will deploy an application containing an MDB, MDB1,
onto Cluster1. The
MDB will listen to Destination1. In order to allow MDB1 instances on all
cluster
members to get
messages from Destination1, the administrator should:
A. enable the
optionAlways activate MDBs in all servers on MDB1s activation specification
B. set the option
MDB connections to Parallel on Destination1s MDB properties
C. disable the
option prefer local on MDB1 when installing the application
D. set the option
Connection proximity to Bus on Bus1s activation specification defaults
Answer: A
QUESTION NO: 37
A cluster, Cluster1,
contains application servers Server1 and Server2. Cluster1 is configured as a
member of service
integration bus(SIBus)Bus1 using the High availability messaging engine
policy. A messaging
engine (ME) for Busl starts up on Server1, and then Server1 crashes. An ME
for Busl will:
A. alreadybe running
on Server2. When Server1 recovers, an ME for Busl will start on Server1.
B. start on Server2.
When Server1 recovers, a second ME for Busl will start on Server1.
C. start on Server2
but fail back to Server1 after Server1 has recovered.
D. start on Server2
and continue running on Server2 even after Server1 has recovered.
Answer: D
QUESTION NO: 38
An administrator has
created a cluster, C1, and configured memory-to-memory HTTP session
replication. How can
the administrator best ensure that every HTTP session is replicated on all
members of the
cluster?
A. In the
Replication domain settings for the C1 replication domain, set Number of
replicas to
entire domain
B. In the
Replication domain settings for the C1 replication domain, set Number of
replicas to 0
C. In the
Memory--to-memory replication settings for each member ofC1, set Number of
replicas to
entire domain
D. In the
Memory--to-memory replication settings for each member of C1, check Replicate
to all
members
Answer: A
QUESTION NO: 39
A J2EE application
maintains information in the HTTP session in memory. This information can be
recreated, but there
is a performance penalty to restore state if a user session fails over to a
different cluster
member.
Which of the
following features maximizes the use of information already stored in a
server's
session?
A. Database
persistence
B. Session affinity
in Web serverplugin
C. Memory--to-memory
replication in Both Mode
D. Memory--to-memory
replication in Server Mode
Answer: B
QUESTION NO: 40
An administrator
wishes to control an Apache Web server on a remote host via the WebSphere
Application Server
Network Deployment administrative console. What must be done to accomplish
this?
A. Configure a web
server definition in the administrative console.
B. Configure the
Apache administrative process on the remote node.
C. Configure an
unmanaged node definition in the administrative console.
D. Configure a
managed node on the remote host.
Answer: A,D
QUESTION NO: 41
A cluster, Cluster1,
contains two servers, Serverl and Server2. Server1 has a weight of 20 and
Server2 has a weight
of 4. A single web server is used to route HTTP requests to Cluster1. The
web server is
started and receives 4 HTTP requests for an application deployed on Cluster1.
If the
requests are all
part of the same HTTP session, and the first request is routed to Server2, how
many requests are
routed to Server1?
A. O
B. 1
C. 2
D. 3
Answer: A
QUESTION NO: 42
What does
backupConfig back up?
A. Log files
B. Profile
configuration
C. WebSphere
binaries
D. First failure
data capture (FFDC) directory
Answer: B
QUESTION NO: 43
Where can
administrator find binding information for an application?
A. In the IBM
extension file
B. In the activation
specification
C. In the deployment
descriptors
D. Executing
thewsadmin command AdminApp.viewBindings (-ApplicationName)
Answer: C
QUESTION NO: 44
Which of the
following statements best describes the type of data collected by request
metrics?
A. Monitors health
indicators such as CPU usage
B. Provides data for
all transactions, without correlation
C. Provides data with
respect to pools, queues, and system data
D. Tracks individual
transactions, recording the processing time for each component
Answer: D
QUESTION NO: 45
Which of the
following actions would enable the collection of performance data for an
application
server, given the
Performance monitoring Infrastructure (PMI) is not enabled?
A. Usingwsadmin,
invoke the enablePMICollection operation on the PerfMBean.
B. Usingwsadmin,
invoke the setInstrumentationLevel operation on the PerfMBean.
C. In the
administrative console, on the Performance tab for the server, select the
Enable
Performance
Monitoring Infrastructure (PMI) checkbox.
D. In the
administrative console, on the Configuration tab for the server, click
Performance
Monitoring
Infrastructure (PMI) under Performance, and then select the Set instrumentation
level
checkbox.
Answer: B
QUESTION NO: 46
An application
server has runtime provisioning enabled. What is the benefit of it? It:
A. allows shared
class cache for runtime classes.
B. reduces server
start time and memory footprint.
C. pre-loads all
Enterprise Java Beans for the application.
D.
enablesIight-weight runtime configuration service to reduce memory compaction
frequency.
Answer: B
QUESTION NO: 47
An application has
poor performance. On examining verbose GC information the administrator
notices that 7OKB
objects frequently cannot be allocated due to heap fragmentation, requiring
timerconsuming heap
compaction. Which of the following is likely to improve performance?
A. Configure more
operating system paging space.
B. Increase the size
of the large object area (LOA).
C. Increase the size
of the thread local heap (TLH).
D. Increase the size
of the native heap.
E. Select
theXnocompaction option.
Answer: B
QUESTION NO: 48
An application
spends 90% of its time in a complex servlet and the rest (10%) of time in a
short
JDBC query.
On average, only 10%
of the servlets are using database connections at any time. The application
starts to perform
poorly after a new batch of users are introduced to the system. What measures
should the
administrator recommend to determine the root cause of the problem?
A. Install Tivoli
Performance Viewer (TPV) as IBM Support Assistant (ISA) add-on.
B. View advice
messages in Tivoli Performance Viewer (TPV) by clicking the Advisor link.
C. Turn on
Performance and Diagnostic Advisor in IBM Support Assistant (ISA) as a
collector.
D. Install Tivoli
Composite Application Manager (ITCAM) as IBM Support Assistant (ISA) add-on.
Answer: B
QUESTION NO: 49
To install fix packs
to remote hosts using the Centralized Installation Manager (CIM), the
administrator must
download the update installer for the appropriate platforms into:
A. a directory on
the class path of a Node Agent on each remote host
B. theWebSphere
Application Server Network Deployment cells CIM repository.
C. the maintenance
sub-directory of the application server install on each remote host.
D. the maintenance
sub-directory of the profile root of the node hosting the CIM repository
Answer: B
QUESTION NO: 50
What is the sequence
of components which would typically be involved in the flow of a request
from a Web browser
to a servlet?
A. External HTTP
Server, HTTP Server Plug-in and EJB Container
B. Load Balancer,
Embedded HTTP Server, HTTP Server Plug-in and Web Container
C. Edge Component,
HTTP Server Plug-in, external HTTP Server, and Web Container
D. External HTTP
Server, HTTP Server Plug-in, embedded HTTP Server and Web Container
Answer: D
QUESTION NO: 51
A system
administrator wants to improve response time and system load of a Web
application
running in a
clustered environment. What might the system administrator attempt to decrease
the
response time of the
Web application?
A. Configure dynamic
caching
B. Enable
memory-to-memory replication
C. Configure session
replication to use a database.
D. Ensure that all
cluster members are in the same node group.
Answer: A
QUESTION NO: 52
How could an
administrator manage multiple stand-alone application servers on different
hosts in
a network?
By using:
A. a job manager
which administers multiple application server nodes through administrative
agents
B. a deployment
manager which administers multiple application server nodes through their node
agents
C. a high
availability manager which administers multiple application server nodes
through their
administrative
agents
D an administrative
agent which administers multiple application server nodes through their
administrative
service
Answer: A
QUESTION NO: 53
What are the three
possible replication types for the dynamic caching service?
A. Client mode
B. Server mode
C. Not shared
D. Push only
E. Both push and
pull
F. Broadcast mode
Answer: C,D,E
QUESTION NO: 54
When configuring
automated transaction peer recovery for recovering inrflight transactions from
the transaction log,
what is required from the file system?
A. RAID disks must
be used to host the transaction log
B. Exclusive read
only file locks and the ability to invalidate them
C. File locking must
be disabled for Network File System Version 4 (NFSV4)
D. Lease-based
exclusive locks on files
Answer: D
QUESTION NO: 55
What is the
advantage of deploying more than one messaging engine and linking them together
in
a topology that has
multiple interconnected service integration buses (SIBus)?
A. Enable protocol
transformation between buses.
B. Improve the
availability of the persistent storage.
C. Spread messaging
workload across multiple servers.
D. Preserve message
ordering through the messaging engines.
Answer: C
QUESTION NO: 56
Which of the
following statements most accurately describes the relationship between a
flexible
management topology
and the network deployment cell?
A. Flexible
management can be an alternative to the network deployment cell model.
B. Flexible
management eliminates the need for node agents in a network deployment cell.
C. The flexible
management topology is a replacement for the network deployment cell.
D. The flexible
management job manager can perform all the tasks of the deployment manager.
Answer: A
QUESTION NO: 57
Which one of the
following statements is true about WebSphere Application Sewer HTTP session
management support'?
A. Session
management canpersist session-related information in several ways.
B. Multiple requests
from the same browser, each specifying a unique Web application, result in a
single session with
multiple session IDs.
C. When an HTTP
client interacts with aservlet, the state information associated with a series
of
client requests is
represented as a SSL ID.
D. The high
availability (HA) manager is responsible for managing HTTP sessions, providing
storage for session
data, allocating session IDs, and tracking the session ID associated with each
client request.
Answer: A
QUESTION NO: 58
Performance of a
database is degrading due an intensive database application. The administrator
suspects that the
JDBC connection pool is not properly tuned. Which performance tools should the
administrator use
for problem determination?
A. Request Metrics
B. System core dump
viewer
C. IBM JVM heap dump
analyzer
D. Tivoli
Performance Viewer (TPV)
E. Performance
Monitoring Infrastructure (PMI) analy1er
Answer: A,D
QUESTION NO: 59
An administrator
wants to update a WebSphere Application Sewer installation to the latest fix
pack. The
installation has no feature packs installed. Which fix packs does the
administrator need
to download and
install? The application sewer fix pack
A. SDKfix pack
B. Web services fix
pack
C. EIB containerfix
pack
D. Centralized
Installation Manager (CIM)fix pack
Answer: A
QUESTION NO: 60
Which of the
following performance monitoring tools is the most appropriate for monitoring
the
overall health of
WebSphere Application Server?
A. Requestmetrks
tool
B. Tivoli
Performance Viewer
C. Transaction
correlation tool
D. Tivoli System
Health Viewer
Answer: B
QUESTION NO: 61
How would an
administrator enable the collection of performance data by using the
administrative
console?
A. On the
Performance tab for the server, select the Enable Performance Monitoring
Infrastructure
(PMI) checkbox.
B. Click Monitoring
and Tuning > Performance Viewer > Current Activity > server-name >
Settings
> Enable
Performance Monitoring Infrastructure (PMI)
IBM 000-377:
Practice Exam
"Pass Any Exam.
Any Time." - www.actualtests.com 21
ActualTests.com
C. On the
Configuration tab for the sewer, click Performance Monitoring Infrastructure
(PMI) under
Performance, and
then select the Set instrumentation level checkbox.
D. On the
Configuration tab for the sewer, click Performance Monitoring Infrastructure
(PMI) under
Performance, and
then select the Enable Performance Monitoring Infrastructure (PMI) checkbox.
Answer: D
QUESTION NO: 62
Which of the
following thread pools are managed by WebSphere Application Server?
A. JVM thread pool
B. HTTP
listenerthread pool
C. Web container
thread pool
D. ORB container
thread pool
E. Dynamic caching
thread pool
Answer: C,D
QUESTION NO: 63
When backing up
WebSphere Application Server configuration and runtime settings, which of the
following commands
would be relevant?
A. backupConfig
-location location
B. restoreConfig
-profileName profile_name -backupFile backupFile_name.
C. manageprofiles
-backupProfile -profileName profile_name -backupFile backupFile_name.
D. wsadmin
-backupConfig -profileName profile_name -backupFile -backupFile_name.
Answer: C
QUESTION NO: 64
How does the
administrator enable verbose garbage collection? Use:
A. thewsadmin
script.
B. the -verbose:gc
command-line option.
C. Rational
Application Assembly and Deployment Tool.
D. Websphere
Application Server environment variables.
E. the -Xoptionsfile
command-line option with appropriate text file.
Answer: A,B,E
QUESTION NO: 65
A new cluster member
has been added to a WebSphere Application Server. What changes will be
seen in the plug-in
configuration file related to this modification?
A. There will be a
new Name attribute inServerCluster with equal to the new cluster members
name.
B. There will be a
Property element under Transport with a Name attribute equal to the new
clustermembers name.
C. There will be a
new Server element underServerCluster with a Name attribute which includes
the new cluster
members name.
D. There will be
aVirtualHost element under VirtualHostGroup with a Name attribute equal to the
RMI-IIOP port number
of the new cluster member.
Answer: C
QUESTION NO: 66
Which administrative
object is used to deploy applications in WebSphere Application Server, ND,
V7.0?
A. Help
B. AdminApp
C. AdminDeploy
D. AdminControl
Answer: B
QUESTION NO: 67
How is the plug-in
configuration file viewed from the WebSphere Application Server administrative
console?
A. There is no
facility to view the plug-in configuration file in the administrative console.
B. From the web
servers list, select a particular web server. In the properties view, click Plug-in
properties.
Click View next to
the Plug-in configuration file name.
C. On the left
navigation bar, expand Servers, Server Types, and then Web Servers. Click on a
particular web
server. The path of the plug-in file is shown here. Use a text file reader to
view the
file.
D. On the left
navigation bar, expand System Administration. Click on Server Management and go
to Web Servers.
Select Plug-in File Management.
Clicking on the View
link runs Notepad with the plug-in file open.
Answer: B
QUESTION NO: 68
A developer informs
an administrator that a servlet in one of the Web modules of a new enterprise
application needs to
load its own version of some common Java classes provided by WebSphere
Application Server.
In order to ensure that this version of classes are only visible to the Web
module, the
administrator should:
A. place the jar
files containing the classes in the lib/ext subdirectory of the application
server
install directory
and select Classes loaded with parent class loader first on the settings page
for
the Web modules
class loader.
B. instruct the
developer to place the jar files containing the classes in the Web modules
WEBINF/
lib directory and
select Classes loaded with local class loader first on the settings page for
the
Web modules class
loader.
C. instruct the
developer to place the jar files containing the classes in the enterprise
applications
EAR file and select
Classes loaded with parent class loader first on the settings page for the
enterprise
applications class loader.
D. place the jar
files containing the classes in a directory on the application servers file
system and
create a shared
library with these jar files in itsclasspath.
Answer: B
QUESTION NO: 69
When an
administrator creates a JMS destination queue or topic, what configuration
information
must be provided in
order to connect the JMS destination to a specific service integration bus
(SIBus)?
A. The messaging
engines name.
B. The JMS provider
type, bus name, bus destination.
C. The JNDI name of
the bus destination and its scope.
D. The name of the
messaging engine and the buss UUID.
Answer: B
QUESTION NO: 70
In a Java EE
application, how are servlets protected?
A. Security
constraints
B. Method
permissions
C. Java 2 security
policy files
D. Administrative
permissions
Answer: A
QUESTION NO: 71
A Network Deployment
cell contains a single cluster of application servers, but no stand-alone
servers. An
application which uses JMS clients will be deployed to the cluster. In order
for the
clients to produce
and consume messages using default messaging, which one of the following
tasks must an
administrator perform?
A. Start the
messaging engine on each cluster member.
B. Scope the service
integration bus (SIBus) to the cluster.
C. The cluster must be
added as a member to a service integration bus (SIBus).
D. Create mediation
and messaging point on the service integration bus (SIBus).
Answer: C
QUESTION NO: 72
A developer informs
an administrator that a servlet in one of the Web modules of a new enterprise
application needs to
access code in a native library. The administrator creates a shared library and
adds the native
library to its Native library path. With which class loader should the shared
library
be associated so
that the servlet can access the native library without risk of an
UnsatisfiedLinkError?
A. The Web modules
class loader
B. The nativelibrays
class loader
C. The application
servers class loader
D. The enterprise
applications class loader
Answer: C
QUESTION NO: 73
What is the most
common role that naming plays in WebSphere Application Server?
A. Allows
applications to obtain references to objects such as EJB homes.
B. Allows Java
programs (clients and Java EE applications) to create, send, receive, and read
asynchronous
requests, as messages.
C Provides a runtime
environment for enterprise beans within the application server.
C. Provides a secure
facility to support Customer's basic organizational entity management needs.
Answer: A
QUESTION NO: 74
Which one of the
following can be used to instantiate resource adapter classes for establishing
and maintaining
resource connections?
A. a data source
B. connection
factories
C. connection pool
settings
D. a JMS activation
specification
Answer: B
QUESTION NO: 75
To create a pool of
connections that an application can use to interact with a database, the
administrator must
create which one of the following?
A. JDBC provider
B. JCA resource
adapter
C. High availability
server
D. JMS activation
specification
Answer: A
QUESTION NO: 76
Which one of the
following actions best describes how to remove application-scoped resources
from an enhanced EAR
file?
A. Edit
theibmconfig/deployment.xml file
B. Edit the
application deployment descriptor
C. Remove
theMETA--INF/application.xml file
D. Remove
theMETA--INF/ibmconfig directory
Answer: D
QUESTION NO: 77
Which of the
following is an option given in the First Steps application that runs
automatically after
installation?
A. Start the sewer.
B. Executewsadmin.
C. Configure
resources.
D. Run the
Snoopservlet.
Answer: A
QUESTION NO: 78
An administrator has
created a deployment manager profile. However, the administrator chose not
to create the
Centralized Installation Manager (CIM) repository and populate it with the
WebSphere
Application Server Network Deployment V7.0 product files. If, in the future,
the
administrator wants
to use the Centralized Installation Manager to install WebSphere Application
Server Network
Deployment V7.0 on a remote host, which of the following tasks will be
necessary?
A. Create the CIM
repository using the Installation Factory.
B. Create a new
deployment manager profile including the CIM repository.
C. Use the
Centralized Installation Manager to create an installation target.
D. Use the
Centralized Installation Manager to create an installation package.
Answer: A
QUESTION NO: 79
A system
administrator is installing WebSphere Application Server for the first time and
was
surprised that the
Profile Management Tool (PMT) did not have the expected profile type options,
as stated in the
Information Center. What is the best conclusion for this finding?
A. The Java runtime
being used by the installation program is not at the required version.
B. The system
administrator is installing a variant ofWebSphere Application Sewer that is not
Network Deployment.
C. The target
operating system the system administrator is installing on is not compatible
withWebSphere
Application Server.
D. A previous step
in the installation has failed. The system administrator should cancel and
check
the logs before
starting over again.
Answer: B
QUESTION NO: 80
Which of the
following options is NOT a valid method of running the Profile Management Tool?
A. Run the command
directly from a system console.
B. Select Profile
Management Tool from the First Steps application.
C. Select System
Administration --> Run Profile Management Tool in the administrative
console.
D. Check the Create
a newWebSphere Application Server profile using the Profile Management
Tool option at the
end of the installation process.
Answer: C
QUESTION NO: 81
How is the response
file specified in a silent installation scenario?
A. Specified in
theinstallation.properties file
B. Specified as a
parameter in thelaunchpad user interface
C. Included as a
command-line option on the install command
D. Included as a
command-line option on thelaunchpad application
Answer: C
QUESTION NO: 82
Global security is
turned on for a federated cell using a file-based federated repository. The
administrator
created a new security domain called App1Domain using local operating system
registry and mapping
it to the application server. The administrator also created a new local
operating system
user ID App1Admin. Which one of the following is true when the new security
domain is enabled to
secure Application1?
A. The administrator
can accessApplicationl.
B. The administrator
can disableApplicationl security.
C. App1Admin can
disableApplicationl security.
D. App1Admin can
access the administrative console.
Answer: B
QUESTION NO: 83
How are Java EE 5
security permissions assigned to actual users in WebSphere Application
Server?
A. By mapping
application roles to users or groups within theWebSphere user registry.
B. By generating the
users in application.xml which will be created in the registry during deploy
time.
C. By theWebSphere
Application Server itself, automatically, by introspecting the classes in the
application.
D. By creating the
users in the application itself which will be created in the registry during
deploy
time.
Answer: A
QUESTION NO: 84
An administrator
adds a new node to a cell. They then add a new cluster member to that node.
What should the administrator
do to best ensure that the Web servers will be able to communicate
with the new cluster
members securely?
A. Ensure that all
Web servers have access to the new nodes personal certificate.
B. Copy the
pluginrcfg.xml files toall of the Web server <web- server_root>/config
directories.
C. Run
thepropagateCertificates script on the new node and specify the list of Web
server.
D. Propagate the new
plug-inkeystores to the appropriate directories on each of the existing Web
server machines.
Answer: D
QUESTION NO: 85
In creating a
security plan, an architect needs to consider how to use multiple security
domains
within a WebSphere
cell. Which one of the following would NOT be appropriate to consider?
A. Nodes
B. Servers
C. Clusters
D. Enterprise
Applications
Answer: D
QUESTION NO: 86
A security
specialist for a WebSphere Application Server Network Deployment V7.0 cell is
concerned about the
data within the audit records. To protect the data, they configure audit record
encryption using a
keystore called AuditkeyStore which contains a new certificate called
AuditCertificate.
With that done, what is now needed to view the data?
A. The password to
theAuditCertificate
B. The password to
theAuditkeyStore
C. The public key
for theAuditCertificate
D. Access to the
console as administrator
Answer: B
QUESTION NO: 87
In order to
configure auditing within a WebSphere cell, which of the following is required?
A. An administrative
user account that has auditor role access must be used.
B. The primary
administrative user must be used to configure any auditing functions.
C. The administrator
must be defined within the auditor security domain and have cell level
monitor access.
D. The auditor
encryption signer cen1ificate must be added to thecellDefaultTrustStore and
synchronized to all
nodes within the cell.
Answer: A
QUESTION NO: 88
An administrator
would like to use fine--grained administrative security to manage service
integration bus
(SIBus) resources such as messaging engine. Identify what is required to enable
this resource as
part of fine--grained administration via the WebSphere Application Server
administrative
console.
A.
DefineAdministrativeSecurityRole for SIBus resource.
B. ScopeSIBus
messaging engine from sewer to cell level.
C. SIBus messaging
engine cannot be managed by fine--grained administration.
D. MigrateWebSphere
Application Server V6.1 to WebSphere Application Server V7 cell to
manage SIBus
messaging engine.
Answer: C
QUESTION NO: 89
During installation,
administrative security was enabled using the default file-based repository.
After installation,
the administrator must change the password that was provided during the
installation. How
can this password be changed?
A. Invokewsadmin and
run the updateDMgrFileRepository command to update the password.
B Manually edit the
primary administrative users password in the fileRegistry.xml file.
B. Use the Manage
Users page in the administrative console and change the primary
administrativeusers
password.
C. Configure the
Federated repositories realm using the administrative console and change the
primary
administrativeusers password.
Answer: C
QUESTION NO: 90
A JMS client needs
to access a secured service integration bus (SIBus) using a connection
factory. When the
administrator configures the connection factory, what must be done to grant the
client permission to
access the bus?
A. Enable Java 2
security in the buss security domain.
B. Enable the JMS
client and the connection factory to use SSL protected transports.
C. Map the
connectionfactorys authentication alias to the bus connector role.
D. Create a
principal in the user registry for the JMS client to access connection factory.
Answer: C
QUESTION NO: 91
What would have to
be configured in order to implement memory--to-memory HTTP Session
persistence?
A. Dynamic cache
service and HTTP plug-in
B. Synchronization
service and embedded Web server
C. Distributed
environment settings in the web containers
D. Fast Response
Cache Accelerator (FRCA) and external Web server
Answer: C
QUESTION NO: 92
What is the Data
Replication Service (DRS) used for? Please choose three from the following.
A. Node agents
B. Web sewers
C. Caching Proxy
D. Dynamic cache
replication
E. HTTP session
persistence and failover
F. Stateful session
EIB persistence and failover
Answer: D,E,F
QUESTION NO: 93
Why does IBM
WebSphere Application Server Network Deployment utilize node groups to
implement a
distributed environment? To:
A. segment multiple
security domains within a WebSphere cell.
B. define the
logical grouping of application servers to scale horizontally or vertically.
C. enable mixed
nodes with different capabilities within the same cell for administration
purposes.
D. allow application
servers having the same applications installed to be grouped logically for
workload management.
Answer: C
QUESTION NO: 94
What can the system
administrator do to distribute incoming HTTP traffic across a farm of Web
servers?
A. Enable sewer
affinity for each HTTP server in the cluster
B. Implement the
Tivoli Access Manager as a load balancer
C. Implement the
caching proxy server component of the Edge Components
D. Use the Load
Balancer component of the Edge Components
Answer: D
QUESTION NO: 95
Which type of server
is recommended to be placed in the demilitarized zone (DMZ)?
A. Generic servers
B. Application
servers
C. Managed HTTP
servers
D. Unmanaged HTTP
servers
Answer: D
QUESTION NO: 96
In Order for a
deployment manager to participate in a flexible management environment, which
one uf the following
steps must be completed?
A. Register directly
with the job manager.
B. Register with the
node agent on the jobmanagers host.
C. Register with an
administrative agent on the jobmanagers host
D. First register
with a local administrative agent, and then register with the job manager.
Answer: D
QUESTION NO: 97
A system
administrator needs to modify the configuration of an enterprise application
within a
flexible management
environment. The system administrator can make the modification using
wsadmin scripts by
connecting to which of the following components?
A. Node agent
B. Job manager
C. Work manager
D. Administrative
agent
E. Deployment
manager
Answer: B,E
QUESTION NO: 98
Username and
password are specified as parameters for the addNode command to authenticate
with:
A. the node agent if
its administrative security is enabled
B. theaddNode
command itself since it is password protected
C. the node to be
federated if its administrative security is enabled
D. the deployment
manager if its administrative security is enabled
Answer: D
QUESTION NO: 99
An administrator
wants to configure HTTP session replication, Stateful Session bean replication,
and the Dynamic
cache for members of a cluster. Which of these consumers should share a
replication domain?
A. Stateful Session
Bean replication and Dynamic cache
B. HTTP Session
replication and Dynamic cache
C. HTTP Session
replication andStateful Session Bean replication
D. HTTP Session
replication and messaging engine replication
Answer: C
QUESTION NO: 100
A cluster, Cluster1,
contains two servers, Serverl and Server2. Serverl has a weight of 2 and
Server2 has a weight
of 4. A single web server is used to route HTTP requests to Cluster1. The
web server is
started and receives 3 HTTP requests for an application deployed on Cluster1.
Assuming no session
affinity, how many requests will the plug--in route to Sewer2?
A. 0
B. 1
C. 2
D. 3
Answer: C
QUESTION NO: 101
A cluster with 5
servers is configured as a member of a service integration bus (SIBus) using
the
Scalability with
high availability messaging engine policy. What are the possible numbers of
messaging engines
that might be running on an individual server in the cluster?
A. 1
B. 2
C. 3
D. 4
E. 5
Answer: A,B
QUESTION NO: 102
Which one of the
following is a true statement?
A. A cluster can run
multiple messaging engines for a single service integration bus (SIBus).
B A service
integration bus (SIBus) destination can only exist on a single messaging engine
B. A single service
integration bus (SIBus) can span multiple WebSphere Application Server cells.
C. AWebSphere
Application Server Network Deployment cell can only contain a single service
integration bus
(SIBus).
Answer: A
QUESTION NO: 103
An administrator
wants to run a Web server on an unmanaged node with no administrative
process. Which of
the following issues result from this configuration?
A. The
administrative console will not be able to generate a plug-in configuration
file for this Web
sewer.
B. Applications will
not be able to use this Web sewer as a deployment target.
C. The plug-in
configuration file must be manually propagated to the Web server host.
D. This Web server
will not be able to perform workload management of requests to a cluster of
application servers.
Answer: C
QUESTION NO: 104
An administrator
creates a horizontal cluster and deploys an application that uses several EJBs.
How can the
administrator ensure that EJB client requests are routed to the same node on
which
the client resides?
A. Enable the prefer
local option for the cluster.
B. Set the scope of
the data source to node instead of cluster.
C. Disable the 0RBs
workload management plug-in for each cluster member.
D. Enablestateful
session bean failover using memory-to-memory replication.
Answer: A
QUESTION NO: 105
A user is taken
through a series of Web pages in an online store and eventually checks out to
complete his
purchase. In the event of a server failure, the user should not have to repeat
a step
that has already
been performed. Which session management strategy is best suited if the user
cannot tolerate a
loss in session information?
A. Database
persistence to externaldatastore
B. Memory--to-memory
replication inBoth mode
C. Memory--to-memory
replication in Client mode
D. Memory--to-memory
replication in Server mode
Answer: A
QUESTION NO: 106
The administrator
ran into a memory leak problem. A .phd file was produced when an
OutOfMemoryError
occurred. Verbose:gc output indicated the heap was exhausted after running a
period of 10 hours.
Which tool is recommended for analyzing the memory problem?
A. Log analyzer
B. ISA Thread Dump
Analyzer
C. Memory Dump
Diagnostic for Java (MDD4J)
D. IBM Thread and
Monitor Dump Analy1er (TMDA)
Answer: C
QUESTION NO: 107
Which of the
following will force a JVM thread dump.
A. kill --9
<processrid>
B. F
SERVERNAME,JAVADUMP
C. Using thewsadmin
command prompt: jvm =
AdminControl.completeServerNameList("type:JVM,process:
server1,*")
AdminControl.invoke(jvm, "dumpAllThreads")
D. Using thewsadmin
command prompt: jvm =
AdminControl.completeServerNameList("type:JVM,process:server1,*")
AdminControl.invoke(jvm,
"dumpThreads")
Answer: C ,D
QUESTION NO: 108
When configuring a
servers diagnostic trace service, in order to have trace level data written to
the
trace log, which one
of the following tasks must be performed?
A. Set the log
detail level to fatal.
B. Set the Trace
Output Format toAdvanced.
C. Set the log
detail level to fine, finer, finest or all.
D Use a trace string
specification of com.ibm.*=detail.
Answer: C
QUESTION NO: 109
As part of a
diagnostic data collection plan, an administrator must gather server JVM logs
and
archive them every
week. How can the administrator configure a server so that the logs are
available for weekly
archiving?
A. Use the Advanced
setting for log file formatting and rotation.
B. Use the
administrative console to set Runtime messages to Info.
C. Use appropriate
settings for log rotation and number of historical logs.
D. Set the archive
and log rotation values in theffdcRun.properties file.
Answer: C
QUESTION NO: 110
An administrator
notices that the <profile_root>/logs directory is filling up with
heapdump and
javacore files.
Before analyzing
these files, what should the administrator do to determine which application
components might be
causing these files to be dumped?
A. Examine the
application servers SystemErr.log and look forOutOfMemoryError exceptions and
stack traces.
B. Monitor the
application servers JVM using Tivoli Performance Viewer and look for steady
growth in the heap
size.
C. Use the Log
Analyzer to view the applicationservers trace.log file and look for application
startup failures.
D. Gather the
applicationservers verbose garbage collection data and look for relatively long
garbage collection
cycles.
Answer: A
QUESTION NO: 111
An application
server is producing heap dumps. Which tool in IBM Support Assistant (ISA) is
used
to perform analysis
on the heap dump?
A. Log Analyzer
B. ThreadAnalyzer
C. Trace and Request
Analyzer
D. Memory Dump
Diagnostic for Java
Answer: D
QUESTION NO: 112
An administrator has
defined a connection factory, jms/CF, which is required by an application that
runs on a cluster.
Three of the clusters four members run the application without error. On the
fourth member, a
NameNotFoundException is thrown attempting to look up jms/CF. The
administrator uses
the dumpNameSpace command to examine the namespace of the fourth
member and verifies
that jms/CF is not in the namespace. What is the most likely cause?
A. The fourth
cluster member is running on a different operating system than the other three.
B. The administrator
has not defined thejms/CF connection factory at a scope visible to the fourth
cluster member.
C. The fourth
cluster member has not been selected as a deployment target for the
application.
D. The administrator
has specified a maximum of 3 connections on thejms/CF connection factory.
Answer: B