IBM C9510-401 - D Application Server Network Deployment V8.5.5 and Liberty Profile System Administration
A system administrator decides to use the advice from the Performance and Diagnostic Advisor to identify the optimum connection pool settings for data sources. In a cell, the data source db2datasource is defined under node scope and used by two servers from that node. The administrator receives two different sets of advice for db2datasource.
One set of advice suggests to increase the maximum connection pool size for db2datasource.
The other suggests reducing the maximum connection pool size for db2datasource.
How should the administrator configure the data sources before reusing the Performance and Diagnostic Advisor?
A WebSphere Application Server cell was configured with a deployment manager node and a custom node. An operator manually changed some configuration files in the custom node, and the node became out of synch with the master repository.
The system administrator used the Synchronize button in the system administration session of the Integrated Solutions Console (ISC) to try to resynchronize the node, but the node remained out of sync.
What should the administrator do to fix it?
A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.
What should the administrator do to implement the required security configuration?
A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.
How should the administrator accomplish this?
A system administrator has created a Python script that will run in WebSphere Network cell where administrative security is enabled. This script is named doUpdate.py and will be run by using the following:
wsadmin -connType RMI -f doUpdate.py
How can the administrator suppress a user/password prompt from appearing when this script is run?
Set the user and password in the:
An EJB application posts a request message into a JMS destination and waits for a response message on a different JMS destination. To correlate the response message to the request message, the application uses the JMS correlationId of the message. The application waits up to five seconds for a response before timing out the request.
A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the request message, process it and post a response message.
The destinations are defined in a Service Integration Bus (SIB) within the cell.
Intermittent timeout exceptions have occurred for the requester application. How can a system administrator correlate and analyze the debug information from both requester and consumer applications?
An application contains a web services client and the application is deployed and running. A system administrator has to add a response timeout to the deployed web services client, so the call fails in a timely fashion.
Which artifact should the administrator use?
A system administrator needs to install WebSphere Application Server using response files, so that a silent install can be done. The administrator has ensured that all required prerequisites have already been installed and, has downloaded and expanded the required WebSphere Application Server installation files.
What can the administrator run to install the product?
A system administrator wants to learn some of the Jython scripting commands for the administration of the environment.
Which product feature should the administrator use?
A new cell contains a cluster with members defined in two managed nodes running on two different machines. The cell also contains two unmanaged nodes running on HTTP servers with HTTP plug-in. Session persistence has been enabled.
Which additional component(s) can the system administrator configure to make this environment highly available?