Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

IBM C9510-401 - D Application Server Network Deployment V8.5.5 and Liberty Profile System Administration

Page: 1 / 3
Total 73 questions

A system administrator decides to use the advice from the Performance and Diagnostic Advisor to identify the optimum connection pool settings for data sources. In a cell, the data source db2datasource is defined under node scope and used by two servers from that node. The administrator receives two different sets of advice for db2datasource.

    One set of advice suggests to increase the maximum connection pool size for db2datasource.

    The other suggests reducing the maximum connection pool size for db2datasource.

How should the administrator configure the data sources before reusing the Performance and Diagnostic Advisor?

A.

Create a data source of the same name under cell scope.

B.

Create a data source of the same name under server scope for each server.

C.

Increase the minimum connection pool size for the data source.

D.

Decrease the maximum connection pool size for the data source.

A WebSphere Application Server cell was configured with a deployment manager node and a custom node. An operator manually changed some configuration files in the custom node, and the node became out of synch with the master repository.

The system administrator used the Synchronize button in the system administration session of the Integrated Solutions Console (ISC) to try to resynchronize the node, but the node remained out of sync.

What should the administrator do to fix it?

A.

Use the Full Resynchronize button.

B.

Invoke “sync” operation on NodeSync MBean.

C.

Recreate the custom profile with the same name without deleting the node.

D.

Manually copy all the deployment manager configuration files to the custom node.

A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.

What should the administrator do to implement the required security configuration?

A.

Install and configure a TAI (Trust Association Interceptor)

B.

Configure a security domain for the stand-alone LDAP server.

C.

Use Federated repositories and configure the supported entity types.

D.

Use Stand-alone custom registry and configure the flat file implementation.

A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.

How should the administrator accomplish this?

A.

Enable “Authenticate when any URI is accessed”.

B.

Enable “Authenticate only when the URI is protected”.

Disable “Use available authentication data when an unprotected URI is accessed”.

C.

Enable “Authenticate only when the URI is protected”.

Enable “Use available authentication data when an unprotected URI is accessed”.

D.

Map the application security roles to the configured user registry’s groups.

A system administrator has created a Python script that will run in WebSphere Network cell where administrative security is enabled. This script is named doUpdate.py and will be run by using the following:

wsadmin -connType RMI -f doUpdate.py

How can the administrator suppress a user/password prompt from appearing when this script is run?

Set the user and password in the:

A.

sas.client.props file.

B.

ssl.client.props file.

C.

soap.client.props file.

D.

wsadmin.properties file.

An EJB application posts a request message into a JMS destination and waits for a response message on a different JMS destination. To correlate the response message to the request message, the application uses the JMS correlationId of the message. The application waits up to five seconds for a response before timing out the request.

A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the request message, process it and post a response message.

The destinations are defined in a Service Integration Bus (SIB) within the cell.

Intermittent timeout exceptions have occurred for the requester application. How can a system administrator correlate and analyze the debug information from both requester and consumer applications?

A.

Enable High Performance Extensible Logging (HPEL).

Use HPEL logViewer command to see debug information.

B.

Enable a diagnostic trace in both requester and consumer servers.

Use the Integrated Solutions Console (ISC) to set the admin=all trace.

Analyze the trace.

C.

Enable High Performance Extensible Logging (HPEL).

Enable Cross Component Trace (XCT) to include request IDs in log and trace records.

Use HPEL logViewer command with appropriate filters to see debug information.

D.

Using the Integrated Solutions Console (ISC), browse the request message that has timed out and look for any key application data.

Search for exceptions using the key application data in both requester and consumer in native_stderr.log and native_stdout.log.

An application contains a web services client and the application is deployed and running. A system administrator has to add a response timeout to the deployed web services client, so the call fails in a timely fashion.

Which artifact should the administrator use?

A.

web.xml

B.

was-webservices-sca.xml

C.

ibm-webservices-bnd.xml

D.

ibm-webservicesclient-bnd.xml

A system administrator needs to install WebSphere Application Server using response files, so that a silent install can be done. The administrator has ensured that all required prerequisites have already been installed and, has downloaded and expanded the required WebSphere Application Server installation files.

What can the administrator run to install the product?

A.

install –options responsefile.xml -silent

B.

install –acceptLicense –options responsefile.xml -silent

C.

imcl –acceptLicense input responsefile.xml –log logfile.txt

D.

IBMIM –acceptLicense –input responsefile.xml –log logfile.txt

A system administrator wants to learn some of the Jython scripting commands for the administration of the environment.

Which product feature should the administrator use?

A.

The wsadmin.properties file to load a profile.

B.

The AdminTask object to generate wsadmin scripts.

C.

The guided activities panel from the Integrated Solutions Console (ISC).

D.

The “Log command assistance commands” option in the Integrated Solutions Console (ISC).

A new cell contains a cluster with members defined in two managed nodes running on two different machines. The cell also contains two unmanaged nodes running on HTTP servers with HTTP plug-in. Session persistence has been enabled.

Which additional component(s) can the system administrator configure to make this environment highly available?

A.

Enable administrative security.

B.

Configure a DMZ secure proxy.

C.

Configure High Performance Extensible Logging.

D.

Configure primary and backup load balancers for the HTTP servers.