IBM WebSphere Application Server Network Deployment V8.0, Core Administration v6.0 (C2180-317)

Page:    1 / 5   
Total 67 questions

An administrator needs to monitor the frequency of garbage collection (GC) cycles that are triggered when a typical client load is run against the server. How should the administrator monitor the frequency ofgarbage collections?

  • A. Use the Log Analyzer to view the verbose GC logs.
  • B. Use the HPEL Log Viewer and look for System.gc() calls.
  • C. Use the Tivoli Performance Viewer (TPV) and select the JVM Runtime.
  • D. Run the performance servlet to gather the verbose GC data.


Answer : C

A system administrator needs to improve performance of a WebSphere Application Server runtime. The computations of JavaServer Pages (JSP), servlets, portlets, Web services and WebSphere commands should be performed once and served from memory. What should the administrator configure?

  • A. Caching Proxy
  • B. Edge Components
  • C. Dynamic cache service
  • D. WebSphere eXtreme Scale


Answer : C

A system administrator is tuning a WebSphere Application Server system for optimal performance, based on advice obtained from the Performance and Diagnostic advisor.
What setting should the administrator configure to ensure accurate advice for the specific configuration of the system?

  • A. Specify the process ID of the server
  • B. Specify the number of processors on the server
  • C. Enable tracing on the server
  • D. Enable High Performance Extensible Logging (HPEL) logging


Answer : B

While monitoring a JDBC data source's performance during a test load, a systemadministrator notices that there are a large number of prepared statements discarded from the cache. In order to improve application throughput, how should the administrator tune the data source?

  • A. Increase the size of the prepared statement cache untilthere are no statement discards under load.
  • B. Increase the maximum connection pool size and keep the prepared statement cache at its default size.
  • C. Set the connection pool purge policy to "EntirePool" and increase the maximum connection pool size.
  • D. Set the minimum connection pool size equal to the maximum connection pool size and keep the prepared statement cache at its default size.


Answer : A

A system administrator needs to identify the performance of a database application and
JDBC connection pool, CPU usage time and response time. Which tools should the administrator use to get this data?

  • A. Client program
  • B. Request metrics
  • C. Custom Java code
  • D. Heap dump analyzer
  • E. Performance Monitoring Infrastructure (PMI)


Answer : B,E

A system administrator needs to identify the most time-intensive web components of a running application, and determine which components are the slowest. The administrator does this from the Tivoli Performance Viewer (TPV) by:

  • A. viewingdiagnostic trace output.
  • B. viewing Servlets Summary Report.
  • C. viewing the log file for the web server.
  • D. opening Reports tab, Runtime operations, reports.


Answer : B

An application server is configured with the default garbage collection (GC) policy. An administrator needs to load test different GC policies. How can the administrator change the server's GC policy?

  • A. Start the node agent from the command line using the -Xgcpolicy option, and specify the server name.
  • B. Start the administrative agent from the command line using the -Xgcpolicy option and specify the server name.
  • C. Use Integrated Solutions Console (ISC) to navigate to the server's JVM configuration and add an appropriate -Xgcpolicy setting.
  • D. Use Integrated Solutions Console (ISC) to navigate to the deployment manager's JVM configuration and add an appropriate -Xgcpolicy setting.


Answer : C

A system administrator needs to modify the Java 2 security permissions for applications running on a server. How should the administrator perform this task?

  • A. Use the PolicyTool.
  • B. Use the iKeyman tool.
  • C. Edit the was.policy file.
  • D. Edit the security.xml file.


Answer : A

The lead administrator needs to limit access to the Integrated Solutions Console (ISC) by a group of administrators who only need to: ?view the configuration of the WebSphere
Application Server. ?monitor its status. ?stop and start the server. To what administrative role should the lead administrator assign this group?

  • A. Auditor
  • B. Monitor
  • C. Operator
  • D. Configurator


Answer : C

A system administrator needs to enable Single Sign On (SSO) using LTPA between
WebSphere cells. What must the administrator do to accomplish this?

  • A. Configure both cells to share LDAP keys.
  • B. Configure both cells to use the same user registry.
  • C. Ensure URL requests use only host names or IP addresses.
  • D. Ensure each cell is in a unique Domain Name System (DNS).


Answer : B

A system administrator needs to enablesecurity auditing. What additional configuration steps are required before auditing becomes effective?

  • A. Configure the types of events that are recorded.
  • B. Configure the types of events that are recorded, and configure failure notifications.
  • C. Create aset of users or groups mapped to the Admin Security Manager role.
  • D. Create a set of users or groups mapped to the Auditor role, and define the notification mechanism.


Answer : D

A system administrator must deploy a new application thatuses Java 2 security. There are several applications installed in the cell that use application security but not Java 2 security.
How can the administrator enable support for Java 2 security without affecting the other applications?

  • A. Enable Java 2 security at the cell level and grant permissions only to the new application.
  • B. Configure a security domain with Java 2 security enabled for the application server that will host the new application.
  • C. Configure a security domain for the other applications inthe cell with both Java 2 security enabled and application security.
  • D. Disable global security and configure a security domain with Java 2 security enabled for the application server that will host the new application.


Answer : B

In a network deployment cell, web users are prompted several times to authenticate. What should the administrator do so that the users only need to authenticate once during a session?

  • A. Configure an authentication proxy server in the DMZ.
  • B. Enable the "Set security cookies to HTTPOnly" property for the global single sign-on configuration.
  • C. Enable single sign-on for the global security configuration and provide the necessary DNS domain names.
  • D. Increase the default LTPA timeout and the cache timeout values for forwarded credentials between servers.


Answer : C

A system administrator creates a profile and selects the option to allow WebSphere
Application Server to create the default certificate. After the certificate is created, what attributes can the administrator customize, if needed?

  • A. location and lifespan of the certificate
  • B. location, type, and password of the keystore
  • C. Distinguished name (DN) and lifespan of the certificate
  • D. Distinguished name (DN) and password of the keystore


Answer : C

A system administrator must configure IBM WebSphere Application Server Network
Deployment V8.0 to authenticate users with a Windows domain. The administrator should configure a registry that is:

  • A. a local operating system (OS).
  • B. a Virtual Member Manager (VMM).
  • C. a registry that implements WebSphere Common Configuration Model (WCCM).
  • D. an Active Directory (AD) domain controller.


Answer : A

Page:    1 / 5   
Total 67 questions