IBM WebSphere Application Server Network Deployment V9.0 Core Administration v1.0 (C9510-418)

Page:    1 / 9   
Total 137 questions

An administrator configures an IBM DB2data source at cell scope. The environment variable DB2UNIVERSAL_JDBC_DRIVER_PATH is configured at cluster scope. The data source test connection on one node succeeds, but fails on the other node with java.lang.ClassNotFoundException:com.ibm.db2.jcc.DB2ConnectionPoolDataSource.
Which of the below is the likely cause for the exception?

  • A. The data source is configured at cell scope.
  • B. Multiple driver JARs are installed on the second node.
  • C. DB2UNIVERSAL_JDBC_DRIVER_PATH is configured at cluster scope.
  • D. A different version of the JDBC driver JAR does not exist on the second node.


Answer : C

Explanation:
Check that the variable is correctly defined at the scope where the JDBCProvider/DataSource is defined.
Note: At runtime, WebSphere Application Server invokes a physical data source by resolving the appropriate variable at a level where one of the following criteria exists:
The scope of the variable can contain the data source configuration; that is, the variable has the larger scope.
The variable and the data source have identical scopes.
Application Server meets these conditions by attempting to resolve the variable at each level of the scope spectrum. That is, the product tries to resolve the variable in the server scope, then the cluster scope, then the node scope, and lastly the cell scope.
Reference:
https://www.ibm.com/support/knowledgecenter/SSAW57_8.0.0/com.ibm.websphere.nd.doc/info/ae/ae/cdat_testcon.html

What is a prerequisite for creating a dynamic cluster?

  • A. Create and verify the service policies.
  • B. Verify that the administrator has Operator privileges.
  • C. Verify the application placement controller is enabled.
  • D. Make sure there are less than 30 core group members in the cell.


Answer : C

Explanation:
Verify that the application placement controller is enabled. The application placement controller is enabled by default. The application placement controller enables the autonomic capabilities of dynamic clusters.
Incorrect Answers:
B: You must have configurator administrative privileges to create a dynamic cluster.
Reference:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/twve_odrdynamiccluster.html

Which of the following gives clues when comparing traces from different processes and correlating events of different servers in the same data center?

  • A. Thread ID
  • B. Timestamp
  • C. Message ID
  • D. Exception from top of stack trace


Answer : B

Explanation:

Reading a Trace File -
-> Timestamps give good clues:
-> Time stamps are real machine time values
-> Good when comparing traces from different processes
Reference:
ftp://ftp.software.ibm.com/software/iea/content/com.ibm.iea.was_v6/waspdguide/6.0/GeneralPD/SW5706G04_Techniques.pdf
, page 26

An administrator installed an enterprise application in fast mode and noticed that the application is failing because J2EE roles have not been mapped.
How can this issue be resolved?

  • A. Re-deploy the application.
  • B. Request that the application developer create an enhanced .ear file which has roles mapped, and deploy the enhanced .ear file.
  • C. Map a security role to the user/group for the application using the Integrated Solutions Console, save changes, and restart the application.
  • D. Map a security role to the user runAs roles for the application using the Integrated Solutions Console, save changes, and restart the application.


Answer : C

Explanation:
WSRR defines J2EE roles that must be mapped to user or group principals.
This can be done by using the WebSphere Administration Console
Reference:
https://www.ibm.com/support/knowledgecenter/en/SSWLGF_8.5.6/com.ibm.sr.doc/twsr_configrn_userroles08.html

Which is true when installing interim fixes silently?

  • A. No response file is needed.
  • B. A password file is required.
  • C. Greater permissions are needed.
  • D. An online repository must be used.


Answer : C

Explanation:
Use the Update Installer program from the same user ID that installed the product that you are updating. Otherwise, the file ownership mismatches might require correction by the root user.
Note: An interim fix is also known as a patch.
Incorrect Answers:
A: A response file is required. For example:
[Windows]: update.bat -silent -options "responsefiles\file_name"
D: A repository can be an online location that hosts the interim fix files and other configuration information, or a local file system that contains the files.
Reference:
https://www.ibm.com/support/knowledgecenter/en/SS7K4U_7.0.0/com.ibm.websphere.installation.nd.doc/info/ae/ae/tins_updi_silifixpk.html

Which type of security restricts access to the operating system from applications?

  • A. Java 2 security
  • B. Application security
  • C. Security constraints
  • D. Administrative security


Answer : A

Reference:
https://www.ibm.com/support/knowledgecenter/en/SSPREK_7.0.0/com.ibm.isam.doc_70/ameb_audit_guide/task/tsk_WAS_global_security.html

How would an administrator analyze Cross Component Trace output?

  • A. Use the logViewer command to review the information.
  • B. Review the SystemErr.log files to review the information.
  • C. Use the Integrated Solutions Console to review the information.
  • D. Use the included Cross Component Trace servlet to review the information.


Answer : A

Reference:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.multiplatform.doc/ae/ctrb_XCTOverview.html

A system administrator has downloaded IBM WebSphere Application Server binaries and created a local IBM Installation Manager repository.
What can the system administrator do to ensure only this local Installation Manager repository is used during installation of the product?

  • A. Create a preference for the public repository.
  • B. Use the Packaging Utility to create the repository.
  • C. Make sure the metadata for the repository includes the value "local". option.


Answer : B

Reference:
https://www.ibm.com/support/knowledgecenter/en/SSEQTP_9.0.0/com.ibm.websphere.installation.base.doc/ae/cins_imoverview.html

When configuring IBM WebSphere Application Server to use LDAP, which of the following is used to connect to the LDAP server?

  • A. Bind distinguished name
  • B. Base distinguished Name
  • C. Operating System user name
  • D. Primary administrative user name


Answer : B

Reference:
https://www.ibm.com/support/knowledgecenter/en/SSJJ9R_6.0.2/com.ibm.jazz.install.doc/topics/t_instl_config_ldap_on_was.html

What is the behavior of the default application class loader?

  • A. Classes from the parent are excluded.
  • B. Classes are loaded from the parent first.
  • C. Classes are loaded from the application first.
  • D. Classes are compared between parent and application.


Answer : B

Where are cacheable objects defined?

  • A. Via the cache monitor
  • B. Via the cache viewer portlet
  • C. Via the cachespec.xml file
  • D. Via the Integrated Solutions Console


Answer : C

Reference:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.multiplatform.doc/ae/tdyn_dynamiccacheconfig.html

An administrator has removed a node, but all the resources associated with the deleted node still exist.
What can the administrator do to ensure the node configuration is removed from the cell repository?

  • A. Run the command syncNoode.
  • B. Refederate and remove the node.
  • C. Run the command cleanupNode.
  • D. Perform node synchronization via the Integrated Solutions Console.


Answer : C

Reference:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_9.0.0/com.ibm.websphere.nd.multiplatform.doc/ae/rxml_removenode.html

What is the default location for heap dumps?

  • A. /logs
  • B. /profiles/logs
  • C. /logs/server1
  • D. <profile_root>/<profile>


Answer : D

Reference:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.multiplatform.doc/ae/tprf_collectingheapdumps.html

After enabling High Performance Extensible Logging (HPEL), which configuration change will improve performance?

  • A. Enabling HPEL Text logging
  • B. Disabling HPEL Text logging
  • C. Increasing Maximum log size
  • D. Disabling Log record buffering


Answer : B

Explanation:
The text log file does not contain any content that is not also stored in either the log data repository or trace data repository. You can disable the text log to enhance server performance.
Reference:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.multiplatform.doc/ae/ctrb_HPELOverview.html

Which is a true statement regarding flexible management and the Job Manager?

  • A. Flexible management requires a secure proxy server.
  • B. A deployment manager can be registered with a Job Manager.
  • C. Flexible management is a replacement for a Network Deployment cell.
  • D. The Job Manager also maintains a master repository for the environment.


Answer : B

Reference:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.multiplatform.doc/ae/tagt_jobmgr_register_dmgr.html

Page:    1 / 9   
Total 137 questions