IBM WebSphere Application Server Network Deployment V9.0 Core Administration v1.0

Page:    1 / 9   
Exam contains 135 questions

In addition to logging changes, what can Cross Component Trace capture?

  • A. The user agent of the browser that has initiated the request.
  • B. The last time that the component was updated by a code deploy.
  • C. The time that the component was started in the application server.
  • D. Data snapshots that store entire request and response bodies on the file system.

Answer : C

Cross Component Trace (XCT) annotates the logs so that log entries that are related to a request that is serviced by more than one thread, process, or even server are identified as belonging to the same unit of work.
XCT log records are typically added to the logs to:
-> demarcate the beginning and ending of work for a particular request on a particular thread.
-> demarcate when work is about to be transferred to another thread or process, or to indicate when work returned from another thread or process.
-> demarcate when work moves from major component to major component, even if work continues on the same thread; for example to show transfer of control from application server code to application code.

Which type of fix would typically be downloaded to address a specific problem?

  • A. Interim fix
  • B. Cumulative fix
  • C. Product fix pack
  • D. Cumulative interim fix

Answer : A

A WebSphere Commerce interim fix (iFix) is a software patch that contains fixes for one or more APARs. A WebSphere Commerce cumulative iFix is a comprehensive collection of interim fixes for a specific release. Both types of fixes are installed with the WebSphere Commerce Update Installer (UPDI).
Note: An Authorized Program Analysis Report, or APAR, is a formal report from IBM development to customers that have notified IBM of a problem or suspected defect. If IBM development is able to confirm the existence of the issue they will create an APAR with any known work around and perhaps an indication of which future release, if any, of the IBM program they intend to target for a formal fix to the defect and whether or not a Program Temporary Fix (PTF) is planned. The
APAR will then be published so that it is visible to supported customers.

What determines which On Demand Routers (ODRs) a Web server forwards requests to?

  • A. The default order in the ODR_Module_Routing_Policy.xml.
  • B. The configuration scope determines which ODRs are included in httpd.conf.
  • C. The configuration scope determines which ODRs are included in plugin-cfg.xml.
  • D. The configuration scope determines which ODRs are included in HTTPplugin-cfg.xml.

Answer : C

In a topology with a web server which forwards requests to an on demand router (ODR), the ODR can be set to dynamically generate and update the web server plug-in configuration file plugin-cfg.xml. By configuring an ODR to dynamically update plugin-cfg.xml, you avoid manually updating the file during administrative actions, which can affect the content.

When enabling SSL directives in the IBM HTTP Server configuration file, which parameter is required?

  • A. The name of the key file
  • B. The AllowOverride statement
  • C. The IP address of the VirtualHost
  • D. The DocumentRoot directory path

Answer : A

Enable SSL and define a key file to use. Uncomment the following lines to enable SSL and define a key file to use:
-> SSLEnable
-> SSLServerCert default
-> Keyfile "C:/Program Files/IBM/HTTPServer5/conf/admin.kdb"

Which of the following is a prerequisite for configuring single sign-on for authentication using LTPA cookies?

  • A. All servers must use the same IBM HTTP Server.
  • B. All servers must be configured as part of the same DNS domain.
  • C. All servers must use an IBM Domino Directory that is configured for LDAP access.
  • D. All servers must be managed by the same IBM WebSphere Application Server Deployment Manager.

Answer : B

To take advantage of support for SSO between WebSphere Application Servers or between WebSphere Application Server and a Domino server, applications must meet the following prerequisites and conditions:
* Verify that all servers are configured as part of the same DNS domain.
* Etc.

To write a Jython script to stop a running application server, an administrator should use which administrative object?

  • A. AdminApp
  • B. AdminTask
  • C. AdminConfig
  • D. AdminControl

Answer : D

You can use the wsadmin tool to stop applications.
There are two ways to complete this task. Firstly, you can use the AdminControl object to stop the application. Alternatively, you can use the scripts in the
AdminApplication script library to start, stop, and administer your application configurations.

Which of the following can be queried to get PMI data?

  • A. Server Cell
  • B. JMX Connectors
  • C. MBean ObjectNames
  • D. Application ServerNames

Answer : C

PMI data can be gathered from the J2EE managed object MBeans or the WebSphere Application Server PMI Perf MBean.

What is the main difference between interim fixes and product fix packs as they relate to IBM WebSphere Application Server?

  • A. Interim fixes typically contain new features or functionality ahead of future product fix packs.
  • B. Product fix packs are a combination of interim fixes and internal fixes to make patching easier.
  • C. Product fix packs are generally reserved for new features or functionality whereas interim fixes are provided only to fix known issues.
  • D. Product fix packs bring WebSphere Application Server to a new product level whereas interim fixes provide corrective service for specific known problems.

Answer : D

Product fix packs contain bundled service to bring WebSphere Application Server up to a new product level. Interim fixes provide corrective service for specific known problems.

Which statement is true about a request made from a browser for a jsp running in an application server?

  • A. The HTTP server plug-in loaded with the embedded HTTP server within the application server forwards the request to the application server.
  • B. The plug-in configuration file loaded with the embedded HTTP server within the application server forwards the request to the application server.
  • C. The HTTP server plug-in loaded with the HTTP server forwards the request to the embedded HTTP server within the application server. The embedded server forwards the request into the web container.
  • D. The plug-in configuration file loaded with the HTTP server forwards the request to the embedded HTTP server within the application server. The embedded server forwards the request into the web container.

Answer : A

When IBM HTTP Server receives a request for a JSP file, it passes the request to WebSphere Application Server - Express's servlet engine, which calls the JSP processor. The JSP processor is an internal servlet which converts a JSP file into Java source code and compiles it. The servlet that implements the JSP processor is org.apache.jasper.runtime.JspServlet.

An administrator would like to uninstall an instance of a multiple instance installation via response file.
How does the administrator ensure that the correct instance is uninstalled?

  • A. All the features must be listed.
  • B. The profile ID must point to the correct instance.
  • C. The offering ID must point to the correct instance.
  • D. The repository location must point to the correct instance.

Answer : D


Which two ways are valid ways to install applications to IBM WebSphere Application Server? (Choose two.)

  • A. wsadmin script
  • B. JMS messaging
  • C. IBM Installation Manager
  • D. IBM Tivoli Access Manager
  • E. Integrated Solutions Console

Answer : AE

Deploy an application or module using the administrative console, wsadmin, programming, or deployment tools.

How can an administrator reduce overhead when utilizing monitored directories?

  • A. Increase the polling interval so that the process runs less often.
  • B. Decrease the amount of time that the monitored directory is accessible by users.
  • C. Decrease the size of the monitored directory so that larger files will not be able to be stored in it.
  • D. Configure the monitored directory settings to not automatically synchronize the application once it is installed.

Answer : A

To change the standard polling interval setting, specify a number of seconds in the Polling interval field.
Figure: Configuring the monitored directory

Reference: Application Server V8.5, July 2013, page 852

An administrator has deployed an application that uses 30 unique SQL statements with a maximum data source connection pool size of 10.
What is the recommended prepared statement cache size for the application?

  • A. 10
  • B. 30
  • C. 40
  • D. 300

Answer : B

To determine the highest value for your cache size to avoid any cache discards, add the number of uniquely prepared statements and callable statements, as determined by the SQL string, concurrency, and the scroll type, for each application that uses this data source on a particular server. This value is the maximum number of possible statements that can be cached on a given connection over the life of the server. Setting the cache size to this value means that you never have cache discards. In general, configure a larger cache for applications with a greater number of statements.

What must be done to delete one or more files from an application when using a partial application update?

  • A. Manually delete the files from the file system (on all nodes if clustered).
  • B. Supply the paths to the files that should be deleted in the administrative console.
  • C. Include a META-INF/ibm-partialapp-delete.props in the partial application update file.
  • D. Select the files that need to be deleted in the file selector section of the form for the partial application update.

Answer : C

If you want to delete application files when you deploy a partial application update, you must first supply a special metadata file called META-INF/ibm-partialapp- delete.props in the partial application compressed file before you continue with the following procedure.

An administrator noticed that one of the servers in the core group is experiencing OutOfMemory. As a result, other servers in the core group failed to start.
What core group custom property should the administrator tune to prevent the affected server from impacting other servers in the core group?


Answer : A

Use this custom property to explicitly enable exception handlers that are specific for OutOfMemoryExceptions that occur when sending or receiving network messages. When this property is set to Isolate, if an OutOfMemoryException occurs when a network message is being sent or received, these exception handlers stop High Availability Manager communications to the Out of Memory process.
If IBM_CS_OOM_ACTION=Isolate is not added to the configuration settings for a core group, if a core group process runs out of memory, the Out of memory process might not be able to respond to all messages. This situation prevents multi-step protocols from completing, and prevents the starting server from receiving its initial view of the distributed state.

Page:    1 / 9   
Exam contains 135 questions

Talk to us!

Have any questions or issues ? Please dont hesitate to contact us is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy