New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

IBM C9510-401 Application Server Network Deployment V8.5.5 and Liberty Profile System Administration Exam Practice Test

Demo: 10 questions
Total 73 questions

Application Server Network Deployment V8.5.5 and Liberty Profile System Administration Questions and Answers

Question 1

A system administrator completed a WebSphere Application Server installation by using the Installation Manager. During installation, all defaults were selected for the installation root directories and the shared resources directory. Over time, the administrator has updated the installation with various interim fixes and fix packs. The administrator notices that the shared resources directory is very large in size and grows larger each time the Installation Manager is run.

How can the administrator decrease the size and remove some of the content from the shared resources directory?

Options:

A.

Manually delete content from the directory.

B.

During an update, create a new shared resources directory.

C.

Clear the Delete Saved Files option for the Installation Manager.

D.

Set the preserve Downloaded Artifacts preference to false.

Question 2

A system administrator has deployed web applications to a clustered environment where database session persistence is configured. The administrator needs to improve the response time and the throughput.

How can the system administrator do this?

Options:

A.

Disable server affinity.

B.

Configure dynamic caching.

C.

Configure a load balancer to spread work between existing web servers.

D.

Tune the database session persistence to optimize for failover.

Question 3

An application deployed to a multi-node cluster is reported to have slowness and hung threads. A system administrator is asked to review the logs on each node and identify if the hung threads are a false alarm.

How can the administrator determine that the hung threads are a false alarm?

Analyze the:

Options:

A.

ffdc logs

B.

SystemErr.log

C.

SystemOut.log

D.

native_stderr.log

Question 4

A WebSphere system administrator needs to install the Installation Manager (IM) on an unmanaged node on a host named . The deployment manager is running on a host named .

What step must the administrator take before submitting a job from the Integrated Solutions Console (ISC) to install the IM on ?

Options:

A.

Install a node agent on .

B.

Install the job manager on .

C.

Start the job manager on .

D.

Register as a target for job manager.

Question 5

After collecting diagnostic trace from a server running under a cell, a system administrator noticed that the trace files contained sensitive information.

To avoid this issue in the future, what can the administrator do?

Options:

A.

Configure entries in the ras.rawtracelist.properties.

B.

Configure suppressSensitiveTrace in the bootstrap.properties file.

C.

Clear the “Disable logging and tracing of potentially sensitive data” checkbox.

D.

Add the entry com.ibm.websphere.logging.RawTraceList=off to the end of the trace string.

Question 6

A developer created an enterprise application which contained data source and security role information. The developer asked a system administrator to install this application to an application server where global security is enabled using the Integrated Solutions Console (ISC). A new data source was configured at the server scope for the use of this application. While load testing the application, the developer noticed that the attributes configured on the new data source were ignored by the application server.

How can the administrator ensure that the attributes configured on the new data source are used by the application server?

Options:

A.

Create the data source under cell scope instead of server scope.

B.

Delete any data source of the same name defined under node, cluster or cell scope.

C.

Reinstall the application and clear the Process embedded configuration check box.

D.

Correct the component-managed and container-managed authentication aliases set on the data source.

Question 7

A system administrator needs to create a cell for a test environment. The administrator uses the Profile Management Tool (PMT) to create the deployment manager profile using the advanced profile creation option and creates a custom profile using the typical profile creation option. The administrator examines the log files for the custom profile creation and sees an INSTCONFFAIL message indicating the deployment manager was not running during the custom profile creation.

How should the administrator fix this?

Options:

A.

Delete the custom profile.

Start the deployment manager.

Create the custom profile again.

B.

Start the deployment manager.

Use PMT to re-create the custom profile.

C.

Use the syncNode command to synchronize the node.

D.

Run the addNode command to federate the custom profile.

Question 8

A web application is hosted on an application server that receives HTTP requests from a third party application named myApp. The URIGroup mapping for this application is called default_host_myApp.

The development team asks a system administrator to configure the HTTP plug-in to prevent routing requests to any application server except server1.

The following exhibit shows the parts of the plugin-cfg.xml file that are relevant for myApp. The UriGroups for other applications are not shown in the exhibit.

What should the administrator do to the plugin-cfg.xml file to ensure that requests for default_host_myApp URIGroup are routed only to machine1?

Options:

A.

Delete the Server tag for CloneId=”b20000002”

Delete all of the tags within the Server tag

B.

Delete the UriGroup tag for default_host_myApp

Delete all of the tags within the UriGroup tag

C.

Delete the VirtualHostGroup tag for default_host

Delete all of the tags within the VirtualHostGroup tag

D.

Edit the LoadBalanceWeight for server1 to 20

Edit the LoadBalanceWeight for server2 to 2

Question 9

Which one of the following options describes the runtime flow starting from the client browser in a clustered WebSphere Application Server Network Deployment topology?

Options:

A.

HTTP server -> job manager -> admin agent -> HTTP server plug-in

B.

Load balancer -> HTTP server -> HTTP server plug-in -> application server

C.

Application server -> node agent -> deployment manager -> load balancer

D.

Deployment manager -> node agent -> HTTP server plug-in -> HTTP server

Question 10

A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changed so users only have to log in once, while keeping the above mentioned timeouts the same. The authentication mechanism available is Kerberos.

How should the administrator do this?

Options:

A.

Configure the SIP digest authentication.

B.

Configure the SPNEGO Web or SPNEGO TAI.

C.

Enable Session Management Security Integration.

D.

Ensure Web Inbound security attribute propagation is enabled.

Demo: 10 questions
Total 73 questions