A system administrator has added a server cluster as a member of a service integration bus (SIB). The administrator needs to configure one messaging engine for each server in this cluster and to have a failover location for each messaging engine.
What should the administrator do to achieve the required design?
Answer : C
Explanation: The scalability with high availability configuration ensures that there is a messaging engine for each server in a cluster, and that each messaging engine has a failover location.
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5/com.ibm.websphere.nd.doc/ae/cjt10
04_.html(second paragraph)
A system administrator was asked by the development team to inform them of any warning message which contains a string "Connection" on a WebSphere Application Server with
High Performance Extensible Logging (HPEL) enabled.
What should the administrator do to continuously monitor logs for the required message?
Answer : C
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSD28V_8.5.5/com.ibm.websphere.base.doc/ae/rtrb
_logviewer.html
A system administrator has created a Python script called globalScript. py.
What should the administrator do to ensure globalScript. py is loaded when the wsadmin shell is used?
Answer : D
An organization updated their LDAP directories and modified user roles. The roles that were configured to have access to a highly secured enterprise application were deleted and new roles with new names were created. The application then had security related exceptions.
How can a system administrator resolve the exceptions and restore security for the application?
Answer : D
Reference:http://www.novell.com/documentation/idmrbpm36/install/data/bb1zmw0.html(Se e the Role of Administrator).
A system administrator,Admin1, with Administrator privileges has archived full repository checkpoints. Another administrator,Configurator1,with Configurator privileges has copied the checkpoint contents directory from one of the archived check points to its original location.Configurator1tries to restore the configuration using the copied archived checkpoint contents and the restore fails.
How canConfigurator1restore the configuration using the copied archived full repository checkpoint?
Answer : A
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5///com.ibm.websphere.zseries.doc/ae/ twve_xdappedcfg.html
In a test environment, a system administrator has configured an external HTTP server in the DMZ that is routing to a cluster of application servers. The administrator wants to achieve higher performance when routing and prioritizing incoming requests to the back- end cluster.
How can the system administrator achieve this task?
Answer : D
A system administrator needs to install WebSphere Application Server Network
Deployment V8.5.5 multiple times and would like to automate the task of installing the product. The administrator wants to create a response file based on an initial installation and use this for future installations.
How can the administrator accomplish this task?
Answer : D
Reference:http://setgetweb.com/p/portal80/p8/additional.html
There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configuration role access to a developer for a single application deployed in that cluster.
How should the administrator meet this requirement and restrict Configuration role access for a single application?
Answer : A
An EJB application posts a request message into a JMS destination and waits for a response message on a different JMS destination. To correlate the response message to the request message, the application uses the JMS correlation ld of the message. The application waits up to five seconds for a response before timing out the request.
A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the request message, process it and post a response message.
The destinations are defined in a Service Integration Bus (SIB) within the cell.
Intermittent timeout exceptions have occurred for the requester application. How can a system administrator correlate and analyze the debug information from both requester and consumer applications?
Answer : C
Which of the following comprises an initial Liberty profile server process?
Answer : C
Reference:https://www-
01.ibm.com/support/knowledgecenter/was_beta_liberty/com.ibm.websphere.wlp.nd.multipl atform.doc/ae/cwlp_about.html(See the Liberty Profile Overview).
A web application was deployed on a WebSphere Application Server cluster. While users are using the application, one of the cluster servers fails and the users lose their working data.
What can the system administrator configure to ensure users can continue to work if one of the cluster servers fails?
Answer : D
Reference:http://websphere.sys-con.com/node/1299059
A web application is hosted on an application server that receives HTTP requests from a third party application named myApp. The URlGroup mapping for this application is called default_host_myApp.
The development team asks a system administrator to configure the HTTP plug-in to prevent routing requests to any application server except serverl.
The following exhibit shows the parts of the plugin-cfg.xml file that are relevant for myApp.
The UriGroups for other applications are not shown in the exhibit.
Answer : C
A system administrator needs to deploy a new enterprise application which requires that application security be enabled, but, the existing applications in the cell cannot be executed with application security enabled. The cell has the global security and Java 2 security disabled.
How can the administrator handle this requirement?
Answer : C
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/csec
_sec_multiple_domains.html?cp=SSAW57_8.5.5%2F1-8-2-33-1-0(See the Java 2 security).
A system administrator wants to learn some of the Python scripting commands for the administration of the environment.
Which product feature should the administrator use?
Answer : D
A system administrator is required to monitor the application server logs for heap memory issues and determine if the heap memory usage is reaching close to 70% of the maximum heap. The application server is configured with an initial heap of 256 MB and a max heap of 1 GB.
How should the administrator determine if the application server is utilizing 70% of the max allocated heap memory?
Answer : A
Reference:http://www.ibm.com/developerworks/bpm/bpmjournal/1312_chan/1312_chan.ht ml
Have any questions or issues ? Please dont hesitate to contact us