C9510-401 Exam - IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile, System Administration

certleader.com

Q1. A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.

What should the administrator do to implement the required security configuration?

A. Install and configure a TAI (Trust Association Interceptor)

B. Configure a security domain for the stand-alone LDAP server.

C. Use Federated repositories and configure the supported entity types.

D. Use Stand-alone custom registry and configure the flat file implementation.

Answer: C

Q2. While monitoring a cluster in the cell, the administrator notices that one server in the cluster periodically loses connections to the database. When this happens, requests to the server have a significantly decreased response time and various error conditions are listed in the log files for the server. Since the error codes are returned quickly, the server starts returning responses faster than the average service times for the application. Due to this,

the weight for the server is increased and a large percentage of incoming requests are being routed to the erroneous server and the server is getting overloaded with requests.

How can the administrator detect these conditions in the future and take action to prevent this problem?

A. Configure the storm drain health policy.

B. Configure the on demand router (ODR) transport chain to tune inbound connections.

C. Monitor the JVM heap usage to determine a new server weight.

D. Enable the PMI Extended statistic set and use the Connection Pool summary report.

Answer: D

Q3. A system administrator was asked by the development team to inform them of any warning message which contains a string "Connection" on a WebSphere Application Server with High Performance Extensible Logging (HPEL) enabled.

What should the administrator do to continuously monitor logs for the required message?

A. Configure log detail levels to include filter on "Connection" string.

B. Use the Log Viewer in the administrative console with filter on "Connection" string.

C. Use the logviewer.sh or logviewer.bat command with appropriate options.

D. Use the Log Viewer in the administrative console with filter on "Connection" string and enable the 'Refresh automatically' feature.

Answer: C

Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSD28V_8.5.5/com.ibm.websphere.base.doc/ae/rtrb_logviewer.html

Q4. A system administrator needs to set a new Liberty profile environment to support an application.

What should the administrator do to enable this environment for high availability and scalability of the application?

A. Define multiple server members in one collective controller.

B. Define multiple servers in a cluster in one collective controller.

C. Define multiple collective controllers within a Liberty collective.

D. Define multiple server members in multiple collective controllers.

Answer: C

Explanation: Reference: https://www-01.ibm.com/support/knowledgecenter/SSEQTP_8.5.5/com.ibm.websphere.base.doc/ae/welc_newinrelease.html

Q5. While coordinating a flexible management topology, the job manager can send commands to which components?

A. Application server and name server.

B. On demand router and load balancer.

C. Deployment manager and admin agent.

D. Node agent and web administration server.

Answer: C

Explanation: Reference: http://java.boot.by/ibm-377/ch01s06.html (See the Flexible management 2nd Paragraph 5th Line, and 3rd Paragraph).

Q6. The application placement controller has been configured with elasticity mode enabled. Intermittently, all instances of a dynamic cluster are removed. After further review, the system administrator noticed that it occurs during peak load on another dynamic cluster.

The administrator wants to keep at least one instance available. Which configuration is needed in the dynamic clusters?

A. Enable application lazy start with elasticity mode.

B. Set the proactiveldleStop custom property to true

C. Set the Number of instances to a value greater than zero.

D. Disable the option "If other dynamic clusters need resources, stop all instances of this cluster during periods of inactivity".

Answer: D

Explanation: Reference: http://pic.dhe.ibm.com/infocenter/wxdinfo/v6r1/index.jsp?topic=%2Fcom.ibm.websphere.ops.doc%2Finfo%2Freference%2Frodccustprop.html

Q7. A system administrator is asked by a development team to monitor the performance of a newly deployed EJB application. The administrator noticed that the heap size of the application server is growing.

What should the administrator do to fix the problem using ORB settings?

A. Use J2EE managed object MBeans.

B. Enable the pass by reference option.

C. Disable the application scoped resources in the application deployment descriptor.

D. Ensure that Process embedded configurations is not selected when exporting the EAR.

Answer: C

Q8. A system administrator needs to trigger a javacore only when a Java. net. Socket Timeout Exception is encountered in real time.

What does the administrator have to configure to trigger the javacore dump?

A. Configure the JAVA_DUMP_OPTS environment variable to capture javacore for ANYSIGNAL and all exceptions.

B. Configure an -Xdump:java Generic JVM argument on WebSphere Application Server with the filter for java.net.SocketTimeoutException.

C. Code wsadmin script to capture javacore and then execute it after the Java.net.SocketTimeoutException has been encountered.

D. Use the log filter in HPEL to monitor for java.net. SocketTimeoutException and then gather a javacore dump from the Integrated Solutions Console (ISC).

Answer: A

Explanation: Reference: http://publib.boulder.ibm.com/infocenter/javasdk/tools/index.jsp?topic=%2Fcom.ibm.java.doc.igaa%2F_1vg00014884d287-11c3fb28dae-7ffc_1001.html

Q9. A system administrator, Admin1, with Administrator privileges has archived full repository checkpoints. Another administrator, Configurator1, with Configurator privileges has copied

the checkpoint contents directory from one of the archived check points to its original location. Configurator1 tries to restore the configuration using the copied archived checkpoint contents and the restore fails.

How can Configurator1 restore the configuration using the copied archived full repository checkpoint?

A. Copy the archived checkpoint metadata directory to its original location.

B. Increase the Automatic checkpoint depth to keep all the delta checkpoints.

C. Delete the delta checkpoints taken after the full repository checkpoint was taken.

D. Ask an administrator to update the privileges for Configurator1 to match Admin1.

Answer: A

Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5///com.ibm.websphere.zseries.doc/ae/twve_xdappedcfg.html

Q10. How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the server's file system?

A. Configure the CSIv2 outbound communications under RMI/IIOP security.

B. Configure the file-based repository and create the fileRegistry.xml file.

C. Enable Java 2 security and configure the app.policy and was .policy files.

D. Use the Admin Task delete Authorization Group to remove application access.

Answer: C

Explanation: Reference: http://pic.dhe.ibm.com/infocenter/adiehelp/v5r1m1/index.jsp?topic=%2Fcom.ibm.wasee.doc%2Finfo%2Fee%2Fae%2Ftsec_plan.html