Q1. A WebSphere Application Server cell was configured with a deployment manager node and a custom node. An operator manually changed some configuration files in the custom node, and the node became out of synch with the master repository.
The system administrator used the Synchronize button in the system administration session of the Integrated Solutions Console (ISC) to try to resynchronize the node, but the node remained out of sync.
What should the administrator do to fix it?
A. Use the Full Resynchronize button.
B. Invoke "sync" operation on NodeSync MBean.
C. Recreate the custom profile with the same name without deleting the node.
D. Manually copy all the deployment manager configuration files to the custom node.
Answer: A
Explanation: Reference: https://books.google.com.pk/books?id=oLq6AgAAQBAJ&pg=PA30&lpg=PA30&dq=Use+the+Full+Resynchronize+button&source=bl&ots=rdUMDel7n0&sig=YeWe8vnPOUZtxtD7DZP8IZdMF1Y&hl=en&sa=X&ei=manTVK-2KIXVau6lgrgG&ved=0CCEQ6AEwAQ#v=onepage&q=Use%20the%20Full%20Resynchronize%20button&f=false
Q2. A system administrator needs to install WebSphere Application Server Network Deployment V8.5.5 multiple times and would like to automate the task of installing the product. The administrator wants to create a response file based on an initial installation and use this for future installations.
How can the administrator accomplish this task?
A. Use the IBM Packaging Utility.
B. Use the Installation Manager Console mode.
C. Complete a silent installation with the -log option.
D. Start the Installation Manager GUI with the -record option.
Answer: D
Explanation: Reference: http://setgetweb.com/p/portal80/p8/additional.html
Q3. A system administrator has created a Python script that will run in WebSphere Network cell where administrative security is enabled. This script is named doUpdate.py and will be run by using the following:
wsadmin -connType RMI -f doUpdate.py
How can the administrator suppress a user/password prompt from appearing when this script is run?
Set the user and password in the:
A. sas.client.props file.
B. ssl.client.props file.
C. soap.client.props file.
D. wsadmin.properties file.
Answer: D
Q4. Which of the following comprises an initial Liberty profile server process?
A. A single JVM, the Liberty kernel, and feature manager.
B. A single JVM, an OSGI framework and an object request broker.
C. An OSGI framework, a web container and an EJB container.
D. An administrative agent, the Liberty kernel and shared libraries.
Answer: C
Explanation: Reference: https://www-01.ibm.com/support/knowledgecenter/was_beta_liberty/com.ibm.websphere.wlp.nd.multiplatform.doc/ae/cwlp_about.html (See the Liberty Profile Overview).
Q5. A system administrator has created a cluster containing two servers in a same node. The administrator did not select the option Generate unique HTTP ports during the creation of the cluster members. After the cluster creation, the administrator changed the HTTP port of the second cluster member to 9081.
Testing the servers using the snoop servlet directly to the server's HTTP port, the administrator got the following error message for the second server;
SRVE0255E: A WebGroup/Virtual Host to handle server2:9081 has not been defined How can the administrator fix this problem?
A. Regenerate and propagate the HTTP plug-in.
B. Add the port 9081 to the default_host alias.
C. Create a new virtual host alias at the cell level for the port 9081.
D. Edit the server.xml for the second server and add the port 9081
Answer: C
Explanation: Reference: http://www-01.ibm.com/support/docview.wss?uid=swg21438842
Q6. A system administrator is tasked with monitoring the overall health of the WebSphere environment to be able to tune the environment properly. Specifically, the administrator was asked to:
• Monitor how much time is spent in the various parts of the environment.
• Determine the concurrent usage of the site.
• Identify potential memory leaks.
Which PMI modules can the administrator examine to obtain this data?
A. Number of requests, Java virtual memory. Average response time
B. Number of requests, Average response time. Web server thread pools
C. Average response time, Java virtual memory. Number of Live HTTP Sessions
D. Average response time. Web server thread pools. Number of Live HTTP Sessions
Answer: : B
Q7. A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changes so users only have to log in once, while keeping the above-mentioned timeouts the same. The authentication mechanism available is Kerberos.
How should the administrator do this?
A. Configure the SIP digest authentication.
B. Configure the SPNEGO Web or SPNEGO TAI.
C. Enable Session Management Security Integration.
D. Ensure Web Inbound security attribute propagation is enabled.
Answer: A
Q8. A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization.
How can a system administrator fix the issue ensuring only authorized access?
A. Using the Integrated Solutions Console (ISC), map all security roles to the special subject Everyone.
B. Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped to groups in the current user registry.
C. Edit the application using an assembly tool to add a security constraint for the servlet and reinstall the application.
D. Edit the application using an assembly tool to remove the security constraint defined for the servlet and reinstall the application.
Answer: B
Q9. A system administrator needs to configure a JDBC provider and a data source for an application in a clustered environment. The administrator also needs to copy the JDBC drivers from the database server to the application server machines.
How can the administrator meet these requirements?
A. Create a JDBC provider and the data source in the cluster scope. Copy the driver to all nodes.
Set the environment variable at the node level to the driver's path.
B. Create a JDBC provider in the server scope and the data source in the node scope. Copy the driver to all application servers.
Set the environment variable at the node level to the driver's path.
C. Create a JDBC provider in the node scope and the data source in the cell scope. Copy the driver to the deployment manager.
Set the environment variable at the server level to point to the deployment manager path.
D. Create a JDBC provider in the application scope and the data source in the server scope. Copy the driver to all application server directories.
Set the environment variable in each JVM to the driver's path.
Answer: B
Q10. A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.
How should the administrator accomplish this?
A. Enable "Authenticate when any URI is accessed".
B. Enable "Authenticate only when the URI is protected".
C. Enable "Authenticate only when the URI is protected".
D. Map the application security roles to the configured user registry's groups.
Answer: B