C9510-401 Exam - IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile, System Administration

certleader.com

Q1. An application contains a web services client and the application is deployed and running. A system administrator has to add a response timeout to the deployed web services client, so the call fails in a timely fashion.

Which artifact should the administrator use?

A. web.xml

B. was-webservices-sca.xml

C. ibm-webservices-bnd.xmi

D. ibm-webservicesclient-bnd.xmi

Answer: C

Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSEQTP_7.0.0/com.ibm.websphere.nd.doc/info/ae/ae/twbs_atkdd2.html

Q2. The installation of WebSphere Application Server did not complete successfully, and a system administrator needs to troubleshoot the installation.

What can the administrator do to identify the cause of the installation failure?

A. Run the installer command with the appropriate command line options.

B. Check the files under the Agent data location of IBM Installation Manager.

C. Check the files under the logs directory of IBM Installation Manager installation directory.

D. Check the log.txt under <WebSphere Application Server install directory><log directory>.

Answer: D

Q3. After collecting diagnostic trace from a server running under a cell, a system administrator noticed that the trace files contained sensitive information.

To avoid this issue in the future, what can the administrator do?

A. Configure entries in the ras.rawtracelist.properties.

B. Configure suppress Sensitive Trace in the boots trap.properties file.

C. Clear the "Disable logging and tracing of potentially sensitive data" checkbox.

D. Add the entry com.ibm.websphere.logging.RawTraceList=Off to the end of the trace string.

Answer: C

Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5/com.ibm.websphere.nd.multiplatform.doc/ae/utrb_loglevel.html

Q4. Which one of the following options describes the runtime flow starting from the client browser in a clustered WebSphere Application Server Network Deployment topology?

A. HTTP server -> job manager -> admin agent -> HTTP server plug-in

B. Load balancer -> HTTP server -> HTTP server plug-in -> application server

C. Application server -> node agent -> deployment manager -> load balancer

D. Deployment manager -> node agent -> HTTP server plug-in -> HTTP server

Answer: A

Q5. A performance test team was testing the capacity of concurrent users of a web application deployed on a multi-processor server. While testing 250 concurrent users, the administrator discovers connections to the database are failing.

In response, a system administrator increased the connection pool to the maximum limit which the database allows and increased the prepared statement cache size. The test passed, but the application response time was slower.

How should the system administrator tune the data source properties to improve the application response time?

A. Change connection pools purge policy.

B. Decrease connection pool reaps time.

C. Decrease number of free pool partitions.

D. Decrease the prepared statement cache size.

Answer: A

Explanation: Reference: https://www-01.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.base.doc/ae/tdat_chgconwsadmin.html

Q6. A system administrator needs to deploy a new enterprise application which requires that application security be enabled, but, the existing applications in the cell cannot be executed with application security enabled. The cell has the global security and Java 2 security disabled.

How can the administrator handle this requirement?

A. Enable Java 2 security for the cell.

Create a security domain with application security enabled. Associate the security domain to the new application.

B. Enable Java 2 security for the cell.

Create a security domain with application security enabled.

Associate the security domain to a new cluster to be used to deploy the new application,

C. Enable administrative security for the cell.

Create a security domain with application security enabled.

Associate the security domain at the application level for the new application.

D. Enable administrative security for the cell.

Create a security domain with application security enabled.

Associate the security domain to the new cluster where the new application is deployed.

Answer: C

Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/csec_sec_multiple_domains.html?cp=SSAW57_8.5.5%2F1-8-2-33-1-0 (See the Java 2 security).

Q7. A system administrator wants to learn some of the Python scripting commands for the administration of the environment.

Which product feature should the administrator use?

A. The wsadmin.properties file to load a profile.

B. The AdminTask object to generate wsadmin scripts.

C. The guided activities panel from the Integrated Solutions Console (ISC).

D. The "Log command assistance commands" option in the Integrated Solutions Console (ISC).

Answer: D

Q8. A system administrator suspects that the slow performance of an application might be caused by lock contention.

To debug this further, what can the administrator do using IBM Support Assistant?

A. Analyze the running server using IBM Monitoring and Diagnostic Tools for Java -Health center.

B. Collect a java core and analyze it using IBM Monitoring and Diagnostic Tools for Java - Health Center.

C. Collect three thread dumps at equal time intervals and analyze them using IBM Monitoring and Diagnostic Tools for Java - Dump Analyzer.

D. Collect three system dumps at equal time intervals and analyze them using IBM Monitoring and Diagnostic Tools for Java - Memory Analyzer.

Answer: A

Explanation: Reference: http://www-01.ibm.com/support/docview.wss?uid=swg27040548

Q9. An application deployed to a multi-node cluster is reported to have slowness and hung threads. A system administrator is asked to review the logs on each node and identify if the hung threads are a false alarm.

How can the administrator determine that the hung threads are a false alarm? Analyze the:

A. ffdc logs.

B. SystemErr.log.

C. SystemOut.log.

D. Native_stderr.log.

Answer: C

Explanation: http://www- 01.ibm.com/support/knowledgecenter/ssw_i5_54/rzatz/trbhangdet.htm (See the False Alarm).