C9510-418 Exam - IBM WebSphere Application Server Network Deployment V9.0 Core Administration

certleader.com

Want to know Examcollection C9510-418 Exam practice test features? Want to lear more about IBM IBM WebSphere Application Server Network Deployment V9.0 Core Administration certification experience? Study High value IBM C9510-418 answers to Improved C9510-418 questions at Examcollection. Gat a success with an absolute guarantee to pass IBM C9510-418 (IBM WebSphere Application Server Network Deployment V9.0 Core Administration) test on your first attempt.

NEW QUESTION 1
What is one of the benefits of using a federated repository over a user registry?

  • A. Does notsupport identity profiles
  • B. Supports only one registry in a realm
  • C. Supports multiple registries within a realm
  • D. Provides account and password policy support

Answer: C

Explanation:
Federated repositories enable you to use multiple repositories with WebSphere® Application Server. These repositories, which can be file-based repositories, LDAP repositories, or a sub-tree of an LDAP repository, are defined and theoretically combined under a single realm. All of the user repositories that are configured under the federated repository functionality are invisible to WebSphere Application Server.
References:https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/cwim_fedrepos.html

NEW QUESTION 2
When installing IBM WebSphere Application Server on a network file system, IBM Installation Manager fails with an insufficient disk space error.
How could this be resolved?

  • A. Increase disk space and try again.
  • B. Delete temporary files and try again.
  • C. Reboot operating system and try again.
  • D. Disable disk space checking inthe config.ini and try again.

Answer: D

Explanation:
On some network file systems, disk space might not be reported correctly at times; and you
might need to bypass disk-space checking and proceed with your installation.
To disable disk-space checking, specify the following system property in the config.ini file in IM_install_root/eclipse/configuration and restart Installation Manager.
References:https://www.ibm.com/support/knowledgecenter/SSEQTP_9.0.0/com.ibm.websphere.installation.base.doc/ae/tins_troubleshoot.html

NEW QUESTION 3
What is a benefit of using the IBM Extended Cache Monitor?

  • A. It invalidates cacheids.
  • B. It displays the contents of the cache instances.
  • C. It displays the contents of object cache instances.
  • D. It displays the dependency ids of the cache instances.

Answer: C

Explanation:
The IBM Extended Cache Monitor for IBM WebSphere Application Server provides you with two functions that are not available with the cache monitor that is supplied with WebSphere Application Server. These two functions enable you to:
display the contents of object cache instances
display the Dynamic Cache mbean statistics for cache instances
References:https://www.ibm.com/developerworks/websphere/downloads/cache_monitor.ht ml

NEW QUESTION 4
An administrator needs to resolve port conflicts after creating a managed node using the Profile Management Tool.
Which supported method can be used to resolve the port conflicts?

  • A. Editserverindex.xml.
  • B. UseupdatePorts.ant.
  • C. Use Profile Port Checker tool and set ports.
  • D. UsemanageProfiletool and set port range on the profile.

Answer: B

Explanation:
If you discover ports conflicts, then you can reassign ports manually. To reassign ports, run the updatePorts.ant file by using the ws_ant script.
References:https://www.ibm.com/support/knowledgecenter/en/SSEQTP_8.5.5/com.ibm.websphere.base.doc/ae/tpro_instancessaappserv.html

NEW QUESTION 5
What does the –Dcom.ibm.webshpere.alarmthreadmonitor.generate.javacore JVM argument do?

  • A. Creates a javacore dump when a thread is hung
  • B. Generates a Tracemessage that a javacore should be generated
  • C. Generates a SystemOut message that a javacore should be generated
  • D. Allows the administrator to choose whether or not to generate a javacore when a hang is detected

Answer: A

Explanation:
If you want to monitor the activity of threads on which system alarms execute, add the following JVM generic arguments to the server settings.
-Dcom.ibm.websphere.alarmthreadmonitor.generate.javacore
Set to any value to cause a javacore dump to be created when an hung system alarm threadis detected. The threads section of the javacore dump can be analyzed to determine what the reported thread and other related threads are doing.
References:https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/ttrb_confighangdet.html

NEW QUESTION 6
In an IBM WebSphere Application Server cluster, an administrator notices EJB requests are not evenly distributed on the cluster members during the load test.
What two things can the administrator verify in order to identify and resolve the issue? (Select two.)

  • A. Ensure Dynamic Workload Management is enabled.
  • B. Ensure host scoped routing optimization is enabled.
  • C. Ensure PMI Workload Management counters are enabled.
  • D. Ensure each server in the cluster has an equal weighted value.
  • E. Ensure the Web server plug-in is using the round robin algorithm.

Answer: AD

Explanation:
A: Workload management optimizes the distribution of client processing tasks. Incoming work requests are distributed to the application servers, enterprise beans, servlets, and other objects that can most effectively process the requests.
D: The server weighted round robin routing policy ensures a balanced routing distribution based on the set of server weights that have been assigned to the members of a cluster. For example, if all servers in the cluster have the same weight, the expected distribution for the cluster is that all servers receive the same number of requests. If the weights for the servers are not equal, the distribution mechanism sends more requests to the higher weight value servers than the lower weight value servers. The policy ensures the distribution that you want, based on the weights that are assigned to the cluster members.
References:https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/crun_srvgrp.html

NEW QUESTION 7
Which is true when installing interim fixes silently?

  • A. No response file is needed.
  • B. A password file is required.
  • C. Greater permissions are needed.
  • D. An online repository must beused.

Answer: C

Explanation:
Use the Update Installer program from the same user ID that installed the product that you are updating. Otherwise, the file ownership mismatches might require correction by the root user.
Note: An interim fix is also known as a patch.

NEW QUESTION 8
Which of the following is true about certificate expiration monitoring?

  • A. Must be runmanually.
  • B. Must be run on the deployment manager.
  • C. Deletes the certificates after they are expired, but does not replace them.
  • D. Can replace expired certificates or certificates in the expiration threshold with a new certificate

Answer: D

Explanation:
Certificatemonitor configuration settings can be configured on the administrative console by selecting Security > SSL certificate and key management > Manage certificate expiration. . On the Manage certificate expiration panel, you can perform the following functions.
Etc.
References:https://www.ibm.com/support/knowledgecenter/en/SSAW57_7.0.0/com.ibm.websphere.nd.doc/info/ae/ae/csec_sslcertmonitoring.html

NEW QUESTION 9
An administrator notices that the Message Driven Beans (MDBs) are slow to complete, and decides to increase the ‘Maximum concurrent MDB invocations per endpoint’.
Which thread pool should be tuned to ensure it can run the maximum number of MDBs without waiting?

  • A. Default
  • B. WebContainer
  • C. SIBJMSRAThreadPool
  • D. WMQJCAResourceAdapter

Answer: D

Explanation:
The thread pool WMQJCAResourceAdapter is referenced by the WebSphere MQ (WMQ) resource adapter inbound delivery to MDB's. When WebSphere MQ resource adapter is used in conjunction with the activation specs, the resource adapter's Work Manager uses the values defined for the WMQJCAResourceAdapter for utilizing the total number of threads defined.
Ideally the default values provides for the WMQJCAResourceAdapter will be sufficient for the resource adapter. But in case there is an heavy load on the system processing huge
number of messages, you can increase the maximum number of threads the thread pool can hold.
References:http://www-01.ibm.com/support/docview.wss?uid=swg21383363

NEW QUESTION 10
An administrator is using the Guided Troubleshooter in the IBM Support Assistant to troubleshoot IBM WebSphere Application Server issues. After going through data collection and analysis, no reliable solution is found.
What is the administrator’s best next step?

  • A. Call ina new PMR with IBM and upload Troubleshooter data to ECuREP.
  • B. Open a new PMR with IBM and upload SystemOut.log from the IBM WebSphere Application Server.
  • C. Submit results to the IBM WebSphere Application Server forum for a quick response from other forum users.
  • D. Use the Guided Troubleshooter to open a service request with IBM, so all the troubleshooting data analyzed so far is uploaded automatically.

Answer: D

NEW QUESTION 11
What determines which On Demand Routers (ODRs) a Web server forwards requests to?

  • A. The default order in theODR_Module_Routing_Poilicy.xml.
  • B. The configuration scope determines which ODRs are included inhttpd.conf.
  • C. The configuration scope determines which ODRs are included inplugin-cfg.xml.
  • D. The configuration scope determines which ODRs are included inHTTPplugin-cfg.xml.

Answer: C

Explanation:
In a topology with a web server which forwards requests to an on demand router (ODR), the ODR can be set to dynamically generate and update the web server plug-in configuration file plugin-cfg.xml. By configuring an ODR to dynamically update plugin- cfg.xml, you avoid manually updating the file during administrative actions, which can affect the content.
References:https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/twve_odr.html

NEW QUESTION 12
When installing a new application to IBM WebSphere Application Server, which location is valid for the application file?

  • A. Client Machine
  • B. Managed Node
  • C. Unmanaged Node
  • D. Remote Web Server

Answer: B

Explanation:
Configuration file location during application installation
Several things occur upon installation of an application onto WebSphere Application Server:
Note: A node is a logical grouping of managed servers. Nodes can be managed or unmanaged. An unmanaged node does not have a node agent or administrative agent to manage its servers, whereas a managed node does. Both application servers and supported web servers can be on unmanaged or managed nodes.
References: WebSphere Application Server V8.5, July 2013, page 17

NEW QUESTION 13
What must be done to delete one or more files from an application when using a partial application update?

  • A. Manually delete the files from the file system (on all nodes if clustered).
  • B. Supply the paths to the files that should be deleted in the administrative console.
  • C. Include a META-INF/ibm-partialapp-delete.props in the partial applicationupdate file.
  • D. Select the files that need to be deleted in the file selector section of the form for the partial application update.

Answer: C

Explanation:
If you want to delete application files when you deploy a partial application update, you must first supply a special metadata file called META-INF/ibm-partialapp-delete.props in the partial application compressed file before you continue with the following procedure. Etc.
References:https://www.ibm.com/support/knowledgecenter/en/SSZLC2_8.0.0/com.ibm.commerce.developer.doc/tasks/tdpdeploying_j2ee_assets_partial.htm

NEW QUESTION 14
What does the following JVM argument do?
-Xverbosegclog:${SERVER_LOG_ROOT}/verbose.m%d.7/18/16M%S.%pid.txt,20,10000

  • A. It changes the default values for verbosegc logging.
  • B. It changes the default location of the verbosegc logging.
  • C. It configured verbosegc logging once it has already been enabled.
  • D. It sets the default value for enabling and configuring verbosegc logging.

Answer: B

Explanation:
-Xverbosegclog[: <file> [,<X>,<Y>]]
Causes -verbose:gc output to be written to the specified file.
If it cannot create the file (for example, if an invalid filename is passed into the command), it will redirect the output to stderr.
If you specify <X>and <Y> the -verbose:gc output is redirected to <X> files, each containing <Y> GC cycles.
The dump agent tokens can be used in the filename. See Dump agent tokens for more information. If you do not specify <file>, verbosegc.%Y%m%d.%H%M%S.%pid.txt is used. example: -Xverbosegclog:newgclogname.log,7,10000
References:http://www-01.ibm.com/support/docview.wss?uid=swg21384096

NEW QUESTION 15
Which statement is true about a request made from a browser for a jsp running in an application server?

  • A. The HTTP server plug-in loaded with the embedded HTTP server within the application server forwards the request to the application server.
  • B. The plug-in configuration file loaded with the embedded HTTP server within the application server forwards the request to the application server.
  • C. The HTTP serverplug-in loaded with the HTTP server forwards the request to the embedded HTTP server within the application serve
  • D. The embedded server forwards the request into the web container.
  • E. The plug-in configuration file loaded with the HTTP server forwards therequest to the embedded HTTP server within the application serve
  • F. The embedded server forwards the request into the web container.

Answer: A

Explanation:
When IBM HTTP Server receives a request for a JSP file, it passes the request to WebSphere Application Server -Express's servlet engine, which calls the JSP processor. The JSP processor is an internal servlet which converts a JSP file into Java source code and compiles it. The servlet that implements the JSP processor is org.apache.jasper.runtime.JspServlet.
References:https://www.ibm.com/support/knowledgecenter/en/ssw_i5_54/rzamy/50/progra m/jspdef.htm

NEW QUESTION 16
What must be modified to configure the authentication settings for IIOP requests?

  • A. Bus security settings
  • B. J2C authentication settings
  • C. Session Initiation Protocol (SIP) authentication settings
  • D. Common Secure Interoperability Version 2 (CSIV2) settings

Answer: D

Explanation:
WebSphere Application Server can propagate attributes directly as part of theCSIv2 protocol for RMI/IIOP requests.
References:https://www.ibm.com/developerworks/websphere/techjournal/0508_benantar/0508_benantar.html

NEW QUESTION 17
How can an administrator configure Web services security?

  • A. Customize WS-Security policy set and bindings and attach to Web services.
  • B. Configure global security with LDAP authentication and map the configuration to Web services.
  • C. Request application developer to use Web Services Security API to achieve Web services security.
  • D. Enable the Web ServicesMetadata Exchange (WS-MetadataExchange) protocol to enable message-level security.

Answer: C

Explanation:
The Web Services Security specification provides a flexible framework for building secure web services to implement message content integrity and confidentiality. The Web Services Security service programming model supports this flexible framework by providing extension points to integrate new token formats, and methods to obtains keys needed for message protection. The application server programming model provides Web Services Security programming application programming interfaces (WSS API) for securing SOAP messages.
Note: WS-Security is a message-level standard that is based on securing SOAP messages through XML digital signature, confidentiality through XML encryption, and credential propagation through security tokens. The Web services security specification defines the facilities for protecting the integrity and confidentiality of a message and provides mechanisms for associating security-related claims withthe message.
References:https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/container_wssec_top.html

NEW QUESTION 18
When creating a health policy, which condition should be selected to track requests that have a significantly decreased response time?

  • A. Workload
  • B. Age-based
  • C. Storm drain
  • D. Excessive response time

Answer: C

Explanation:
The Storm drain condition tracks requests that have a significantly decreased response time.
References:https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/cwve_odhealth.html

NEW QUESTION 19
What can an administrator use to remotely manage multiple stand-alone (unfederated) application servers?

  • A. Job Manager
  • B. Administrative agent
  • C. Deployment manager
  • D. remoteServer.jaclscript

Answer: A

Explanation:
Administering nodes remotely using the job manager
In a flexible management environment, you can asynchronouslysubmit and administer jobs for large numbers of stand-alone application servers, deployment managers, and host computers over a geographically dispersed area. At the remote machines, you can use jobs to manage applications, modify the product configuration, or do general purpose tasks such as run a script.
References:https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/tagt_jobmgr.html

NEW QUESTION 20
Which tool can be used to collect data to be used for monitoring and tuning the environment?

  • A. Thread and Monitor Dump Analyzer
  • B. Performance Monitoring Infrastructure
  • C. IBM Tivoli Performance Viewer Advisor
  • D. Garbage Collection and Memory Visualizer

Answer: B

Explanation:
WebSphere Application Server provides Performance Monitoring Infrastructure (PMI) data to help monitor the overall healthof the WebSphere Application Server environment. PMI provides average statistics on WebSphere Application Server resources, application resources, and system metrics. Many statistics are available in WebSphere Application Server, and you might want to understand the ones that most directly measure your site's resources to detect problems.
References:https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/tprf_monitoringhealth.html

NEW QUESTION 21
Which of the following is true regarding disk offload?

  • A. The amount of disk space to use cannot be specified.
  • B. On server startup, DynaCache loads the entire disk cache into memory.
  • C. The number of cache entries that are offloaded to disk cannot be specified.
  • D. Disk offload can be enabled to have a cache entry copied to the file system at a configurable location.

Answer: ACD

Explanation:
AC:Before you enable disk offload, consider the following:
You cannot specify the number of cache entries that are offloaded to disk. You cannot specify the amount of disk space touse.
D: You can enable disk offload to have a cache entry copied to the file system (the location is configurable).
References:https://www.ibm.com/support/knowledgecenter/SSEQTP_9.0.0/com.ibm.websphere.base.doc/ae/udyn_rcachesettings.html

NEW QUESTION 22
Which of the following statements is true regarding the relationship of nodes and node groups?

  • A. Nodes can belong to only one node group.
  • B. Nodes managed by a node group cannot be deleted.
  • C. All nodes are initially not associated with a node group.
  • D. All nodes are initially associated with a default node group.

Answer: D

Explanation:
D: a node must be a member ofa node group. Initially, all Application Server nodes are members of the default DefaultNodeGroup node group.
Note:A node group is a collection of managed nodes.

NEW QUESTION 23
......

P.S. Certshared now are offering 100% pass ensure C9510-418 dumps! All C9510-418 exam questions have been updated with correct answers: https://www.certshared.com/exam/C9510-418/ (65 New Questions)