Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

IBM C9510-401 D Application Server Network Deployment V8.5.5 and Liberty Profile System Administration Exam Practice Test

Page: 1 / 7
Total 73 questions

D Application Server Network Deployment V8.5.5 and Liberty Profile System Administration Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

A JAX-WS EJB stateless session bean web service needs to be accessed by consumers outside the corporate domain.

Which configuration will help a system administrator meet the requirement?

Options:

A.

Open firewall ports for both bootstrap and orb listener ports within the cell.

B.

Configure plug-in in the DMZ to send request to the cluster members.

C.

Configure on demand router (ODR) in the DMZ to send requests to the cluster members.

D.

Configure HTTP tunneling to send the client-side Object Request Broker (ORB) request to the server-side ORB.

Question 2

A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.

What should the administrator do to implement the required security configuration?

Options:

A.

Install and configure a TAI (Trust Association Interceptor)

B.

Configure a security domain for the stand-alone LDAP server.

C.

Use Federated repositories and configure the supported entity types.

D.

Use Stand-alone custom registry and configure the flat file implementation.

Question 3

How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the server’s file system?

Options:

A.

Configure the CSIv2 outbound communications under RMI/IIOP security.

B.

Configure the file-based repository and create the fileRegistry.xml file.

C.

Enable Java 2 security and configure the app.policy and was.policy files.

D.

Use the AdminTask deleteAuthorizationGroup to remove application access.

Question 4

A system administrator needs to set a new Liberty profile environment to support an application.

What should the administrator do to enable this environment for high availability and scalability of the application?

Options:

A.

Define multiple server members in one collective controller.

B.

Define multiple servers in a cluster in one collective controller.

C.

Define multiple collective controllers within a Liberty collective.

D.

Define multiple server members in multiple collective controllers.

Question 5

A system administrator has installed WebSphere Application Server Network Deployment V8.5.5 using the silent installation process and needs the verify that the installation completed successfully.

What does the administrator need to do to verify a successful installation?

Options:

A.

Launch the Installation Manager GUI, verify the installation by going to File -> View Installed Packages.

B.

Run the command IBMIM listInstalledPackages and check that the appropriate WebSphere Application Server package is listed.

C.

Check for INSTCONFSUCCESS message at the end of the log.txt file.

D.

Use the installver command to compare the checksum of the product file to the correct checksum value in the bill-of-materials file and make sure that the checksums match.

Question 6

A system administrator needs to view the list of certificates for unmanaged web server located on a remote system.

How should the administrator do this?

Options:

A.

View the plugin-cfg.xml

B.

Look at the SSL configuration in the httpd.conf

C.

Use iKeyman to view the keyring.

D.

Use the administrative console to check the content of the cell default keystore.

Question 7

A system administrator has created a Python script called globalScript. py.

What should the administrator do to ensure globalScript. py is loaded when the wsadmin shell is used?

Options:

A.

Compile globalScript.py to a Java class in the bin directory.

B.

Invoke wsadmin with the argument-profileName globalScript.py.

C.

Modify the configureCustomProperty script to import globalScript. py.

D.

Set the script profiles in the wsadmin.properties file to load globalScript .py.

Question 8

A system administrator is required to create a star topology for multi-cell performance management for three WebSphere Application Server cells.

How should the administrator configure the Application Placement Controller (APC) in a star topology?

Configure the cell custom property CenterCell to:

Options:

A.

false in all three WebSphere Application Server cells.

B.

false in one WebSphere Application Server cell

true in the other two WebSphere Application Server cells.

C.

true in all three WebSphere Application Server cells.

D.

true in one WebSphere Application Server cell

false in the other two WebSphere Application Server cells.

Question 9

An EJB application posts a request message into a JMS destination and waits for a response message on a different JMS destination. To correlate the response message to the request message, the application uses the JMS correlationId of the message. The application waits up to five seconds for a response before timing out the request.

A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the request message, process it and post a response message.

The destinations are defined in a Service Integration Bus (SIB) within the cell.

Intermittent timeout exceptions have occurred for the requester application. How can a system administrator correlate and analyze the debug information from both requester and consumer applications?

Options:

A.

Enable High Performance Extensible Logging (HPEL).

Use HPEL logViewer command to see debug information.

B.

Enable a diagnostic trace in both requester and consumer servers.

Use the Integrated Solutions Console (ISC) to set the admin=all trace.

Analyze the trace.

C.

Enable High Performance Extensible Logging (HPEL).

Enable Cross Component Trace (XCT) to include request IDs in log and trace records.

Use HPEL logViewer command with appropriate filters to see debug information.

D.

Using the Integrated Solutions Console (ISC), browse the request message that has timed out and look for any key application data.

Search for exceptions using the key application data in both requester and consumer in native_stderr.log and native_stdout.log.

Question 10

A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization.

How can a system administrator fix the issue ensuring only authorized access?

Options:

A.

Using the Integrated Solutions Console (ISC), map all security roles to the special subject Everyone.

B.

Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped to groups in the correct user registry.

C.

Edit the application using an assembly tool to add a security constraint for the servlet and reinstall the application.

D.

Edit the application using an assembly tool to remove the security constraint defined for the servlet and reinstall the application.

Page: 1 / 7
Total 73 questions