Ensurepass

QUESTION 11

A system administrator needs to automate management of applications deployed onto IBM WebSphere Application Server Network Deployment V8.0 using scripting. Which administrative objects should the system administrator use?

 

A.

AdminApp

B.

AdminApplication

C.

AdminTask

D.

AdminConfig

E.

AdminControl

 

Correct Answer: AC

 

 

QUESTION 12

A system administrator needs to configure a WebSphere Application Server runtime through a properties file. The administrator needs to verify that the properties file is correct and can be applied. How should the administrator do this?

 

A.

Using the applyConfigProperties command with the -validate option.

B.

Using the validateConfigProperties command with the -validate option.

C.

Using the applyConfigProperties command; the verification is done automatically during application of the configuration properties.

D.

Using Integration Solution Console’s Configuration problems panel with Maximum: Validate all documents set.

 

Correct Answer: A

 

 

QUESTION 13

A mixed version and flexible management topology is required for a new application. For ease of administration, the system administrator needs to register a WebSphere V7.0 stand-alone node with a WebSphere V8.0 job manager. What must the administrator do before registering with the job manager?

 

A.

federate the V7.0 stand-alone node with a V7.0 node agent

B.

federate the V7.0 stand-alone node with a V8.0 node agent

C.

register the V7.0 stand-alone node with a V7.0 administrative agent

D.

register the V7.0 stand-alone node with a V8.0 administrative agent

 

Correct Answer: C

 

 

QUESTION 14

A system administrator needs to install WebSphere Application Server binaries on a remote host. The administrator will use the Centralized Installation Manager (CIM) of a Deployment Manager. How should the administrator do this? To install the binaries executing a CIM job, the administrator should:

 

A.

install Job Manager and register it to the deployment manager.

B.

install an administrative agent and federate it to the deployment manager.

C.

register the target host to the Job Manager server of the deployment manager.

D.

transfer a IBM Installation Manager (IIM) kit to the target host and register it with the deployment manager.

 

Correct Answer: C

 

 

QUESTION 15

Management is concerned about secure communication when using WebSphere Proxy Server. How can the system administrator provide additional security to the base proxy configuration?

 

A.

Disable File Transfer Protocol (FTP).

B.

Enable proxy authentication and authorization.

C.

Implement Secure Shell (SSH) communication.

D.

Configure Secure Sockets Layer (SSL) transport.

 

Correct Answer: D

 

 

QUESTION 16

A system administrator configures the intelligent runtime provisioning feature included with WebSphere Application Server Network Deployment V8.0. The default WebSphere settings are in place. At what level will the administrator enable runtime provisioning?

 

A.

node agent

B.

web container

C.

application server

D.

deployment manager

 

Correct Answer: C

 

 

QUESTION 17

Web clients are seeing error messages when they try to access a Java EE application. In order to isolate the system component that may be causing the problem, the administrator decides to verify the request flow from a web browser. In what order should the components be examined?

 

A.

Web server, embedded HTTP server, web services engine

B.

Web server, HTTP plug-in, embedded HTTP server, web container

C.

Embedded HTTP server, web services engine, web container

D.

Load balancer, web server, name server, embedded HTTP server, web container

 

Correct Answer: B

 

 

QUESTION 18

A system administrator must deploy a new application that uses Java 2 security. There are several applications installed in the cell that use application security but not Java 2 security. How can the administrator enable support for Java 2 security without affecting the other applications?

 

A.

Enable Java 2 security at the cell level and grant permissions only to the new application.

B.

Configure a security domain with Java 2 security enabled for the application server that will host the new application.

C.

Configure a security domain for the other applications in the cell with both Java 2 security enabled and application security.

D.

Disable global security and configure a security domain with Java 2 security enabled for the application server that will host the new application.

 

Correct Answer: B

 

 

QUESTION 19

A system administrator needs to create a new standalone WebSphere application server profile on <machine_a>. All previous WebSphere installations have been on <machine_a>. What should the administrator do to prevent a port conflict with this new server?

 

A.

Execute the pmt script from a remote machine.

B.

Execute the Profile Management Tool from <machine_a>

C.

Edit the server.xml file on <machine_a> to change ports.

D.

Look for running processes on <machine_a> using port 9080

 

Correct Answer: B

 

 

QUESTION 20

A system administrator is tuning a WebSphere Application Server system for optimal performance, based on advice obtained from the Performance and Diagnostic advisor. What setting should the administrator configure to ensure accurate advice for the specific configuration of the system?

 

A.

Specify the process ID of the server

B.

Specify the number of processors on the server

C.

Enable tracing on the server

D.

Enable High Performance Extensible Logging (HPEL) logging

 

Correct Answer: B

 

Free VCE & PDF File for IBM C9510-317 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.