C9510-401 Premium Bundle

C9510-401 Premium Bundle

IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile, System Administration Certification Exam

4.5 
(21315 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

IBM C9510-401 Free Practice Questions

Q1. A WebSphere Application Server cell was configured with a deployment manager node and a custom node. An operator manually changed some configuration files in the custom node, and the node became out of synch with the master repository.

The system administrator used the Synchronize button in the system administration session of the Integrated Solutions Console (ISC) to try to resynchronize the node, but the node remained out of sync.

What should the administrator do to fix it?

A. Use the Full Resynchronize button.

B. Invoke "sync" operation on NodeSync MBean.

C. Recreate the custom profile with the same name without deleting the node.

D. Manually copy all the deployment manager configuration files to the custom node.

Answer: A

Explanation: Reference: https://books.google.com.pk/books?id=oLq6AgAAQBAJ&pg=PA30&lpg=PA30&dq=Use+the+Full+Resynchronize+button&source=bl&ots=rdUMDel7n0&sig=YeWe8vnPOUZtxtD7DZP8IZdMF1Y&hl=en&sa=X&ei=manTVK-2KIXVau6lgrgG&ved=0CCEQ6AEwAQ#v=onepage&q=Use%20the%20Full%20Resynchronize%20button&f=false

Q2. A system administrator needs to deploy a new enterprise application which requires that application security be enabled, but, the existing applications in the cell cannot be executed with application security enabled. The cell has the global security and Java 2 security disabled.

How can the administrator handle this requirement?

A. Enable Java 2 security for the cell.

Create a security domain with application security enabled. Associate the security domain to the new application.

B. Enable Java 2 security for the cell.

Create a security domain with application security enabled.

Associate the security domain to a new cluster to be used to deploy the new application,

C. Enable administrative security for the cell.

Create a security domain with application security enabled.

Associate the security domain at the application level for the new application.

D. Enable administrative security for the cell.

Create a security domain with application security enabled.

Associate the security domain to the new cluster where the new application is deployed.

Answer: C

Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/csec_sec_multiple_domains.html?cp=SSAW57_8.5.5%2F1-8-2-33-1-0 (See the Java 2 security).

Q3. A system administrator is required to monitor the application server logs for heap memory issues and determine if the heap memory usage is reaching close to 70% of the maximum heap. The application server is configured with an initial heap of 256 MB and a max heap of 1 GB.

How should the administrator determine if the application server is utilizing 70% of the max allocated heap memory?

A. Check the System logs for Out Of Memory Errors.

Trigger a heap dump from the Integrated Solutions Console (ISC). Analyze the heap dump.

B. Configure WebSphere Application Server to enable verbose garbage collection. Analyze the garbage collection cycles in the native logs.

C. Configure Initial heap to be equal to the max heap.

Trigger a heap dump from the Integrated Solutions Console (ISC). Analyze the heap dump.

D. Configure WebSphere Application Server to increase max heap. Trigger a heap dump from the Integrated Solutions Console (ISC). Analyze the heap dump.

Answer: A

Explanation: Reference: http://www.ibm.com/developerworks/bpm/bpmjournal/1312_chan/1312_chan.html

Q4. A system administrator wants to learn some of the Python scripting commands for the administration of the environment.

Which product feature should the administrator use?

A. The wsadmin.properties file to load a profile.

B. The AdminTask object to generate wsadmin scripts.

C. The guided activities panel from the Integrated Solutions Console (ISC).

D. The "Log command assistance commands" option in the Integrated Solutions Console (ISC).

Answer: D

Q5. A system administrator has added a server cluster as a member of a service integration bus (SIB). The administrator needs to configure one messaging engine for each server in this cluster and to have a failover location for each messaging engine.

What should the administrator do to achieve the required design?

A. Configure a new messaging engine in each server to support failover.

B. Configure the data store for each messaging engine for each server in the cluster.

C. Select scalability with high availability as the messaging engine policy.

D. Create a core group policy to restrict each messaging engine to a particular server.

Answer: C

Explanation: The scalability with high availability configuration ensures that there is a messaging engine for each server in a cluster, and that each messaging engine has a failover location.

Reference: http://www-

01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5/com.ibm.websphere.nd.doc/ae/cjt1004_.html (second paragraph)

Q6. An EJB application posts a request message into a JMS destination and waits for a response message on a different JMS destination. To correlate the response message to the request message, the application uses the JMS correlation ld of the message. The application waits up to five seconds for a response before timing out the request.

A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the request message, process it and post a response message.

The destinations are defined in a Service Integration Bus (SIB) within the cell.

Intermittent timeout exceptions have occurred for the requester application. How can a system administrator correlate and analyze the debug information from both requester and consumer applications?

A. Enable High Performance Extensible Logging (HPEL). Use HPEL logViewer command to see debug information.

B. Enable a diagnostic trace in both requester and consumer servers.

Use the Integrated Solutions Console (ISC) to set the admin=all trace. Analyze the trace.

C. Enable High Performance Extensible Logging (HPEL).

Enable Cross Component Trace (XCT) to include request IDs in log and trace records. Use HPEL logViewer command with appropriate filters to see debug information.

D. Using the Integrated Solutions Console (ISC), browse the request message that has timed out and look for any key application data.

Search for exceptions using the key application data in both requester and consumer in native_stderr.log and native_stdout.log.

Answer: C

Q7. A new cell contains a cluster with members defined in two managed nodes running on two different machines. The cell also contains two unmanaged nodes running on HTTP servers with HTTP plug-in. Session persistence has been enabled.

Which additional component(s) can the system administrator configure to make this environment highly available?

A. Enable administrative security.

B. Configure a DMZ secure proxy.

C. Configure High Performance Extensible Logging.

D. Configure primary and backup load balancers for the HTTP servers.

Answer: C

Q8. A system administrator has been asked to uninstall an application from a cluster running in a WebSphere Application Server Network Deployment cell. This application was installed from the Integrated Solutions Console (ISC). The monitored directory for the cluster is

<cluster1_dir>.

What step(s) can the administrator perform to uninstall the application?

A. Delete the application file from <cluster1_dir>.

B. Stop the running cluster.

Delete the application file from <cluster1_dir>.

C. Stop the running cluster.

Copy the application file to <cluster1_dir>. Delete the application file from <cluster1_dir>.

D. Create a properties file to describe the deletion of the application file Copy the properties file to <cluster1_dir>.

Answer: A

Q9. A performance test team was testing the capacity of concurrent users of a web application deployed on a multi-processor server. While testing 250 concurrent users, the administrator discovers connections to the database are failing.

In response, a system administrator increased the connection pool to the maximum limit which the database allows and increased the prepared statement cache size. The test passed, but the application response time was slower.

How should the system administrator tune the data source properties to improve the application response time?

A. Change connection pools purge policy.

B. Decrease connection pool reaps time.

C. Decrease number of free pool partitions.

D. Decrease the prepared statement cache size.

Answer: A

Explanation: Reference: https://www-01.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.base.doc/ae/tdat_chgconwsadmin.html

Q10. The application placement controller has been configured with elasticity mode enabled. Intermittently, all instances of a dynamic cluster are removed. After further review, the system administrator noticed that it occurs during peak load on another dynamic cluster.

The administrator wants to keep at least one instance available. Which configuration is needed in the dynamic clusters?

A. Enable application lazy start with elasticity mode.

B. Set the proactiveldleStop custom property to true

C. Set the Number of instances to a value greater than zero.

D. Disable the option "If other dynamic clusters need resources, stop all instances of this cluster during periods of inactivity".

Answer: D

Explanation: Reference: http://pic.dhe.ibm.com/infocenter/wxdinfo/v6r1/index.jsp?topic=%2Fcom.ibm.websphere.ops.doc%2Finfo%2Freference%2Frodccustprop.html

Q11. An application deployed to a multi-node cluster is reported to have slowness and hung threads. A system administrator is asked to review the logs on each node and identify if the hung threads are a false alarm.

How can the administrator determine that the hung threads are a false alarm? Analyze the:

A. ffdc logs.

B. SystemErr.log.

C. SystemOut.log.

D. Native_stderr.log.

Answer: C

Explanation: http://www- 01.ibm.com/support/knowledgecenter/ssw_i5_54/rzatz/trbhangdet.htm (See the False Alarm).

Q12. An application contains a web services client and the application is deployed and running. A system administrator has to add a response timeout to the deployed web services client, so the call fails in a timely fashion.

Which artifact should the administrator use?

A. web.xml

B. was-webservices-sca.xml

C. ibm-webservices-bnd.xmi

D. ibm-webservicesclient-bnd.xmi

Answer: C

Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSEQTP_7.0.0/com.ibm.websphere.nd.doc/info/ae/ae/twbs_atkdd2.html

Q13. A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.

How should the administrator accomplish this?

A. Enable "Authenticate when any URI is accessed".

B. Enable "Authenticate only when the URI is protected".

C. Enable "Authenticate only when the URI is protected".

D. Map the application security roles to the configured user registry's groups.

Answer: B

Q14. A system administrator has deployed web applications to a clustered environment where database session persistence is configured. The administrator needs to improve the response time and the throughput.

How can the system administrator do this?

A. Disable server affinity.

B. Configure dynamic caching.

C. Configure a load balancer to spread work between existing web servers.

D. Tune the database session persistence to optimize for failover.

Answer: B

Explanation: Reference: http://www.ibm.com/developerworks/websphere/techjournal/1008_genkin/1008_genkin.htm l

Q15. A system administrator is tasked with monitoring the overall health of the WebSphere environment to be able to tune the environment properly. Specifically, the administrator was asked to:

• Monitor how much time is spent in the various parts of the environment.

• Determine the concurrent usage of the site.

• Identify potential memory leaks.

Which PMI modules can the administrator examine to obtain this data?

A. Number of requests, Java virtual memory. Average response time

B. Number of requests, Average response time. Web server thread pools

C. Average response time, Java virtual memory. Number of Live HTTP Sessions

D. Average response time. Web server thread pools. Number of Live HTTP Sessions

Answer: : B

Q16. A system administrator runs a Python script that creates and configures several servers and realizes that the script fails before completing. Although many tasks succeeded, they are rolled back when the script fails.

Before running the script again, what can the administrator add to the script after each task so the completed tasks are committed even if other tasks fail?

A. AdminApp.update ()

B. AdminConfig.save()

C. AdminControl.invoke(server, 'sync’)

D. AdminTask.backupJobManager('server')

Answer: C

Q17. In a test environment, a system administrator has configured an external HTTP server in the DMZ that is routing to a cluster of application servers. The administrator wants to achieve higher performance when routing and prioritizing incoming requests to the back- end cluster.

How can the system administrator achieve this task?

A. Configure a cluster of external HTTP servers.

B. Enable the prefer local option on the cluster members.

C. Set up a Caching Proxy server between the external web server and the application server.

D. Place an On Demand Router (ODR) between the external web server and the application servers.

Answer: D

Q18. A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization.

How can a system administrator fix the issue ensuring only authorized access?

A. Using the Integrated Solutions Console (ISC), map all security roles to the special subject Everyone.

B. Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped to groups in the current user registry.

C. Edit the application using an assembly tool to add a security constraint for the servlet and reinstall the application.

D. Edit the application using an assembly tool to remove the security constraint defined for the servlet and reinstall the application.

Answer: B

Q19. A system administrator discovers an issue that requires a change to a federated server. In this cell, WebSphere administrative security is enabled, but application security is not enabled.

How should the administrator make this change? The administrator should use:

A. A web browser to connect to the node agent https port.

B. A web browser to connect to the deployment manager admin_host port.

C. The job manager to submit a job to update the unmanaged server.

D. An ssh connection to the node and modify the client_types.xmI file.

Answer: B

START C9510-401 EXAM