Q1. Which one of the following options describes the runtime flow starting from the client browser in a clustered WebSphere Application Server Network Deployment topology?
A. HTTP server -> job manager -> admin agent -> HTTP server plug-in
B. Load balancer -> HTTP server -> HTTP server plug-in -> application server
C. Application server -> node agent -> deployment manager -> load balancer
D. Deployment manager -> node agent -> HTTP server plug-in -> HTTP server
Answer: A
Q2. A system administrator needs to create a cell for a test environment. The administrator uses the Profile Management Tool (PMT) to create the deployment manager profile using the advanced profile creation option and creates a custom profile using the typical profile creation option. The administrator examines the log files for the custom profile creation and sees an INSTCONFFAIL message indicating the deployment manager was not running during the custom profile creation.
How should the administrator fix this?
A. Delete the custom profile. Start the deployment manager. Create the custom profile again.
B. Start the deployment manager. Use PMT to re-create the custom profile.
C. Use the syncNode command to synchronize the node.
D. Run the addNode command to federate the custom profile.
Answer: A
Q3. How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the server's file system?
A. Configure the CSIv2 outbound communications under RMI/IIOP security.
B. Configure the file-based repository and create the fileRegistry.xml file.
C. Enable Java 2 security and configure the app.policy and was .policy files.
D. Use the Admin Task delete Authorization Group to remove application access.
Answer: C
Explanation: Reference: http://pic.dhe.ibm.com/infocenter/adiehelp/v5r1m1/index.jsp?topic=%2Fcom.ibm.wasee.doc%2Finfo%2Fee%2Fae%2Ftsec_plan.html
Q4. A system administrator was asked by the development team to inform them of any warning message which contains a string "Connection" on a WebSphere Application Server with High Performance Extensible Logging (HPEL) enabled.
What should the administrator do to continuously monitor logs for the required message?
A. Configure log detail levels to include filter on "Connection" string.
B. Use the Log Viewer in the administrative console with filter on "Connection" string.
C. Use the logviewer.sh or logviewer.bat command with appropriate options.
D. Use the Log Viewer in the administrative console with filter on "Connection" string and enable the 'Refresh automatically' feature.
Answer: C
Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSD28V_8.5.5/com.ibm.websphere.base.doc/ae/rtrb_logviewer.html
Q5. After collecting diagnostic trace from a server running under a cell, a system administrator noticed that the trace files contained sensitive information.
To avoid this issue in the future, what can the administrator do?
A. Configure entries in the ras.rawtracelist.properties.
B. Configure suppress Sensitive Trace in the boots trap.properties file.
C. Clear the "Disable logging and tracing of potentially sensitive data" checkbox.
D. Add the entry com.ibm.websphere.logging.RawTraceList=Off to the end of the trace string.
Answer: C
Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5/com.ibm.websphere.nd.multiplatform.doc/ae/utrb_loglevel.html
Q6. A system administrator has created a Python script called globalScript. py.
What should the administrator do to ensure globalScript. py is loaded when the wsadmin shell is used?
A. Compile globalScript.py to a Java class in the bin directory.
B. Invoke wsadmin with the argument-profileName globalScript.py.
C. Modify the configureCustomProperty script to import globalScript. py.
D. Set the script profiles in the wsadmin.properties file to load globalScript .py.
Answer: D
Q7. A system administrator decides to use the advice from the Performance and Diagnostic Advisor to identify the optimum connection pool settings for data sources. In a cell, the data source db2datasource is defined under node scope and used by two servers from that node. The administrator receives two different sets of advice for db2datasource.
. One set of advice suggests increasing the maximum connection pool size for db2datasource.
. The other suggests reducing the maximum connection pool size for db2datasource.
How should the administrator configure the data sources before reusing the Performance and Diagnostic Advisor?
A. Create a data source of the same name under cell scope.
B. Create a data source of the same name under server scope for each server.
C. Increase the minimum connection pool size for the data source.
D. Decrease the maximum connection pool size for the data source.
Answer: B
Q8. A system administrator needs to configure a JDBC provider and a data source for an application in a clustered environment. The administrator also needs to copy the JDBC drivers from the database server to the application server machines.
How can the administrator meet these requirements?
A. Create a JDBC provider and the data source in the cluster scope. Copy the driver to all nodes.
Set the environment variable at the node level to the driver's path.
B. Create a JDBC provider in the server scope and the data source in the node scope. Copy the driver to all application servers.
Set the environment variable at the node level to the driver's path.
C. Create a JDBC provider in the node scope and the data source in the cell scope. Copy the driver to the deployment manager.
Set the environment variable at the server level to point to the deployment manager path.
D. Create a JDBC provider in the application scope and the data source in the server scope. Copy the driver to all application server directories.
Set the environment variable in each JVM to the driver's path.
Answer: B
Q9. A system administrator has to design a new production environment to host a web application. The workload of this web application is expected to increase during special marketing campaigns.
Which one of the following topologies should the administrator configure to address the requirements for this new environment?
A. A Liberty collective environment with autonomic managers and on demand router (ODR).
B. A flexible management environment supported by one admin agent running in each node of the cell.
C. A dynamic cluster with autonomic managers, application placement controller and intelligent routers.
D. A heterogeneous cell with enough servers to support the peak load spread across multiple nodes on the same machine.
Answer: C
Q10. A system administrator ran the backup Config command to backup the configuration using the -nostop option. The administrator changed the properties for the service integration environment by modifying the sib.properties file. During testing the administrator noticed Service Integration Bus related errors and wanted to restore the service integration environment. The administrator used the restore config command, but the tuning properties for the service integration environment were not restored.
How can the administrator prevent this issue?
A. Use full repository checkpoints for both the backup and the restore.
B. Use the restore config command with -nostop for the restore.
C. Use the manage profiles command for both the backup and the restore.
D. Use the backup config command without -nostop for the backup Use the restore config command without -nostop for the restore.
Answer: B
Q11. A system administrator in a bank was asked by business users to determine the most accessed JSP page in a web application at normal work load for marketing purpose.
Which tool should the administrator use to find the most used JSP page?
A. Performance and Diagnostic Advisor
B. IBM Support Assistant Data Collector
C. High Performance Extensible Logging Log Viewer
D. Tivoli Performance Viewer (TPV) summary reports
Answer: C
Q12. A web application is hosted on an application server that receives HTTP requests from a third party application named myApp. The URlGroup mapping for this application is called default_host_myApp.
The development team asks a system administrator to configure the HTTP plug-in to prevent routing requests to any application server except serverl.
The following exhibit shows the parts of the plugin-cfg.xml file that are relevant for myApp. The UriGroups for other applications are not shown in the exhibit.
What should the administrator do to the plugin-cfg.xml file to ensure that requests for default_host_myApp URIGroup are routed only to machine1?
A. Delete the server tag for Cloneld="b20000002" Delete all of the tags within the Server tag
B. Delete the UriGroup tag for default_host_myApp Delete all of the tags within this UriGroup tag
C. Delete the VirtualHostGroup tag for default_host Delete all of the tags within the VirtualHostGroup tag
D. Edit the LoadBalanceWeight forserverl to 20 Edit the LoadBalanceWeight for server2 to 2
Answer: C
Q13. A WebSphere system administrator needs to install the Installation Manager (IM) on an unmanaged node on a host named <machine2>. The deployment manger is running on a host named <machine1>.
What step must the administrator take before submitting a job from the Integrated Solutions Console (ISC) to install the IM on <machine2>?
A. Install a node agent on <machine2>.
B. Install the job manager on <machine1>.
C. Start the job manager on <machine1>.
D. Register <machine2> as a target for job manager.
Answer: A
Q14. A system administrator needs to view the list of certificates for unmanaged web server located on a remote system.
How should the administrator do this?
A. View the plugin-cfg.xml
B. Look at the SSL configuration in the httpd.conf
C. Use iKeyman to view the keyring.
D. Use the administrative console to check the content of the cell default keystore.
Answer: B
Explanation: Reference: http://www.cse.yorku.ca/~seela/db2/Content_manager/httpserver.html
Q15. A system administrator has created a wsadmin script with several steps to install and configure an application and some resources in a WebSphere Application Server process. The script executed but the application was not installed successfully. The administrator suspects that the script has problems.
How can the administrator test and debug the script?
A. In WebSphere Application Server Developer Tools for Eclipse, right click on the script file and select validate from context menu.
B. Execute the script using the wsadmin with the option -conntype NONE and monitor the commandAssistancePythonCommands.log file.
C. Use WebSphere Application Server Developer Tools for Eclipse in the debug perspective connected to the server and execute the script step by step.
D. Run the script using wsadmin with these parameters:-lang Python -javaoption "-Xdebug" and then execute the log Viewer command with the option –listlnstances
Answer: C
Q16. A system administrator has created a cluster containing two servers in a same node. The administrator did not select the option Generate unique HTTP ports during the creation of the cluster members. After the cluster creation, the administrator changed the HTTP port of the second cluster member to 9081.
Testing the servers using the snoop servlet directly to the server's HTTP port, the administrator got the following error message for the second server;
SRVE0255E: A WebGroup/Virtual Host to handle server2:9081 has not been defined How can the administrator fix this problem?
A. Regenerate and propagate the HTTP plug-in.
B. Add the port 9081 to the default_host alias.
C. Create a new virtual host alias at the cell level for the port 9081.
D. Edit the server.xml for the second server and add the port 9081
Answer: C
Explanation: Reference: http://www-01.ibm.com/support/docview.wss?uid=swg21438842
Q17. Within a WebSphere Application Server Network Deployment cell, a system administrator needs to write a script to determine if a particular server is stopped. It is important that the wsadmin script explicitly return a status of stopped as opposed to just failing.
What wsadmin object should the administrator use to write this script?
A. AdminApp
B. AdminTask
C. AdminConfig
D. AdminControl
Answer: D
Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSAW57_8.0.0/com.ibm.websphere.nd.doc/info/ae/ae/welc6topscripting.html
Q18. While coordinating a flexible management topology, the job manager can send commands to which components?
A. Application server and name server.
B. On demand router and load balancer.
C. Deployment manager and admin agent.
D. Node agent and web administration server.
Answer: C
Explanation: Reference: http://java.boot.by/ibm-377/ch01s06.html (See the Flexible management 2nd Paragraph 5th Line, and 3rd Paragraph).
Q19. The computer where a federated node was running had a failure and cannot be recovered. A system administrator wants to recreate the node with the same configurations in another computer.
Which steps should the administrator execute in order to recover the damaged node?
A. Configure the new computer with a different hostname. Create a custom profile with the same name.
Federate to the cell using the command addNode with the default options.
B. Configure the new computer with a different hostname. Create a custom profile with a different name.
Federate to the cell using the command addNode with the option -asExistingNode.
C. Configure the new computer with the same hostname. Create a custom profile with the same name.
Federate to the cell using the command addNode with the option -asExistingNode.
D. Configure the new computer with the same hostname. Create a custom profile with the same name.
Federate to the cell using the command addNode with the options -includeapps.
Answer: B
Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSD28V_8.5.5/com.ibm.websphere.zseries.doc/ae/tagt_addNode_asExistingNode.html (See the Heading Procedure).