Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configurator role access to a developer for a single application deployed in that cluster.

How should the administrator meet this requirement and restrict Configurator role access for a single application?

A.

Create a J2C authentication alias for that developer.

B.

Create an Administrative user role and provide Configurator access to the developer.

C.

Create an Administrative group role and provide Configurator access to the developer.

D.

Create an administrative authorization group, scope it only for that application and create an Administrative user or group role to give Configurator access to the developer.

While monitoring a cluster in the cell, the administrator notices that one server in the cluster periodically loses connections to the database. When this happens, requests to the server have a significantly decreased response time and various error conditions are listed in the log files for the server. Since the error codes are returned quickly, the server starts returning responses faster than the average service times for the application. Due to this, the weight for the server is increased and a large percentage of incoming requests are being routed to the erroneous server and the server is getting overloaded with requests.

How can the administrator detect these conditions in the future and take action to prevent this problem?

A.

Configure the storm drain health policy.

B.

Configure the on demand router (ODR) transport chain to tune inbound connections.

C.

Monitor the JVM heap usage to determine a new server weight.

D.

Enable the PMI Extended statistic set and use the Connection Pool summary report.

The administrator needs to identify any security role references and security constraints in a web application.

How can the administrator identify these roles and constraints?

A.

ibm-application-ext.xml file using a text editor.

B.

ibmconfig folder in the application after using the EARExpander command.

C.

Web deployment descriptor using IBM Assembly and Deploy Tools.

D.

Security role to user/group mapping by using the Integrated Solutions Console (ISC).

A system administrator has deployed web applications to a clustered environment where database session persistence is configured. The administrator needs to improve the response time and the throughput.

How can the system administrator do this?

A.

Disable server affinity.

B.

Configure dynamic caching.

C.

Configure a load balancer to spread work between existing web servers.

D.

Tune the database session persistence to optimize for failover.

A system administrator has created a wsadmin script with several steps to install and configure an application and some resources in a WebSphere Application Server process. The script executed but the application was not installed successfully. The administrator suspects that the script has problems.

How can the administrator test and debug the script?

A.

In WebSphere Application Server Developer Tools for Eclipse, right click on the script file and select Validate from context menu.

B.

Execute the script using the wsadmin with the option –conntype NONE and monitor the commandAssistanceJythonCommands.log file.

C.

Use WebSphere Application Server Developer Tools for Eclipse in the debug perspective connected to the server and execute the script step by step.

D.

Run the script using wsadmin with these parameters: -lang jython –javaoption “-Xdebug” and then execute the logViewer command with the option -listInstances

An EJB application posts a request message into a JMS destination and waits for a response message on a different JMS destination. To correlate the response message to the request message, the application uses the JMS correlationId of the message. The application waits up to five seconds for a response before timing out the request.

A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the request message, process it and post a response message.

The destinations are defined in a Service Integration Bus (SIB) within the cell.

Intermittent timeout exceptions have occurred for the requester application. How can a system administrator correlate and analyze the debug information from both requester and consumer applications?

A.

Enable High Performance Extensible Logging (HPEL).

Use HPEL logViewer command to see debug information.

B.

Enable a diagnostic trace in both requester and consumer servers.

Use the Integrated Solutions Console (ISC) to set the admin=all trace.

Analyze the trace.

C.

Enable High Performance Extensible Logging (HPEL).

Enable Cross Component Trace (XCT) to include request IDs in log and trace records.

Use HPEL logViewer command with appropriate filters to see debug information.

D.

Using the Integrated Solutions Console (ISC), browse the request message that has timed out and look for any key application data.

Search for exceptions using the key application data in both requester and consumer in native_stderr.log and native_stdout.log.

A system administrator suspects that the slow performance of an application might be caused by lock contention.

To debug this further, what can the administrator do using IBM Support Assistant?

A.

Analyze the running server using IBM Monitoring and Diagnostic Tools for Java – Health Center.

B.

Collect a javacore and analyze it using IBM Monitoring and Diagnostic Tools for Java – Health Center.

C.

Collect three thread dumps at equal time intervals and analyze them using IBM Monitoring and Diagnostic Tools for Java – Dump Analyzer.

D.

Collect three system dumps at equal time intervals and analyze them using IBM Monitoring and Diagnostic Tools for Java – Memory Analyzer.

A system administrator discovers an issue that requires a change to a federated server. In this cell, WebSphere administrative security is enabled, but application security is not enabled.

How should the administrator make this change?

The administrator should use:

A.

a web browser to connect to the node agent https port.

B.

a web browser to connect to the deployment manager admin_host port.

C.

the job manager to submit a job to update the unmanaged server.

D.

an ssh connection to the node and modify the client_types.xml file.

The computer where a federated node was running had a failure and cannot be recovered. A system administrator wants to recreate the node with the same configurations in another computer.

Which steps should the administrator execute in order to recover the damaged node?

A.

Configure the new computer with a different hostname.

Create a custom profile with the same name.

Federate to the cell using the command addNode with the default options.

B.

Configure the new computer with a different hostname.

Create a custom profile with a different name.

Federate to the cell using the command addNote with the option –asExistingNode.

C.

Configure the new computer with the same hostname.

Create a custom profile with the same name.

Federate to the cell using the command addNote with the option –asExistingNode.

D.

Configure the new computer with the same hostname.

Create a custom profile with the same name.

Federate to the cell using the command addNote with the options –includeapps.

A system administrator completed a WebSphere Application Server installation by using the Installation Manager. During installation, all defaults were selected for the installation root directories and the shared resources directory. Over time, the administrator has updated the installation with various interim fixes and fix packs. The administrator notices that the shared resources directory is very large in size and grows larger each time the Installation Manager is run.

How can the administrator decrease the size and remove some of the content from the shared resources directory?

A.

Manually delete content from the directory.

B.

During an update, create a new shared resources directory.

C.

Clear the Delete Saved Files option for the Installation Manager.

D.

Set the preserve Downloaded Artifacts preference to false.