Limited Time Discount Offer 30% Off - Ends in 02:00:00

×

IBM C2180-377 Exam - IBM WebSphere Application Server Network Deployment V7.0, Core Administration

Questions & Answers for IBM C2180-377

Showing 1-15 of 112 Questions

Question #1

Which of the following will force a JVM thread dump.

A. kill --9 <processrid>

B. F SERVERNAME,JAVADUMP

C. Using the wsadmin command prompt: jvm = AdminControl.completeServerNameList("type:JVM,process: server1,*") AdminControl.invoke(jvm, "dumpAllThreads")

D. Using the wsadmin command prompt: jvm = AdminControl.completeServerNameList("type:JVM,process:server1,*") AdminControl.invoke(jvm, "dumpThreads")

Question #2

An administrator has created a cluster, C1, and configured memory-to-memory HTTP
session replication. How can the administrator best ensure that every HTTP session is
replicated on all members of the cluster?

A. In the Replication domain settings for the C1 replication domain, set Number of replicas to entire domain

B. In the Replication domain settings for the C1 replication domain, set Number of replicas to 0

C. In the Memory--to-memory replication settings for each member of C1, set Number of replicas to entire domain

D. In the Memory--to-memory replication settings for each member of C1, check Replicate to all members

Question #3

In a Java EE application, how are EIB resources protected?

A. Security constraints

B. Method permissions

C. Java 2 security policy files

D. Administrative permissions

Question #4

In Order for a deployment manager to participate in a flexible management environment,
which one uf the following steps must be completed?

A. Register directly with the job manager.

B. Register with the node agent on the job managers host.

C. Register with an administrative agent on the job managers host

D. First register with a local administrative agent, and then register with the job manager.

Question #5

In addition to the normal process for assembling an application, which one of the following
tasks must be performed if the EAR file contains a Web services-enabled module?

A. Generate EJB resource mappings.

B. Generate deployment code for the application.

C. Redefine the bindings properties. D Edit the annotations or deployment descriptors.

Question #6

In order to verify that a server has started successfully and all of its components have
initialized without throwing any exceptions, what steps should an administrator perform?

A. Use the Log Analyzer to view the servers activity.log file.

B. View the servers startServer.log and native_stdout.log files.

C. Examine the SystemOut.log file for the current server process.

D. Log in to the administrative console and examine the runtime messages.

Question #7

Global security is turned on for a federated cell using a file-based federated repository. The
administrator created a new security domain called App1Domain using local operating
system registry and mapping it to the application server. The administrator also created a
new local operating system user ID App1Admin. Which one of the following is true when
the new security domain is enabled to secure Application1?

A. The administrator can access Applicationl.

B. The administrator can disable Applicationl security.

C. App1Admin can disable Applicationl security.

D. App1Admin can access the administrative console.

Question #8

Which of the following performance monitoring tools is the most appropriate for monitoring
the overall health of WebSphere Application Server?

A. Request metrks tool

B. Tivoli Performance Viewer

C. Transaction correlation tool

D. Tivoli System Health Viewer

Question #9

Which one of the following can be used to instantiate resource adapter classes for
establishing and maintaining resource connections?

A. a data source

B. connection factories

C. connection pool settings

D. a JMS activation specification

Question #10

What is the most common role that naming plays in WebSphere Application Server?

A. Allows applications to obtain references to objects such as EJB homes.

B. Allows Java programs (clients and Java EE applications) to create, send, receive, and read asynchronous requests, as messages. C Provides a runtime environment for enterprise beans within the application server.

C. Provides a secure facility to support Customer's basic organizational entity management needs.

Question #11

Which action below must be performed to ensure that requests routed through the Web
server can reach a Web application deployed in WebSphere Application Server Network
Deployment V7.0?

A. Security is enabled on the administrative console.

B. An updated plugin-cfg.xml is generated and propagated to the Web server.

C. The Web server and the WebSphere Application Server must be installed on the same physical sewer.

D. The Web server plug-in and the WebSphere Application Server must be installed on the same physical server.

Question #12

When backing up WebSphere Application Server configuration and runtime settings, which
of the following commands would be relevant?

A. backupConfig -location location

B. restoreConfig -profileName profile_name -backupFile backupFile_name.

C. manageprofiles -backupProfile -profileName profile_name -backupFile backupFile_name.

D. wsadmin -backupConfig -profileName profile_name -backupFile -backupFile_name.

Question #13

A security specialist for a WebSphere Application Server Network Deployment V7.0 cell is
concerned about the data within the audit records. To protect the data, they configure audit
record encryption using a keystore called AuditkeyStore which contains a new certificate
called AuditCertificate. With that done, what is now needed to view the data?

A. The password to the AuditCertificate

B. The password to the AuditkeyStore

C. The public key for the AuditCertificate

D. Access to the console as administrator

Question #14

An administrator wishes to control an Apache Web server on a remote host via the
WebSphere Application Server Network Deployment administrative console. What must be
done to accomplish this?

A. Configure a web server definition in the administrative console.

B. Configure the Apache administrative process on the remote node.

C. Configure an unmanaged node definition in the administrative console.

D. Configure a managed node on the remote host.

Question #15

How are Java EE 5 security permissions assigned to actual users in WebSphere
Application Server?

A. By mapping application roles to users or groups within the WebSphere user registry.

B. By generating the users in application.xml which will be created in the registry during deploy time.

C. By the WebSphere Application Server itself, automatically, by introspecting the classes in the application.

D. By creating the users in the application itself which will be created in the registry during deploy time.

You Need Avanset VCE Player in Order to Open VCE Files

AUTUMN SALE: 30% DISCOUNT
This is ONE TIME OFFER

You save
30%

Enter Your Email Address to Receive Your 30% Discount Code

AUTUMN SALE: 30% DISCOUNT

You save
30%

Use Discount Code:

A confirmation link was sent to your e-mail.

Please check your mailbox for a message from support@exam-labs.com and follow the directions.