Limited Time Discount Offer 30% Off - Ends in 02:00:00

×

IBM C9510-401 Exam - IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile, System Administration

Download Free IBM C9510-401 Exam Questions

File name

Views

Size

Downloads

 

349

72.9 KB

230

Questions & Answers for IBM C9510-401

Showing 1-15 of 65 Questions

Question #1

A system administrator has been asked to uninstall an application from a cluster running in
a WebSphere Application Server Network Deployment cell. This application was installed
from the Integrated Solutions Console (ISC). The monitored directory for the cluster is
<cluster1_dir>.
What step(s) can the administrator perform to uninstall the application?

A. Delete the application file from <cluster1_dir>.

B. Stop the running cluster. Delete the application file from <cluster1_dir>.

C. Stop the running cluster. Copy the application file to <cluster1_dir>. Delete the application file from <cluster1_dir>.

D. Create a properties file to describe the deletion of the application file Copy the properties file to <cluster1_dir>.

Question #2

While coordinating a flexible management topology, the job manager can send commands
to which components?

A. Application server and name server.

B. On demand router and load balancer.

C. Deployment manager and admin agent.

D. Node agent and web administration server.

Reference: http://java.boot.by/ibm-377/ch01s06.html (See the Flexible management 2nd
Paragraph 5th Line, and 3rd Paragraph).

Question #3

A new cell contains a cluster with members defined in two managed nodes running on two
different machines. The cell also contains two unmanaged nodes running on HTTP servers
with HTTP plug-in. Session persistence has been enabled.
Which additional component(s) can the system administrator configure to make this
environment highly available?

A. Enable administrative security.

B. Configure a DMZ secure proxy.

C. Configure High Performance Extensible Logging.

D. Configure primary and backup load balancers for the HTTP servers.

Question #4

A system administrator needs to configure a JDBC provider and a data source for an
application in a clustered environment. The administrator also needs to copy the JDBC
drivers from the database server to the application server machines.
How can the administrator meet these requirements?

A. Create a JDBC provider and the data source in the cluster scope. Copy the driver to all nodes. Set the environment variable at the node level to the driver's path.

B. Create a JDBC provider in the server scope and the data source in the node scope. Copy the driver to all application servers. Set the environment variable at the node level to the driver's path.

C. Create a JDBC provider in the node scope and the data source in the cell scope. Copy the driver to the deployment manager. Set the environment variable at the server level to point to the deployment manager path.

D. Create a JDBC provider in the application scope and the data source in the server scope. Copy the driver to all application server directories. Set the environment variable in each JVM to the driver's path.

Question #5

A system administrator was asked by the development team to inform them of any warning
message which contains a string "Connection" on a WebSphere Application Server with
High Performance Extensible Logging (HPEL) enabled.
What should the administrator do to continuously monitor logs for the required message?

A. Configure log detail levels to include filter on "Connection" string.

B. Use the Log Viewer in the administrative console with filter on "Connection" string.

C. Use the logviewer.sh or logviewer.bat command with appropriate options.

D. Use the Log Viewer in the administrative console with filter on "Connection" string and enable the 'Refresh automatically' feature.

Reference: http://www-
01.ibm.com/support/knowledgecenter/SSD28V_8.5.5/com.ibm.websphere.base.doc/ae/rtrb
_logviewer.html

Question #6

An application contains a web services client and the application is deployed and running.
A system administrator has to add a response timeout to the deployed web services client,
so the call fails in a timely fashion.
Which artifact should the administrator use?

A. web.xml

B. was-webservices-sca.xml

C. ibm-webservices-bnd.xmi

D. ibm-webservicesclient-bnd.xmi

Reference: http://www-
01.ibm.com/support/knowledgecenter/SSEQTP_7.0.0/com.ibm.websphere.nd.doc/info/ae/a
e/twbs_atkdd2.html

Question #7

A system administrator has installed WebSphere Application Server Network Deployment
V8.5.5 using the silent installation process and needs to verify that the installation
completed successfully.
What does the administrator need to do to verify a successful installation?

A. Launch the Installation Manager GUI, and verify the installation by going to File -> View Installed Packages.

B. Run the command IBMIM list installed Packages and check that the appropriate WebSphere Application Server package is listed.

C. Check for INSTCONFSUCCESS message at the end of the <webSphere Application Server install directory><log directory>log.txt file.

D. Use the installer command to compare the checksum of the product file to the correct checksum value in the bill-of-materials file and make sure that the checksums match.

Reference: http://www-
01.ibm.com/support/knowledgecenter/SSAW57_7.0.0/com.ibm.websphere.installation.nd.d
oc/info/ae/ae/tins_trouble.html?cp=SSAW57_7.0.0%2F1-5-0-7

Question #8

An EJB application posts a request message into a JMS destination and waits for a
response message on a different JMS destination. To correlate the response message to
the request message, the application uses the JMS correlation ld of the message. The
application waits up to five seconds for a response before timing out the request.
A Message Driven Bean (MDB) running on a different cluster is responsible for consuming
the request message, process it and post a response message.
The destinations are defined in a Service Integration Bus (SIB) within the cell.
Intermittent timeout exceptions have occurred for the requester application. How can a
system administrator correlate and analyze the debug information from both requester and
consumer applications?

A. Enable High Performance Extensible Logging (HPEL). Use HPEL logViewer command to see debug information.

B. Enable a diagnostic trace in both requester and consumer servers. Use the Integrated Solutions Console (ISC) to set the admin=all trace. Analyze the trace.

C. Enable High Performance Extensible Logging (HPEL). Enable Cross Component Trace (XCT) to include request IDs in log and trace records. Use HPEL logViewer command with appropriate filters to see debug information.

D. Using the Integrated Solutions Console (ISC), browse the request message that has timed out and look for any key application data. Search for exceptions using the key application data in both requester and consumer in native_stderr.log and native_stdout.log.

Question #9

A system administrator has configured a cluster containing 40 servers. The cluster
members all belong to one core group. While examining the log files, the administrator
notices that the core group coordinator is consuming abnormally high amounts of memory
and CPU resources.
How can the system administrator reduce the memory and CPU resource usage of the
core group coordinator?

A. Configure a core group bridge.

B. Configure a second active coordinator

C. Decrease the memory on the machine.

D. Move the coordinator to another machine.

Question #10

While monitoring a cluster in the cell, the administrator notices that one server in the cluster
periodically loses connections to the database. When this happens, requests to the server
have a significantly decreased response time and various error conditions are listed in the
log files for the server. Since the error codes are returned quickly, the server starts
returning responses faster than the average service times for the application. Due to this,
the weight for the server is increased and a large percentage of incoming requests are
being routed to the erroneous server and the server is getting overloaded with requests.
How can the administrator detect these conditions in the future and take action to prevent
this problem?

A. Configure the storm drain health policy.

B. Configure the on demand router (ODR) transport chain to tune inbound connections.

C. Monitor the JVM heap usage to determine a new server weight.

D. Enable the PMI Extended statistic set and use the Connection Pool summary report.

Question #11

A system administrator needs to install WebSphere Application Server Network
Deployment V8.5.5 multiple times and would like to automate the task of installing the
product. The administrator wants to create a response file based on an initial installation
and use this for future installations.
How can the administrator accomplish this task?

A. Use the IBM Packaging Utility.

B. Use the Installation Manager Console mode.

C. Complete a silent installation with the -log option.

D. Start the Installation Manager GUI with the -record option.

Reference: http://setgetweb.com/p/portal80/p8/additional.html

Question #12

Which one of the following options describes the runtime flow starting from the client
browser in a clustered WebSphere Application Server Network Deployment topology?

A. HTTP server -> job manager -> admin agent -> HTTP server plug-in

B. Load balancer -> HTTP server -> HTTP server plug-in -> application server

C. Application server -> node agent -> deployment manager -> load balancer

D. Deployment manager -> node agent -> HTTP server plug-in -> HTTP server

Question #13

A system administrator has deployed web applications to a clustered environment where
database session persistence is configured. The administrator needs to improve the
response time and the throughput.
How can the system administrator do this?

A. Disable server affinity.

B. Configure dynamic caching.

C. Configure a load balancer to spread work between existing web servers.

D. Tune the database session persistence to optimize for failover.

Reference:
http://www.ibm.com/developerworks/websphere/techjournal/1008_genkin/1008_genkin.htm

Question #14

The administrator needs to identify any security role references and security constraints in
a web application.
How can the administrator identify these roles and constraints?

A. ibm-application-ext.xml file using a text editor.

B. ibmconfig folder in the application after using the EARExpander command.

C. Web deployment descriptor using IBM Assembly and Deploy Tools.

D. Security role to user/group mapping by using the Integrated Solutions Console (ISC).

Question #15

A system administrator needs to trigger a javacore only when a Java. net. Socket Timeout
Exception is encountered in real time.
What does the administrator have to configure to trigger the javacore dump?

A. Configure the JAVA_DUMP_OPTS environment variable to capture javacore for ANYSIGNAL and all exceptions.

B. Configure an -Xdump:java Generic JVM argument on WebSphere Application Server with the filter for java.net.SocketTimeoutException.

C. Code wsadmin script to capture javacore and then execute it after the Java.net.SocketTimeoutException has been encountered.

D. Use the log filter in HPEL to monitor for java.net. SocketTimeoutException and then gather a javacore dump from the Integrated Solutions Console (ISC).

Reference:
http://publib.boulder.ibm.com/infocenter/javasdk/tools/index.jsp?topic=%2Fcom.ibm.java.do
c.igaa%2F_1vg00014884d287-11c3fb28dae-7ffc_1001.html

You Need Avanset VCE Player in Order to Open VCE Files

Try Our Special 30% Discount Offer for
Premium C9510-401 VCE File

  • Verified by experts

C9510-401 Premium File

  • Real Questions
  • Last Update: Sep 8, 2019
  • 100% Accurate Answers
  • Fast Exam Update

$14.99

$21.41

AUTUMN SALE: 30% DISCOUNT
This is ONE TIME OFFER

You save
30%

Enter Your Email Address to Receive Your 30% Discount Code

AUTUMN SALE: 30% DISCOUNT

You save
30%

Use Discount Code:

A confirmation link was sent to your e-mail.

Please check your mailbox for a message from support@exam-labs.com and follow the directions.