Certbus > IBM > IBM Certified Advanced System Administrator > C9510-401 > C9510-401 Online Practice Questions and Answers

C9510-401 Online Practice Questions and Answers

Questions 4

The computer where a federated node was running had a failure and cannot be recovered. A system administrator wants to recreate the node with the same configurations in another computer.

Which steps should the administrator execute in order to recover the damaged node?

A. Configure the new computer with a different hostname.Create a custom profile with the same name.Federate to the cell using the command addNode with the default options.

B. Configure the new computer with a different hostname.Create a custom profile with a different name.Federate to the cell using the command addNote with the option 璦sExistingNode.

C. Configure the new computer with the same hostname.Create a custom profile with the same name.Federate to the cell using the command addNote with the option 璦sExistingNode.

D. Configure the new computer with the same hostname.Create a custom profile with the same name.Federate to the cell using the command addNote with the options 璱ncludeapps.

Browse 73 Q&As
Questions 5

A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization.

How can a system administrator fix the issue ensuring only authorized access?

A. Using the Integrated Solutions Console (ISC), map all security roles to the special subject Everyone.

B. Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped to groups in the correct user registry.

C. Edit the application using an assembly tool to add a security constraint for the servlet and reinstall the application.

D. Edit the application using an assembly tool to remove the security constraint defined for the servlet and reinstall the application.

Browse 73 Q&As
Questions 6

A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.

What should the administrator do to implement the required security configuration?

A. Install and configure a TAI (Trust Association Interceptor)

B. Configure a security domain for the stand-alone LDAP server.

C. Use Federated repositories and configure the supported entity types.

D. Use Stand-alone custom registry and configure the flat file implementation.

Browse 73 Q&As
Questions 7

A WebSphere Application Server cell was configured with a deployment manager node and a custom node. An operator manually changed some configuration files in the custom node, and the node became out of synch with the master repository.

The system administrator used the Synchronize button in the system administration session of the Integrated Solutions Console (ISC) to try to resynchronize the node, but the node remained out of sync.

What should the administrator do to fix it?

A. Use the Full Resynchronize button.

B. Invoke "sync" operation on NodeSync MBean.

C. Recreate the custom profile with the same name without deleting the node.

D. Manually copy all the deployment manager configuration files to the custom node.

Browse 73 Q&As
Questions 8

A system administrator needs to view the list of certificates for unmanaged web server located on a remote

system.

How should the administrator do this?

A. View the plugin-cfg.xml

B. Look at the SSL configuration in the httpd.conf

C. Use iKeyman to view the keyring.

D. Use the administrative console to check the content of the cell default keystore.

Browse 73 Q&As
Questions 9

How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the server's file system?

A. Configure the CSIv2 outbound communications under RMI/IIOP security.

B. Configure the file-based repository and create the fileRegistry.xml file.

C. Enable Java 2 security and configure the app.policy and was.policy files.

D. Use the AdminTask deleteAuthorizationGroup to remove application access.

Browse 73 Q&As
Questions 10

A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.

How should the administrator accomplish this?

A. Enable "Authenticate when any URI is accessed".

B. Enable "Authenticate only when the URI is protected".Disable "Use available authentication data when an unprotected URI is accessed".

C. Enable "Authenticate only when the URI is protected".Enable "Use available authentication data when an unprotected URI is accessed".

D. Map the application security roles to the configured user registry's groups.

Browse 73 Q&As
Questions 11

After installing an enhanced EAR in a WebSphere Application Server environment, a system administrator with Configurator privileges is able to see a JDBC provider and a data source in the Integrated Solution Console (ISC) but is not able to delete these resources.

How can the administrator resolve this issue?

A. Use the AdminTask object to delete the resources.

B. Stop all application server instances and then delete the resources.

C. Ask another administrator with iscadmin privilege to delete the resource.

D. Edit the EAR to remove the application scoped resources and reinstall the application.

Browse 73 Q&As
Questions 12

A system administrator is required to create a star topology for multi-cell performance management for three WebSphere Application Server cells.

How should the administrator configure the Application Placement Controller (APC) in a star topology? Configure the cell custom property CenterCell to:

A. false in all three WebSphere Application Server cells.

B. false in one WebSphere Application Server celltrue in the other two WebSphere Application Server cells.

C. true in all three WebSphere Application Server cells.

D. true in one WebSphere Application Server cellfalse in the other two WebSphere Application Server cells.

Browse 73 Q&As
Questions 13

An application deployed to a multi-node cluster is reported to have slowness and hung threads. A system administrator is asked to review the logs on each node and identify if the hung threads are a false alarm.

How can the administrator determine that the hung threads are a false alarm? Analyze the:

A. ffdc logs

B. SystemErr.log

C. SystemOut.log

D. native_stderr.log

Browse 73 Q&As
Questions 14

An EJB application posts a request message into a JMS destination and waits for a response message on a different JMS destination. To correlate the response message to the request message, the application uses the JMS correlationId of the message. The application waits up to five seconds for a response before timing out the request.

A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the request message, process it and post a response message.

The destinations are defined in a Service Integration Bus (SIB) within the cell. Intermittent timeout exceptions have occurred for the requester application. How can a system administrator correlate and analyze the debug information from both requester and consumer applications?

A. Enable High Performance Extensible Logging (HPEL).Use HPEL logViewer command to see debug information.

B. Enable a diagnostic trace in both requester and consumer servers.Use the Integrated Solutions Console (ISC) to set the admin=all trace.Analyze the trace.

C. Enable High Performance Extensible Logging (HPEL).Enable Cross Component Trace (XCT) to include request IDs in log and trace records.Use HPEL logViewer command with appropriate filters to see debug information.

D. Using the Integrated Solutions Console (ISC), browse the request message that has timed out and look for any key application data.Search for exceptions using the key application data in both requester and consumer in native_stderr.log and native_stdout.log.

Browse 73 Q&As
Questions 15

The installation of WebSphere Application Server did not complete successfully, and a system administrator needs to troubleshoot the installation.

What can the administrator do to identify the cause of the installation failure?

A. Run the installver command with the appropriate command line options.

B. Check the files under the Agent data location of IBM Installation Manager.

C. Check the files under the logs directory of IBM Installation Manager installation directory.

D. Check the log.txt under .

Browse 73 Q&As
Questions 16

A new cell contains a cluster with members defined in two managed nodes running on two different machines. The cell also contains two unmanaged nodes running on HTTP servers with HTTP plug-in. Session persistence has been enabled.

Which additional component(s) can the system administrator configure to make this environment highly available?

A. Enable administrative security.

B. Configure a DMZ secure proxy.

C. Configure High Performance Extensible Logging.

D. Configure primary and backup load balancers for the HTTP servers.

Browse 73 Q&As
Questions 17

A system administrator has added a server cluster as a member of a service integration bus (SIB). The administrator needs to configure one messaging engine for each server in this cluster and to have a failover location for each messaging engine.

What should the administrator do to achieve the required design?

A. Configure a new messaging engine in each server to support failover.

B. Configure the data store for each messaging engine for each server in the cluster.

C. Select scalability with high availability as the messaging engine policy.

D. Create a core group policy to restrict each messaging engine to a particular server.

Browse 73 Q&As
Questions 18

A system administrator runs a Jython script that creates and configures several servers and realize that the script fails before completing. Although many tasks succeeded, they are rolled back when the script fails.

Before running the script again, what can the administrator add to the script after each task so the completed tasks are committed even if other tasks fail?

A. AdminApp.update()

B. AdminConfig.save()

C. AdminControl.invoke(server, `sync')

D. AdminTask.backupJobManager(`server')

Browse 73 Q&As
Exam Code: C9510-401
Exam Name: IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile, System Administration
Last Update: Apr 15, 2024
Questions: 73 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99