000-253

41
000-253 QUESTION 1 Which statement describes the relationship between WebSphere MQ and Web Sphere default messaging as a JMS provider? A. Default messaging relies on WebSphere MQ as the JMS Provider B. Default messaging is a version of WebSphere MQ C. WebSphere MQ and default messaging are separate and do not share any modules or configuration data D. WebSphere MQ and default messaging must share the same Cloudscape database QUESTION 2 When attempting to install WebSphere Application Server v6.1 using the silent install, the installation fails early in the process and no log files appear to be created in the logs directory. Which two steps can the administrator perform to troubleshoot the issue? A. Restart the installation after an OS restart B. Restart the installation with the log parameter C. Look for the log files in the system temporary area D. Run the installation verification test (IVT) E.Start over by creating a new responsefile.txt using the responsefile.base.txt QUESTION 3 What is the name of the WebSphere scripting tool? A. wasadmin B. ws_ant C. wsadmin D. wsdeploy QUESTION 4 An administrator is configuring JDBC database connections. Where is the file system path to the DB2 or Oracle driver .zip files specified? A. On the Connection manager J2C configuration panel B. From the Environment -> WebSphere Variables panel of the administration Console C. Within the .ear file of the deployed application D. Within the connection pool parameters for the cell QUESTION 5 When installing WebSphere Application Server v6.1 along with IBM HTTP server and related plug-ins, an administrator notices the following message in the <plugins_root>/logs/install/log.txt Plug.install, com.ibm.ws.install.ni.ismp.actions. ISMPComponentizedFileRepositoryDeployAction, Err, Component not found: prereq.jdk Which two additional entries should the administrator verify? A. The PLUGIN_JDK_ROOT value in log.txt B. The JAV_HOME system environment variable C. The CURRENT_WORKING_DIRECTORY value in log.txt D. The CLASSPATH system environment variable E. The JAVA_INSTALL_PATH value in log.txt

description

00

Transcript of 000-253

Page 1: 000-253

000-253QUESTION 1Which statement describes the relationship between WebSphere MQ and Web Spheredefault messaging as a JMS provider?

A. Default messaging relies on WebSphere MQ as the JMS ProviderB. Default messaging is a version of WebSphere MQC. WebSphere MQ and default messaging are separate and do not share any modules orconfiguration dataD. WebSphere MQ and default messaging must share the same Cloudscape database

QUESTION 2When attempting to install WebSphere Application Server v6.1 using the silent install,the installation fails early in the process and no log files appear to be created in the logsdirectory. Which two steps can the administrator perform to troubleshoot the issue?

A. Restart the installation after an OS restartB. Restart the installation with the log parameterC. Look for the log files in the system temporary areaD. Run the installation verification test (IVT)E.Start over by creating a new responsefile.txt using the responsefile.base.txt

QUESTION 3What is the name of the WebSphere scripting tool?

A. wasadminB. ws_antC. wsadminD. wsdeploy

QUESTION 4An administrator is configuring JDBC database connections. Where is the file systempath to the DB2 or Oracle driver .zip files specified?

A. On the Connection manager J2C configuration panelB. From the Environment -> WebSphere Variables panel of the administration ConsoleC. Within the .ear file of the deployed applicationD. Within the connection pool parameters for the cell

QUESTION 5When installing WebSphere Application Server v6.1 along with IBM HTTP server andrelated plug-ins, an administrator notices the following message in the<plugins_root>/logs/install/log.txtPlug.install, com.ibm.ws.install.ni.ismp.actions.ISMPComponentizedFileRepositoryDeployAction, Err, Component not found: prereq.jdkWhich two additional entries should the administrator verify?

A. The PLUGIN_JDK_ROOT value in log.txtB. The JAV_HOME system environment variableC. The CURRENT_WORKING_DIRECTORY value in log.txtD. The CLASSPATH system environment variableE. The JAVA_INSTALL_PATH value in log.txt

Page 2: 000-253

QUESTION 6While an administrator is using the Tivoli Performance Viewer to analyze a performanceproblem with a production application server, the administrator notes that the databaseconnection pools have a much lower percentage of utilization than the other pools. Whichstatement explains this observation?

A. The Tivoli Performance Viewer percentages are only useful for performingperformance analysis on a server that is executing in a controlled load test scenarioB. the database server is constrained, causing calls to the database to consume moreresources than are available for processingC. The connection pools have not been defined to account for parallel application servercalls to the database, causing this particular server to show low utilizationD. This Condition indicates there is a bottleneck in one of the processes upstream in thepipeline of process flows within the application server

QUESTION 7It has been decided to use database session persistence for a particular J2EE application.Which two steps must be performed to implement this feature?

A. Create session databaseB. Select a multi row schemaC. Configure the JDBC provider and data sourceD. Create session database tablesE. Configure row size to match session size

QUESTION 8Which statement is true for a managed application server process to startup?

A. Starting a managed server is not dependent on the presence of a running deploymentmanagerB. The node agent should not be started before any managed servers on that nodeC. A node agent and deployment manager must be running before starting a managedserverD. The deployment manager needs to be started before the managed server

QUESTION 9When adding a new member to a cluster, why might it be necessary for an administratorto select the option for generating unique HTTP ports?

A. To prevent other applications from using these portsB. To avoid port conflicts with other servers on the same nodeC. To enable encryption over the secure HTTP portsD. To ensure that cluster members on different nodes have unique ports

QUESTION 10What are the three possible modes that the replication service instance can be set up torun in?A. Server modeB. Broadcast modeC. Client modeD. Both Mode

Page 3: 000-253

E. Publish/Subscribe modeF. Event Listener mode

QUESTION 11The WebSphere scripting tool supports which two scripting languages?

A. AntB. PerlC. JaclD. JythonE. BSF

QUESTION 12In addition to data sources and shared libraries, which resources can enhanced EARssupport?

A. Class loader policy, Virtual host information and JVM command line parametersB. JAAS Authentication Aliases, Virtual host information and JVM command lineparametersC. JAAS Authentication Aliases, Class Loader policy, Virtual host information and JVMcommand line parametersD. JAAS Authentication Aliases, Class loader policy and JVM command lien parametersE. JAAS Authentication Aliases, Class loader policy and Virtual host information

QUESTION 13Which statement most accurately describes the effect of increasing the JVM maximumheap size?

A. More objects will be created and the time required to garbage collect will decreaseB. A larger heap size will cause the server to take longer to startC. The time between garbage collections will increase, but the garbage collection willtake longerD. No measurable performance change will result from increasing the heap size

QUESTION 14Which services are implemented by the WebSphere Application server?

A. Security, JMS messaging, Naming and HTTP Plug-inB. Security, Naming, Transaction and Dynamic cacheC. HTTP Load Balancing service, JMS messaging and Data Replication Service (DRS)D. The user registry, Naming and HTTP Plug-in

QUESTION 15An administrator is analyzing an activity.log file form a profile by using the ApplicationServer Toolkit (AST) Profiling and Logging perspective. There are hundreds of logrecords. Most of the records as informational messages. How can the administrator viewonly the records whose severity is at the warning and error level?

A. Update the filter so that it shows only Error and Warning log recordsB. When the activity.log file is imported into AST, use the filter option to exclude theinformational messagesC. The activity.log file must be filtered using the Log Analyzer before it is imported into

Page 4: 000-253

ASTD. Create two filters, one showing only Errors and one showing only Warnings. Exporteach and merge them into a single new activity log

QUESTION 16Certkiller .com has a WebSphere Application Server V4 client and wishes to look up andaccess objects in WebSphere Application Server V6.1 without requiring changes to theclient. What must the customer do to enable WebSphere Application Server V6.1 objectsto be accessible through the legacy name space?

A. Create a configured name bindingB. Configure a leaf bindingC. Create a corbaname bindingD. Use a compound name

QUESTION 17The application server is architected to use an existing user registry that storesadministrative users and application users. What is needed to setup this architecture?

A. Retrieve a list of nodes and node agents contained within the cellB. Generate web services binding for the existing user registryC. Configure the connection to the existing user registryD. Configure the JNDI path to the security database

QUESTION 18Which are three possible components of Web Modules?

A. ServletsB. HTMLsC. Session and Entity beansD. RAR filesE. SIP Servlet filesF. MDB filesG. JSPs

QUESTION 19Which set of parameters can a system administrator adjust to directly improveperformance for the EJB container?

A. Data Source connection pool and server JVM sizeB. Session timeout and HTTP session object sizeC. Transaction lifetime and client inactivity timeoutD. Cache Size and Cache cleanup interval

QUESTION 20Which statement is true about WebSphere JVM logs?

A. The JVM logs are self-managing and can roll over based on time or file sizeB. The JVM logs should be moved from the default location to make them easier toaccess from the command lineC. The number of historical JVM log files is fixed at 3; this value will reset on eachserver restart

Page 5: 000-253

D. The JVM logs are, by default, kept outside the Application server filesystem directorytree to prevent them from being overwritten when applying fixpacks

QUESTION 21A system administrator has enabled dynamic caching across a cluster of servers andconfigured a replication domain for the cluster. Which configuration mode should be thesystem administrator enable for memory to memory session partitioning to ensure eachobject is replicated to every consumer of the replication domain?

A. Specific number of replicasB. Full Group replicaC. Single replicaD. Entire domain

QUESTION 22In order to create a new WebSphere cell and implement a horizontal scaling topology, anadministrator needs to perform which task(s)?

A. Federate nodes and create cluster members across multiple machinesB. Deploy multiple database servers using a high availability productC. Federate nodes and create multiple clustersD. Load balance multiple HTTP servers using Edge Components

QUESTION 23Assume that a federated repository is configured from three existing repositories: A,Band C. A user tries to log in but is denied access. What is a possible reason for the loginfailure?

A. The users ID is contained in repository A, which is a file-based repositoryB. The users LDAP Distinguished Name (DN) is not the same across all repositoriesC. The users IDs does not exist in all three repositoriesD. One or more of the three repositories is not accessible

QUESTION 24From which root can the JNDI DumpNameSpace utility be used to examine the contentsof the namespace when JDNI errors are occurring?

A. Java, which contains naming information unique to the specific server applicationB. Server, which contains the objects that are accessible by remote processesC. Node, which contains all JNDI references used within the cells defined scopeD. Local, which contains objects that are available by local processes only

QUESTION 25Which statement most accurately defines the location of where the WebSphere securityservice runs?A. The security service urns locally in each of the WebSphere processes (deploymentmanager, node agent and application sever.)B. The security service runs on the deployment managerC. The security service runs in the federated nodes of the cellD. The security service runs on the LDAP sever and is accessed through the applicationserver node agent

Page 6: 000-253

QUESTION 26The Profile Management Tool Allows you to enable WebSphere administrative security.Which use registry is used for this default security?

A. Standalone LDAP registryB. Standalone custom registryC. Local Operating systemD. Federated Repositories

QUESTION 27A system administrator has just completed installing the core binary files of WebSphereApplication Server Network Deployment. The system administrator wasn't to create adeployment manager profile with a Federated Node. What is the easiest method toaccomplish this?

A. Create deployment manager and custom profiles using the profile management toolB. Create a deployment manager profile using the profile management toolC. Create a Cell profile using the profile management toolD. Create deployment manager and custom profiles using the manageprofiles command

QUESTION 28Which approach should be recommended when designing a production topology forWebSphere application servers providing high availability and failover capabilities?

A. Utilize load balances between the web servers and the application servers to providefailover support at the application server tierB. Place the Authentication servers outside of the intrusion firewall with the web servers,since the web servers will need to access themC. Create a design using multiple machines that handle the full production load, enablingthe use of application server clustering to provide failover capabilitiesD. Use the target processor engines and least number of physical machines for theapplication server tier, to minimize the software licensing costs?

QUESTION 29If an administrator configures session management for an application server to use SSLID tracking, which two session tracking mechanism should also be enabled?

A. AllB. CookiesC. Security IntegrationD. URL Rewriting

QUESTION 30For security reasons, an administrator would like to ensure that HTML resources areisolated between Web modules running on a server. Which setting should beadministrator configure?

A. HTTPS port configurationB. Admin Console ConfigurationC. Virtual host configurationD. Class loader configurationQUESTION 31

Page 7: 000-253

What is the correct command to save configuration changes in Jython script file?

A. $AdminConfig.saveB. AdminTask.save()C. $AdminTask.saveD. The WebSphere scripting tool does a periodic save based on a properly in itsconfigurationE. AdminConfig.save()

QUESTION 32An administrator has a cluster of two members and needs to ensure that roughly twice asmany client requests are routed to cluster member A than are routed to cluster member B.How should the administrator configure this type of load distribution?

A. Double the OS priority for member As JVM processB. Double the minimum size of member As Web container thread poolC. Assign to member A, a weight two times as large as member Bs weightD. Create two entries for member A in the HTTP plug-in configuration

QUESTION 33For performance reasons, a J2EE application maintains HTTP session information inmemory (not persisted). The information in the session can be recreated based on thecontents of various cookies. Recreating this data from the cookies would incurperformance penalties. Which mechanism minimizes the need to recreate session data?

A. Database persistenceB. Memory-to-Memory replication in both client and server modeC. Memory-to-memory replication in server modeD. Session affinity in web server plug-in

QUESTION 34When configuring a J2C connection factory, which setting can be configured using theadministrative console?

A. Container-Manager authentication aliasB. Mapping configuration aliasC. Component-managed authentication aliasD. Authentication preference

QUESTION 35A System Administrator is planning to do a silent install using a customized file. Thesystem administrator does not want to install the samples that come with the product.Which option in the response file should the administrator update to NOT include thesamples with the installation?

A. InstallTypeB. CustomC. PROF_ActionD. Feature

QUESTION 36In order to gather all of the necessary data required by IBM Support to troubleshoot a

Page 8: 000-253

database connection pooling problem, an administrator should perform which task(s)?

A. Reproduce the problem, use the Tivoli Performance Viewer to log the JDBCconnection pool activity then submit the log file to IBM supportB. Reproduce the problem, create a JAR file including the systemout.log andnative_stdout.log files ten submit the JAR file to IBM supportC. Run the collector command, use the problem type option to specify databaseconnection pooling and submit the resulting JAR file to IBM supportD. Use the service component of the IBM Support Assistant (ISA) to gather data for thedatabase connection pooling problem type

QUESTION 37What functionality does the Caching Proxy server provide?

A. File service enablerB. Integration with Dynacache and third party object cachesC. HTTP compressionD. Dynamic content caching and integration with servlet cachingE. Reverse Proxy and content-based routing

QUESTION 38What is the name of the WebSpehere scripting tool?

A. wsdeployB. wsadminC. ws_antD. wasadmin

QUESTION 39Session Initiation Protocol (SIP) servlets are packaged in which type of archive file?

A. SARB. JARC. SIP-JARD. WARE. EJB-JAR

QUESTION 40A DB2 data source is used across different applications. The application is installed inmultiple machines for horizontal scaling but the database driver location differs frommachine to machine. When using WebSphere variables, what is the most maintainableway to define the scope for this data source?

A. JDBC provider - cell scope data source - cell scopeB. JDBC provider - node scope data source - cell scopeC. JDBC provider - node scope data source - node scopeD. JDBC provider - cell scope data source - node scope

QUESTION 41An application has 15 concurrent users and a connection pool size of 10. Each user uses 3prepared statements. For this application, what is the recommended prepared statementcache size?

Page 9: 000-253

A. 45B. 15C. 30D. 10

QUESTION 42After hearing from clients that they are having problems logging into an application, anadministrator enables tracing on WebSphere security components using the following logtrace string:com.ibm.ws.security.*=detail and restarts the serverWhen the administrator examines the trace log, there are no events recorded for anysecurity components.What must the administrator do to ensure that the trace information is written to the tracelog?

A. Update the Log Detail levels for the servers node agentB. Set the Log Detail Levels to one of the following: fine, finer, finestC. Modify the server.xml file to enable tracing and restart the serverD. Configure the trace output format with the advanced setting

QUESTION 43After installation and application server profile creation, which servlet is useful forvalidating system configuration?

A. HitCountB. WSSamplesC. HelloHTMLD. Snoop

QUESTION 44When is J2EE mapping of security roles to users and groups allowed?

A. During application development with Rational Application Developer (RAD) or withApplication Server Toolkit (AST)B. During application runtimeC. When configuring the user registryD. During the creation of an application profileE. After an application is installedF. During an application installation

QUESTION 45Which Web server plug-in setting is NOT configurable using the administrative console?

A. Refresh configuration intervalB. Load balancing optionC. Minimum number of connectionsD. Retry interval

QUESTION 46A WAR file containing several JSR 168 complaint portlets has bees successfully installedin an application server. If portlet serving has been enabled, how can the portlets beaccessed with a browser?

Page 10: 000-253

A. Request the wpsServlet servlet and then select the portlet from a portal menuB. Request the portlets index.jsp and then submit the context root and portlet nameC. Request the portlet directly using a URL that includes the name of the portletD. Request the PortletServingservlet servlet and then submit the name of the portlet

QUESTION 47What has to be configured to implement memory-to-memory HTTP Session persistence?

A. The HTTP Plug-in and embedded HTTP ServerB. EJB session beans and EJB ContainerC. The JMS Server and Queue ManagerD. The Data Replication Server (DRS) and Web Container

QUESTION 48The Profile Management Tool Allows you to enable WebSphere administrative security.Which use registry is used for this default security?

A. Local Operating systemB. Standalone LDAP registryC. Standalone custom registryD. Federated Repositories

QUESTION 49An administrator should use the IBM Support Assistant (ISA) to perform which tasks?A. Assemble and package enterprise applications into EAR files and submit to IBMSupport for profilingB. Submit a Problem Management Report (PMR) electronically to IBM Support andCheck the PMRs statusC. Analyze a service log file against a symptom database and submit the results to IBMsupportD. Create a log of the activity for several components of an application server and submitthe log to IBM support

QUESTION 50Under which circumstance should the WebSphere administrator use the dumpNameSpaceutility?

A. When applications are experiencing a problem accessing a specific WebSphere datasourceB. When the application server will not start because the JNDI namespace tables havebecome corruptedC. Before regenerating the plug-in for the web serverD. To clear the namespace prior to installing or redeploying an application

QUESTION 51A WAR file containing JSR 168 compliant portlets has been successfully installed in anapplication server. If portlet serving has been enabled, how can the protlets be accessedwith a browser?

A. Request the wpsServlet servlet and then select the portlet from a portal menuB. Request the PortletServingServlet servlet and then submit the name of the portlet

Page 11: 000-253

C. Request the portlet directly using a URL that includes the name of the portletD. Request the portlets index.jsp and then submit the context root and portlet name

QUESTION 52What is needed to load balance the HTTP traffic across a cluster of Web Servers?

A. Enable server affinity for each HTTP server in the clusterB. Configure proxy server such as Tivoli Access Manager (TAM)C. Use an IP sprayer from the load balancing component of the WebSphere edgecomponentsD. Implement the caching proxy server component of the WebSphere Edge

QUESTION 53If an IBM HTTP Server is defined, the IHS Administration is installed and the IBMHTTP server is defined to an unmanaged node, which two can be done?

A. Update the sever with new fixpacksB. Start and stop the server and propagate the plug-in configuration file after it isgeneratedC. Display the IBM HTTP Server error log (error.log) and access log (access.log) files aswell as display and edit the IBM HTTP server configuration file (httpd.conf)D. Flush its local cacheE. Enable dynamic trace

QUESTION 54When attempting to install WebSphere Application Server v6.1 using the silent install,the installation fails early in the process and no log files appear to be created in the logsdirectory. Which two steps can the administrator perform to troubleshoot the issue?

A. Restart the installation with the log parameterB. Run the installation verification test (IVT)C. Look for the log files in the system temporary areaD. Start over by creating a new responsefile.txt using the responsefile.base.txtE. Restart the installation after an OS restart

QUESTION 55What are three goals of the Virtual Member Manager (VMM)?A. Provide a repository-independent programming interfaceB. Provide the ability for users to achieve a single view of their own multiple repositoriesin a federated modelC. Provide a cache of repository informationD. Provide a repository that can span multiple WebSphere cellsE. Support various pluggable repositories

QUESTION 56An administrator needs to enable support for a number of applications that usemessage-driven beans (MDBs). Some of the beans use point-to-point messaging andother beans use publish-subscribe messaging. The administrator will typically need toperform which two sets of tasks?

A. Configure a service integration bus and add the appropriate bus memberB. Deploy the MDBs to the message engine and select the SOAP over JMS protocol

Page 12: 000-253

C. Configure queue managers using the WebSpehere MQ JMS providerD. Deploy the MDBs to JCA container and select bean managed persistenceE. Configure the default JMS provider and define the necessary destinations (queues andtopics)

QUESTION 57Which statement is NOT true about Application Server Toolkit (AST)?A. It has Jython editor and source debuggerB. It has a similar look and feel to the IBM Rational family of products and is based onEclipseC. It is supported on Windows, Linux and AIXD. It has a complete development environment for enterprise applications including EJBsE. It can run wsadmin scripts inside AST

QUESTION 58Which web module parameter adjustments would result in improved response time forweb clients?

A. Disable load on startupB. Set the reload internal to 20 seconds or lessC. Set the distributable flagD. Enable pre-compile JSP option

QUESTION 59A J2EE application needs to be configured as follows:The EJB module and the utility JAR in the application must be loaded by the same Classloader. Each web module must have its own unique class loader.What is the correct application server and web module class loader configuration for thisapplication?

A. Isolation Policy -> Multiple, Class loader policy -> ApplicationB. Isolation Policy -> Single, Class loader policy -> ModuleC. Isolation Policy -> Single, Class loader policy -> ApplicationD. Isolation Policy -> Multiple, Class loader policy -> Module

QUESTION 60To enable tracing on a WebSphere component, such as the naming or the rsadapter usinga servers Diagnostic Trace Service, which set of tasks should an administrator perform?

A. Use the administrative console to direct the trace output to a memory buffer, select atrace output format, select a component to trace and set the log detail level to either fine,finer or finestB. From the administrative console select Tracing, select a node agent, select processlogs, select a trace output format, select a component to trace and set the log detail levelsto detailC. Edit the wsadmin.properties file to specify a trace string for the component and acceptall of the default tracing properties then perform a full-resynchronize of the node agentD. Use the Application Server Toolkit (AST) to import the activity.log file and edit thisfile to specify a trace string for the component then export the activity.log file to the nodeagents configuration directory.

Page 13: 000-253

QUESTION 61What is the minimum administrative role that is required for an enterprise application tobe started through the console?

A. OperatorB. MonitorC. AdministratorD. Configuration

QUESTION 62After installation and application server profile creation, which servlet is useful forvalidating system configuration?

A. HitCountB. SnoopC. HelloHTMLD. WSSamples

QUESTION 63A J2EE application needs to be configured as follows:The EJB module and the utility JAR in the application must be loaded by the same classloader. Web Module WAR1 and the EJB module must use the same Class loader and webmodule WAR2 must have its own class loader.What is the correct Web Module class loader configuration for this application?

A. WAR1 - Module, WAR2 - ApplicationB. WAR1 - Application, WAR2 - ModuleC. WAR1 - Application, WAR2 - ApplicationD. WAR1 - Module, WAR2 - Module

QUESTION 64What is the minimum administrative role required for Java 2 security to be enabledthrough the administrative console?A. ConfigurationB. SecurityC. OperatorD. Administrator

QUESTION 65When implementing WebSphere security, which statement is true about authenticationand authorization credentials?

A. Both authentication and authorization require lookups to the security server LDAPdatabaseB. Authentication takes place utilizing a user registry, however authorization is donebased on properties defined within the .ear fileC. Authorization must occur before authentication to ensure the proper J2EE Securityroles are utilized for the LDAP lookupD. WebSphere security processes run on a centralized security service LDAP database tofacilitate single sign on administration of both authentication and authorizationcredentials

Page 14: 000-253

QUESTION 66What is the advantage of implementing a multi-tiered environment across multiplemachines?

A. The tiers allow you to rune individual productsB. It can more closely align with Certkiller .com's business functions (i.e distribution,ordering and inventory management.)C. It is the separation of tiers that allows operating system tuning parameters to be usedbased on the machine's functionD. Separation reduces maintenance complexities since components are highly availablein a distributed configuration

QUESTION 67What does a WebSphere application server provide to support the installation anddeployment of JSR 168 Complaint portlets?

A. An embedded version of WebSphere Portal ExpressB. An embedded portlet containerC. Several J2EE applications that render and aggregate portlets in a browserD. A scaled-down version of the WebSphere Portal Server

QUESTION 68Which statement describes the WebSphere v6.1 FFDC feature?

A. FFDC information is stored in an optimized relational databaseB. FFDC does not affect performance of the WebSphere application serverC. FFDC logs are mainly intended for application development teamsD. The application server needs to be restarted after enabling FFDC

QUESTION 69What is the default connection protocol that the WebSphere scripting tool uses?

A. SOAPB. RMIC. SOAP is tried first then RMI is tried secondD. NONEE. TCP

QUESTION 70A system administrator needs to create a data source and make it available on multiplenodes using different directory structure. Which two actions should the systemadministrator take to do this?

A. Define the JDBC provider at the cell scopeB. Define the JDBC provider at the node scopeC. Create the data source that uses this JDBC provider at the node scopeD. Define the JDBC provider at the server scopeE. Create the data source that uses this JDBC provider at the server scopeF. Create the data source that uses this JDBC provider at the cell scope

Page 15: 000-253

QUESTION 71Which three statements are true about J2EE security roles?

A. Binding of the users and groups to the J2EE security roles is usually done at theapplication install timeB. Authorization is performed using the J2EE security rolesC. Security roles are applied to the web and EJB application componentsD. Security roles provide an access control mechanism to manage the applications accessto system level resourcesE. Security roles can be modified dynamically at runtimeF. Authentication is performed using the J2EE security roles

QUESTION 72Which file can a system administrator consult prior to starting an installation todetermine which components are already installed on the machine?

A. prereqChecker.xmlB. log.txtC. vpd.propertiesD. Profileregistry.xml

QUESTION 73According to the Upstream Queuing Model for performance tuning, what reflects thecorrect application of recommended settings for maximum concurrent clients?

A. Web server=75, web container=50, datasource=25B. Web server=25, web container=50, datasource=75C. Web server=50, web container=50,datasource=50D. Web server=75, Web Container=75, Datasource=25

QUESTION 74A system administrator is federating a node using the addNode command. The Addnodecommand can't perform by default which step?

A. Include applications in the cellB. Create a definition for the node agentC. Update the node's wsadmin.properties file to reflect the new cell environment settingsD. Create entries in the master repository for the federated node

QUESTION 75Which two tasks can be performed using the IBM Key Management Utility (Ikeyman)for managing SSL for IBM HTTP Server?

A. Sign certificates on certificate Authority's (CA) behalfB. Create self-singed certificatesC. Create a key database fileD. Edit httpd.conf to use a certificateE. Install GSkit

QUESTION 76When the application server is experiencing normal to heavy usage, which statementmost accurately describes optimal pool usage?

Page 16: 000-253

A. The Performance Management Interface (PMI) must be explicitly enabled on theapplication server to be monitored, since it requires CPU resources on the server beingmonitoredB. The pools will all show similar numerical values, indicating balanced workload isoccurring throughout the application serverC. Pools used by the application should be released and rebuilt in conjunction with JVMgarbage collection cycles ensuring that no stale connections persistD. Pools used by the application should be nearly fully utilized, indicating that resourcesare being efficiently used

QUESTION 77After creating a profile, a system administrator discovers there are port conflicts. Whichaction should the system administrator take to fix the port conflicts in the existingprofile?

A. Run the updatePorts.ant scriptB. Edit the server.xml fileC. Update the portdef.props fileD. Re-create the profile entering different ports

QUESTION 78How can an administrator view the contents of the activity.log file in the profile rootdirectory?

A. Run the waslogbr script from the command line and use the Log analyzerB. Open the file using any text editorC. Use the profiling and Logging perspective in the Application Server Toolkit (AST)D. Open the file using the IBM Support Assistant (ISA) and use the Thread Analyzer tool

QUESTION 79A system administrator is installing an enterprise application in a securedWebSphere Application Server environment. The application has been configuredto use security roles. Which of the following is considered a BEST practice whenmapping the security roles to the current user registry?

A. Map the security roles of EJB methods to groups and the security roles of Webresources to users.B. Map the security roles of Web resources to groups and security roles of EJB methodsto users.C. Map all security roles to usersD. Map all security roles to groups

QUESTION 80A system administrator has created data source definition using the ApplicationDeployment Descriptor editor in the Application Server Toolkit (AST). Thesedatasource can be accessed by any:

A. Applications running on the serverB. Applications in the current AST workspace.C. Modules contained in the EAR file where the definition is madeD. J2EE Application clients accessing the server

Page 17: 000-253

QUESTION 81Which of the following must a system administrator define when creating a JDBCprovider at the cluster scope?

A. All datasources for this JDBC provider at the cluster level.B. An XA data source implementation type, for the JDBC driver.C. The symbolic Variable used in the class path to the JDBC driver for each node in theclusterD. The J2C authentication data entry for the datasource at the cluster scope.

QUESTION 82A system administrator is installing an enterprise application containing severalentity EJBs. All EJBs are contained in the same EJB JAR file. All CMP EJBs in theJAR file, except one, access the same datasources. What is the MOST efficient wayto bind the datasources for the EJBs?

A. Create a separate EJB JAR file for the EJB that is different and set EJB moduledatasources on both EJB JARs.B. Ask developers to pre-configure the EJB module with the production datasource JNDInames.C. Individually, bind each of the EJBs to the datasource they use.D. Bind the EJB module to the datasource used by most EJBs, then specify a separatebinding for the EJB that is different

QUESTION 83The WebSphere Rapid Deployment(WRD) tool is running in the automaticallocation mode. All of the following enterprise applications will be deployed if thefile types are placed below in WRD's monitored directory EXCEPT.

A. An Enterprise Archive (EAR) file.B. A Web module (WAR) file.C. An EJB module JAR file.D. A Resource Adapter Archive (RAR) file.

QUESTION 84A customer is in the process of configuring a J2C (JCA) connection factory usingthe administrative console. The customer wishes to eventually secure the connection.The customer also knows that several security settings are now deprecated inWebSphere Application Server V6 for connection factories. Which of the followingshould the system administrator recommend that the customer use?

A. Component-managed Authentication AliasB. Mapping-Configuration AliasC. Authentication preferenceD. Container-managed authentication alias

QUESTION 85If a system administrator is creating a wsadmin script, and within the script it isnecessary to create several JMS Connection Factories and JDBC. Dtasources, whichof the following wsadmin scripting objects should be used?

Page 18: 000-253

A. AdminConfigB. AdminControlC. AdminAppD. AdminTask

QUESTION 86A customer is using the WebSphere V6 Default messaging provider as themessaging service. The customer has the following configuration. Cell C1 has Bus Aand B, whereas Cell C2 has Bus C. All of the following are supported optionalEXCEPT.

A. Configuring a link between Bus A and Bus B.B. Configuring WebSphere MQ as a Foreign bus.C. Configuring a link between Bus b AND Bus C.D. Running a JMS Client on Bus A that gets messages from a destination on Bus C.

QUESTION 87A system administrator is about to federate a node into a Network Deployment cell.The node's server has several applications installed and a Service integration Bus isdefined on the node. Before federating the node, the system administrator mustunderstand that the default behavior of the addNode operation is:

A. To not carry over applications to the cell.B. To not carry over Service Integration Buses to the cell.C. To not carry over applications and Service Integration Buses to the cell.D. To carry over applications and Service Integration buses to the cell.

QUESTION 88A system administrator is using the administrative console and accidentally closesthe browser without saving any changes made during that session. What must thesystem administrator do to make sure any configuration changes that were madeduring the last session are not lost?

A. Lo in as a different user and save the master repository.B. O and hand-edit the configuration xml files in the appropriate placesC. Restore a backup copy of the master configurationD. Make those changes permanent when the system administrator logs in again.

QUESTION 89In order to safely and completely backup an Application Server's configuration,which of the following commands would be MOST appropriate?

A. backupConfigB. BackupConfig -safeModeC. backupConfig -stopD. backupConfi -nostop

QUESTION 90A system administrator is concerned about disk usage. Although the systemadministrator wants to be sure the activity log does not grow too large, the systemadministrator also wants to ensure that important messages are not lost. Which ofthe following strategies would control the size of the logs and yield the maximum

Page 19: 000-253

amount of log information?

A. Set the Maximum File Size to 3 MB for the IBM Service Logs in the administrativeconsole.B. In the Log Analyzer, set the Maximum File Size to 3 MB for the IBM Service Logs.C. Using wsadmin, set the Maximum Number of Historical Log Files to 2 with a FileSize of 2 MB.D. Through the administrative console, set the Maximum File Size to 2 MB and theMaximum Number of Historical Log Files to 3

QUESTION 91Which of the follow statements MOST accurately describes the effect of increasingthe JVM heap size?

A. More objects will be created and the time required to garbage collect will decrease.B. Applications run longer before a garbage collection occurs.C. A larger heap size will cause the server to take loner to start.D. No measurable performance change will result from increasing the heap size.

QUESTION 92A performance analysis of a customer application revealed that the overhead ofpersistent HTTP sessions was the main contributor to performance slow down. Allof the following factors will help with improving the performance of persistentHTTP session performance EXCEPT:

A. Reducing the size of the session objectB. Invalidating unneeded sessionsC. Increasing the memory availableD. Increasing the cache overflow size.

QUESTION 93A system administrator needs to gather performance data for several servlets thatare used by an application running on a particular server. Using the TivoliPerformance Viewer, which of the following performance statistics would thesystem administrator be able to monitor?

A. The number of failed servlet requestsB. The average response time for servlet requests.C. The average wait time for a particular servlet.D. The minimum and maximum response times for servlet requests.

QUESTION 94For testing purposes, a system administrator needs to disable automaticpropagation of the plugin-cfg xml file for an HTTP server which has already beenconfigured on a managed node. Which of the following steps must be performedfrom within the administrative console?

A. Select Environment->Update Web Server Plug-in, uncheck the "Automaticallypropagate the plug-in configuration file" optionB. Select Environment ->Virtual Hosts, uncheck the "Automatically propagate theplug-in configuration file" optionC. Select Server, select an application server, select Web container, uncheck the

Page 20: 000-253

"Automatically propagate the plug-in configuration file" optionD. Select Servers->Web servers, click the Web server, select Plug-in properties, uncheckthe "Automatically propagate the plug-in configuration file" option

QUESTION 95The customer has deployed a WebSphere-based application that performs excessivedatabase operations. The application is deployed to a 2-node symmetric cluster,with 2 application servers per node, for a cluster size of 4 members. All clustermembers are configured identically and there exists no other servers on clusters inthis cell. In addition, a data source is defined at the cell-scoped level with amaximum of 100 connections. Given that each database connection consumes 2MBof memory, under peak load, how much of the JVM heap on each server isconsumed by connections?

A. 25MBB. 50 MBC. 100MBD. 200MB

QUESTION 96Which of the following sets of parameters can a system administrator adjust inorder to directly improve performance for the EJB container?

A. Cache size, cache cleanup intervalB. Datasource connection pool, server JVM sizeC. Session timeout, HTTP session object sizeD. Transaction lifetime, client inactivity timeout

QUESTION 97Which of the following changes to an application server's configuration will causethe HTTP plug-in configuration file to be regenerated?

A. The Web CONTAINER'S CLASS-LOADER POLICY HAS BEEN MODIFIEDB. An application's class-loder policy has been modifiedC. A new application has been installed on the serverD. The server's PMI monitoring level has been modified.

QUESTION 98Which of the following lists contains all of the class loader settins that can beconfigured at the application server level?

A. Single, Multiple, Parent First, Parent LastB. Single, Application, Parent First, Parent LastC. Module, Application, Parent First, Parent LastD. Enable class reloading, Realod Interval, Parent First, Parent Last

QUESTION 99When working with a cluster, a system administrator needs to stop and restart allservers in the cluster. This will ensure that applications running in the clusterremain available at all times. Using the administrative console., which actions willMOST efficiently accomplish this task?

Page 21: 000-253

A. From the Application Servers page select each server. Click stop, then slect the serveragain and click Start.B. From the Application Server page select all servers in the cluster, Click Stop, thenselect all the servers again and click start.C. From the Clusters page select the cluster and click stop, then select cluster again andclick start.D. From the Cluster page select the cluster and click Ripplestart.

QUESTION 100A developer is building as EJB that will have exclusive access to a confidentialmilitary database. The developer therefore does not want the EJB to be clustered orworkload managed. In a conference with the system administrator, the developer isadvised to use which caching option when building the bean?

A. Option A CachingB. Option B CachingC. Option C CachingD. Dynamic Caching

QUESTION 101A system administrator is reviewing a checklist of actions that should occur duringthe federation process. The system administrator notes that all of the followingchecklist actions are correct EXCEPT:

A. The node is added to the cellB. The node agent and application server are startedC. The application server becomes a managed server in the cellD. The application server is stopped, and a new node agent is created.

QUESTION 102A system administrator wants to federate an application server profile to a cell. Allof the following are valid steps or actions EXCEPT:

A. Install the product on each machine if this is a multiple machine install.B. Create an application server profile on the application server machine and start theapplication server.C. Add the node defined by the application server profile to the cell, which will delete theapplication server cell, and federates the node to the deployment manager cell.D. Monitor the node agent and application server which will start automatically duringthe federation process.

QUESTION 103Given the following JSESSIONID=000A2ABM41JozU_VM8IffsMNfdR:v544d0o0,what cluster member (clone ID) would this HTTP request be routed to?

A. 000A2B. 0000A2ABC. v544d0o0D. Route cannot be determined from the above information

Page 22: 000-253

QUESTION 104A system administrator has deployed a horizontally and vertically scaled clusteredapplication across a 6-NODE wEBsPHERE Application Server cluster. Each nodecontains two cluster members. The system administrator is looking for the mostscalable HTTP Session persistence mechanism for this environment. Which of thefollowing HTTP Session persistence strategies would BEST fit these requirements?

A. Memory-to-Memory Replication in a pure peer-to-peer topology configurationB. Databse Session persistenceC. Local SessionsD. Local Session with overflow

QUESTION 105When can a Data Replication Domino be created from the WebSphere ApplicationServer V6 administrative console?

A. While adding a new cluster member to the cluster or clicking on Cluster member ->Replication Domino -> NewB. While creating the cluster or clicking on Environment -> Replication Domino -> NewC. While configuring session management on each cluster member or clicking onResources -> Replication Domain -> NewD. The administrative console does not support creation of the Data Replication Domainat this time.

QUESTION 106User requests are directed to the web container using the web container inboundtransport chain. The chain consists of all of the following EXCEPT for:

A . An HTTP INBOUND CHANNEL THAT SERVERS http 1.0 and 1.1 requests.B. A TCP inbound channel that provides the connection to the network.C. A Web Services inbound channel that provides the connection to the Web ServicesGateway.D. A Web container channel over which requests for servlets and JSPs are sent to the Webcontainer for processing

QUESTION 107Which of the following statements BEST describes the relationship betweenWebSphere MQ and WebSphere Platform Messaging?

A. WebSphere MQ and Platform Messaging are separate and do not share any modulesor configuration data.B. Platform Messaging relies on WebSphere MQ as the JMS provider.C. WebSphere MQ and Platform Messaging must share the same Cloudscape database.D. Platform Messaging is simply a scaled down version of WebSphere MQ.

QUESTION 108A customer called a WebSphere support analyst and asked about J2EE extensions.The analyst said that these extensions are included with Programming ModelExtension (PME) which is part of WebSphere Application Server V6. The analystalso mentioned of the included extensions, but made a mistake on one of theextensions. All of the following are correct EXCEPT:

Page 23: 000-253

A. Asynchronous beans offer performance enhancements for resource-Intensive tasks byenabling single tasks to run as multiple tasks.B. Startup beans allow the automatic execution of business logic when the node agentstarts or stops.C. Internationalization service is a WebSphere extension that allows one to automaticallyrecognize the time zone and locale information of a calling client.D. Scheduler service is a WebSphere programming extension responsible for startingactions at specific times or intervals.

QUESTION 109Which of the following are services implemented by the WebSphere ApplicationServer?

A. Session management, Naming, Messaging engine, and the user registryB. Security, Messaging engine, Naming, HTTP Plug-inC. The user registry, Transaction service, Naming, and HTTP Plug-inD. Security, Naming, Messaging engine, and Dynamic Cache.

QUESTION 110Which of the following components are supported by Express/Base WebSphereApplication Server V6 through the WebSphere administrative console?

A. Application server clusteringB. External web serverC. External generic serverD. WebServer V5 JMS server

QUESTION 111The EJB container in one of the cluster members handles an EJB client call fromoutside of the container. The cluster member fails. The client's request will beautomatically redirected to a service in another available server. All of the followingare involved in redirecting the client's request EXCEPT:

A. The High Availability ManagerB. Application Server clusterC. EJB workload amangement (WLM)D. IBM Dispatcher Service

QUESTION 112A system administrator was asked to use pre-defined port numbers for the newapplication server profile. The system administrator can use the wasprofilecommand line utility to accomplish this task by defining port numbers. The systemadministrator will need follow the format in.

A. vpd.properties and use that file for the -portsFile argument.B. Portdef.props and use that file for the -portsFile argument.C. Wasprofile.properties and use that file for the -portsFile argument.D. Sas.client.props and use that file for the -portsFile argument.

QUESTION 113Which of the following is the correct way to delete a profile in WebSphereApplication Server V6?

Page 24: 000-253

A. Use the "Profile creation wizard"B. Delete the profile Template directoryC. Use the wasprofile command line utilityD. Delete the profile directory

QUESTION 114A system administrator installed the WebSphere Application Server V6 NetworkDeployment product. The system administrator also created Application Serverprofile to deploy a J2EE application that is using Message Driven Beans (MDB).The system administrator did not install sample applications during or after theinstallation. What does the system administrator have to do to display and run theapplication successfully?

A. Create a customer profile and deploy the application on it.B. Create and configure Service Integration Bus (SIB) and add the Server to it to create amessaging engineC. Install Embedded Messaging from the installation CD to create a messaging engine.D. Install WebSphere MQ and deploy the application on it

QUESTION 115A system administrator was asked to develop necessary artifacts to install aWebSphere Application Server V6 Network Deployment package, create adeployment manager profile and a customer profile, all on a single machine. Silentinstallation script response files were used. How many response files does the systemadministrator need to create to accomplish this task without using UI based tools?

A. 1B. 2C. 3D. 4

QUESTION 116A system administrator is unable to start the installation wizard while installing theWebShere Application Server V6 Network Deployment package. In addition, thesystem administrator cannot see any log files under the temp directory. What is theMOST probable cause?

A. The JDK is not installed yet.B. There is not enough Disk Space.C. There is not enough CPU power.D. The installation Database Repository (IDR) is not functioning.

QUESTION 117A system administrator fedrated a custom profile to the deployment manager. Thesystem administrator then created a new server (server1) on the fedrated node. Howshould the system administrator verify that the server was successfully created?

A. Use the snoop servletB. Run the installation Verification proramC. View the addNode.lo file of the node agent.D. View SystemOut.log file of the deployment manager.

Page 25: 000-253

QUESTION 118A system administrator was troubleshooting a problem after configuring theenvironment for the remote plug-in (http://webserver-hostname/snoop does notwork). The system administrator could verify thathttp://app-server-hostname:9080/snoop and http://webserver-hostname areworking properly. Assuming that the system administrator used defaultvalues during the installation, which log file will give more informationabout the problem?

A. error.log under HTTP Server logs directoryB. http_plugin.log under PLUGIN logs directoryC. SystemOut.log under PROFILE logs directoryD. plugin-cf.xml under PLUGIN logs directory

There is an http_plugin.log under plugin log directory and it is a log file.Not D:There is no plugin-cf.xml file in plugin log directory.There is a plugin-cfg.xml file within plugin config directory but it is not a log file, it is anxml configuration file for the plugin module.

QUESTION 119When a J2EE enterprise application is being assembled to take advantage of J2EEsecurity, there are a number of configurations and mapping that need to be made.Which of the following items can a security constraint be mapped to?

A. A Web resourcesB. An EJBC. A login mechanismD. A security realm

QUESTION 120A system administrator is working in a federated cell with Global security enabled.The system administrator wants to use various command line tools to manage theapplication servers. All of the following command line tools require the systemadministrator to provide a username and password EXCEPT:

A. startServerB. stopServerC. wsadminD. stopManager

QUESTION 121An enterprise application must be started through the console. Which of theseadministrative roles would be the minimum required?

A. MonitorB. ConfiguratorC. AdministratorD. Operator

Page 26: 000-253

QUESTION 122After installing IBM WebSphere Application Server and creating a fedrated cell, asystem administrator wants to enable Global security. After making the appropriateconfiguration changes, which steps must the system administrator take in order forGlobal security to become fully active?

A. Restart the Deployment ManagerB. Restart the Deployment Manager and all Node AgentsC. Restart the Deployment Manager, all Node Agents and all Application ServersD. Restart the Deployment Manager, all Node Agents, all Application Servers and the User Registry

QUESTION 123Two enterprise applications need to be installed into the WebSphere ApplicationServer environment. Each application has to rely upon authentication throughWebSphere security, but must map to different user registers. Which of thefollowing statements is valid?

A. Both applications can be installed into the same application server and each need to bemapped to separate user registries.B. Both applications can be installed into the same node but different application servers.C. The applications need to be installed on separate nodes which can be in the same cell.D. The applications need to be installed in separate cells.

QUESTION 124A system administrator is making sure that the SSL communications between theplug-in and the application server are as secure as possible. While configuring SSLfor the plug-in what steps should be taken to ensure the BEST possible security?

A. Replace the private keyB. Replace the plugin-key.kdb fileC. Remove the public keyD. Remove the DummyKeyring.kdb file

QUESTION 125The First Failure Data Capture (FFDC) is a diagnostic component of WebSphereApplication Server and serves a very specific role. Which of the followingdescriptions BEST defines the role of FFDC?

A. The First Failure Data Capture tool preserves the information generated from aprocessing failure and returns control to the affected engines. The captured data is savedin a log file for use in analyzing the problem.B. The First Failure Data Capture tool preserves the information generated from aprocessing failure and forces the application server to shut down.C. The First Failure Data Capture tool preserves the information generated from aprocessing failure and invokes the Collector tool to take a snapshot of the systemenvironment.D. The First Failure Data Capture tool preserves the information generated from aprocessing failure and forces the application server to do a thread dump.

Page 27: 000-253

QUESTION 126A system administrator has to determine the root cause of and decides to enabletracing application server. How can the system administrator accomplish this task?

A. Inside the administrative console, click Troubleshooting -> Logs and Trace and Selectthe Runtime tab.B. Inside the administrative console, click Troubleshooting -> Logs and Trace ->server-> Diagnostic Trace and select the Runtime tab.C. Edit the tracLog properties file and restart the application server.D. This is not possible. The trace configuration of a running application server cannot bechanged.

QUESTION 127When using the administrative console to configure logging on a particular server,the Diagnostic Trace Service can be configured to write messaging to log files in oneof three formats. Which of the following are the supported formats?

A. Basic, CBE, JRasB. Basic, AdvancedC. Basic, Intermediate, AdvancedD. Basic, Advanced, Log Analyzer

QUESTION 128Not every name space can be dumped using the dumpNameSpace utility. Usingwsadmin, the NameServer MBean can be invoked to dump these name spaces. All ofthe following can be dumped with the NameServer MBean EXCEPT.

A. Name space java:B. Name space local:C. Name space Server:D. Name space jdbc:

QUESTION 129A problem has been reported to a system administrator, however the systemadministrator is unable to use the Log Analyzer for some reason. Which of thefollowing is an alternative way for the system administrator to review the LogAnalyzer log file?A. Use the dumplog command.B. Use the showin commandC. Use any text editor although the formatting wont be as nice.D. Format the Log Analyzer log with wsadmin and then use any text editor.E. Use the showlog command

QUESTION 130A system administrator is asked to write a PERL script to output only those errormessages in System Out log that refer to some sort of error or warning. Which eventtypes should the system administrator include?

A. F,E,WB. F,E,W,DC. F,E,W,AD. F,E,W,H

Page 28: 000-253

QUESTION 131A system administrator notices that web requests are falling on a particularapplication server which has already started. Which log files should be reviewed forapplication server errors?

A. SystemErr.log.SystemOut.logB. startServer.log. stopServer.log.System Err.log.SystemOu.logC. SystemOut.logD. SystemErr.log

QUESTION 132What is required to configure a WebSphere application server for remotedebugging?

A. Edit the WebSphere remoteDebug.properties file.B. Edit the WebSphere remotAppServerDebug properties fileC. Go to the administrative console and enable the Debuging Service to start under theSystem Administration tab.D. Go to the administrative console and enable the Debugging Service to start along withthe application server.

QUESTION 133While testing the HTTP Session affinity behavior of a WebSphere cluster, thesystem administrator noticed that there were two versions of the plugin-cfg.xml fileused:Version #1: plugin-cfg.xml<ServerCluster Name= "abcCluster"><ServerCloneID="abcdefgh"LoadBalanceWeight="2"Name="ServerA">Version #2: plugin-cfg.xml<ServerCluster Name= "abcCluster"><ServerLoadBalanceWeight="2"Name="ServerA">What would be the expected behavioral differences between the two versions of theWebSphere plugin configuration file in terms of honoring HTTP session addinity?

A. Version #1 supports HTTP Session affinityB. Version #1 and version #2 both support session affinityC. Version #2 supports HTTP session affinityD. Version #1 and version #2 do not support HTTP session affinity

QUESTION 134A system administrator is creating a wsadmin script. Within the script, it isnecessary to list the running applications on a server. Which of the followingwsadmin scripting objects should be used?

A. AdminMBeansB. AdminConfigC. AdminOperationsD. AdminControl

Page 29: 000-253

QUESTION 135A system administrator is developing an application to a 2-node cluster. One of thenodes is a powerful AIX-based machine and the other is a smaller Windows-basedmachine with less processing capability. How would the cluster BEST be configuredto ensure more work gets routed to the more powerful server?

A. Use the Random algorithm and assign a smaller weight to the Windows box.B. Use the First-Come-First-Served algorithmC. Use the Round Robin and assign a larger weight to the AIX machineD. Use the Least Recently Used algorithm with weights.

QUESTION 136On receipt of a JMS message on a queue (Q ), a message-driven bean (MDB)processes the message by invoking a stateless session bean that does a data baseupdate. Both enterprise beans execute within the same transaction context. Thequeue type destination in the underlying Service integration Bus corresponding to Qis defined with the "Maximum failed deliveries" attribute set to 0, and the"Exception destination" specific as 'None'. What happens when the processing of aparticular message results in a transaction rollback?

A. The application server hosting the MDB is shutdownB. The JMS runtime stops the delivery of the message to the applicationC. The JMS runtime keeps delivering the message to the applicationD. The message gets stranded on the queue (Q)

QUESTION 137The log files reveal naming exceptions after a system administrator has just createda new datasource. What tool would the system administrator use to verify that thedatasource is correctly registered in the JNDI namespace?

A. dumpJNDINameSpaceB. dumpNameSpaceC. dumpJNDICacheD. showNameSpace

QUESTION 138A system administrator is asked to diagnose a problem on a remote node using theLog Analyzer. In order to accomplish this task, what is the name of the LogAnalyzer source log file that the system administrator will have to access?

A. service.logB. activity.logC. loganalyzer.logD. trace.log

QUESTION 139Where in the administrator console can the log detail levels be changed?

A. Troubleshooting -> Logs and TraceB. System administration -> Console settings -> PreferencesC. Environment -> WebSphere VariableD. System administration -> Console settings -> Logging

Page 30: 000-253

QUESTION 140A system administrator notices that an application server (with servlets and EJBs)is receiving llOP requests, but not any HTTP requests. Which of the following logfile(s) should be checked?

A. SystemOut.log and SystemErr.logB. startServer.logC. activity.logD. HTTP_plugin.log and native_stdout.log

QUESTION 141Sometimes it is required to force an application to create a thread dump (orjavacore). Which of the following processes would be used to force a thread dump?A. Using the wsadmin command prompt, get a handle to the problem application server.----------------------------------------------wsadmin>setjvm[$AdminControl completeObjectName type=JVM,process=server1.*]------------------wsadmin>$AdminControl invoke$jvm dumpAllThreadsLook for an output file in the installation root directory with a name likejavacore.date.time.id.txt.B. Using the wsadmin command prompt, geta handle to the problem application server.----------------------------------------------wsadmin>set jvm[$AdminControl completeObjectNametype=JVM,process=server1,*]Generate the thread dump:---------------------wsadmin>$AdminControl invoke $jvm dumpAppServerThreadsLook for an output file in the installation root directory with a name likejavacore.date.time.id.txt.C. Using the wsadmin command prompt, geta handle to the problem application server.----------------------------------------------wsadmin>set jvm[$AdminControl completeObjectNametype=JVM,process=server1,*]Generate the thread dump:---------------------wsadmin>$AdminControl invoke $jvm dumpJVMThreadsLook for an output file in the installation root directory with a name likejavacore.date.time.id.txt.D. Using the wsadmin command prompt, geta handle to the problem application server.----------------------------------------------wsadmin>set jvm[$AdminControl completeObjectNametype=JVM,process=server1,*]Generate the thread dump:---------------------wsadmin>$AdminControl invoke $jvm dumpThreadsLook for an output file in the installation root directory with a name likejavacore.date.time.id.txt.

QUESTION 142In WebSphere Application Server V6, a logging infrastructure that extends JavaLogging in used. Which of the following contains the BEST subset of logging levelsthat a system administrator can use to log only errors?

Page 31: 000-253

A. Severe, fatalB. All, finest, finer, fine, server, fatalC. All debug, entryExit, Info, warning, fatalD. All, debug, entryExit, info, warning, error, fatal

QUESTION 143There are multiple property files which control the behavior of the FFDC filter. Allof the following are FFDC property files EXCEPT:A. ffdcStart.properties - used while the server is startingB. ffdcRun.properties - used after the server is readyC. ffdcException.properties - used whenever an exception occursD. ffdcStop.properties - used while the server is in the process of stopping

QUESTION 144A system administrator is asked how best to suppress System out or System.errmessages from the customer's application. Which of the following actions should thesystem administrator recommend to the customer?

A. Covert their logging to use Log4j.B. Use the Common Base Event API and the Java Logging API.C. Use JRas to log messages.D. Click Troubleshooting > Logs and Trace >server name > JVM Logs and change theinstalled Application Output parameter from the Admin Console

QUESTION 145A system administrator has just installed the WebSphere Application Server. Thesystem administrator is interested in turning on global security in order to protectthe environment. By enabling global security, all of the following security featureswill be activated EXCEPT:

A. Common Secure interoperability Version 2 (CSIV2)B. Authentication to the administrative consoleC. SSL between the plug-in and the embedded Web serverD. J2EE security

QUESTION 146A site using J2EE security to protect their application the websphere ApplicationServer. An Application is being assembled with Application Server Toolkit andneeds to be configured for security. All of these steps are appropriate in this caseEXCEPT:

A. Creating the J2EE security rolesB. Creating the j2eesecurity.policy fileC. Creating the security constraintsD. Configuring the loin mechanism for the Web module

QUESTION 147A secured network is being set up between an external Web server and theapplication server's embedded web server. Given that mutual SSL authentication isa required part of the process, which of the following configuration steps needs to beselected?

Page 32: 000-253

A. SERVER AUTHENTICATION ONLYB. Both Server and Client authenticationC. Cluster authenticationD. Client authentication only

QUESTION 148A system administrator is considering how to configure WebSphere ApplicationServer with Global security to use the Local OS user registry. Which of thefollowing limitations does the system administrator need to take into account?

A. CSIV2 is not supported with the Local OS user registryB. Global security can not use the Local OS user registry if WebSphere ApplicationServer is running as non-rootC. Java client certificates will not be able to be authenticatedD. Mapping J2EE security roles can not be done with groups

QUESTION 149In considering security requirements for an Application Server, a systemadministrator is interested in implementing Java 2 security. Which of the followingstatements is valid regarding the enabling of Java 2 security?

A. Global security must be enabled for Java2 security to functionB. Global security does not need to be enabled for J2EE security to functionC. Java 2 security does not require Global security to be enabledD. Java 2 security must be enabled for Global security to function

QUESTION 150While setting up global security for a WebSphere environment, systemadministrators need to be assigned various accesses. In order to configure SSL(Security Socket Layer) through the administrative console, which of the followingadministrative roles would be required?

A. MonitorB. SecurityC. ConfiguratorD. Operator

QUESTION 151Which of the following external servers is normally found outside the firewall or inthe demilitarized zone?

A. Generic serversB. Managed Web serversC. Unmanaged Web serversD. JMS Servers

QUESTION 152The capabilities of WebSphere base are being compared and contrasted withWebSphere Network Deployment configurations. All of the following statements arevalid EXCEPT:

Page 33: 000-253

A. WebSphere Base configuration does not provide any built-in support for WorkloadManagement and Failover capabilities.B. Multiple installations of WebSphere base servers do not have a central point ofadministrationC. WebSphere Network Deployment Configuration can be used to manage web servernodesD. Web Sphere Base configuration does not provide built-in support for serviceintegration bus.

QUESTION 153Which of the following is a valid statement concerning the WebSphere V6 HighAvailability Manager ?

A. The HA Manager enhances the availability of WebSphere singleton services liketransaction services, JMS Message services, and Service integration Bus services.B. The HA Manager runs as an enterprise application within each application serverprocess that monitors the "health" of WebSphere clusters.C. In the event of a server failure, the HA Manager could failover the transaction servicewhich could recover in-flight transactions.D. The HA Manager leverages latest storage technologies to provide fast recovery timeof both single and two-phase transactions

QUESTION 154A customer must enable High Availability and failover for a cluster of externalHTTP servers. Which of the following actions should the system administratorrecommend to a accomplish this task?

A. Use the load balancing component of the WebSphere Edge ComponentsB. Configure a proxy server such as Tivoli Access ManagerC. Enable server affinity for each HTTP server in the clusterD. Implement the caching proxy server component of the WebSphere Edge Components.

QUESTION 155An internet client is requesting a servlet from their web browser. Assuming that allinternet client requests are first routed to an IP sprayer, which of the followingcomponents would typically be involved in the flow of the request from client toservlet?

A. JMS server, LDAP server, and EJB containerB. External HTTP server, HTTP server Plug-in, and web containerC. Embedded HTTP server, web container, and EJB containerD. Embedded HTTP server, JMS server, and authentication proxy server

QUESTION 156A developer is attempting to setup the Web SERVER DEFINITION WITHIN THEAPPLICATION SERVER FOR A CUSTOMER DEMONSTARTION. Thedeveloper designed a chart that lists information about the definition process. Asystem administrator was asked to confirm the accuracy of the chart. Which of thefollowing information would the system administrator indicate is NOT included inthe Web server definition?

Page 34: 000-253

A. Information about the location of the Web serverB. Information about its application server configuration filesC. Information about its plug-in configurationD. Information about configuration files, and plug-in configuration

QUESTION 157A customer has an application running on WebSphere Application Server. When auser logs on, the application retrieves the relevant Product code information fromthe database and stores it in a HashMap. A reference to the HashMap is then storedin the HTTP Session object. Which of the following should be recommended as ameans for improving HTTP Session persistence performance?

A. Use memory-to-memory replicationB. Use peer-to-peer topologyC. Use database persistenceD. Declare the reference to the HashMap as transient

QUESTION 158A system administrator wants to ensure that nodes with different hardwareresources participate in a cluster as efficiently as possible. Which of the followingshould be used to BEST meet this goal?

A. A load balancer to evenly distribute requests to cluster membersB. A fine grain application update with capabilities to tune cluster member applicationsto the hardwareC. Weighted definitions for cluster membersD. Identical application components for all cluster members

QUESTION 159A system administrator is creating a new cluster. The servers in the cluster will needseveral configuration steps to support the applications. Which of the following waysis MOST efficient to create and configure the cluster members?

A. Create and properly configure a server then add this server as the first member of thecluster.B. Create and properly configure as standalone server then add this server as the lastmember of the clusterC. Create the cluster and add all the cluster members, then make configuration changes atthe cluster scope.D. Create the cluster and add all the cluster members, then set the configuration in any ofthe clustered servers.

QUESTION 160A proposed WebSphere cell contains about 25 nodes. The environment will behorizontally and vertically scaled and can potentially grow over time. What strategyfor HTTP Session persistence would work BEST for this situation?

A. Database session persistenceB. Memory-t-Memory replication in a peer-to-peer topologyC. Local sessionsD. Peer-to-Peer session persistence

Page 35: 000-253

QUESTION 161When using the addNode command to federate a node to a cell, It may be necessaryto know the Deployment Manager's SOAP connection port. What is the BEST wayto locate this port?

A. Navigate to the profiles directory of the WebSphere Application Server installationroot directory, and issuing the wsadmin $AdminConfig getPort command.B. Navigate to the bin directory of the node to be federated and issuing the followingcommand ivt.bat server1 <node>C. Examine the serverindex.xml file corresponding to the Deployment Manager's nodeD. Examine the responsefile.oct file in the WebSphere Application Server Installationroot directory

QUESTION 162A system administrator is configuring application servers for using the DataReplication Service in a WebSphere Application Server V6 cluster environment.Which of the following replication modes are available?

A. Client Only, Server Only, Both Client and ServerB. Cluster Only, Both Client and ClusterC. Cluster Only, Both Cluster and ServerD. Cluster Only, Node Only, Both Cluster and Node

QUESTION 163A system administrator wants to share system information like WorkloadManagement among core groups. Which of the following statements is valid in thiscontext?

A. Core groups in same or different cells use the service integration bus to shareWorkload Management information.B. Core groups can overlap by including common servers and the common servers areused to share Workload Management informationC. Core groups in different cells can only use the core group bridge service to shareWorkload Management informationD. Core groups use the core group bridge service to share Workload Managementinformation

QUESTION 164A server has its application class-loader policy set to "Single". What additionalconfiguration is necessary to ensure that the application class-loader will load Webmodules for a particular application on the server?A. The application must have its WAR class-loader policy set to "Module"B. The application must have its WAR class-loader policy set to "Application"C. The class-loader mode for the application server must be set to "Parent Last"D. No additional configuration is required. Setting the class-loader policy to "Single" issufficient

QUESTION 165If a system administrator uses the Tivoli Performance Viewer to monitorapplication servlets and EJB's which of the following sets of metrics should beviewed in order to BEST evaluate the performance of the application?

Page 36: 000-253

A. Average response time, heap size, garbage collection statisticsB. Average response time, number of requests/transactions, number of HTTP sessionsC. Average response time, heap size of datasource connection pool.D. Number of transactions, size of datasource connection pool, CPU utilization

QUESTION 166Which of the following events will cause the HTTP plug-in configuration file to beregenerated?

A. When a new virtual host is created or an existing virtual host is modifiedB. Whenever an application server is restartedC. Whenever a Web server is restartedD. When a new datasource is created or an existing datasource is modified

QUESTION 167A customer has a clustered application deployed to a very stable WebSphere cell.The HTTP Session are persisted to a database. Under heavy load, which of thefollowing Write Frequency settings would yield best performance?

A. End of Servlet serviceB. Time-based writes to the session databaseC. Update attributes onlyD. Update cache only

QUESTION 168When the HTTP plug-in configuration file is regenerated either manually orautomatically the file must be propagated to the Web servers. If a systemadministrator needs to configure automatic propagation of the plugin-cfg.xml filefor an Apache HTTP server, which of the following tasks must be performed?

A. Enable session management for the HTTP serverB. Configure the HTTP server on a managed node.C. Automatic propagation is not supported, the plugin-cfg.xml file must be transferredmanuallyD. Set the automatic propagation flag in the pluin-cfg.xml file.

QUESTION 169A system administrator needs to gather performance data for several databases thatare accessed by the applications on a particular server. The system administratorhas decided to use the Tivoli Performance Viewer to monitor each application'sdatabase access. Which of the following performance modules would provide therequired performance data?

A. JDBC Connection PoolsB. Thread PoolsC. System DataD. Transaction Manager

QUESTION 170A customer has a data source configured at the cell scope with the Maximumconnections set to 10. Which of the following statements is valid about theconnections?

Page 37: 000-253

A. The sum of all JDBC client connections in the cell are bounded by 10 connectionsB. If the server is a cluster member, then it cannot have more than 10 connectionsC. Each server in the cell can have a maximum of 10 connectionsD. All the servers in the cell cannot exceed a maximum of 10 connections

QUESTION 171According to the so-called Upstream Queuing model for performance tuning, whichof the following would reflect the correct application of recommended settings formaximum concurrent clients?

A. Web server=75, Web container=50, Datasource=25B. Web server=50, Web container=50, Datasource=50C. Web server=25, Web container=50, Datasource=75D. Web server=75, Web container=25, Datasource=50

QUESTION 172A system administrator managing a WebSphere Application Server and wants toensure that the JVM SystemOut log does not take up too much disk space. Which ofthe following approaches would assure the least amount of disk space is used?

A. Using the administrative console, set the Log File Rotation, Maximum Files Size to 5MB.B. Using the Log Analyzer, set the Maximum File Size to 3 MBC. Using the Log Rotation tool, set the Log File Count to 2 and the File Size to 2 MB.D. Using wsadmin, set the Maximum Number of Historical Log Files to 3 with a FileSize of 1 MB.

QUESTION 173A system administrator wishes to create a configuration archive in order to create asimilar configuration on another system. Using the "Admin Task exportServer"functionality within wsadmin, it is possible to export a configuration archive forwhich of the following items?

A. An application moduleB. An enterprise applicationC. A stand-alone application ServerD. A federated profile

QUESTION 174A system administrator is receiving an error while trying to connect to theadministrative console of an application server profile. The connection is beingmade from a remote web browser that has been installed and verified previously.Assuming that this application server is using default ports, what is the MOSTprobable cause of this error?

A. The adminconsole application was stopped previously from the adminconsoleB. The Application Server was not startedC. The WebSphere configuration database is not runningD. The adminconsole application was uninstalled from the adminconsole

QUESTION 175When using the installation wizard to install the WebSphere Application Server v6

Page 38: 000-253

Network Deployment package, product binaries are copied to the installationdirectory. Which of the following will also occur as a result of the installation?

A. A profile for deployment manager will be created by default.B. A profile for application server will be created by defaultC. A custom profile will be created by defaultD. A system administrator has an option to create a profile using the create profile wizard

QUESTION 176A system administrator installed the WebSphere v6 plug-in on a machine that has aWeb server and multiple application server profiles. A deployment manager wasnot used at this time. In this situation, Web server can be managed from theadministrative console by connecting to which profile (s)?A. Any of the profiles on that machineB. The profile that was created firstC. The profile that was created lastD. The default profile

QUESTION 177A system administrator received a message that the System prerequisites checkfailed during the installation of the WebSphere Application server V6 NetworkDeployment package. Which log file should the system administrator review to findmore information about the failure?

A. SystemOut.log under<INSTALL-ROOT>\logs directoryB. Log.txt under <INSTALL-ROOT>\logs directoryC. Log.txt under system temp directoryD. SystemErr.log under <INSTALL-ROOT>\logs directory

QUESTION 178Non-IBM supported Web server (start, stop and change configuration) must bemanaged from the WebSphere Application Server V6 administrative console in aNetwork Deployment environment. Which of the following processes has to bestarted on the WebServer machine that has been configured as a managed node?

A. Deployment managerB. Custom profileC. Node agentD. Application server

QUESTION 179A system administrator is having problems starting the application server (server1)Which log files should be checked to et more information about the problem?A. SystemOut.log and SystemErr.log under<WEBSPHERE-INSTALL-ROOT>\logs\server1 dircetoryB. SystemOut.log and SystemErr.log under<WEBSPHERE-INSTALL-ROOT>\profiles\<profiles name>directoryC. Log.txt and startWerver.log under <WEBSPHERE-INSTALL-ROOT>\logs directoryD. Log.txt and startServer.log under system temp directory

Page 39: 000-253

QUESTION 180A system administrator was asked to develop necessary artifacts to installWebSphere Application Server V6 Network Deployment Package, create customprofile and federate to the existing deployment manager. Silent installation scripts(response files) must be used. What is the BEST approach to accomplish this taskwithout using UI based tools?

A. Create a response file that installs product binaries, create the custom profile andfederates the node.B. Create two response files. The first one installs product binaries and calls the secondresponse file that create the custom profile and federates the node.C. Create a response file that installs product binaries, use profile creation wizard tocreate the custom profile and federate the node from the deployment manager'sadministrative console.D. Install product binaries using installation wizard and create a response file to createthe custom profile and federate the node.

QUESTION 181While updating an enterprise application on a production cluster running acrossmultiple machines, a system administrator must ensure that the application relainsavailable at all times to the users. After updating the application components, whatsrep can be used to accomplish this requirement?

A. On the last page of the Enterprise Application -> Update wizard, click Rollout UpdateB. Select System Administration -> Nodes, select node names and click FullResynchronizeC. Select Enterprise Application -> [application name] -> Stop and then EnterpriseApplications ->[application name] -> StartD. Select Servers -> Clusters ->[clustername] -> RippleStart

QUESTION 182A system administrator is installing an application and discovers that a requiredsecurity role has not been defined by the procedures of the application modules.How can the system administrator create a new security role for the application?

A. Use the Security Global Security page of WebSphere administrative console.B. Use Application Server Toolkit (AST) to define a new role on the module that requiresit.C. Use wsadmin to define the required security role.D. Edit the source of Application Deployment Descriptor and add a properly formed<sec-role-name>element

QUESTION 183A customer needs to connect an application server to a third party vendor's EIS.The customer asks the consultant about the functionalities that should be availablewith a JCA Resource Adapter that has been supplied by the EIS vendor. Theconsultant responds that all of the functionalities should be available EXCEPT forthe one stating that it

A. Provide connectivity between J2EE components such as an application server or anapplication client and an EISB. Collaborates with the application server to provide contract services such as

Page 40: 000-253

connection pooling transaction management caching and messagingC. Implements the Common Client interface (CCI) for EIS accessD. Implements the standard Service Provider Interface

QUESTION 184While packaging an enterprise application, a system administrator notices that theJNDI names of some of the EJBs conflict with existing names in the JNDInamespace. What action should the system administrator take to correct thisproblem?

A. Ask the developers to prefix the JNDI names of the EJB references with the name ofthe application to avoid clashes.B. Use the WebSphere administrative console to change the names of the EJB referencesC. Use the Application Server Toolkit (AST) to map the EJB references to unique namesin the name space.D. Use the WebSphere administrative console to create a separate name space for theapplication

QUESTION 185A system administrator has been requested to package an enterprise application sothat all of its required resource definitions are contained in the Enterprise Archive(EAR) File. How can this task be accomplished by using the Application ServerToolkit (AST)?

A. While running in AST, configure the application resources using the administrativeconsole, then export an Enhanced EAR file.B. While using AST, import the EAR file into the workspace of the Resourcesperspective, import a previously configured resource .xml file and export an EnhancedEAR file.C. While using AST, open the application's deployment descriptor editor. Switch to theDeployment page, define the needed resources and export the Enhanced EAR file.D. Using AST, open each module of the application and define the required resources.Include the configured modules in an enterprise application project and export anEnhanced EAR file.

QUESTION 186A JDBC provider has been defined at both the cell and node scope. Duplicatedatasources have been defined at both levels. An application has defined the sameprovider and datasource as part of an Enhanced EAR file. Which datasource will beused by the application?

A. The datasource defined on the JDBC provider at the cell scope.B. The datasource defined in the Enhanced EAR file.C. The datasource defined at the node scope.D. No datasource will be used as the server and will not start when duplicate resourcesare defined.

QUESTION 187A system administrator notices that web requests are failing on a particularapplication server which has already started. Which log file(s) should be reviewedfor application server errors?

Page 41: 000-253

A. SystemErr.logB. SystemErr.log, SystemOut.logC. SystemOut.logD. startServer.log, stopServer.log, SystemErr.log, SystemOut.log

Q Ans Q Ans Q Ans Q Ans Q Ans1 C 16 A 31 E 46 C 61 A2 B,C 17 C 32 C 47 D 62 B3 C 18 A,B,G 33 D 48 D 63 B4 B 19 D 34 C 49 B 64 D5 C,E 20 A 35 D 50 A 65 B6 D 21 B 36 D 51 C 66 C7 A,C 22 A 37 D,E 52 C 67 B8 A 23 D 38 B 53 B,C 68 B9 B 24 B 39 A 54 A,C 69 A10 A,C,D 25 A 40 A 55 A,B,E 70 A,F11 C,D 26 D 41 C 56 A,E 71 A,B,C12 E 27 C 42 B 57 C 72 C13 C 28 C 43 D 58 D 73 A14 B 29 C 44 A,E,F 59 D 74 A15 A 30 C 45 C 60 A 75 B,C

76 D 91 B 106 C 121 D 136 C77 A 92 D 107 A 122 C 137 B78 C 93 B 108 B 123 D 138 B79 D 94 D 109 D 124 B 139 A80 C 95 D 110 B 125 A 140 D81 C 96 A 111 D 126 B 141 D82 D 97 C 112 B 127 D 142 A83 D 98 A 113 C 128 D 143 C84 A 99 D 114 B 129 E 144 D85 A 100 A 115 C 130 A 145 C86 D 101 B 116 B 131 A 146 B87 C 102 D 117 D 132 D 147 D88 D 103 C 118 B 133 A 148 B89 A 104 B 119 A 134 D 149 C90 A 105 B 120 A 135 C 150 C

151 C 159 A 167 B 175 D 183 B152 D 160 A 168 B 176 D 184 C153 C 161 C 169 A 177 C 185 C154 A 162 A 170 C 178 C 186 B155 B 163 D 171 A 179 B 187 B156 B 164 B 172 D 180 B157 D 165 B 173 C 181 A158 C 166 A 174 B 182 B