C2180-377 - IBM WebSphere Application Server Network Deployment V7.0, Core Administration Exam
Go back to IBM
What is the most common role that naming plays in WebSphere Application Server?
Allows applications to obtain references to objects such as EJB homes.
A cluster, Cluster1, contains two servers, Serverl and Server2. Server1 has a weight of 20 and Server2 has a weight of 4. A single web server is used to route HTTP requests to Cluster1. The web server is started and receives 4 HTTP requests for an application deployed on Cluster1. If the requests are all part of the same HTTP session, and the first request is routed to Server2, how many requests are routed to Server1?
When configuring automated transaction peer recovery for recovering inrflight transactions from the transaction log, what is required from the file system?
Lease-based exclusive locks on files
Applications that need to create additional persistent bindings of objects associated with a specific node can bind those objects under which of the following types of namespace partition?
A user is taken through a series of Web pages in an online store and eventually checks out to complete his purchase. In the event of a server failure, the user should not have to repeat a step that has already been performed. Which session management strategy is best suited if the user cannot tolerate a loss in session information?
Database persistence to external datastore
An application has poor performance. On examining verbose GC information the administrator notices that 7OKB objects frequently cannot be allocated due to heap fragmentation, requiring timerconsuming heap compaction. Which of the following is likely to improve performance?
Increase the size of the large object area (LOA).
A developer informs an administrator that a servlet in one of the Web modules of a new enterprise application needs to access code in a native library. The administrator creates a shared library and adds the native library to its Native library path. With which class loader should the shared library be associated so that the servlet can access the native library without risk of an UnsatisfiedLinkError?
The application servers class loader
Which administrative object is used to deploy applications in WebSphere Application Server, ND, V7.0?
A WebSphere Application Server installation finishes and the primary installation log indicates an exit code of INSTCONFSUCCESS. What is the best conclusion that can be resolved from this result?
The WebSphere Application Server installed successfully.
An administrator would like to use fine--grained administrative security to manage service integration bus (SIBus) resources such as messaging engine. Identify what is required to enable this resource as part of fine--grained administration via the WebSphere Application Server administrative console.
SIBus messaging engine cannot be managed by fine--grained administration.
An administrator has enabled security auditing for the WebSphere Application Server. They wish to view the audit records in order to verify that it is working properly. Which tool would best allow them to view the audit data?
wsadmin, using the AdminTask.binaryAuditLogReader command
An administrator has created a cluster, C1, and configured memory-to-memory HTTP session replication. How can the administrator best ensure that every HTTP session is replicated on all members of the cluster?
In the Replication domain settings for the C1 replication domain, set Number of replicas to entire domain
When adding a new member to a cluster, why is it necessary for an administrator to select the option for generating unique HTTP ports?
To avoid port conflicts with other servers on the same node
Which one of the following can be used to instantiate resource adapter classes for establishing and maintaining resource connections?
Which of the following statements most accurately describes the relationship between a flexible management topology and the network deployment cell?
Flexible management can be an alternative to the network deployment cell model.
It is determined that a single class loader is needed for all of the modules in all of the enterprise applications on an application server. What action should the administrator take to implement this?
Set the Classloader policy on the application server to single
An administrator adds a new node to a cell. They then add a new cluster member to that node. What should the administrator do to best ensure that the Web servers will be able to communicate with the new cluster members securely?
Propagate the new plug-in keystores to the appropriate directories on each of the existing Web servermachines.
A cluster with 5 servers is configured as a member of a service integration bus (SIBus) using the Scalability with high availability messaging engine policy. What are the possible numbers of messaging engines that might be running on an individual server in the cluster?
Which of the following items best gives a reason to perform an unattended installation of WebSphere Application Server?
The installation for the particular target platform has been done before and will be repeated in the future.
A cluster, Cluster1, contains application servers Server1 and Server2. Cluster1 is configured as a member of service integration bus(SIBus)Bus1 using the High availability messaging engine policy. A messaging engine (ME) for Busl starts up on Server1, and then Server1 crashes. An ME for Busl will:
start on Server2 and continue running on Server2 even after Server1 has recovered.
How is the plug-in configuration file viewed from the WebSphere Application Server administrative console?
From the web servers list, select a particular web server. In the properties view, click Plug-in properties.Click View next to the Plug-in configuration file name.
Which one of the following profile related tasks can only be performed using the manage profiles command line facility?
Delete a profile
A company maintains several different LDAP directory servers to contain a registry of user IDs and passwords. How can an administrator make all of the user IDs and passwords in these directories available to WebSphere security?
Configure a federated repositow including all of the LDAP directory servers.
A developer informs an administrator that a servlet in one of the Web modules of a new enterprise application needs to load its own version of some common Java classes provided by WebSphere Application Server. In order to ensure that this version of classes are only visible to the Web module, the administrator should:
instruct the developer to place the jar files containing the classes in the Web modules WEB- INF/libdirectory and select Classes loaded with local class loader first on the settings page for the Web modulesclass loader.
Where can administrator find binding information for an application?
In the deployment descriptors
Global security is turned on for a federated cell using a file-based federated repository. The administrator created a new security domain called App1Domain using local operating system registry and mapping it to the application server. The administrator also created a new local operating system user ID App1Admin. Which one of the following is true when the new security domain is enabled to secure Application1?
The administrator can disable Applicationl security.
Which of the following will force a JVM thread dump.
Using the wsadmin command prompt: jvm = AdminControl.completeServerNameList("type:JVM,process:server1,*") AdminControl.invoke(jvm, "dumpAllThreads")
Which one of the following actions best describes how to remove application-scoped resources from an enhanced EAR file?
Remove the META--INF/ibmconfig directory
A developer informs an administrator that a servlet in one of the Web modules of a new enterprise application needs to access code in a native library. The administrator creates a shared library and adds the native library to its Native library path. What else does the administrator need to do to ensure that the servlet can access the native library without risk of an UnsatisfiedLinkError? Using the administrative console, select:
Use an isolated class loader for this shared library on the shared library settings page and associate theshared library with the Web modules class loader.
In a test cell which has WebSphere global security disabled, an administrator has created a service integration bus (SIBus) with security enabled for testing applications that use messaging resources. Now the administrator needs to enable security on the bus for further testing. Which of the following tasks must be performed to enable security on the bus?
Enable administrative security for the cell.
In Order for a deployment manager to participate in a flexible management environment, which one uf the following steps must be completed?
First register with a local administrative agent, and then register with the job manager.
An administrator is troubleshooting a communication problem between two application sewers, on different nodes (node-A and node-B), within a cell that has administrative security enabled. Based on prior investigation, they believe that the problem involves a missing signing certificate on node-B. What should be done to verify this theory?
Verify that the CellDefaultTrustStore has the appropriate signing certificates in it and run the syncNodescript on node-B.
In a Java EE application, how are servlets protected?
How does the administrator enable verbose garbage collection? Use:
the wsadmin script.
the -verbose:gc command-line option.
the -Xoptionsfile command-line option with appropriate text file.
If a deployed application is mapped to a Web server, an updated plug-in configuration file must be generated and propagated. By viewing the plug-in configuration file, how can an administrator determine if the mapping was successful? There will be a:
URI element under UriGroup With a Name attribute equal to the context root of the mapped application.C Server element under ServerCluster with a Name attribute equal to the .ear file of the mappedapplication.D VirtualHost element under VirtualHostGroup with a Name attribute equal to the assigned port number ofthe mapped application.
In order to verify that a server has started successfully and all of its components have initialized without throwing any exceptions, what steps should an administrator perform?
Examine the SystemOut.log file for the current server process.
How would an administrator enable the collection of performance data by using the administrative console?
On the Configuration tab for the sewer, click Performance Monitoring Infrastructure (PMI) underPerformance, and then select the Enable Performance Monitoring Infrastructure (PMI) checkbox.
An administrator would like to use the Centralized Installation Manager (CIM) to install WebSphere Application Server Network Deployment V7.0 on a remote Solaris host. The Solaris host has been updated with all the required operating system patches. What is the next step the administrator must perform?
Configure an installation target for the Solaris host.
Aside from the administrative console and the addNode command, what other facilities does WebSphere Application Server provide for federating nodes into cells?
The Profile Management Tool (PMT)
When configuring a servers diagnostic trace service, in order to have trace level data written to the trace log, which one of the following tasks must be performed?
Set the log detail level to fine, finer, finest or all.D Use a trace string specification of com.ibm.*=detail.
In addition to the normal process for assembling an application, which one of the following tasks must be performed if the EAR file contains a Web services-enabled module?
Generate deployment code for the application.
When backing up WebSphere Application Server configuration and runtime settings, which of the following commands would be relevant?
manageprofiles -backupProfile -profileName profile_name -backupFile backupFile_name.
A security specialist for a WebSphere Application Server Network Deployment V7.0 cell is concerned about the data within the audit records. To protect the data, they configure audit record encryption using a keystore called AuditkeyStore which contains a new certificate called AuditCertificate. With that done, what is now needed to view the data?
The password to the AuditkeyStore
An administrator notices that the <profile_root>/logs directory is filling up with heapdump and javacore files. Before analyzing these files, what should the administrator do to determine which application components might be causing these files to be dumped?
Examine the application servers SystemErr.log and look for OutOfMemoryError exceptions and stacktraces.
An administrator has created a deployment manager profile. However, the administrator chose not to create the Centralized Installation Manager (CIM) repository and populate it with the WebSphere Application Server Network Deployment V7.0 product files. If, in the future, the administrator wants to use the Centralized Installation Manager to install WebSphere Application Server Network Deployment V7.0 on a remote host, which of the following tasks will be necessary?
Create the CIM repository using the Installation Factory.
An administrator wants to configure HTTP session replication, Stateful Session bean replication, and the Dynamic cache for members of a cluster. Which of these consumers should share a replication domain?
HTTP Session replication and Stateful Session Bean replication
Which of the following is an option given in the First Steps application that runs automatically after installation?
Start the sewer.
An administrator has defined a connection factory, jms/CF, which is required by an application that runs on a cluster. Three of the clusters four members run the application without error. On the fourth member, a NameNotFoundException is thrown attempting to look up jms/CF. The administrator uses the dumpNameSpace command to examine the namespace of the fourth member and verifies that jms/CF is not in the namespace. What is the most likely cause?
The administrator has not defined the jms/CF connection factory at a scope visible to the fourth clustermember.
Which of the following thread pools are managed by WebSphere Application Server?
Web container thread pool
ORB container thread pool
The application accesses an external resource using a J2C adaptor. The security credential for the external resource authentication has changed. Which one of the following should be updated?
J2C authentication data.