C2180-401 - IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile, System Administration

Go back to IBM

Example Questions

A system administrator has created a cluster containing two servers in a same node. The administrator did not select the option Generate unique HTTP ports during the creation of the cluster members. After the cluster creation, the administrator changed the HTTP port of the second cluster member to 9081. Testing the servers using the snoop servlet directly to the server's HTTP port, the administrator got the following error message for the second server; SRVE0255E: A WebGroup/Virtual Host to handle server2:9081 has not been defined How can the administrator fix this problem? A system administrator needs to install WebSphere Application Server using response files, so that silent install can be done. The administrator has ensured that all required prerequisites have already been installed and, has downloaded and expanded the required WebSphere Application Server installation files. What can the administrator run to install the product? A system administrator has added a server cluster as a member of a service integration bus (SIB). The administrator needs to configure one messaging engine for each server in this cluster and to have a failover location for each messaging engine. What should the administrator do to achieve the required design? A system administrator has configured a cluster containing 40 servers. The cluster members all belong to one core group. While examining the log files, the administrator notices that the core group coordinator is consuming abnormally high amounts of memory and CPU resources. How can the system administrator reduce the memory and CPU resource usage of the core group coordinator? A system administrator needs to install WebSphere Application Server Network Deployment V8.5.5 multiple times and would like to automate the task of installing the product. The administrator wants to create a response file based on an initial installation and use this for future installations. How can the administrator accomplish this task? The installation of WebSphere Application Server did not complete successfully, and a system administrator needs to troubleshoot the installation. What can the administrator do to identify the cause of the installation failure? A developer created an enterprise application which contained data source and security role information. The developer asked a system administrator to install this application to an application server where global security is enabled using the Integrated Solutions Console (ISC). A new data source was configured at the server scope for the use of this application. While load testing the application, the developer noticed that the attributes configured on the new data source were ignored by the application server. How can the administrator ensure that the attributes configured on the new data source are used by the application server? There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configuration role access to a developer for a single application deployed in that cluster. How should the administrator meet this requirement and restrict Configuration role access for a single application? A system administrator needs to create a cell for a test environment. The administrator uses the Profile Management Tool (PMT) to create the deployment manager profile using the advanced profile creation option and creates a custom profile using the typical profile creation option. The administrator examines the log files for the custom profile creation and sees an INSTCONFFAIL message indicating the deployment manager was not running during the custom profile creation. How should the administrator fix this? An organization updated their LDAP directories and modified user roles. The roles that were configured to have access to a highly secured enterprise application were deleted and new roles with new names were created. The application then had security related exceptions. How can a system administrator resolve the exceptions and restore security for the application? A web application was deployed on a WebSphere Application Server cluster. While users are using the application, one of the cluster servers fails and the users lose their working data. What can the system administrator configure to ensure users can continue to work if one of the cluster servers fails? A system administrator completed a WebSphere Application Server installation by using the Installation Manager. During installation, all defaults were selected for the installation root directories and the shared resources directory. Over time, the administrator has updated the installation with various interim fixes and fix packs. The administrator notices that the shared resources directory is very large in size and grows larger each time the Installation Manager is run. How can the administrator decrease the size and remove some of the content from the shared resources directory? A system administrator, Admin1, with Administrator privileges has archived full repository checkpoints. Another administrator, Configurator1, with Configurator privileges has copied the checkpoint contents directory from one of the archived check points to its original location. Configurator1 tries to restore the configuration using the copied archived checkpoint contents and the restore fails. How can Configurator1 restore the configuration using the copied archived full repository checkpoint? A system administrator was asked by the development team to inform them of any warning message which contains a string "Connection" on a WebSphere Application Server with High Performance Extensible Logging (HPEL) enabled. What should the administrator do to continuously monitor logs for the required message? A system administrator is required to monitor the application server logs for heap memory issues and determine if the heap memory usage is reaching close to 70% of the maximum heap. The application server is configured with an initial heap of 256 MB and a max heap of 1 GB. How should the administrator determine if the application server is utilizing 70% of the max allocated heap memory? The application placement controller has been configured with elasticity mode enabled. Intermittently, all instances of a dynamic cluster are removed. After further review, the system administrator noticed that it occurs during peak load on another dynamic cluster. The administrator wants to keep at least one instance available. Which configuration is needed in the dynamic clusters? A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured. How should the administrator accomplish this? A system administrator has deployed web applications to a clustered environment where database session persistence is configured. The administrator needs to improve the response time and the throughput. How can the system administrator do this? An EJB application posts a request message into a JMS destination and waits for a response message on a different JMS destination. To correlate the response message to the request message, the application uses the JMS correlation ld of the message. The application waits up to five seconds for a response before timing out the request. A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the request message, process it and post a response message. The destinations are defined in a Service Integration Bus (SIB) within the cell. Intermittent timeout exceptions have occurred for the requester application. How can a system administrator correlate and analyze the debug information from both requester and consumer applications? While monitoring a cluster in the cell, the administrator notices that one server in the cluster periodically loses connections to the database. When this happens, requests to the server have a significantly decreased response time and various error conditions are listed in the log files for the server. Since the error codes are returned quickly, the server starts returning responses faster than the average service times for the application. Due to this, the weight for the server is increased and a large percentage of incoming requests are being routed to the erroneous server and the server is getting overloaded with requests. How can the administrator detect these conditions in the future and take action to prevent this problem? A system administrator needs to deploy a new enterprise application which requires that application security be enabled, but, the existing applications in the cell cannot be executed with application security enabled. The cell has the global security and Java 2 security disabled. How can the administrator handle this requirement? After collecting diagnostic trace from a server running under a cell, a system administrator noticed that the trace files contained sensitive information. To avoid this issue in the future, what can the administrator do? The computer where a federated node was running had a failure and cannot be recovered. A system administrator wants to recreate the node with the same configurations in another computer. Which steps should the administrator execute in order to recover the damaged node? An application deployed to a multi-node cluster is reported to have slowness and hung threads. A system administrator is asked to review the logs on each node and identify if the hung threads are a false alarm. How can the administrator determine that the hung threads are a false alarm? Analyze the: A system administrator needs to view the list of certificates for unmanaged web server located on a remote system. How should the administrator do this? A system administrator has deployed an application. The development team has updated a new version of this application. The administrator needs to immediately deploy this updated application and guarantee that only this new edition is used by clients and that any service requests for the application are queued during the deployment of the new application. How can the administrator achieve this task without any downtime to the application? A system administrator is asked by a development team to monitor the performance of a newly deployed EJB application. The administrator noticed that the heap size of the application server is growing. What should the administrator do to fix the problem using ORB settings? A WebSphere Application Server cell was configured with a deployment manager node and a custom node. An operator manually changed some configuration files in the custom node, and the node became out of synch with the master repository. The system administrator used the Synchronize button in the system administration session of the Integrated Solutions Console (ISC) to try to resynchronize the node, but the node remained out of sync. What should the administrator do to fix it? A performance test team was testing the capacity of concurrent users of a web application deployed on a multi-processor server. While testing 250 concurrent users, the administrator discovers connections to the database are failing. In response, a system administrator increased the connection pool to the maximum limit which the database allows and increased the prepared statement cache size. The test passed, but the application response time was slower. How should the system administrator tune the data source properties to improve the application response time? A system administrator is tasked with monitoring the overall health of the WebSphere environment to be able to tune the environment properly. Specifically, the administrator was asked to: · Monitor how much time is spent in the various parts of the environment. · Determine the concurrent usage of the site. · Identify potential memory leaks. Which PMI modules can the administrator examine to obtain this data? How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the server's file system? A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changes so users only have to log in once, while keeping the above-mentioned timeouts the same. The authentication mechanism available is Kerberos. How should the administrator do this? A system administrator needs to trigger a javacore only when a Java. net. Socket Timeout Exception is encountered in real time. What does the administrator have to configure to trigger the javacore dump? A system administrator decides to use the advice from the Performance and Diagnostic Advisor to identify the optimum connection pool settings for data sources. In a cell, the data source db2datasource is defined under node scope and used by two servers from that node. The administrator receives two different sets of advice for db2datasource. . One set of advice suggests to increase the maximum connection pool size for db2datasource. . The other suggests reducing the maximum connection pool size for db2datasource. How should the administrator configure the data sources before reusing the Performance and Diagnostic Advisor? A system administrator in a bank was asked by business users to determine the most accessed JSP page in a web application at normal work load for marketing purpose. Which tool should the administrator use to find the most used JSP page? In a test environment, a system administrator has configured an external HTTP server in the DMZ that is routing to a cluster of application servers. The administrator wants to achieve higher performance when routing and prioritizing incoming requests to the back-end cluster. How can the system administrator achieve this task? A system administrator ran the backup Config command to backup the configuration using the - nostop option. The administrator changed the properties for the service integration environment by modifying the sib.properties file. During testing the administrator noticed Service Integration Bus related errors and wanted to restore the service integration environment. The administrator used the restore config command, but the tuning properties for the service integration environment were not restored. How can the administrator prevent this issue? A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization. How can a system administrator fix the issue ensuring only authorized access? A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users. What should the administrator do to implement the required security configuration? A system administrator has installed WebSphere Application Server Network Deployment V8.5.5 using the silent installation process and needs to verify that the installation completed successfully. What does the administrator need to do to verify a successful installation? Which one of the following options describes the runtime flow starting from the client browser in a clustered WebSphere Application Server Network Deployment topology? A system administrator is required to create a star topology for multi-cell performance management for three WebSphere Application Server cells. How should the administrator configure the Application Placement Controller (APC) in a star topology? Configure the cell custom property Center Cell to: A system administrator needs to set a new Liberty profile environment to support an application. What should the administrator do to enable this environment for high availability and scalability of the application? A system administrator suspects that the slow performance of an application might be caused by lock contention. To debug this further, what can the administrator do using IBM Support Assistant?