Term
What can be done in the First Steps application that can be run after installation? |
|
Definition
Starting the server, Running an installation verification test (IVT), Running the Profile Management Tool (PMT) |
|
|
Term
____ can be used to instantiate resource adapter classes for establishing and maintaining resource connections |
|
Definition
|
|
Term
global security is turned on for a federated cell using a file-based federated repository. The administrator created a new security domain called App1Domain using local operating system registry and mapping it to the application server. The administrator also created a new local operating system user ID App1Admin When the new security domain is enabled to secure Application1, who can disable Application1 security? |
|
Definition
|
|
Term
What three facilities does Websphere Application Server provide for federating nodes into cells? |
|
Definition
the admin console, the addNode command, and the Profile Management tool |
|
|
Term
What is the command to backup WAS configuration and runtime settings |
|
Definition
manageprofiles -backupProfile profile_name -backupFile file_name |
|
|
Term
What can the system administrator do to distribute incoming HTTP traffic across a farm of Web servers? |
|
Definition
Use the Load Balancer component of the Edge Components |
|
|
Term
What is the sequence of components which would typically be involved in the flow of a request from a Web browser to a servlet? |
|
Definition
External HTTP Server, HTTP Server Plug-in, embedded HTTP Server and Web Container |
|
|
Term
An administrator can manage multiple stand-alone application servers on different hosts in a network by using a _____ which administers multiple application server nodes through _______ |
|
Definition
job manager, administrative agents |
|
|
Term
Which type of server is recommended to be placed in the demilitarized zone (DMZ)? |
|
Definition
|
|
Term
What is the advantage of deploying more than one messaging engine and linking them together in a topology that has multiple interconnected service integration buses (SIBus)? |
|
Definition
To spread messaging workload across multiple servers |
|
|
Term
What is the purpose of node groups in a distributed environment? |
|
Definition
To enable mixed nodes with different capabilities within the same cell for administration purposes |
|
|
Term
To decrease the response time and system load of a Web application in a clustered environment, the system administrator may attempt to: |
|
Definition
configure dynamic caching |
|
|
Term
If a system administrator needs to modify the configuration of an enterprise application within a flexible management environment using wsadmin, which component(s) will he need to connect to? |
|
Definition
The job manager or the deployment manager |
|
|
Term
_____ would have to be configured in order to implement memory-to-memory HTTP Session persistence |
|
Definition
distributed environment settings in the web containers |
|
|
Term
When configuring automated transaction peer recovery for recovering in-flight transactions from the transaction log, _______ is required from the file system |
|
Definition
lease-based exclusive locks on files |
|
|
Term
Three possible replication types for the dynamic caching service |
|
Definition
Not shared, push only, both push and pull |
|
|
Term
What is the Data Replication Service (DRS) used for? 3 things |
|
Definition
dynamic cache replication, HTTP session persistence failover, and stateful session EJB persistence and failover |
|
|
Term
Flexible management can be _______ to the network deployment cell model |
|
Definition
|
|
Term
In order for a deployment manager to participate in a flexible management environment, it must: |
|
Definition
register directly with the job manager |
|
|
Term
What is a reason to perform an unattended installation of WAS? |
|
Definition
The installation has been done before and will be repeated in the future |
|
|
Term
How is the response file specified in a silent installation scenario? |
|
Definition
Included as a command-line option on the install command |
|
|
Term
Name two steps a system administrator could do to verify a successful installation of WAS |
|
Definition
Run the installation verification tool with a success message, and login in successfully to the administrative console |
|
|
Term
The only way to delete a profile is with this tool? |
|
Definition
The manageprofiles command-line tool |
|
|
Term
What are three ways in which the Profile Management Tool can be run? |
|
Definition
Run the command from the command line Select Profile Management Tool from the First Steps application Check the Create a new WebSphere Application Server profile using the Profile Management Tool option at the end of the installation process |
|
|
Term
What conclusion can be resolved from an INSTCONFSUCCESS code in the WAS primary installation log? |
|
Definition
WAS installed successfully |
|
|
Term
A system administrator is installing WebSphere Application Server for the first time and was surprised that the Profile Management Tool (PMT) did not have the expected profile type options, as stated in the Information Center. What is most likely the cause? |
|
Definition
The system administrator is installing a variant of WebSphere Application Server that is not Network Deployment. |
|
|
Term
An administrator would like to use the Centralized Installation Manager (CIM) to install WebSphere Application Server Network Deployment V7.0 on a remote Solaris host. The Solaris host has been updated with all the required operating system patches. What is the next step the administrator must perform? |
|
Definition
Configure an installation target for the Solaris host |
|
|
Term
An administrator has created a deployment manager profile. However, the administrator chose not to create the Centralized Installation Manager (CIM) repository and populate it with the WebSphere Application Server Network Deployment V7.0 product files. If, in the future, the administrator wants to use the Centralized Installation Manager to install WebSphere Application Server Network Deployment V7.0 on a remote host, what might be done? |
|
Definition
Create the CIM repository using the Installation Factory |
|
|
Term
Applications that need to create additional persistent bindings of objects associated with a specific node can bind those objects under the ______ namespace partition. |
|
Definition
|
|
Term
_____ in WAS allows applications to obtain references to objects such as EJB homes. |
|
Definition
|
|
Term
In addition to the normal process for assembling an application, ______ must be performed if the EAR file contains a Web services-enabled module. |
|
Definition
generating deployment code for the application |
|
|
Term
How would you remove the application-scoped resources from an enhanced EAR file? |
|
Definition
By removing the META-INF/ibmconfig directory |
|
|
Term
In a Java EE application, how are EJB resources protected? |
|
Definition
|
|
Term
In a Java EE application, how are servlets protected? |
|
Definition
|
|
Term
To use a message-driven bean (MDB) to communicate with the default messaging provider, the administrator must create _______. |
|
Definition
a JMS activation specification |
|
|
Term
To create a pool of connections that an application can use to interact with a database, the administrator must create _______. |
|
Definition
|
|
Term
Resources that are defined at more specific scopes ______ duplicate resources that are defined at more general scopes. |
|
Definition
|
|
Term
Resources such as JDBC providers, namespace bindings, or shared libraries can be defined at ______ scope. |
|
Definition
|
|
Term
An application which uses JMS clients will be deployed to a stand-alone application server. Messages will be produced by a session EJB and consumed by a message-driven bean (MDB) via a queue destination. What JMS resources must be configured by an administrator to support this application? |
|
Definition
queue, connection factory, activation specification |
|
|
Term
A network deployment cell contains a single cluster of application servers, but no stand-alone servers. An application which uses JMS clients will be deployed to the cluster. In order for the clients to produce and consume messages with default messaging, an administrator must ___________ |
|
Definition
add the cluster as a member to a service integration bus (SIB) |
|
|
Term
When an administrator creates a service integration bus (SIB) destination, he must assign the destination to __________ |
|
Definition
|
|
Term
The following information must be provided when an administrator creates a JMS destination queue or topic to connect to a specific service integration bus: |
|
Definition
The JMS provider type, bus name, and bus destination |
|
|
Term
What is the command to execute a wsadmin script file in WAS? |
|
Definition
|
|
Term
The _____ administrative object is used to deploy applications in WAS within wsadmin. |
|
Definition
|
|
Term
In order to ensure that requests are routed through the web server to reach a web application deployed in WAS: |
|
Definition
an updated plugin-cfg.xml must be generated and propagated to the web server |
|
|
Term
How is the plug-in configuration file viewed from the WebSphere Application Server administrative console? |
|
Definition
From the web servers list, select a particular web server. In the properties view, click Plug-in properties. Click View next to the Plug-in configuration file name. |
|
|
Term
If a deployed application is mapped to a Web server, an updated plug-in configuration file must be generated and propagated. By viewing the plug-in configuration file, how can administrator determine if the mapping was successful? |
|
Definition
There will be a URI element under UriGroup with a Name attribute equal to the context root of the mapped application |
|
|
Term
What changes will be seen in the plug-in configuration file when a new cluster member is added to WAS? |
|
Definition
There will be a new Server element under ServerCluster with a Name attribute which includes the new cluster member's name. |
|
|
Term
A developer informs an administrator that a servlet in one of the Web modules of a new enterprise application needs to access code in a native library. The administrator creates a shared library and adds the native library to its Native library path. What else does the administrator need to do to ensure that the servlet can access the native library without risk of an UnsatisfiedLinkError? |
|
Definition
Use an isolated class loader for this shared library on the shared library settings page and associate the shared library with the web modules class loader |
|
|
Term
A developer informs an administrator that a servlet in one of the Web modules of a new enterprise application needs to load its own version of some common Java classes provided by WebSphere Application Server. In order to ensure that this version of classes are only visible to the Web module, the administrator should: |
|
Definition
instruct the developer to place the jar files containing the classes in the Web modules WEB-INF/lib directory and select Classes loaded with local class loader first on the settings page for the Web modules class loader. |
|
|
Term
It is determined that a single class loader is needed for all of the modules in all of the enterprise applications on an application server. What action should the administrator take to implement this? |
|
Definition
Set the classloader policy on the application server to single |
|
|
Term
A developer informs an administrator that a servlet in one of the Web modules of a new enterprise application needs to access code in a native library. The administrator creates a shared library and adds the native library to its Native library path? With which class loader should the shared library be associated so that the servlet can access the native library without risk of an UnsatisfiedLinkError? |
|
Definition
The application server's class loader |
|
|
Term
A federated cell has two nodes, Node01 and Node02. Global Security is turned on and is using a file based user registry. Node01 has servers A, B, C and D. A developer has deployed a new security check-in application to servers A and D. As a security requirement, this new application is required to use local operating system registry for user authentications. What is the most direct way to enable this secured application? |
|
Definition
Create a security domain and scope it to application server A and D |
|
|
Term
Can the SIB messaging engine be managed with fine-grained administration? |
|
Definition
|
|
Term
The application accesses an external resource using a J2C adaptor. The security credential for the external resource authentication has changed. What needs to be updated? |
|
Definition
The J2C authentication data |
|
|
Term
Before an administrator can create method permissions for an EJB, he must: |
|
Definition
define one or more security roles |
|
|
Term
How are Java EE 5 security permissions assigned to actual users in WAS? |
|
Definition
By mapping application roles to users or groups within the Websphere user registry |
|
|
Term
In order to enable security on a service integration bus that uses messaging resources, _____ must first be enabled. |
|
Definition
administrative security for the cell |
|
|
Term
A JMS client needs to access a secured service integration bus using a connection factory. What must be done to grant the client permission to access the bus? |
|
Definition
Map the connection factory's authentication alias to the bus connector role. |
|
|
Term
An administrator needs to set up a new employee with administrative access to an existing WebSphere cell. What administrative security roles must the administrator have in order to grant the new employee operator access? |
|
Definition
The Admin Security Manager role is required so that the administrator can assign new users to administrative roles. |
|
|
Term
In order to configure auditing within a Websphere cell, what must be used? |
|
Definition
An administrative user account that has auditor role access. |
|
|
Term
An administrator is troubleshooting a communication problem between two application servers, on different nodes (node-A and node-B), within a cell that has administrative security enabled. Based on prior investigation, they believe that the problem involves a missing signing certificate on node-B. What should be done to verify this theory? |
|
Definition
Verify that the CellDefaultTrustStore has the appropriate signing certificates in it and run the syncNode script on node-B. |
|
|
Term
An administrator adds a new node to a cell. They then add a new cluster member to that node. What should the administrator do to best ensure that the Web servers will be able to communicate with the new cluster members securely? |
|
Definition
Propagate the new plug-in keystores to the appropriate directories on each of the existing Web server machines. |
|
|
Term
A company maintains several different LDAP directory servers to contain a registry of user IDs and passwords. How can an administrator make all of the user IDs and passwords in these directories available to Websphere security? |
|
Definition
Configure a federated repository including all of the LDAP directory servers |
|
|
Term
During installation, administrative security was enabled using the default file-based repository. After installation, the administrator must change the password that was provided during the installation. How can this password be changed? |
|
Definition
Use the Manage Users page in the administrative console and change the primary administrative users password. |
|
|
Term
An administrator manages a cell that is configured to use an LDAP server for its user registry. But, there are several cases where he needs certain application servers to authenticate against a file based registry. How can this be accomplished? |
|
Definition
Configure Global security to use an LDAP registry and create a new security domain with a user realm definition for the file based registry and assign it to the desired application servers. |
|
|
Term
In creating a security plan, an architect needs to consider how to use multiple security domains within a Websphere cell. What scopes can be considered? What scope would not be appropriate to consider? |
|
Definition
nodes, servers, clusters enterprise applications |
|
|
Term
An administrator has enabled security auditing for the WebSphere Application Server. They wish to view the audit records in order to verify that it is working properly. Which tool would best allow them to view the audit data? |
|
Definition
wsadmin, using the AdminTask.binaryAuditLogReader command |
|
|
Term
A security specialist for a WebSphere Application Server Network Deployment V7.0 cell is concerned about the data within the audit records. To protect the data, they configure audit record encryption using a keystore called AuditKeyStore which contains a new certificate called AuditCertificate. With that done, what is now needed to view the data? |
|
Definition
The password to the AuditKeyStore |
|
|
Term
Username and password are specified as parameters for the addNode command to authenticate with: |
|
Definition
the deployment manager if its administrative security is enabled. |
|
|
Term
When adding a new member to a cluster, why is it necessary for an administrator to select the option for generating unique HTTP ports? |
|
Definition
To avoid port conflicts with other servers on the same node |
|
|
Term
An administrator creates a horizontal cluster and deploys an application that uses several EJBs. How can the administrator ensure that EJB client requests are routed to the same node on which the client resides? |
|
Definition
Enable the prefer local option for the cluster. |
|
|
Term
A J2EE application maintains information in the HTTP session in memory. This information can be recreated, but there is a performance penalty to restore state if a user session fails over to a different cluster member. Which feature maximizes the use of information already stored in a server's session? |
|
Definition
Session affinity in the Web server plugin |
|
|
Term
A user is taken through a series of Web pages in an online store and eventually checks out to complete his purchase. In the event of a server failure, the user should not have to repeat a step that has already been performed. Which session management strategy is best suited if the user cannot tolerate a loss in session information? |
|
Definition
Database persistence to external datastore |
|
|
Term
An administrator has created a cluster, C1, and configured memory-to-memory HTTP session replication. How can the administrator best ensure that every HTTP session is replicated on all members of the cluster? |
|
Definition
In the Replication domain settings for the C1 replication domain, set the Number of Replicas to the entire domain. |
|
|
Term
An administrator wants to configure HTTP session replication, Stateful Session bean replication, and the Dynamic cache for members of a cluster. Which of these consumers should share a replication domain? |
|
Definition
HTTP session replication and stateful session bean replication |
|
|
Term
An administrator wishes to control an Apache Web server on a remote host via the WebSphere Application Server Network Deployment administrative console. What must be done to accomplish this? (two things) |
|
Definition
Configure a web server definition in the administrative console. Configure a managed node on the remote host. |
|
|
Term
An administrator wants to run a Web server on an unmanaged node with no administrative process. What does this mean for the plugin config file? |
|
Definition
It must be manually propagate to the web server host. |
|
|
Term
A cluster, Cluster1, is a member of the service integration bus (SIBus) Bus1 and the host of a queue destination Destination1. When Cluster1 was added to Bus1, the High availability messaging engine policy was selected. An administrator will deploy an application containing an MDB, MDB1, onto Cluster1. The MDB will listen to Destination1. In order to allow MDB1 instances on all cluster members to get messages from Destination1, the administrator should: |
|
Definition
enable the option Always activate MDBs in all servers on MDB1s activation specification. |
|
|
Term
A cluster with 5 servers is configured as a member of a service integration bus (SIBus) using the Scalability with high availability messaging engine policy. What are the possible numbers of messaging engines that might be running on an individual server in the cluster? |
|
Definition
|
|
Term
A cluster, Cluster1, contains application servers Server1 and Server2. Cluster1 is configured as a member of service integration bus (SIBus) Bus1 using the High availability messaging engine policy. A messaging engine (ME) for Bus1 starts up on Server1, then Server1 crashes. An ME for Bus1 will: |
|
Definition
start on Server2 and continue running on Server2 even after Server1 has recovered. |
|
|
Term
(True/False) A cluster can run multiple messaging engines for a single service integration bus (SIBus). |
|
Definition
|
|
Term
(True/False) A service integration bus (SIBus) destination can only exist on a single messaging engine |
|
Definition
|
|
Term
(True/False) A single service integration bus (SIBus) can span multiple WebSphere Application Server cells. |
|
Definition
|
|
Term
(True/False) A WebSphere Application Server Network Deployment cell can only contain a single service integration bus (SIBus). |
|
Definition
|
|
Term
A cluster, Cluster1, contains two servers, Server1 and Server2. Server1 has a weight of 2 and Server2 has a weight of 4. A single web server is used to route HTTP requests to Cluster1. The web server is started and receives 3 HTTP requests for an application deployed on Cluster1. Assuming no session affinity, how many requests will the plug-in route to Server2? |
|
Definition
|
|
Term
A cluster, Cluster1, contains two servers, Server1 and Server2. Server1 has a weight of 20 and Server2 has a weight of 4. A single web server is used to route HTTP requests to Cluster1. The web server is started and receives 4 HTTP requests for an application deployed on Cluster1. If the requests are all part of the same HTTP session, and the first request is routed to Server2, how many requests are routed to Server1? Why? |
|
Definition
0, due to session affinity |
|
|
Term
(True/False) Session management can persist session-related information in several ways. |
|
Definition
|
|
Term
(True/False) Multiple requests from the same browser, each specifying a unique Web application, result in a single session with multiple session IDs. |
|
Definition
|
|
Term
(True/False) When an HTTP client interacts with a servlet, the state information associated with a series of client requests is represented as a SSL ID. |
|
Definition
|
|
Term
(True/False) The high availability (HA) manager is responsible for managing HTTP sessions, providing storage for session data, allocating session IDs, and tracking the session ID associated with each client request. |
|
Definition
|
|
Term
Where can an administrator find binding information for an application? |
|
Definition
In the deployment descriptors |
|
|
Term
What does backupConfig back up? |
|
Definition
|
|
Term
An application has poor performance. On examining verbose GC information the administrator notices that 70KB objects frequently cannot be allocated due to heap fragmentation, requiring time-consuming heap compaction. What is likely to improve performance? |
|
Definition
Increase the size of the large object area (LOA). |
|
|
Term
How does the administrator enable verbose garbage collection? |
|
Definition
Use the wsadmin script, or the -verbose:gc command-line option, or the Xoptionsfile command-line option with appropriate text file. |
|
|
Term
An application server has runtime provisioning enabled. What is the benefit of it? |
|
Definition
It reduces server start time and memory footprint. |
|
|
Term
Peformance of a database is degrading due an intensive database application. The administrator suspects that the JDBC connection pool is not properly tuned. Which performance tools should the administrator use for problem determination? |
|
Definition
Request metrics The Tivoli Performance Viewer (TPV) |
|
|
Term
An application spends 90% of its time in a complex servlet and the rest (10%) of time in a short JDBC query. On average, only 10% of the servlets are using database connections at any time. The application starts to perform poorly after a new batch of users are introduced to the system. What measures should the administrator recommend to determine the root cause of the problem? |
|
Definition
View advice messages in Tivoli Performance Viewer by clicking the Advisor link |
|
|
Term
What thread pools are managed by WAS? |
|
Definition
Web container thread pool and ORB container thread pool |
|
|
Term
What type of data is collected by request metrics? |
|
Definition
individual transactions, recording the processing time for each component |
|
|
Term
Which performance monitoring tool is the most appropriate for monitoring the overall health of WAS? |
|
Definition
Tivoli Performance Viewer |
|
|
Term
What would enable the collection of performance data for an application server if Performance Monitoring Infrastructure (PMI) is not enabled? |
|
Definition
Using wsadmin, invoke the setInstrumentationLevel operation on the PerfMBean. |
|
|
Term
How would an administrator enable the collection of performance data by using the administrative console? (ie How is PMI turned on?) |
|
Definition
On the Configuration tab for the server, click Performance Monitoring Infrastructure (PMI) under Performance, and then select the Enable Performance Monitoring Infrastructure (PMI) checkbox. |
|
|
Term
To install fix packs to remote hosts using the Centralized Installation Manager (CIM), the administrator must download the update installer for the appropriate platforms into: |
|
Definition
the WebSphere Application Server Network Deployment cells CIM repository. |
|
|
Term
An administrator wants to update a WebSphere Application Server installation to the latest fix pack. The installation has no feature packs installed. Which fix packs does the administrator need to download and install? |
|
Definition
The application server fix pack and the SDK fix pack |
|
|
Term
As part of a diagnostic data collection plan, an administrator must gather server JVM logs and archive them every week. How can the administrator configure a server so that the logs are available for weekly archiving? |
|
Definition
Use appropriate settings for log rotation and number of historical logs. |
|
|
Term
An administrator notices that the /logs directory is filling up with heapdump and javacore
files. Before analyzing these files, what should the administrator do to determine which application
components might be causing these files to be dumped? |
|
Definition
Examine the application servers SystemErr.log and look for OutOfMemoryError exceptions and stack traces. |
|
|
Term
In order to verify that a server has started successfully and all of its components have initialized without throwing any exceptions, what steps should an administrator perform? |
|
Definition
Examine the SystemOut.log file for the current server process. |
|
|
Term
Does FFDC affect the performance of WAS? |
|
Definition
|
|
Term
An administrator has been asked by IBM Support to gather diagnostic trace data relevant to a problem involving some components of the application server. How should the administrator prepare to gather the data? |
|
Definition
Configure Diagnostic Trace for the server by selecting that the trace output be written to a file. |
|
|
Term
When configuring a servers diagnostic trace service, in order to have trace level data written to the trace log, what task must be performed? |
|
Definition
Set the log detail level to fine, finer, finest or all. |
|
|
Term
An administrator has defined a connection factory, jms/CF, which is required by an application that runs on a cluster. Three of the clusters four members run the application without error. On the fourth member, a NameNotFoundException is thrown attempting to look up jms/CF. The administrator uses the dumpNameSpace command to examine the namespace of the fourth member and verifies that jms/CF is not in the namespace. What is the most likely cause? |
|
Definition
The administrator has not defined the jms/CF connection factory at a scope visible to the fourth cluster member. |
|
|
Term
The administrator ran into a memory leak problem. A .phd file was produced when an OutOfMemoryError occurred. Verbose:gc output indicated the heap was exhausted after running a period of 10 hours. Which tool is recommended for analyzing the memory problem? |
|
Definition
Memory Dump Diagnostic for Java (MDD4J) |
|
|
Term
Data replication service (DRS) is turned on for replicating in-memory data among WebSphere processes. During peak load, the developer found an OutOfMemoryError in the log. The developer suggests turning off data replication service (DRS). What services would be impacted? |
|
Definition
Stateful session EJB persistence and failover, HTTP session persistence and failover, Dynamic cache replication |
|
|
Term
An application server is hung and has to be killed and restarted by the administrator. In order to troubleshoot the server hang problem, the administrator decides to reproduce the hang condition and trigger thread dumps for further analysis. What is the most effective way to collect the thread dump data? |
|
Definition
Wait for the thread monitor to signal a possible hung thread, then take three thread dumps several seconds apart. |
|
|
Term
How can an administrator force a JVM thread dump? |
|
Definition
Using the wsadmin command prompt: jvm = AdminControl.completeServerNameList("type=JVM,process=server1,*") AdminControl.invoke(jvm, "dumpThreads") |
|
|
Term
Due to network problems, the IBM Support Assistant (ISA) Agent is not available. Which service will be inoperable? |
|
Definition
Remote debugging, data collection and file transfer |
|
|
Term
An application server is producing heap dumps. Which tool in IBM Support Assistant (ISA) is used to perform analysis on the heap dump? |
|
Definition
Memory Dump Diagnostic for Java |
|
|