Exam4Training

IBM C1000-174 IBM WebSphere Application Server Network Deployment v9.0.5 Administrator Online Training

Question #1

Which component dynamically allocates resources to applications based on demand in an intelligent management framework?

  • A . Resource Scheduler
  • B . Load Balancer
  • C . Policy Director
  • D . Application Controller

Reveal Solution Hide Solution

Correct Answer: A
Question #2

What is the purpose of a load balancer in the deployment of applications?

  • A . Ensuring application compatibility
  • B . Managing application updates
  • C . Distributing incoming network traffic across multiple servers
  • D . Securing data during deployment

Reveal Solution Hide Solution

Correct Answer: C
Question #3

An administrator installed an enterprise application in fast mode and noticed that the application is failing because J2EE roles have not been mapped.

How can this issue be resolved?

  • A . Re-deploy the application.
  • B . Request that the application developer create an enhanced .ear file which has roles mapped, and deploy the enhanced .ear file.
  • C . Map a security role to the user/group for the application using the Integrated Solutions Console, save changes, and restart the application.
  • D . Map a security role to the user runAs roles for the application using the Integrated Solutions Console, save changes, and restart the application.

Reveal Solution Hide Solution

Correct Answer: C
Question #4

An administrator has removed a node, but all the resources associated with the deleted node still exist.

What can the administrator do to ensure the node configuration is removed from the cell repository?

  • A . Run the command syncNoode.
  • B . Refederate and remove the node.
  • C . Run the command cleanupNode.
  • D . Perform node synchronization via the Integrated Solutions Console.

Reveal Solution Hide Solution

Correct Answer: C
Question #5

Which of the following is NOT a version control system?

  • A . Git
  • B . Subversion (SVN)
  • C . Docker
  • D . Mercurial

Reveal Solution Hide Solution

Correct Answer: C
Question #6

What is the purpose of a "build tool" in software development?

  • A . To create documentation
  • B . To generate reports
  • C . To compile, test, and package code
  • D . To design user interfaces

Reveal Solution Hide Solution

Correct Answer: C
Question #7

What is needed on order to integrate IBM WebSphere Application Serve security and third-party security servers?

  • A . Set up a Trust Association.
  • B . Create a new session cookie definition.
  • C . Enable Java Authentication SPI (JASPI).
  • D . Implement a custom single sign on token.

Reveal Solution Hide Solution

Correct Answer: A
Question #8

What is a common method for achieving high availability in a network?

  • A . Load Balancing
  • B . Debugging
  • C . Single-Point-of-Failure
  • D . Bottlenecking

Reveal Solution Hide Solution

Correct Answer: A
Question #9

An administrator has made a configuration change to a server in network deployment topology.

Which statement describes the synchronization process in this scenario?

  • A . Configuration changes on a server are prohibited
  • B . Node agent synchronizes its files with the master repository
  • C . Configuration changes are maintained on the node’s master repository
  • D . Node agent synchronizes its files with the master repository when the deployment manager is restarted

Reveal Solution Hide Solution

Correct Answer: C
Question #10

What aspect characterizes a multi-tier environment?

  • A . Single-layered system
  • B . Centralized data processing
  • C . Division of functionalities into separate layers
  • D . Lack of user interaction

Reveal Solution Hide Solution

Correct Answer: C

Question #11

Which of the following is true about certificate expiration monitoring?

  • A . Must be run manually.
  • B . Must be run on the deployment manager.
  • C . Deletes the certificates after they are expired, but does not replace them.
  • D . Can replace expired certificates or certificates in the expiration threshold with a new certificate

Reveal Solution Hide Solution

Correct Answer: D
Question #12

What is a Cell in the context of IBM WebSphere Application Server Network Deployment?

  • A . It is a single instance of WebSphere.
  • B . It is a combination of multiple application servers.
  • C . It represents a grouping of physical servers.
  • D . It refers to a collection of administrative agents.

Reveal Solution Hide Solution

Correct Answer: B
Question #13

Which of the following is a package manager for JavaScript?

  • A . npm
  • B . Pip
  • C . Composer
  • D . Maven

Reveal Solution Hide Solution

Correct Answer: A
Question #14

Which tool can be used to collect data to be used for monitoring and tuning the environment?

  • A . Thread and Monitor Dump Analyzer
  • B . Performance Monitoring Infrastructure
  • C . IBM Tivoli Performance Viewer Advisor
  • D . Garbage Collection and Memory Visualizer

Reveal Solution Hide Solution

Correct Answer: B
Question #15

When adding a repository to a federated repository configuration, which type of repository can be added only using wsadmin commands?

  • A . File repository
  • B . LDAP repository
  • C . SAML repository
  • D . Database repository

Reveal Solution Hide Solution

Correct Answer: D
Question #16

How can an administrator deploy or update an EAR, JAR, WAR, or SAR file to an application server or cluster in a development environment?

  • A . Place the file in the monitored directory.
  • B . Place the file in the operating system defined temporary directory.
  • C . Place the file in the operating system defined user home directory for the user that owns the Java process.
  • D . Email the file to wasadmin@hostname.com, where hotname.com is the host of the IBM WebSphere Application Server.

Reveal Solution Hide Solution

Correct Answer: A
Question #17

Which step must be completed when placing an application edition in validation mode?

  • A . Roll out the new edition.
  • B . Stop the currently active edition.
  • C . Create routing policies for the new edition.
  • D . Verify that three cluster members are used in the task.

Reveal Solution Hide Solution

Correct Answer: C
Question #18

What is the primary function of the Deployment Manager in IBM WebSphere Application Server Network Deployment?

  • A . It manages applications across multiple servers.
  • B . It serves as the primary web server.
  • C . It is responsible for hosting the database.
  • D . It controls the routing of HTTP requests.

Reveal Solution Hide Solution

Correct Answer: A
Question #19

In an intelligent management setup, what does "Autonomic Computing" primarily aim to achieve?

  • A . Automated and self-configuring systems
  • B . Manual and fixed system configurations
  • C . Reducing network speed
  • D . Static allocation of resources

Reveal Solution Hide Solution

Correct Answer: A
Question #20

How would an administrator configure Cross Component Trace?

  • A . Through wsadmin script only
  • B . Through the Integrated Solutions Console only
  • C . Through the supplied Cross Component Trace enablement tool
  • D . Through either the Integrated Solutions Console or through wsadmin script

Reveal Solution Hide Solution

Correct Answer: D

Question #21

Which is true when an administrator properly updates a single file within an application?

  • A . The administrator can use a partial application update.
  • B . The administrator must redeploy the full application file.
  • C . The administrator can manually update the file on the file system.
  • D . The administrator must uninstall the application, and then, reinstall with the updated application file.

Reveal Solution Hide Solution

Correct Answer: D
Question #22

In a three-tier architecture, what is the relationship between the presentation, application, and data tiers?

  • A . They are independent and do not interact
  • B . Each tier communicates directly with the other two
  • C . Only the presentation tier interacts with the application tier
  • D . The data tier is isolated from the other two tiers

Reveal Solution Hide Solution

Correct Answer: B
Question #23

Which deployment approach involves packaging an application and its dependencies into a single unit for seamless deployment and execution?

  • A . Containerization
  • B . Virtualization
  • C . Multi-tenancy
  • D . Monolithic Deployment

Reveal Solution Hide Solution

Correct Answer: A
Question #24

What are two automated administrative tasks that can be done with configuration checkpoints? (Select two.)

  • A . delete
  • B . restore
  • C . archive
  • D . backup
  • E . compress

Reveal Solution Hide Solution

Correct Answer: A D
Question #25

Which attack involves an attacker intercepting communication between two parties, secretly altering it, and then relaying it?

  • A . Man-in-the-Middle (MitM) attack
  • B . Trojan horse attack
  • C . Ransomware attack
  • D . Buffer overflow attack

Reveal Solution Hide Solution

Correct Answer: A
Question #26

If a printer fails to print after being installed, what might be a potential cause?

  • A . Low ink levels
  • B . Insufficient paper in the tray
  • C . Printer driver issues or connection problems
  • D . Network firewall blocking printing

Reveal Solution Hide Solution

Correct Answer: C
Question #27

Which factor is often monitored to assess the availability and response time of a website or service?

  • A . Uptime
  • B . Energy consumption
  • C . RAM allocation
  • D . Network bandwidth

Reveal Solution Hide Solution

Correct Answer: A
Question #28

What does the term "Garbage Collection" refer to in software performance optimization?

  • A . Disposing of unused memory objects
  • B . Reducing processor load
  • C . Optimizing network bandwidth
  • D . Upgrading software versions

Reveal Solution Hide Solution

Correct Answer: A
Question #29

Which of the following is true about creating multiple security domains?

  • A . A new security domain can be created only using the administrative console.
  • B . Global security must be enabled before creating new multiple security domains.
  • C . Only users assigned to the security-admin role can create new multiple security domains.
  • D . If a unique name for the domain is not specified, the system will automatically create one.

Reveal Solution Hide Solution

Correct Answer: C
Question #30

A administrator has configured memory to memory (M2M) session persistence for a large WebSphere Application Server ND cluster with a dedicated data replication service (DRS) domain.

How can they keep the DRS domain secure?

  • A . Select encryption type DES and TRIPLE_DES.
  • B . Select DCS-Secure as transport chain under Core Group name.
  • C . Nothing needs to be done, the environment is secured when using M2M session persistence.
  • D . Select encryption type DES and TRIPLE_DES and regenerate the encryption key periodically.

Reveal Solution Hide Solution

Correct Answer: B

Question #31

What state must an application edition be in before it can be started?

  • A . Active
  • B . InActive
  • C . Validation
  • D . Deactivated

Reveal Solution Hide Solution

Correct Answer: B
Question #32

Which of the following could be diagnosed using one of the Diagnostic tools in the IBM Support Assistant?

  • A . Port conflicts
  • B . Capacity problems
  • C . Network performance problems
  • D . Operating system prerequisites

Reveal Solution Hide Solution

Correct Answer: A
Question #33

Which of the following is a potential consequence when using an external session management store over a server level store?

  • A . A server level store makes a smaller footprint.
  • B . Only half the current sessions can be saved externally.
  • C . External session management stores can use additional system resources.
  • D . Using an external session management store takes 10X as long to rebuild the session after a failure.

Reveal Solution Hide Solution

Correct Answer: C
Question #34

Which tool is commonly used to automate the deployment of applications in a server environment?

  • A . Jenkins
  • B . Photoshop
  • C . Microsoft Excel
  • D . Slack

Reveal Solution Hide Solution

Correct Answer: A
Question #35

Which technique involves creating redundant systems that can immediately take over if the main system fails?

  • A . Parallel Processing
  • B . Data Mirroring
  • C . Clustering
  • D . Replication

Reveal Solution Hide Solution

Correct Answer: C
Question #36

Which process involves configuring and managing software, applying updates, and ensuring application availability in a live environment?

  • A . Development
  • B . Deployment
  • C . Application Administration
  • D . Debugging

Reveal Solution Hide Solution

Correct Answer: C
Question #37

An administrator wants to verify an IBM WebSphere Application Server installation by examining the installation’s directory structure. In this example, <WAS_installation_directory> indicates the installation’s root directory.

What is one directory tree structure that indicates a successful installation of the product files?

  • A . <WAS_installation_directory>/web
  • B . <WAS_installation_directory>/bin
  • C . <WAS_installation_directory>/profiles
  • D . <WAS_installation_directory>/installableApps

Reveal Solution Hide Solution

Correct Answer: B
Question #38

What does "CPU utilization" refer to in the context of system monitoring?

  • A . The percentage of time the CPU is executing processes
  • B . The frequency at which the CPU accesses memory
  • C . The capacity of the CPU cache
  • D . The rate of data transfer between the CPU and peripherals

Reveal Solution Hide Solution

Correct Answer: A
Question #39

What information must the system administrator have to successfully tune a connection pool?

  • A . The requests per second that occur during a peak.
  • B . The MaxConnections and WaitingCount values.
  • C . The number of concurrent requests waiting for a connection.
  • D . How long the database takes to respond to SELECT operations only.

Reveal Solution Hide Solution

Correct Answer: D
Question #40

Which tool is commonly used for remotely administering servers or workstations?

  • A . PowerShell
  • B . Notepad
  • C . WinZip
  • D . Google Chrome

Reveal Solution Hide Solution

Correct Answer: A

Question #41

If an administrator dynamically generates a plugin-cfg file after setting up high availability automatic generation, what will be the results?

  • A . The dynamic generation issues a propagation request.
  • B . The dynamic generation creates a second plugin-cfg file.
  • C . The dynamic generation overwrites the intelligent management settings.
  • D . An error message is shown that cannot be dynamically generated.

Reveal Solution Hide Solution

Correct Answer: C
Question #42

Heapdumps, javacores, and system cores are recommended to be generated for which kind of IBM WebSphere Application Server problems?

  • A . Slow page rendering
  • B . High CPU and disk I/O
  • C . Slow File uploads and downloads
  • D . System hangs and out of memory

Reveal Solution Hide Solution

Correct Answer: B
Question #43

What feature in intelligent management allows servers to join or leave a cluster without disrupting the system?

  • A . Elastic Clustering
  • B . Static Membership
  • C . Dynamic Scaling
  • D . Failover Mechanism

Reveal Solution Hide Solution

Correct Answer: A
Question #44

In WebSphere Application Server Network Deployment, what does the term ‘Node’ refer to?

  • A . A physical server.
  • B . A specific machine hosting application server instances.
  • C . An administrative console.
  • D . A container for web applications.

Reveal Solution Hide Solution

Correct Answer: B
Question #45

What must be done to delete one or more files from an application when using a partial application update?

  • A . Manually delete the files from the file system (on all nodes if clustered).
  • B . Supply the paths to the files that should be deleted in the administrative console.
  • C . Include a META-INF/ibm-partialapp-delete.props in the partial application update file.
  • D . Select the files that need to be deleted in the file selector section of the form for the partial application update.

Reveal Solution Hide Solution

Correct Answer: C
Question #46

Which tool is used to remotely access another system’s desktop?

  • A . Telnet
  • B . SSH
  • C . RDP
  • D . SNMP

Reveal Solution Hide Solution

Correct Answer: C
Question #47

What is a benefit of using the IBM Extended Cache Monitor?

  • A . It invalidates cacheids.
  • B . It displays the contents of the cache instances.
  • C . It displays the contents of object cache instances.
  • D . It displays the dependency ids of the cache instances.

Reveal Solution Hide Solution

Correct Answer: C
Question #48

Which type of fix would typically be downloaded to address a specific problem?

  • A . Interim fix
  • B . Cumulative fix
  • C . Product fix pack
  • D . Cumulative interim fix

Reveal Solution Hide Solution

Correct Answer: A
Question #49

What does the term "Continuous Integration" refer to in the context of deploying applications?

  • A . Continuous testing of applications
  • B . Continuous and automated integration of code changes into a shared repository
  • C . Continuous deployment of applications to production servers
  • D . Continuous monitoring of application performance

Reveal Solution Hide Solution

Correct Answer: B
Question #50

What does the “Update all” selection install by default if no further action is taken?

  • A . All updates are installed for all installed package groups.
  • B . All updates for only the selected package group are installed.
  • C . Only recommended updates for all installed package groups are installed.
  • D . Only recommended updates for the selected package groups are installed.

Reveal Solution Hide Solution

Correct Answer: A

Question #51

Which concept involves deploying and maintaining multiple independent instances of an application for different clients or user groups?

  • A . Microservices
  • B . Monolithic Architecture
  • C . Multi-tenancy
  • D . Single-Tenant Deployment

Reveal Solution Hide Solution

Correct Answer: C
Question #52

Which tool can be used to get dynamic cache size details and monitoring and tuning suggestions?

  • A . Request metrics
  • B . Performance servlet
  • C . Performance and Diagnostic Advisor
  • D . IBM Tivoli Performance Viewer advisor

Reveal Solution Hide Solution

Correct Answer: D
Question #53

An administrator would like to uninstall an instance of a multiple instance installation via response file.

How does the administrator ensure that the correct instance is uninstalled?

  • A . All the features must be listed.
  • B . The profile ID must point to the correct instance.
  • C . The offering ID must point to the correct instance.
  • D . The repository location must point to the correct instance.

Reveal Solution Hide Solution

Correct Answer: D
Question #54

If an administrator sets the regenerate time for high availability plug-in generation to 10, what is the effect?

  • A . The plugin-cfg file is generated exactly every 10 minutes.
  • B . The plugin-cfg file is generated at most every 10 minutes.
  • C . The plugin-cfg file is generated 10 minutes after a rebuild request.
  • D . The plugin-cfg file is generated after doing a poll every 10 minutes.

Reveal Solution Hide Solution

Correct Answer: B
Question #55

Which encryption protocol is commonly used for securing internet communication?

  • A . WEP
  • B . SSH
  • C . HTTPS
  • D . FTPS

Reveal Solution Hide Solution

Correct Answer: C
Question #56

Which of the following is true regarding disk offload?

  • A . The amount of disk space to use cannot be specified.
  • B . On server startup, DynaCache loads the entire disk cache into memory.
  • C . The number of cache entries that are offloaded to disk cannot be specified.
  • D . Disk offload can be enabled to have a cache entry copied to the file system at a configurable location.

Reveal Solution Hide Solution

Correct Answer: A C D
Question #57

Which of the following is an allowed sharing policy in the cachespec.xml?

  • A . delete
  • B . replicate
  • C . syndicate
  • D . not-shared

Reveal Solution Hide Solution

Correct Answer: D
Question #58

What is the default programming model for application development in WebSphere Application Server?

  • A . Servlets and JSP
  • B . EJBs
  • C . JavaBeans
  • D . Spring Framework

Reveal Solution Hide Solution

Correct Answer: A
Question #59

How would an administrator analyze Cross Component Trace output?

  • A . Use the logViewer command to review the information
  • B . Review the SystemErr.log files to review the information.
  • C . Use the Integrated Solutions Console to review the information.
  • D . Use the included Cross Component Trace servlet to review the information.

Reveal Solution Hide Solution

Correct Answer: A
Question #60

When configuring a dynamic cluster, which option can improve bottleneck conditions in deployed applications by enabling the placement controller to start more than one instance of the dynamic cluster on a node?

  • A . Automatic mode
  • B . Vertical stacking
  • C . Number of server instances
  • D . Custom dynamic server template

Reveal Solution Hide Solution

Correct Answer: B

Question #61

After executing the command: imcl listInstalledPackages, an administrator sees the following result: com.ibm.websphere.ND.v90_9.0.0.20160203_0234.

What does this indicate to the administrator?

  • A . IBM Installation Manager was installed.
  • B . Installation Manager installed IBM WebSphere Application Server.
  • C . The Profile Management Tool installed WebSphere Application Server.
  • D . WebSphere Customization Toolbox installed WebSphere Application Server.

Reveal Solution Hide Solution

Correct Answer: B
Question #62

An administrator configures an IBM DB2data source at cell scope. The environment variable DB2UNIVERSAL_JDBC_DRIVER_PATH is configured at cluster scope.

The data source test connection on one node succeeds, but fails on the other node with java.lang.ClassNotFoundException:com.ibm.db2.jcc.DB2ConnectionPoolDataSource.

Which of the below is the likely cause for the exception?

  • A . The data source is configured at cell scope.
  • B . Multiple driver JARs are installed on the second node.
  • C . DB2UNIVERSAL_JDBC_DRIVER_PATH is configured at cluster scope.
  • D . A different version of the JDBC driver JAR does not exist on the second node.

Reveal Solution Hide Solution

Correct Answer: C
Question #63

When updating an application, what is important to keep in mind?

  • A . The application is only updated during the next server restart.
  • B . The application is automatically stopped, updated, and restarted.
  • C . The application is only updated during the next restart of the application.
  • D . The application is stopped, updated, and restarted at the scheduled time.

Reveal Solution Hide Solution

Correct Answer: B
Question #64

When enabling SSL directives in the IBM HTTP Server configuration file, which parameter is required?

  • A . The name of the key file
  • B . The AllowOverride statement
  • C . The IP address of the VirtualHost
  • D . The DocumentRoot directory path

Reveal Solution Hide Solution

Correct Answer: A
Question #65

Which metric is commonly used to measure the responsiveness of a system under a given workload?

  • A . Throughput
  • B . Latency
  • C . Bandwidth
  • D . Capacity

Reveal Solution Hide Solution

Correct Answer: B
Question #66

Which protocol is commonly used for secure shell access and secure file transfers?

  • A . FTP
  • B . SSH
  • C . Telnet
  • D . HTTP

Reveal Solution Hide Solution

Correct Answer: B
Question #67

Which two ways are valid ways to install applications to IBM WebSphere Application Server? (Select two.)

  • A . wsadmin script
  • B . JMS messaging
  • C . IBM Installation Manager
  • D . IBM Tivoli Access Manager
  • E . Integrated Solutions Console

Reveal Solution Hide Solution

Correct Answer: A E
Question #68

To write a Jython script to stop a running application server, an administrator should use which administrative object?

  • A . AdminApp
  • B . AdminTask
  • C . AdminConfig
  • D . AdminControl

Reveal Solution Hide Solution

Correct Answer: D
Question #69

Which of the following is true for federated Repositories?

  • A . Does not support identity profiles
  • B . Provides read only capability for the registries.
  • C . Supports one registry only in a realm within a cell
  • D . Supports multiple repositories in a realm within a cell

Reveal Solution Hide Solution

Correct Answer: D
Question #70

An administrator is using the Guided Troubleshooter in the IBM Support Assistant to troubleshoot IBM WebSphere Application Server issues. After going through data collection and analysis, no reliable solution is found.

What is the administrator’s best next step?

  • A . Call in a new PMR with IBM and upload Troubleshooter data to ECuREP.
  • B . Open a new PMR with IBM and upload SystemOut.log from the IBM WebSphere Application Server.
  • C . Submit results to the IBM WebSphere Application Server forum for a quick response from other forum users.
  • D . Use the Guided Troubleshooter to open a service request with IBM, so all the troubleshooting data analyzed so far is uploaded automatically.

Reveal Solution Hide Solution

Correct Answer: A

Question #71

When installing interim fixes, which of the following is a valid repository option?

  • A . Main repository
  • B . Local repository
  • C . Secured repository
  • D . Compressed repository

Reveal Solution Hide Solution

Correct Answer: D
Question #72

What data source property can an administrator configure to minimize the chances of encountering StaleConnectionExceptions?

  • A . Minimum connections = 0
  • B . Reap Timeout < Unused Timeout
  • C . Purge Policy = FailingConnectionOnly
  • D . Unused Timeout > Half firewall timeout

Reveal Solution Hide Solution

Correct Answer: A
Question #73

After enabling High Performance Extensible Logging (HPEL), which configuration change will improve performance?

  • A . Enabling HPEL Text logging
  • B . Disabling HPEL Text logging
  • C . Increasing Maximum log size
  • D . Disabling Log record buffering

Reveal Solution Hide Solution

Correct Answer: B
Question #74

Which is true statement regarding the Administrative security role and its purpose?

  • A . The Admin Security Manager has the ability to map other users to applications.
  • B . The Admin Security Manager has the ability to map other users to administrative roles.
  • C . The Integrated Solutions Console administrator has ability to map other users to applications.
  • D . The Integrated Solutions Console administrator has ability to map other users to administrative roles.

Reveal Solution Hide Solution

Correct Answer: D
Question #75

What is something an administrator needs to keep on mind regarding the relationship between an IBM WebSphere Application Server install and an IBM Installation Manager install?

  • A . IBM Installation Manager should be used in GUI mode.
  • B . IBM Installation Manager can be uninstalled and reinstalled without impacting WebSphere Application Server
  • C . IBM Installation Manager repository information points to the install location of Websphere Application Server
  • D . IBM Installation Manager can be used by either a user with administrator privileges or a regular user to administer the same installation

Reveal Solution Hide Solution

Correct Answer: B
Question #76

What is the significance of a ‘Cluster’ in WebSphere Application Server Network Deployment?

  • A . It refers to a group of interconnected databases.
  • B . It is used to synchronize Deployment Managers.
  • C . It provides high availability and scalability.
  • D . It represents the configuration settings for LDAP.

Reveal Solution Hide Solution

Correct Answer: C
Question #77

Which statement is true when synchronizing a web server in a cell topology?

  • A . Web server are managed servers and can be synchronized.
  • B . Web server are unmanaged nodes and can be synchronized.
  • C . Web server are managed nodes and cannot be synchronized.
  • D . Web server are unmanaged servers and cannot be synchronized.

Reveal Solution Hide Solution

Correct Answer: D
Question #78

What happens when the JDBC data source prepared statement cache is full?

  • A . The cache size is increased to accommodate new entries.
  • B . Old entries in the cache are discarded to make room for new ones.
  • C . The cache switches to a different storage mechanism for new entries.
  • D . The cache is paused and entries are not added to it until it is emptied.

Reveal Solution Hide Solution

Correct Answer: B
Question #79

How can the administrator change the console session expiration for the Integrated Solutions Console?

  • A . Modify timeout value and run the timeout.jacl script.
  • B . Set the timeout value in the Console Preferences panel.
  • C . Use the settimeout wsadmin command and specify the value.
  • D . Set the ConnectionResponseTimeout value in the Integrated Solutions Console.

Reveal Solution Hide Solution

Correct Answer: A
Question #80

When deploying a new edition of an application, which edition rollout configuration option should be used to ensure that the two editions of the application are not active at the same time?

  • A . Atomic
  • B . Grouped
  • C . Soft reset
  • D . Hard reset

Reveal Solution Hide Solution

Correct Answer: A

Question #81

Which of the following can be queried to get PMI data?

  • A . Server Cell
  • B . JMX Connectors
  • C . MBean ObjectNames
  • D . Application ServerNames

Reveal Solution Hide Solution

Correct Answer: C
Question #82

What can an administrator use to remotely manage multiple stand-alone (unfederated) application servers?

  • A . Job Manager
  • B . Administrative agent
  • C . Deployment manager
  • D . remoteServer.jaclscript

Reveal Solution Hide Solution

Correct Answer: A
Question #83

Which programming language is often used in configuration management tools like Chef and Puppet?

  • A . Java
  • B . Ruby
  • C . C++
  • D . Swift

Reveal Solution Hide Solution

Correct Answer: B
Question #84

What is the primary purpose of an Application Server in the deployment of applications?

  • A . Managing user authentication
  • B . Running applications and providing runtime environments
  • C . Storing application data
  • D . Controlling network traffic

Reveal Solution Hide Solution

Correct Answer: B
Question #85

Which process involves identifying and resolving software, hardware, or network-related issues that affect system performance?

  • A . Debugging
  • B . System Formatting
  • C . Code Refactoring
  • D . Version Control

Reveal Solution Hide Solution

Correct Answer: A
Question #86

Which factor is critical for achieving scalability in application deployment?

  • A . Single point of failure
  • B . Redundant resources
  • C . Fixed application architecture
  • D . Static configurations

Reveal Solution Hide Solution

Correct Answer: B
Question #87

Which protocol is commonly used for secure file transfer in a networked environment?

  • A . HTTP
  • B . FTP
  • C . SSH
  • D . SMTP

Reveal Solution Hide Solution

Correct Answer: C
Question #88

Which security measure involves transforming plain text into an unreadable form using a key?

  • A . Encoding
  • B . Decryption
  • C . Encryption
  • D . Hashing

Reveal Solution Hide Solution

Correct Answer: C
Question #89

Which component in a network environment manages IP addresses and domain names?

  • A . DHCP Server
  • B . DNS Resolver
  • C . FTP Server
  • D . HTTP Proxy

Reveal Solution Hide Solution

Correct Answer: A
Question #90

What does the principle of "Least Privilege" refer to in security?

  • A . Providing every user with maximum privileges
  • B . Limiting user access rights to the minimum necessary to perform their tasks
  • C . Allowing unrestricted access to sensitive data
  • D . Granting access based on job titles

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version