Exam4Training

IBM C9510-401 IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile, System Administration Online Training

Question #1

A system administrator completed a WebSphere Application Server installation by using the Installation Manager. During installation, all defaults were selected for the installation root directories and the shared resources directory. Over time, the administrator has updated the installation with various interim fixes and fix packs. The administrator notices that the shared resources directory is very large in size and grows larger each time the Installation Manager is run.

How can the administrator decrease the size and remove some of the content from the shared resources directory?

  • A . Manually delete content from the directory.
  • B . During an update, create a new shared resources directory.
  • C . Clear the Delete Saved Files option for the Installation Manager.
  • D . Set the preserve Downloaded Artifacts preference to false.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

http://www-01.ibm.com/support/knowledgecenter/SSAW57_7.0.0/com.ibm.websphere.installation.soafepnd.doc/info/ae/ae/tins_installfp_dist.html?lang=en (Shared resources directory)

Question #2

A system administrator ran the backup Config command to backup the configuration using the -nostop option. The administrator changed the properties for the service integration environment by modifying the sib.properties file. During testing the administrator noticed Service Integration Bus related errors and wanted to restore the service integration environment. The administrator used the restore config command, but the tuning properties for the service integration environment were not restored.

How can the administrator prevent this issue?

  • A . Use full repository checkpoints for both the backup and the restore.
  • B . Use the restore config command with -nostop for the restore.
  • C . Use the manage profiles command for both the backup and the restore.
  • D . Use the backup config command without -nostop for the backup Use the restore config command without -nostop for the restore.

Reveal Solution Hide Solution

Correct Answer: B
Question #3

A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.

What should the administrator do to implement the required security configuration?

  • A . Install and configure a TAI (Trust Association Interceptor)
  • B . Configure a security domain for the stand-alone LDAP server.
  • C . Use Federated repositories and configure the supported entity types.
  • D . Use Stand-alone custom registry and configure the flat file implementation.

Reveal Solution Hide Solution

Correct Answer: C
Question #4

A system administrator has added a server cluster as a member of a service integration bus (SIB). The administrator needs to configure one messaging engine for each server in this cluster and to have a failover location for each messaging engine.

What should the administrator do to achieve the required design?

  • A . Configure a new messaging engine in each server to support failover.
  • B . Configure the data store for each messaging engine for each server in the cluster.
  • C . Select scalability with high availability as the messaging engine policy.
  • D . Create a core group policy to restrict each messaging engine to a particular server.

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

The scalability with high availability configuration ensures that there is a messaging engine for each server in a cluster, and that each messaging engine has a failover location.

http://www-01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5/com.ibm.websphere.nd.doc/ae/cjt1004_.html (second paragraph)

Question #5

A system administrator wants to learn some of the Python scripting commands for the administration of the environment.

Which product feature should the administrator use?

  • A . The wsadmin.properties file to load a profile.
  • B . The AdminTask object to generate wsadmin scripts.
  • C . The guided activities panel from the Integrated Solutions Console (ISC).
  • D . The "Log command assistance commands" option in the Integrated Solutions Console (ISC).

Reveal Solution Hide Solution

Correct Answer: D
Question #6

A system administrator has created a Python script called globalScript. py.

What should the administrator do to ensure globalScript. py is loaded when the wsadmin shell is used?

  • A . Compile globalScript.py to a Java class in the bin directory.
  • B . Invoke wsadmin with the argument-profileName globalScript.py.
  • C . Modify the configureCustomProperty script to import globalScript. py.
  • D . Set the script profiles in the wsadmin.properties file to load globalScript .py.

Reveal Solution Hide Solution

Correct Answer: D
Question #7

A system administrator has created a Python script that will run in WebSphere Network cell where administrative security is enabled.

This script is named doUpdate.py and will be run by using the following:

wsadmin -connType RMI -f doUpdate.py

How can the administrator suppress a user/password prompt from appearing when this script is run? Set the user and password in the:

  • A . sas.client.props file.
  • B . ssl.client.props file.
  • C . soap.client.props file.
  • D . wsadmin.properties file.

Reveal Solution Hide Solution

Correct Answer: D
Question #8

A system administrator runs a Python script that creates and configures several servers and realizes that the script fails before completing. Although many tasks succeeded, they are rolled back when the script fails.

Before running the script again, what can the administrator add to the script after each task so the completed tasks are committed even if other tasks fail?

  • A . AdminApp.update ()
  • B . AdminConfig.save()
  • C . AdminControl.invoke(server, ‘sync’)
  • D . AdminTask.backupJobManager(‘server’)

Reveal Solution Hide Solution

Correct Answer: C
Question #9

An application deployed to a multi-node cluster is reported to have slowness and hung threads. A system administrator is asked to review the logs on each node and identify if the hung threads are a false alarm.

How can the administrator determine that the hung threads are a false alarm?

Analyze the:

  • A . ffdc logs
  • B . SystemErr.log
  • C . SystemOut.log
  • D . native_stderr.log

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Problem (Abstract)

The SystemOut.log contains a WSVR0605W message, also called a hung thread message. A javacore, or thread dump on Solaris and HP-UX, is needed in order to determine how to resolve the potentially hung threads.

Cause

WebSphere Application Server attempts to report potentially hung threads using the hung thread detector. Depending on how the hung thread detector policy is configured, a thread running for a certain interval (default 10 minutes) might be reported as hung and a WSVR0605W message is printed in the SystemOut.log file:

WSVR0605W: Thread <threadname> has been active for <time> and may be hung. There are <totalthreads> in total in the server that may be hung.

References: https://www-01.ibm.com/support/docview.wss?uid=swg21448581

Question #10

A system administrator suspects that the slow performance of an application might be caused by lock contention.

To debug this further, what can the administrator do using IBM Support Assistant?

  • A . Analyze the running server using IBM Monitoring and Diagnostic Tools for Java C Health Center.
  • B . Collect a javacore and analyze it using IBM Monitoring and Diagnostic Tools for Java C Health Center.
  • C . Collect three thread dumps at equal time intervals and analyze them using IBM Monitoring and Diagnostic Tools for Java C Dump Analyzer.
  • D . Collect three system dumps at equal time intervals and analyze them using IBM Monitoring and Diagnostic Tools for Java C Memory Analyzer.

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

The IBM Monitoring and Diagnostic Tools for Java – Health Center is a lightweight tool that monitors active IBM Virtual Machines for Java with minimal performance overhead. The Health Center suggests live tuning recommendations for Garbage Collection, profiles methods including call stacks, and highlights contended locks. This information can help you optimize performance, improve stability and optimize system resource usage.

The tool is provided in two parts:

References: https://www.ibm.com/support/knowledgecenter/SS3KLZ/com.ibm.java.diagnostics.healthcenter.doc/homepage/plugin-homepage-hc.html

Question #11

A system administrator was asked by the development team to inform them of any warning message which contains a string “Connection” on a WebSphere Application Server with High Performance Extensible Logging (HPEL) enabled.

  • A . Configure log detail levels to include filter on “Connection” string.
  • B . Use the Log Viewer in the administrative console with filter on “Connection” string.
  • C . Use the logviewer.sh or logviewer.bat command with appropriate options.
  • D . Use the Log Viewer in the administrative console with filter on “Connection” string and enable the “Refresh automatically” feature.

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

The High Performance Extensible Logging (HPEL) facility writes to the log and trace repositories in a binary format. You can view, query and filter the repository using the LogViewer command.

logviewer.sh -monitor -includeLoggers Connection

-monitor [integer]Specifies that you want the logViewer to continuously monitor the repository and output new log record entries as they are created. You can provide an optional integer argument after this parameter to specify how often you want the LogViewer tool to query the repository for new records. By default the logViewer queries the repository for new records every 5 seconds. When used with other filtering options, only those new records that match the filter criteria are displayed.

References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/rtrb_logviewer.html

Question #12

A system administrator is required to monitor the application server logs for heap memory issues and determine if the heap memory usage is reaching close to 70% of the maximum heap. The application server is configured with an initial heap of 256 MB and a max heap of 1 GB.

How should the administrator determine if the application server is utilizing 70% of the max allocated heap memory?

  • A . Check the System logs for OutOfMemoryErrors.Trigger a heap dump from the Integrated Solutions Console (ISC).Analyze the heap dump.
  • B . Configure WebSphere Application Server to enable verbose garbage collection.Analyze the garbage collection cycles in the native logs.
  • C . Configure Initial heap to be equal to the max heap.Trigger a heap dump from the Integrated Solutions Console (ISC).Analyze the heap dump.
  • D . Configure WebSphere Application Server to increase max heap.Trigger a heap dump from the Integrated Solutions Console (ISC).Analyze the heap dump.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Enabling verboseGC (Garbage Collection) output is often required when diagnosing issues with WebSphere Application Server. Because verboseGC data is critical to troubleshooting memory and performance problems and the overhead is generally very low, you may want to consider proactively enabling it in your environment.

References: http://www-01.ibm.com/support/docview.wss?uid=swg21114927

Question #13

After collecting diagnostic trace from a server running under a cell, a system administrator noticed that the trace files contained sensitive information.

To avoid this issue in the future, what can the administrator do?

  • A . Configure entries in the ras.rawtracelist.properties.
  • B . Configure suppressSensitiveTrace in the bootstrap.properties file.
  • C . Clear the “Disable logging and tracing of potentially sensitive data” checkbox.
  • D . Add the entry com.ibm.websphere.logging.RawTraceList=off to the end of the trace string.

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

You can either enable or disable the sensitive log and trace guard to help control whether loggers write sensitive information in your log and trace files.

Use the administrative console to enable or disable the sensitive log and trace guard.

Procedure

References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/ttrb_enablesensitivelogtrace.html

Question #14

A system administrator needs to trigger a javacore only when a java,net.SocketTimeoutException is encountered in real time.

What does the administrator have to configure to trigger the javacore dump?

  • A . Configure the JAVA_DUMP_OPTS environment variable to capture javacore for ANYSIGNAL and all exceptions.
  • B . Configure an CXdump:java Generic JVM argument on WebSphere Application Server with the filter for java.net.SocketTimeoutException.
  • C . Code wsadmin script to capture javacore and then execute it after the java.net.SocketTimeoutException has been encountered.
  • D . Use the log filter in HPEL to monitor for java.net.SocketTimeoutException and then gather a javacore dump from the Integrated Solutions Console (ISC).

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Dump agents are set up during JVM initialization. They enable you to use events occurring within the JVM, such as Garbage Collection, thread start, or JVM termination, to initiate one of four types of dump or to launch an external tool. Default dump agents are set up at JVM initialization They are sufficient for most cases, but the use of the -Xdump option on the command line allows more detailed configuration of dump agents. The total set of options and sub-options available under -Xdump is very flexible and there are many examples presented in this chapter to show this flexibility.

Example:

To generate system cores:

-Xdump:system:events=user

References: http://www-01.ibm.com/support/docview.wss?uid=swg21242497

Question #15

An EJB application posts a request message into a JMS destination and waits for a response message on a different JMS destination. To correlate the response message to the request message, the application uses the JMS correlationId of the message. The application waits up to five seconds for a response before timing out the request.

A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the request message, process it and post a response message.

The destinations are defined in a Service Integration Bus (SIB) within the cell.

Intermittent timeout exceptions have occurred for the requester application.

How can a system administrator correlate and analyze the debug information from both requester and consumer applications?

  • A . Enable High Performance Extensible Logging (HPEL).Use HPEL logViewer command to see debug information.
  • B . Enable a diagnostic trace in both requester and consumer servers.Use the Integrated Solutions Console (ISC) to set the admin=all trace.Analyze the trace.
  • C . Enable High Performance Extensible Logging (HPEL).Enable Cross Component Trace (XCT) to include request IDs in log and trace records.Use HPEL logViewer command with appropriate filters to see debug information.
  • D . Using the Integrated Solutions Console (ISC), browse the request message that has timed out and look for any key application data.Search for exceptions using the key application data in both requester and consumer in native_stderr.log and native_stdout.log.

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Cross Component Trace (XCT) annotates the logs so that log entries that are related to a request that is serviced by more than one thread, process, or even server are identified as belonging to the same unit of work. XCT helps identify the root cause of problems across components.

References: WebSphere Application Server V8.5 Administration and Configuration Guide for the Full Profile (July 2013), page 1091

Question #16

A WebSphere system administrator needs to install the Installation Manager (IM) on an unmanaged node on a host named <machine2>. The deployment manager is running on a host named <machine1>.

What step must the administrator take before submitting a job from the Integrated Solutions Console (ISC) to install the IM on <machine2>?

  • A . Install a node agent on <machine2>.
  • B . Install the job manager on <machine1>.
  • C . Start the job manager on <machine1>.
  • D . Register <machine2> as a target for job manager.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Submitting jobs to install Installation Manager on remote hosts

In a flexible management environment, you can submit the Install IBM Installation Manager job to install the Installation Manager on registered hosts of the job manager.

References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.installation.zseries.doc/ae/tagt_jobmgr_install_im.html

Question #17

A system administrator has created a wsadmin script with several steps to install and configure an application and some resources in a WebSphere Application Server process. The script executed but the application was not installed successfully. The administrator suspects that the script has problems.

How can the administrator test and debug the script?

  • A . In WebSphere Application Server Developer Tools for Eclipse, right click on the script file and select Validate from context menu.
  • B . Execute the script using the wsadmin with the option Cconntype NONE and monitor the commandAssistanceJythonCommands.log file.
  • C . Use WebSphere Application Server Developer Tools for Eclipse in the debug perspective connected to the server and execute the script step by step.
  • D . Run the script using wsadmin with these parameters: -lang jython Cjavaoption “-Xdebug” and then execute the logViewer command with the option -listInstances

Reveal Solution Hide Solution

Correct Answer: C
Question #18

A system administrator has been asked to uninstall an application from a cluster running in a WebSphere Application Server Network Deployment cell. This application was installed from the Integrated Solutions Console (ISC). The monitored directory for the cluster is <cluster1_dir>.

What step(s) can the administrator perform to uninstall the application?

  • A . Delete the application file from <cluster1_dir>.
  • B . Stop the running cluster.Delete the application file from <cluster1_dir>.
  • C . Stop the running cluster.Copy the application file to <cluster1_dir>.Delete the application file from <cluster1_dir>.
  • D . Create a properties file to describe the deletion of the application file.Copy the properties file to <cluster1_dir>.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

You can use application properties files to install enterprise application files on a server or cluster, update deployed applications or modules, or uninstall deployed applications or modules. Drag or copy a properties file to a monitored directory and the product performs the deployment action described in the properties file. The enterprise application files that you can install, update, or uninstall using properties files include enterprise archive (EAR), web archive (WAR), Java archive (JAR), and Session Initiation Protocol (SIP) archive (SAR) files.

References: https://www.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.multiplatform.doc/ae/trun_app_install_dragdrop_prop.html

Question #19

A system administrator runs a Jython script that creates and configures several servers and realize that the script fails before completing. Although many tasks succeeded, they are rolled back when the script fails.

Before running the script again, what can the administrator add to the script after each task so the completed tasks are committed even if other tasks fail?

  • A . AdminApp.update()
  • B . AdminConfig.save()
  • C . AdminControl.invoke(server, ‘sync’)
  • D . AdminTask.backupJobManager(‘server’)

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

AdminConfig.save () to save changes after script execution.

Question #20

A system administrator has created a Jython script called globalScript.py.

What should the administrator do to ensure globalScript.py is loaded when the wsadmin shell is used?

  • A . Compile globalScript.py to a Java class in the bin directory.
  • B . Invoke wsadmin with the argument CprofileName globalScript.py.
  • C . Modify the configureCustomProperty script to import globalScript.py.
  • D . Set the script profiles in the wsadmin.properties file to load globalScript.py.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

wsadmin.properties has this entry com.ibm.ws.scripting.profiles where we can add the scripting files to be loaded.

References: https://www-01.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/rxml_propscript.html

Question #21

A system administrator discovers an issue that requires a change to a federated server. In this cell, WebSphere administrative security is enabled, but application security is not enabled.

How should the administrator make this change?

The administrator should use:

  • A . a web browser to connect to the node agent https port.
  • B . a web browser to connect to the deployment manager admin_host port.
  • C . the job manager to submit a job to update the unmanaged server.
  • D . an ssh connection to the node and modify the client_types.xml file.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

The admin_host virtual host is used for access to the WebSphere administrative console.

At installation time, the host is configured to match requests on the wc_adminhost and wc_adminhost_secure ports for the stand-alone server or deployment manager.

References: WebSphere Application Server V8.5 Administration and Configuration Guide for the Full Profile (July 2013), page 303

Question #22

A system administrator has created a Jython script that will run in WebSphere Network cell where administrative security is enabled.

This script is named doUpdate.py and will be run by using the following:

wsadmin CconnType RMI Cf doUpdate.py

How can the administrator suppress a user/password prompt from appearing when this script is run?

Set the user and password in the:

  • A . sas.client.props file.
  • B . ssl.client.props file.
  • C . soap.client.props file.
  • D . wsadmin.properties file.

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

The user Id and password needed for wsadmin to connect to a secured server can be supplied as command line options and in properties files. If used together, command line options take precedence over what is in the properties files. The properties files are located at Profile_root/properties.

If you use a Remote Method Invocation (RMI) connector or a JSR160RMI connector, set the following properties in the sas.client.props file with the appropriate values:

com.ibm.CORBA.loginUserid=

com.ibm.CORBA.loginPassword=

References: https://www.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/txml_security.html

Question #23

A system administrator wants to learn some of the Jython scripting commands for the administration of the environment.

Which product feature should the administrator use?

  • A . The wsadmin.properties file to load a profile.
  • B . The AdminTask object to generate wsadmin scripts.
  • C . The guided activities panel from the Integrated Solutions Console (ISC).
  • D . The “Log command assistance commands” option in the Integrated Solutions Console (ISC).

Reveal Solution Hide Solution

Correct Answer: D
Question #24

Within a WebSphere Application Server Network Deployment cell, a system administrator needs to write a script to determine if a particular server is stopped. It is important that the wsadmin script explicitly return a status of stopped as opposed to just failing.

What wsadmin object should the administrator use to write this script?

  • A . AdminApp
  • B . AdminTask
  • C . AdminConfig
  • D . AdminControl

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Use the AdminControl object to invoke operational commands that manage objects for the application server.

Many of the AdminControl commands have multiple signatures so that they can either invoke in a raw mode using parameters that are specified by Java Management Extensions (JMX), or by using strings for parameters. In addition to operational commands, the AdminControl object supports some utility commands for tracing, reconnecting with a server, and converting data types.

References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/rxml_admincontrol.html

Question #25

A system administrator is tasked with monitoring the overall health of the WebSphere environment to be able to tune the environment properly.

Specifically, the administrator was asked to:

Which PMI modules can the administrator examine to obtain this data?

  • A . Number of requests, Java virtual memory, Average response time
  • B . Number of requests, Average response time, Web server thread pools
  • C . Average response time, Java virtual memory, Number of Live HTTP Sessions
  • D . Average response time, Web server thread pools, Number of Live HTTP Sessions

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Monitoring overall system health. To monitor overall system health, monitor the following statistics at a minimum:

References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/tprf_monitoringhealth.html

Question #26

A system administrator is required to create a star topology for multi-cell performance management for three WebSphere Application Server cells.

How should the administrator configure the Application Placement Controller (APC) in a star topology?

Configure the cell custom property CenterCell to:

  • A . false in all three WebSphere Application Server cells.
  • B . false in one WebSphere Application Server celltrue in the other two WebSphere Application Server cells.
  • C . true in all three WebSphere Application Server cells.
  • D . true in one WebSphere Application Server cellfalse in the other two WebSphere Application Server cells.

Reveal Solution Hide Solution

Correct Answer: D
Question #27

A system administrator has deployed web applications to a clustered environment where database session persistence is configured. The administrator needs to improve the response time and the throughput.

How can the system administrator do this?

  • A . Disable server affinity.
  • B . Configure dynamic caching.
  • C . Configure a load balancer to spread work between existing web servers.
  • D . Tune the database session persistence to optimize for failover.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

The dynamic cache service improves performance by caching the output of servlets, commands, and JavaServer Pages (JSP) files. WebSphere Application Server consolidates several caching activities, including servlets, web services, and WebSphere commands, into one service called the dynamic cache. These caching activities work together to improve application performance and share many configuration parameters that are set in an application server’s dynamic cache service.

References: WebSphere Application Server V8.5 Administration and Configuration Guide for the Full Profile (July 2013), page 512

Question #28

A system administrator decides to use the advice from the Performance and Diagnostic Advisor to identify the optimum connection pool settings for data sources. In a cell, the data source db2datasource is defined under node scope and used by two servers from that node. The administrator receives two different sets of advice for db2datasource.

How should the administrator configure the data sources before reusing the Performance and Diagnostic Advisor?

  • A . Create a data source of the same name under cell scope.
  • B . Create a data source of the same name under server scope for each server.
  • C . Increase the minimum connection pool size for the data source.
  • D . Decrease the maximum connection pool size for the data source.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

References: https://www.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/cprf_rpa.html

Question #29

A performance test team was testing the capacity of concurrent users of a web application deployed on a multi-processor server. While testing 250 concurrent users, the administrator discovers connections to the database are failing.

In response, a system administrator increased the connection pool to the maximum limit which the database allows and increased the prepared statement cache size. The test passed, but the application response time was slower.

How should the system administrator tune the data source properties to improve the application response time?

  • A . Change connection pools purge policy.
  • B . Decrease connection pool reap time.
  • C . Decrease number of free pool partitions.
  • D . Decrease the prepared statement cache size.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

The higher the statement cache, the more system resources are delayed. Therefore, if you set the number too high, you might lack resources because your system cannot open multiple prepared statements.

References: http://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/udat_jdbcdatasorprops.html

Exit mobile version