Dump Adicional para a prova C2180-401 - Websphere Application Server V8.5.5

Descripción

Test sobre Dump Adicional para a prova C2180-401 - Websphere Application Server V8.5.5, creado por aroldo.esmerio el 08/09/2015.
aroldo.esmerio
Test por aroldo.esmerio, actualizado hace más de 1 año
aroldo.esmerio
Creado por aroldo.esmerio hace alrededor de 9 años
42
1

Resumen del Recurso

Pregunta 1

Pregunta
What is the default protocol type for wsadmin?
Respuesta
  • SOAP
  • RMI
  • None

Pregunta 2

Pregunta
The default behaviors for wsadmin can be changed by editing which file?
Respuesta
  • AddNodes.properties
  • wsadmin.properties
  • behaviors.properties

Pregunta 3

Pregunta
What is the main difference between the Express and base WebSphere Application Server editions?
Respuesta
  • The License
  • The instalation
  • The Download
  • The Name

Pregunta 4

Pregunta
Which WebSphere Application Server edition do you need if you want to deploy a single application with low transaction volume?
Respuesta
  • Deployment Manager
  • Application Server
  • Liberty core
  • Any editions

Pregunta 5

Pregunta
Which of the following provides an environment for running servlets?
Respuesta
  • Client module
  • Web container
  • EJB module

Pregunta 6

Pregunta
Which type of JDBC driver is considered a “thick” driver?
Respuesta
  • Type 2
  • Type 3
  • Type 4
  • Type 5

Pregunta 7

Pregunta
Which of the following are components contained within the JVM of the application server?
Respuesta
  • HTTP Server plug-in
  • DB2 database
  • Embedded HTTP Server
  • SQL Server

Pregunta 8

Pregunta
A process that handles communications with the resources within the node is
Respuesta
  • Classes
  • Node Agent
  • Objects
  • EJB

Pregunta 9

Pregunta
What is the process when the node agent checks for changes to the master configuration?
Respuesta
  • Garbage collection
  • Main Sync
  • file syncronization
  • Virtual Hosts

Pregunta 10

Pregunta
What is a configuration that allows a host machine to resemble multiple host machines?
Respuesta
  • files
  • Virtual Hosts
  • profiles
  • servers

Pregunta 11

Pregunta
What defines the runtime environment for either the deployment manager or the application server?
Respuesta
  • Job Manager
  • Hosts
  • profiles
  • repository

Pregunta 12

Pregunta
Qual o profile que cria um nó vazio
Respuesta
  • Stand Alone
  • Deploy Manager
  • Job Manager
  • Custom Profiles

Pregunta 13

Pregunta
what is define application server configurations ?
Respuesta
  • servers
  • Profiles
  • Applications
  • Mbeans

Pregunta 14

Pregunta
Which log file is used to verify that the installation was successful?
Respuesta
  • <was_root>\logs\install\log.txt
  • /opt/IBM/WebSphere/AppServer/firststeps/ ./firststeps.sh
  • sysout.log
  • sysint.log

Pregunta 15

Pregunta
When running IBM HTTP Server as a Windows Service, what user rights are required for the user account?
Respuesta
  • user
  • Act as part of the operating system Log on as a service
  • invite
  • login

Pregunta 16

Pregunta
The AdminApp application can be configured with the administrative console.
Respuesta
  • True
  • False

Pregunta 17

Pregunta
The result of packaging an enterprise application is
Respuesta
  • jar
  • ear
  • msi
  • exe

Pregunta 18

Pregunta
Which of the following is not one of the five Java objects that perform different operations?
Respuesta
  • AdminConfig
  • AdminControl
  • Adminstart
  • AdminTask

Pregunta 19

Pregunta
A system administrator is tasked with creating a WebSphere Application Server Network Deployment topology with the following servers: • a deployment manager (DMGR) • a custom node • an IBM HTTP Server (IHS) What types of nodes and management services pairs should the administrator configure for this topology?
Respuesta
  • Managed node and administrative agent Job Manager and flexible management node Unmanaged node and node agent
  • Managed node and application server Managed node and administrative agent Unmanaged node and admin agent
  • Managed node and DMGR server Managed node and node agent Unmanaged node and IHS administration server
  • Unmanaged node and DMGR server Unmanaged node and node agent Managed node and IHS administration server

Pregunta 20

Pregunta
A system administrator returns to the Integrated Solutions Console (ISC) after stepping away from the computer for twenty minutes. The administrator discovers that the console session is still active. How can the administrator modify the console session expiration?
Respuesta
  • Add the user ID to the iscadmins role.
  • Modify the invalidationTimeout tuning parameter.
  • Disable single sign-on interoperability mode for the LTPA token.}
  • Modify the browser settings to use session cookies.

Pregunta 21

Pregunta
A system administrator discovers that the wsadmin output for the command AdminAppp.view('MyApp')includes several accented characters that do not display properly. The system administrator realizes that these are Unicode characters. Which argument list should the administrator use to properly display the output from wsadmin?
Respuesta
  • wsadmin -javaoption -Dprofile.encoding=Cp104 -c AdminApp.view('MyApp')
  • wsadmin -c "print AdminApp.view('MyApp')"
  • wsadmin -lang ANSI -c AdminApp.view('MyApp')
  • wsadmin -c AdminApp.view('MyApp') >! SystemOut

Pregunta 22

Pregunta
An application developer needs to make a call to secured EJB in a remote cell from an unsecured application. A specific application ID myapp is needed to access the remote EJB. The application developer's cell and the remote cell where the EJB is deployed are in the same security realm. How can the system administrator secure the RMI/IIOP communication within global security? Modify CSIv2:
Respuesta
  • inbound communication settings and select Identity assertion and specify a server trusted identity.
  • inbound communication settings and select Identity assertion and specify an alternative trusted identity and password for myapp.
  • outbound communication settings and select Identity assertion and specify a server trusted identity.
  • outbound communication settings and select Identity assertion and specify an alternative trusted identity and password for myapp.

Pregunta 23

Pregunta
A system administrator observed a decreased performance of a web application. During investigation, the system administrator found that there were frequent garbage collections. A WebSphere Application Server is running on 32-bit platform with 8GB of memory, and with default settings for the JVM. What does the administrator need to change to improve performance?
Respuesta
  • Change the garbage collection policy to "balanced".
  • Increase the JVM maximum and the initial heap size.
  • Increase the JVM maximum heap size and use the "balanced" garbage collection policy.
  • Update the operating system parameters to make more memory available for the JVM.

Pregunta 24

Pregunta
The service integration message store tries to persist a message in the messaging engine file store and finds that it is full, it logs an error. A system administrator is required to examine the contents of the file store. In which log does the administrator examine the contents of the file store?
Respuesta
  • ffdc
  • SystemErr
  • SystemOut
  • native_stderr

Pregunta 25

Pregunta
Which intelligent management component maintains cell topology information and keeps the other controllers informed of the environment?
Respuesta
  • Dynamic workload controller
  • Autonomic request flow manager
  • On demand configuration service

Pregunta 26

Pregunta
Which type of security restricts access to the application
Respuesta
  • Administrative security
  • Application security
  • Java 2 security
  • File system security

Pregunta 27

Pregunta
Which type of security restricts access to the operating system
Respuesta
  • Administrative security
  • Application security
  • Java 2 security
  • File system security

Pregunta 28

Pregunta
Which type of security restricts access to the console?
Respuesta
  • Administrative security
  • Application security
  • Java 2 security
  • File system security

Pregunta 29

Pregunta
What component identifies the batch application to run?
Respuesta
  • Job scheduler
  • Parallel job manager
  • XML job control language

Pregunta 30

Pregunta
A W ebSphere Application Server cell w as configured w ith a deployment manager node and a custom node. An operator manually changed some configuration files in the custom node, and the node became out of synch w ith the master repository. The system administrator used the Synchronize button in the system administration session of the Integrated Solutions Console (ISC) to try to resynchronize the node, but the node remained out of sync. W hat should the administrator do to fix it?
Respuesta
  • Use the Full Resynchronize button.
  • Invoke “sync” operation on NodeSync MBean.
  • Recreate the custom profile w ith the same name w ithout deleting the node.
  • Manually copy all the deployment manager configuration files to the custom node.

Pregunta 31

Pregunta
A system administrator needs to install W ebSphere Application Server using response files, so that silent install can be done. The administrator has ensured that all required prerequisites have already been installed and, has dow nloaded and expanded the required W ebSphere Application Server installation files. W hat can the administrator run to install the product?
Respuesta
  • install -options responsefile.xml -silent
  • install -acceptLicense -options responsefile.xml -silent
  • install-acceptLicense input responsefile.xml -log logfile.txt
  • IBMIM -acceptLicense -input responsefile.xml -log logfile.txt

Pregunta 32

Pregunta
A system administrator needs to create a cell for a test environment. The administrator uses the Profile Management Tool (PMT) to create the deployment manager profile using the advanced profile creation option and creates a custom profile using the typical profile creation option. The administrator examines the log files for the custom profile creation and sees an INSTCONFFAIL message indicating the deployment manager w as not running during the custom profile creation. How should the administrator fix this?
Respuesta
  • Delete the custom profile. Start the deployment manager. Create the custom profile again.
  • Start the deployment manager. Use PMT to re-create the custom profile.
  • Use the syncNode command to synchronize the node.
  • Run the addNode command to federate the custom profile.

Pregunta 33

Pregunta
A system administrator needs to install W ebSphere Application Server Netw ork Deployment V8.5.5 multiple times and w ould like to automate the task of installing the product. The No commentsadministrator w ants to create a response file based on an initial installation and use this for future installations. How can the administrator accomplish this task?
Respuesta
  • Use the IBM Packaging Utility.
  • Use the Installation Manager console mode.
  • Complete a silent installation w ith the -log option.
  • Start the Installation Manager GUI with the -record option.

Pregunta 34

Pregunta
The installation of W ebSphere Application Server did not complete successfully, and a system administrator needs to troubleshoot the installation. W hat can the administrator do to identify the cause of the installation failure?
Respuesta
  • Run the installer command w ith the appropriate command line options.
  • Check the files under the Agent data location of IBM Installation Manager.
  • Check the files under the logs directory of IBM Installation Manager installation directory.
  • Check the log.txt under <WebSphere Application Server install directory><log directory>.

Pregunta 35

Pregunta
The computer w here a federated node w as running had a failure and cannot be recovered. A system administrator w ants to recreate the node w ith the same configurations in another computer. W hich steps should the administrator execute in order to recover the damaged node?
Respuesta
  • Configure the new computer w ith a different hostname. Create a custom profile w ith the same name. Federate to the cell using the command addNode w ith the default options.
  • Configure the new computer with a different hostname. Create a custom profile with a different name. Federate to the cell using the command addNode with the option -asExistingNode.
  • Configure the new computer w ith the same hostname. Create a custom profile w ith the same name. Federate to the cell using the command addNode w ith the option -asExistingNode.
  • Configure the new computer w ith the same hostname. Create a custom profile w ith the same name. Federate to the cell using the command addNode w ith the options -includeapps.

Pregunta 36

Pregunta
A system administrator, Admin1, w ith Administrator privileges has archived full repository checkpoints. Another administrator, Configurator1, w ith Configurator privileges has copied the checkpoint contents directory from one of the archived check points to its original location. Configurator1 tries to restore the configuration using the copied archived checkpoint contents and the restore fails. How can Configurator1 restore the configuration using the copied archived full repository checkpoint?
Respuesta
  • Copy the archived checkpoint metadata directory to its original location.
  • Increase the Automatic checkpoint depth to keep all the delta checkpoints.
  • Delete the delta checkpoints taken after the full repository checkpoint w as taken.
  • Ask an administrator to update the privileges for Configurator1 to matchAdmin1.

Pregunta 37

Pregunta
A system administrator completed a W ebSphere Application Server installation by using the Installation Manager. During installation, all defaults w ere selected for the installation root directories and the shared resources directory. Over time, the administrator has updated the installation w ith various interim fixes and fix packs. The administrator notices that the shared resources directory is very large in size and grow s larger each time the Installation Manager is run. How can the administrator decrease the size and remove some of the content from the shared resources directory?
Respuesta
  • Manually delete content from the directory.
  • During an update, create a new shared resources directory.
  • Clear the Delete Saved Files option for the Installation Manager.
  • Set the preserveDownloadedArtifacts preference to false.

Pregunta 38

Pregunta
A system administrator ran the backupConfig command to backup the configuration using the -nostop option. The administrator changed the properties for the service integration environment by modifying the sib.properties file. During testing the administrator noticed Service Integration Bus related errors and wanted to restore the service integration environment. The administrator used the restoreconfig command, but the tuning properties for the service integration environment were not restored. How can the administrator prevent this issue?
Respuesta
  • Use full repository checkpoints for both the backup and the restore.
  • Use the restoreconfig command with -nostop for the restore.
  • Use the manageprofiles command for both the backup and the restore.
  • Use the backupconfig command without -nostop for the backup Use the restoreconfigcommand without -nostop for the restore.

Pregunta 39

Pregunta
An EJB application posts a request message into a JMS destination and w aits for a response message on a different JMS destination. To correlate the response message to the request message, the application uses the JMS correlationld of the message. The application w aits up to five seconds for a response before timing out the request. A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the request message, process it and post a response message. The destinations are defined in a Service Integration Bus (SIB) w ithin the cell. Intermittent timeout exceptions have occurred for the requester application. How can a system administrator correlate and analyze the debug information from both requester and consumer applications?
Respuesta
  • Enable High Performance Extensible Logging (HPEL). Use HPEL logView er command to see debug information.
  • Enable a diagnostic trace in both requester and consumer servers. Use the Integrated Solutions Console (ISC) to set the admin=all trace. Analyze the trace.
  • Enable High Performance Extensible Logging (HPEL). Enable Cross Component Trace (XCT) to include request IDs in log and trace records. Use HPEL logViewer command with appropriate filters to see debug information.
  • Using the Integrated Solutions Console (ISC), brow se the request message that has timed out and look for any key application data. Search for exceptions using the key application data in both requester and consumer in native_stderr.log and native_stdout.log.

Pregunta 40

Pregunta
After collecting diagnostic trace from a server running under a cell, a system administrator noticed that the trace files contained sensitive information. To avoid this issue in the future, w hat can the administrator do?
Respuesta
  • Configure entries in the ras.raw tracelist.properties.
  • Configure suppressSensitiveTrace in the bootstrap.properties file.
  • Clear the “Disable logging and tracing of potentially sensitive data” checkbox.
  • Add the entry com.ibm.w ebsphere.logging.Raw TraceList=Off to the end of the trace string

Pregunta 41

Pregunta
A system administrator needs to trigger a javacore only w hen a Java. net. SocketTimeoutException is encountered in real time. W hat does the administrator have to configure to trigger the javacore dump?
Respuesta
  • Configure the JAVA_DUMP_OPTS environment variable to capture javacore for ANYSIGNAL and all exceptions.
  • Configure an -Xdump:java Generic JVM argument on W ebSphere Application Server w ith the filter for java.net.SocketTimeoutException.
  • Code w sadmin script to capture javacore and then execute it after the Java.net.SocketTimeoutException has been encountered.
  • Use the log filter in HPEL to monitor forjava.net. SocketTimeoutException and then gather a javacore dump from the Integrated Solutions Console (ISC).

Pregunta 42

Pregunta
An application deployed to a multi-node cluster is reported to have slow ness and hung threads. A system administrator is asked to review the logs on each node and identify if the hung threads are a false alarm. How can the administrator determine that the hung threads are a false alarm? Analyze the:
Respuesta
  • ffdc logs.
  • SystemErr.log.
  • SystemOut.log.
  • native_stderr.log.

Pregunta 43

Pregunta
A system administrator decides to use the advice from the Performance and Diagnostic Advisor to identify the optimum connection pool settings for data sources. In a cell, the data source db2datasource is defined under node scope and used by tw o servers from that node. The administrator receives tw o different sets of advice for db2datasource. . One set of advice suggests to increase the maximum connection pool size for db2datasource. . The other suggests reducing the maximum connection pool size for db2datasource. How should the administrator configure the data sources before reusing the Performance and Diagnostic Advisor?
Respuesta
  • Create a data source of the same name under cell scope.
  • Create a data source of the same name under server scope for each server.
  • Increase the minimum connection pool size for the data source.
  • Decrease the maximum connection pool size for the data source.

Pregunta 44

Pregunta
A system administrator has deployed w eb applications to a clustered environment w here database session persistence is configured. The administrator needs to improve the response time and the throughput. How can the system administrator do this?
Respuesta
  • Disable server affinity.
  • Configure dynamic caching.
  • Configure a load balancer to spread w ork betw een existing w eb servers.
  • Tune the database session persistence to optimize for failover.

Pregunta 45

Pregunta
A system administrator is required to create a star topology for multi-cell performance management for three W ebSphere Application Server cells. How should the administrator configure the Application Placement Controller (APC) in a star topology?
Respuesta
  • false in all three W ebSphere Application Server cells.
  • false in one W ebSphere Application Server cell true in the other tw o W ebSphere Application Server cells.
  • true in all three W ebSphere Application Server cells.
  • true in one WebSphere Application Server cell false in the other two WebSphere Application Server cells.

Pregunta 46

Pregunta
How can a system administrator secure a W ebSphere Application Server environment to ensure that an application code w ill not be allow ed to access any files in the server’s file system?
Respuesta
  • Configure the CSIv2 outbound communications under RMI/IIOP security.
  • Configure the file-based repository and create the fileRegistry.xml file.
  • Enable Java 2 security and configure the app.policy and was .policy files.
  • Use the AdminTask deleteAuthorizationGroup to remove application access.

Pregunta 47

Pregunta
A customer has enabled LTPA as their authentication mechanism and has w eb resources that are not secured by proper security constraints. A system administrator is required to ensure that all w eb resources are secured. How should the administrator accomplish this?
Respuesta
  • Enable “Authenticate when any URI is accessed”.
  • Enable “Authenticate only w hen the URI is protected”.
  • disable all
  • Map the application security roles to the configured user registry’s groups.

Pregunta 48

Pregunta
A new ly deployed application has authorization errors w hen invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization. How can a system administrator fix the issue ensuring only authorized access?
Respuesta
  • Using the Integrated Solutions Console (ISC), map all security roles to the special subject Everyone.
  • Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped to groups in the current user registry.
  • Edit the application using an assembly tool to add a security constraint for the servlet and reinstall the application.
  • Edit the application using an assembly tool to remove the security constraint defined for the servlet and reinstall the application.

Pregunta 49

Pregunta
A system administrator needs to deploy a new enterprise application w hich requires that application security be enabled, but, the existing applications in the cell can not be executed w ith application security enabled. The cell has the global security and Java 2 security disabled. How can the administrator handle this requirement?
Respuesta
  • Enable Java 2 security for the cell. Create a security domain w ith application security enabled. Associate the security domain to the new application.
  • Enable Java 2 security for the cell. Create a security domain w ith application security enabled. Associate the security domain to a new cluster to be used to deploy the new application,
  • Enable administrative security for the cell. Create a security domain with application security enabled. Associate the security domain at the application level for the new application.
  • Enable administrative security for the cell. Create a security domain w ith application security enabled. Associate the security domain to the new cluster w here the new application is deployed.

Pregunta 50

Pregunta
A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users. W hat should the administrator do to implement the required security configuration?
Respuesta
  • Install and configure a TAI (Trust Association Interceptor)
  • Configure a security domain for the stand-alone LDAP server.
  • Use Federated repositories and configure the supported entity types.
  • Use Stand-alone custom registry and configure the flat file implementation.

Pregunta 51

Pregunta
A w eb application w as deployed on a W ebSphere Application Server cluster. W hile users are using the application, one of the cluster servers fails and the users lose their w orking data. W hat can the system administrator configure to ensure users can continue to w ork if one of the cluster server fails?
Respuesta
  • An increased session timeout.
  • A cluster of external HTTP servers.
  • A load balancer to spread w ork betw een existing servers
  • A WebSphere eXtreme Scale HTTP session management.

Pregunta 52

Pregunta
A system administrator has added a server cluster as a member of a service integration bus (SIB). The administrator needs to configure one messaging engine for each server in this cluster and to have a failover location for each messaging engine. W hat should the administrator do to achieve the required design?
Respuesta
  • Configure a new messaging engine in each server to support failover.
  • Configure the data store for each messaging engine for each server in the cluster.
  • Select scalability with high availability as the messaging engine policy.
  • Create a core group policy to restrict each messaging engine to a particular server.

Pregunta 53

Pregunta
A system administrator has to design a new production environment to host a w eb application. The w orkload of this w eb application is expected to increase during special marketing campaigns. W hich one of the follow ing topologies should the administrator configure to address the requirements for this new environment?
Respuesta
  • A Liberty collective environment w ith autonomic managers and on demand router (ODR).
  • A flexible management environment supported by one admin agent running in each node of thecell.
  • A dynamic cluster with autonomic managers, application placement controller and intelligent routers.
  • A heterogeneous cell w ith enough servers to support the peak load spread across multiple nodes on the same machine

Pregunta 54

Pregunta
A system administrator has configured a netw ork deployment cell containing multiple nodes and global security enabled w ith an LDAP repository. To increase capacity, the administrator needs to add additional nodes to the cell. After adding the nodes by using both scripts and the Integrated Solutions Console (ISC), the administrator examines the System.out log for the deployment manager and notices the follow ing message: 0000004d ORBRas E com.ibm.w s.security.orbssl.W SSSLClientSocketFactoryImpl createSSLSocket ProcessDiscovery : 0 JSSL0080E: javax.net.ssl.SSLHandshakeException -The client and server could not negotiate the desired level of security. Reason?com.ibm.jsse2.util.h: No trusted certificate found How can the administrator resolve this problem?
Respuesta
  • Disable Java 2 security.
  • Restart the deployment manager.
  • Increase the RSA token timeout value.
  • Change the number of active LTPA keys.

Pregunta 55

Pregunta
A system administrator w ants to learn some of the Python scripting commands for the administration of the environment. W hich product feature should the administrator use?
Respuesta
  • The w sadmin.properties file to load a profile.
  • The AdminTask object to generate w sadmin scripts.
  • The guided activities panel from the Integrated Solutions Console (ISC).
  • The “Log command assistance commands” option in the Integrated Solutions Console (ISC).

Pregunta 56

Pregunta
A system administrator has created a Python script called globalScript. py. W hat should the administrator do to ensure globalScript. py is loaded w hen the w sadmin shell is used?
Respuesta
  • Compile globalScript.py to a Java class in the bin directory.
  • Invoke w sadmin w ith the argument-profileName globalScript.py.
  • Modify the configureCustomProperty script to import globalScript. py.
  • Set the script profiles in the wsadmin.properties file to load globalScript .py.

Pregunta 57

Pregunta
A system administrator discovers an issue that requires a change to a federated server. In this cell, W ebSphere administrative security is enabled, but application security is not enabled. How should the administrator make this change? The administrator should use:
Respuesta
  • a w eb brow ser to connect to the node agent https port.
  • a web browser to connect to the deployment manager admin_host port.
  • the job manager to submit a job to update the unmanaged server.
  • an ssh connection to the node and modify the client_types.xmI file.

Pregunta 58

Pregunta
A system administrator has created a w sadmin script w ith several steps to install and configure an application and some resources in a W ebSphere Application Server process. The script executed but the application w as not installed successfully. The administrator suspects that the script has problems. How can the administrator test and debug the script?
Respuesta
  • In W ebSphere Application Server Developer Tools for Eclipse, right click on the script file and select validate from context menu.
  • Execute the script using the w sadmin w ith the option -conntype NONE and monitor the commandAssistancePythonCommands.log file.
  • Use WebSphere Application Server Developer Tools for Eclipse in the debug perspective connected to the server and execute the script step by step.
  • Run the script using w sadmin w ith these parameters:-langPython-javaoption “-Xdebug” and then execute the log View er command w ith the option –listlnstances

Pregunta 59

Pregunta
After installing an enhanced EAR in a W ebSphere Application Server environment, a system administrator w ith Configurator privileges is able to see a JDBC provider and a data source in the Integrated Solution Console (ISC) but is not able to delete these resources. How can the administrator resolve this issue?
Respuesta
  • Use the AdminTask object to delete the resources.
  • Stop all application server instances and then delete the resources.
  • Ask another administrator w ith iscadmin privilege to delete the resource.
  • Edit the EAR to remove the application scoped resources and reinstall the application.

Pregunta 60

Pregunta
A developer created an enterprise application w hich contained data source and security role information. The developer asked a system administrator to install this application to an application server w here global security is enabled using the Integrated Solutions Console (ISC). A new data source w as configured at the server scope for the use of this application. W hile load testing the application, the developer noticed that the attributes configured on the new data source w ere ignored by the application server. How can the administrator ensure that the attributes configured on the new data source are used by the application server?
Respuesta
  • Create the data source under cell scope instead of server scope.
  • Delete any data source of the same name defined under node, cluster or cell scope.
  • Reinstall the application and clear the Process embedded configuration check box.
  • Correct the component-managed and container-managed authentication aliases set on the data source

Pregunta 61

Pregunta
In a test environment, a system administrator has configured an external HTTP server in the DMZ that is routing to a cluster of application servers. The administrator w ants to achieve higher performance w hen routing and prioritizing incoming requests to the back-end cluster. How can the system administrator achieve this task?
Respuesta
  • Configure a cluster of external HTTP servers
  • Enable the prefer local option on the cluster members.
  • Set up a Caching Proxy server betw een the external w eb server and the application server.
  • Place an On Demand Router (ODR) between the external web server and the application servers.

Pregunta 62

Pregunta
W hile monitoring a cluster in the cell, the administrator notices that one server in the cluster periodically loses connections to the database. W hen this happens, requests to the server have a significantly decreased response time and various error conditions are listed in the log files for the server. Since the error codes are returned quickly, the server starts returning responses faster than the average service times for the application. Due to this, the w eight for the server is increased and a large percentage of incoming requests are being routed to the erroneous server and the server is getting overloaded w ith requests. How can the administrator detect these conditions in the future and take action to prevent this problem?
Respuesta
  • Configure the storm drain health policy.
  • Configure the on demand router (ODR) transport chain to tune inbound connections.
  • Monitor the JVM heap usage to determine a new server w eight.
  • Enable the PMI Extended statistic set and use the Connection Pool summary report.

Pregunta 63

Pregunta
The application placement controller has been configured w ith elasticity mode enabled. Intermittently, all instances of a dynamic cluster are removed. After further review , the system administrator noticed that it occurs during peak load on another dynamic cluster. The administrator w ants to keep at least one instance available. W hich configuration is needed in the dynamic clusters?
Respuesta
  • Enable application lazy start w ith elasticity mode.
  • Set theproactiveldleStopcustom property to true
  • Set the Number of instances to a value greater than zero.
  • Disable the option”If other dynamic clusters need resources, stop all instances of this cluster during periods of inactivity”.
Mostrar resumen completo Ocultar resumen completo

Similar

Ramas del derecho
Mónica Molina
Aparato CIRCULATORIO
JL Cadenas
CONSTITUCIÓN ESPAÑOLA 1978
Vic Vilve
Anatomía cabeza
Diego Santos
LOS REINOS DE LA NATURALEZA
Laura Juliana4303
MAPAS CONCEPTUALES DIGITALES
Ana Maria Orozco
Promoción de ventas
VICTOR HUGO ORTIZ ALCALA
Proceso de la investigación científica
Alejandra Cortes
Uso De Los Tiempos Verbales
Laura -
TRIÁNGULOS y CUADRILÁTEROS
Ulises Yo