Pregunta 1
Pregunta
What is the default protocol type for wsadmin?
Pregunta 2
Pregunta
The default behaviors for wsadmin can be changed by editing which
file?
Respuesta
-
AddNodes.properties
-
wsadmin.properties
-
behaviors.properties
Pregunta 3
Pregunta
What is the main difference between the Express and base
WebSphere Application Server editions?
Respuesta
-
The License
-
The instalation
-
The Download
-
The Name
Pregunta 4
Pregunta
Which WebSphere Application Server edition do you need if you
want to deploy a single application with low transaction volume?
Respuesta
-
Deployment Manager
-
Application Server
-
Liberty core
-
Any editions
Pregunta 5
Pregunta
Which of the following provides an environment for running servlets?
Respuesta
-
Client module
-
Web container
-
EJB module
Pregunta 6
Pregunta
Which type of JDBC driver is considered a “thick” driver?
Respuesta
-
Type 2
-
Type 3
-
Type 4
-
Type 5
Pregunta 7
Pregunta
Which of the following are components contained within the JVM of
the application server?
Respuesta
-
HTTP Server plug-in
-
DB2 database
-
Embedded HTTP Server
-
SQL Server
Pregunta 8
Pregunta
A process that handles communications with the resources within the
node is
Respuesta
-
Classes
-
Node Agent
-
Objects
-
EJB
Pregunta 9
Pregunta
What is the process when the node agent checks for changes to the
master configuration?
Respuesta
-
Garbage collection
-
Main Sync
-
file syncronization
-
Virtual Hosts
Pregunta 10
Pregunta
What is a configuration that allows a host machine to resemble
multiple host machines?
Respuesta
-
files
-
Virtual Hosts
-
profiles
-
servers
Pregunta 11
Pregunta
What defines the runtime environment for either the deployment
manager or the application server?
Respuesta
-
Job Manager
-
Hosts
-
profiles
-
repository
Pregunta 12
Pregunta
Qual o profile que cria um nó vazio
Respuesta
-
Stand Alone
-
Deploy Manager
-
Job Manager
-
Custom Profiles
Pregunta 13
Pregunta
what is define application server configurations ?
Respuesta
-
servers
-
Profiles
-
Applications
-
Mbeans
Pregunta 14
Pregunta
Which log file is used to verify that the installation was successful?
Pregunta 15
Pregunta
When running IBM HTTP Server as a Windows Service, what user
rights are required for the user account?
Pregunta 16
Pregunta
The AdminApp application can be configured with the administrative
console.
Pregunta 17
Pregunta
The result of packaging an enterprise application is
Pregunta 18
Pregunta
Which of the following is not one of the five Java objects that perform
different operations?
Respuesta
-
AdminConfig
-
AdminControl
-
Adminstart
-
AdminTask
Pregunta 19
Pregunta
A system administrator is tasked with creating a WebSphere Application Server Network
Deployment topology with the following servers:
• a deployment manager (DMGR)
• a custom node
• an IBM HTTP Server (IHS)
What types of nodes and management services pairs should the administrator configure for this
topology?
Respuesta
-
Managed node and administrative agent
Job Manager and flexible management node
Unmanaged node and node agent
-
Managed node and application server
Managed node and administrative agent
Unmanaged node and admin agent
-
Managed node and DMGR server
Managed node and node agent
Unmanaged node and IHS administration server
-
Unmanaged node and DMGR server
Unmanaged node and node agent
Managed node and IHS administration server
Pregunta 20
Pregunta
A system administrator returns to the Integrated Solutions Console (ISC) after stepping away
from the computer for twenty minutes. The administrator discovers that the console session is still
active.
How can the administrator modify the console session expiration?
Respuesta
-
Add the user ID to the iscadmins role.
-
Modify the invalidationTimeout tuning parameter.
-
Disable single sign-on interoperability mode for the LTPA token.}
-
Modify the browser settings to use session cookies.
Pregunta 21
Pregunta
A system administrator discovers that the wsadmin output for the command
AdminAppp.view('MyApp')includes several accented characters that do not display properly.
The system administrator realizes that these are Unicode characters.
Which argument list should the administrator use to properly display the output from wsadmin?
Respuesta
-
wsadmin -javaoption -Dprofile.encoding=Cp104 -c
AdminApp.view('MyApp')
-
wsadmin -c "print AdminApp.view('MyApp')"
-
wsadmin -lang ANSI -c AdminApp.view('MyApp')
-
wsadmin -c AdminApp.view('MyApp') >! SystemOut
Pregunta 22
Pregunta
An application developer needs to make a call to secured EJB in a remote cell from an unsecured
application. A specific application ID myapp is needed to access the remote EJB. The application
developer's cell and the remote cell where the EJB is deployed are in the same security realm.
How can the system administrator secure the RMI/IIOP communication within global security?
Modify CSIv2:
Respuesta
-
inbound communication settings and select Identity assertion and specify a server
trusted identity.
-
inbound communication settings and select Identity assertion and specify an alternative
trusted identity and password for myapp.
-
outbound communication settings and select Identity assertion and specify a server
trusted identity.
-
outbound communication settings and select Identity assertion and specify an
alternative trusted identity and password for myapp.
Pregunta 23
Pregunta
A system administrator observed a decreased performance of a web application. During
investigation, the system administrator found that there were frequent garbage collections. A
WebSphere Application Server is running on 32-bit platform with 8GB of memory, and with
default settings for the JVM.
What does the administrator need to change to improve performance?
Respuesta
-
Change the garbage collection policy to "balanced".
-
Increase the JVM maximum and the initial heap size.
-
Increase the JVM maximum heap size and use the "balanced" garbage collection policy.
-
Update the operating system parameters to make more memory available for the JVM.
Pregunta 24
Pregunta
The service integration message store tries to persist a message in the messaging engine file
store and finds that it is full, it logs an error. A system administrator is required to examine the
contents of the file store.
In which log does the administrator examine the contents of the file store?
Respuesta
-
ffdc
-
SystemErr
-
SystemOut
-
native_stderr
Pregunta 25
Pregunta
Which intelligent management component maintains cell topology
information and keeps the other controllers informed of the
environment?
Respuesta
-
Dynamic workload controller
-
Autonomic request flow manager
-
On demand configuration service
Pregunta 26
Pregunta
Which type of security restricts access to the application
Respuesta
-
Administrative security
-
Application security
-
Java 2 security
-
File system security
Pregunta 27
Pregunta
Which type of security restricts access to the operating system
Respuesta
-
Administrative security
-
Application security
-
Java 2 security
-
File system security
Pregunta 28
Pregunta
Which type of security restricts access to the console?
Respuesta
-
Administrative security
-
Application security
-
Java 2 security
-
File system security
Pregunta 29
Pregunta
What component identifies the batch application to run?
Respuesta
-
Job scheduler
-
Parallel job manager
-
XML job control language
Pregunta 30
Pregunta
A W ebSphere Application Server cell w as configured w ith a deployment manager node and a
custom node. An operator manually changed some configuration files in the custom node, and the
node became out of synch w ith the master repository.
The system administrator used the Synchronize button in the system administration session of the
Integrated Solutions Console (ISC) to try to resynchronize the node, but the node remained out of
sync.
W hat should the administrator do to fix it?
Respuesta
-
Use the Full Resynchronize button.
-
Invoke “sync” operation on NodeSync MBean.
-
Recreate the custom profile w ith the same name w ithout deleting the node.
-
Manually copy all the deployment manager configuration files to the custom node.
Pregunta 31
Pregunta
A system administrator needs to install W ebSphere Application Server using response files, so
that silent install can be done. The administrator has ensured that all required prerequisites have
already been installed and, has dow nloaded and expanded the required W ebSphere Application
Server installation files.
W hat can the administrator run to install the product?
Respuesta
-
install -options responsefile.xml -silent
-
install -acceptLicense -options responsefile.xml -silent
-
install-acceptLicense input responsefile.xml -log logfile.txt
-
IBMIM -acceptLicense -input responsefile.xml -log logfile.txt
Pregunta 32
Pregunta
A system administrator needs to create a cell for a test environment. The administrator uses the
Profile Management Tool (PMT) to create the deployment manager profile using the advanced
profile creation option and creates a custom profile using the typical profile creation option. The
administrator examines the log files for the custom profile creation and sees an INSTCONFFAIL
message indicating the deployment manager w as not running during the custom profile creation.
How should the administrator fix this?
Respuesta
-
Delete the custom profile.
Start the deployment manager.
Create the custom profile again.
-
Start the deployment manager.
Use PMT to re-create the custom profile.
-
Use the syncNode command to synchronize the node.
-
Run the addNode command to federate the custom profile.
Pregunta 33
Pregunta
A system administrator needs to install W ebSphere Application Server Netw ork Deployment
V8.5.5 multiple times and w ould like to automate the task of installing the product. The
No commentsadministrator w ants to create a response file based on an initial installation and use this for future
installations.
How can the administrator accomplish this task?
Respuesta
-
Use the IBM Packaging Utility.
-
Use the Installation Manager console mode.
-
Complete a silent installation w ith the -log option.
-
Start the Installation Manager GUI with the -record option.
Pregunta 34
Pregunta
The installation of W ebSphere Application Server did not complete successfully, and a system
administrator needs to troubleshoot the installation.
W hat can the administrator do to identify the cause of the installation failure?
Respuesta
-
Run the installer command w ith the appropriate command line options.
-
Check the files under the Agent data location of IBM Installation Manager.
-
Check the files under the logs directory of IBM Installation Manager installation directory.
-
Check the log.txt under <WebSphere Application Server install directory><log directory>.
Pregunta 35
Pregunta
The computer w here a federated node w as running had a failure and cannot be recovered. A
system administrator w ants to recreate the node w ith the same configurations in another
computer.
W hich steps should the administrator execute in order to recover the damaged node?
Respuesta
-
Configure the new computer w ith a different hostname.
Create a custom profile w ith the same name.
Federate to the cell using the command addNode w ith the default options.
-
Configure the new computer with a different hostname.
Create a custom profile with a different name.
Federate to the cell using the command addNode with the option -asExistingNode.
-
Configure the new computer w ith the same hostname.
Create a custom profile w ith the same name.
Federate to the cell using the command addNode w ith the option -asExistingNode.
-
Configure the new computer w ith the same hostname.
Create a custom profile w ith the same name.
Federate to the cell using the command addNode w ith the options -includeapps.
Pregunta 36
Pregunta
A system administrator, Admin1, w ith Administrator privileges has archived full repository
checkpoints. Another administrator, Configurator1, w ith Configurator privileges has copied the
checkpoint contents directory from one of the archived check points to its original location.
Configurator1 tries to restore the configuration using the copied archived checkpoint contents
and the restore fails.
How can Configurator1 restore the configuration using the copied archived full repository
checkpoint?
Respuesta
-
Copy the archived checkpoint metadata directory to its original location.
-
Increase the Automatic checkpoint depth to keep all the delta checkpoints.
-
Delete the delta checkpoints taken after the full repository checkpoint w as taken.
-
Ask an administrator to update the privileges for Configurator1 to matchAdmin1.
Pregunta 37
Pregunta
A system administrator completed a W ebSphere Application Server installation by using the
Installation Manager. During installation, all defaults w ere selected for the installation root
directories and the shared resources directory. Over time, the administrator has updated the
installation w ith various interim fixes and fix packs. The administrator notices that the shared
resources directory is very large in size and grow s larger each time the Installation Manager is run.
How can the administrator decrease the size and remove some of the content from the shared
resources directory?
Respuesta
-
Manually delete content from the directory.
-
During an update, create a new shared resources directory.
-
Clear the Delete Saved Files option for the Installation Manager.
-
Set the preserveDownloadedArtifacts preference to false.
Pregunta 38
Pregunta
A system administrator ran the backupConfig command to backup the configuration using the -nostop option. The
administrator changed the properties for the service integration environment by
modifying the sib.properties file. During testing the administrator noticed Service Integration Bus
related errors and wanted to restore the service integration environment. The administrator used
the restoreconfig command, but the tuning properties for the service integration environment were
not restored.
How can the administrator prevent this issue?
Respuesta
-
Use full repository checkpoints for both the backup and the restore.
-
Use the restoreconfig command with -nostop for the restore.
-
Use the manageprofiles command for both the backup and the restore.
-
Use the backupconfig command without -nostop for the backup Use the restoreconfigcommand without -nostop for the restore.
Pregunta 39
Pregunta
An EJB application posts a request message into a JMS destination and w aits for a response
message on a different JMS destination. To correlate the response message to the request
message, the application uses the JMS correlationld of the message. The application w aits up to
five seconds for a response before timing out the request.
A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the
request message, process it and post a response message.
The destinations are defined in a Service Integration Bus (SIB) w ithin the cell.
Intermittent timeout exceptions have occurred for the requester application. How can a system
administrator correlate and analyze the debug information from both requester and consumer
applications?
Respuesta
-
Enable High Performance Extensible Logging (HPEL).
Use HPEL logView er command to see debug information.
-
Enable a diagnostic trace in both requester and consumer servers.
Use the Integrated Solutions Console (ISC) to set the admin=all trace. Analyze the trace.
-
Enable High Performance Extensible Logging (HPEL).
Enable Cross Component Trace (XCT) to include request IDs in log and trace records. Use HPEL
logViewer command with appropriate filters to see debug information.
-
Using the Integrated Solutions Console (ISC), brow se the request message that has timed out
and look for any key application data.
Search for exceptions using the key application data in both requester and consumer in
native_stderr.log and native_stdout.log.
Pregunta 40
Pregunta
After collecting diagnostic trace from a server running under a cell, a system administrator noticed
that the trace files contained sensitive information.
To avoid this issue in the future, w hat can the administrator do?
Respuesta
-
Configure entries in the ras.raw tracelist.properties.
-
Configure suppressSensitiveTrace in the bootstrap.properties file.
-
Clear the “Disable logging and tracing of potentially sensitive data” checkbox.
-
Add the entry com.ibm.w ebsphere.logging.Raw TraceList=Off to the end of the trace string
Pregunta 41
Pregunta
A system administrator needs to trigger a javacore only w hen a Java. net.
SocketTimeoutException is encountered in real time.
W hat does the administrator have to configure to trigger the javacore dump?
Respuesta
-
Configure the JAVA_DUMP_OPTS environment variable to capture javacore for ANYSIGNAL
and all exceptions.
-
Configure an -Xdump:java Generic JVM argument on W ebSphere Application Server w ith the
filter for java.net.SocketTimeoutException.
-
Code w sadmin script to capture javacore and then execute it after the
Java.net.SocketTimeoutException has been encountered.
-
Use the log filter in HPEL to monitor forjava.net. SocketTimeoutException and then gather a
javacore dump from the Integrated Solutions Console (ISC).
Pregunta 42
Pregunta
An application deployed to a multi-node cluster is reported to have slow ness and hung threads. A
system administrator is asked to review the logs on each node and identify if the hung threads are
a false alarm.
How can the administrator determine that the hung threads are a false alarm?
Analyze the:
Respuesta
-
ffdc logs.
-
SystemErr.log.
-
SystemOut.log.
-
native_stderr.log.
Pregunta 43
Pregunta
A system administrator decides to use the advice from the Performance and Diagnostic Advisor to
identify the optimum connection pool settings for data sources. In a cell, the data source
db2datasource is defined under node scope and used by tw o servers from that node. The
administrator receives tw o different sets of advice for db2datasource.
. One set of advice suggests to increase the maximum connection pool size for
db2datasource.
. The other suggests reducing the maximum connection pool size for db2datasource.
How should the administrator configure the data sources before reusing the Performance and
Diagnostic Advisor?
Respuesta
-
Create a data source of the same name under cell scope.
-
Create a data source of the same name under server scope for each server.
-
Increase the minimum connection pool size for the data source.
-
Decrease the maximum connection pool size for the data source.
Pregunta 44
Pregunta
A system administrator has deployed w eb applications to a clustered environment w here database
session persistence is configured. The administrator needs to improve the response time and the
throughput.
How can the system administrator do this?
Respuesta
-
Disable server affinity.
-
Configure dynamic caching.
-
Configure a load balancer to spread w ork betw een existing w eb servers.
-
Tune the database session persistence to optimize for failover.
Pregunta 45
Pregunta
A system administrator is required to create a star topology for multi-cell performance
management for three W ebSphere Application Server cells.
How should the administrator configure the Application Placement Controller (APC) in a star
topology?
Respuesta
-
false in all three W ebSphere Application Server cells.
-
false in one W ebSphere Application Server cell
true in the other tw o W ebSphere Application Server cells.
-
true in all three W ebSphere Application Server cells.
-
true in one WebSphere Application Server cell
false in the other two WebSphere Application Server cells.
Pregunta 46
Pregunta
How can a system administrator secure a W ebSphere Application Server environment to ensure
that an application code w ill not be allow ed to access any files in the server’s file system?
Respuesta
-
Configure the CSIv2 outbound communications under RMI/IIOP security.
-
Configure the file-based repository and create the fileRegistry.xml file.
-
Enable Java 2 security and configure the app.policy and was .policy files.
-
Use the AdminTask deleteAuthorizationGroup to remove application access.
Pregunta 47
Pregunta
A customer has enabled LTPA as their authentication mechanism and has w eb resources that are
not secured by proper security constraints. A system administrator is required to ensure that all
w eb resources are secured.
How should the administrator accomplish this?
Respuesta
-
Enable “Authenticate when any URI is accessed”.
-
Enable “Authenticate only w hen the URI is protected”.
-
disable all
-
Map the application security roles to the configured user registry’s groups.
Pregunta 48
Pregunta
A new ly deployed application has authorization errors w hen invoking EJB methods from a servlet.
An additional review indicates that users are authenticated, but do not have the correct
authorization.
How can a system administrator fix the issue ensuring only authorized access?
Respuesta
-
Using the Integrated Solutions Console (ISC), map all security roles to the special subject
Everyone.
-
Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped
to groups in the current user registry.
-
Edit the application using an assembly tool to add a security constraint for the servlet and
reinstall the application.
-
Edit the application using an assembly tool to remove the security constraint defined for the
servlet and reinstall the application.
Pregunta 49
Pregunta
A system administrator needs to deploy a new enterprise application w hich requires that
application security be enabled, but, the existing applications in the cell can not be executed w ith
application security enabled. The cell has the global security and Java 2 security disabled.
How can the administrator handle this requirement?
Respuesta
-
Enable Java 2 security for the cell.
Create a security domain w ith application security enabled.
Associate the security domain to the new application.
-
Enable Java 2 security for the cell.
Create a security domain w ith application security enabled.
Associate the security domain to a new cluster to be used to deploy the new application,
-
Enable administrative security for the cell.
Create a security domain with application security enabled.
Associate the security domain at the application level for the new application.
-
Enable administrative security for the cell.
Create a security domain w ith application security enabled.
Associate the security domain to the new cluster w here the new application is deployed.
Pregunta 50
Pregunta
A system administrator is configuring the security of a new environment. The administrator has
been asked to configure one LDAP server that has different sub-trees for business users and
administration users.
W hat should the administrator do to implement the required security configuration?
Respuesta
-
Install and configure a TAI (Trust Association Interceptor)
-
Configure a security domain for the stand-alone LDAP server.
-
Use Federated repositories and configure the supported entity types.
-
Use Stand-alone custom registry and configure the flat file implementation.
Pregunta 51
Pregunta
A w eb application w as deployed on a W ebSphere Application Server cluster. W hile users are
using the application, one of the cluster servers fails and the users lose their w orking data.
W hat can the system administrator configure to ensure users can continue to w ork if one of the
cluster server fails?
Respuesta
-
An increased session timeout.
-
A cluster of external HTTP servers.
-
A load balancer to spread w ork betw een existing servers
-
A WebSphere eXtreme Scale HTTP session management.
Pregunta 52
Pregunta
A system administrator has added a server cluster as a member of a service integration bus (SIB).
The administrator needs to configure one messaging engine for each server in this cluster and to
have a failover location for each messaging engine.
W hat should the administrator do to achieve the required design?
Respuesta
-
Configure a new messaging engine in each server to support failover.
-
Configure the data store for each messaging engine for each server in the cluster.
-
Select scalability with high availability as the messaging engine policy.
-
Create a core group policy to restrict each messaging engine to a particular server.
Pregunta 53
Pregunta
A system administrator has to design a new production environment to host a w eb application.
The w orkload of this w eb application is expected to increase during special marketing campaigns.
W hich one of the follow ing topologies should the administrator configure to address the
requirements for this new environment?
Respuesta
-
A Liberty collective environment w ith autonomic managers and on demand router (ODR).
-
A flexible management environment supported by one admin agent running in each node of
thecell.
-
A dynamic cluster with autonomic managers, application placement controller and intelligent
routers.
-
A heterogeneous cell w ith enough servers to support the peak load spread across multiple
nodes on the same machine
Pregunta 54
Pregunta
A system administrator has configured a netw ork deployment cell containing multiple nodes and
global security enabled w ith an LDAP repository. To increase capacity, the administrator needs to
add additional nodes to the cell. After adding the nodes by using both scripts and the Integrated
Solutions Console (ISC), the administrator examines the System.out log for the deployment
manager and notices the follow ing message:
0000004d ORBRas E com.ibm.w s.security.orbssl.W SSSLClientSocketFactoryImpl
createSSLSocket ProcessDiscovery : 0 JSSL0080E:
javax.net.ssl.SSLHandshakeException -The client and server could not negotiate the desired level of security.
Reason?com.ibm.jsse2.util.h: No trusted certificate found
How can the administrator resolve this problem?
Respuesta
-
Disable Java 2 security.
-
Restart the deployment manager.
-
Increase the RSA token timeout value.
-
Change the number of active LTPA keys.
Pregunta 55
Pregunta
A system administrator w ants to learn some of the Python scripting commands for the
administration of the environment.
W hich product feature should the administrator use?
Respuesta
-
The w sadmin.properties file to load a profile.
-
The AdminTask object to generate w sadmin scripts.
-
The guided activities panel from the Integrated Solutions Console (ISC).
-
The “Log command assistance commands” option in the Integrated Solutions Console (ISC).
Pregunta 56
Pregunta
A system administrator has created a Python script called globalScript. py.
W hat should the administrator do to ensure globalScript. py is loaded w hen the w sadmin shell is
used?
Respuesta
-
Compile globalScript.py to a Java class in the bin directory.
-
Invoke w sadmin w ith the argument-profileName globalScript.py.
-
Modify the configureCustomProperty script to import globalScript. py.
-
Set the script profiles in the wsadmin.properties file to load globalScript .py.
Pregunta 57
Pregunta
A system administrator discovers an issue that requires a change to a federated server. In this
cell, W ebSphere administrative security is enabled, but application security is not enabled.
How should the administrator make this change?
The administrator should use:
Respuesta
-
a w eb brow ser to connect to the node agent https port.
-
a web browser to connect to the deployment manager admin_host port.
-
the job manager to submit a job to update the unmanaged server.
-
an ssh connection to the node and modify the client_types.xmI file.
Pregunta 58
Pregunta
A system administrator has created a w sadmin script w ith several steps to install and configure an
application and some resources in a W ebSphere Application Server process. The script executed
but the application w as not installed successfully. The administrator suspects that the script has
problems.
How can the administrator test and debug the script?
Respuesta
-
In W ebSphere Application Server Developer Tools for Eclipse, right click on the script file and
select validate from context menu.
-
Execute the script using the w sadmin w ith the option -conntype NONE and monitor the
commandAssistancePythonCommands.log file.
-
Use WebSphere Application Server Developer Tools for Eclipse in the debug perspective
connected to the server and execute the script step by step.
-
Run the script using w sadmin w ith these parameters:-langPython-javaoption “-Xdebug” and
then execute the log View er command w ith the option –listlnstances
Pregunta 59
Pregunta
After installing an enhanced EAR in a W ebSphere Application Server environment, a system
administrator w ith Configurator privileges is able to see a JDBC provider and a data source in the
Integrated Solution Console (ISC) but is not able to delete these resources.
How can the administrator resolve this issue?
Respuesta
-
Use the AdminTask object to delete the resources.
-
Stop all application server instances and then delete the resources.
-
Ask another administrator w ith iscadmin privilege to delete the resource.
-
Edit the EAR to remove the application scoped resources and reinstall the application.
Pregunta 60
Pregunta
A developer created an enterprise application w hich contained data source and security role
information. The developer asked a system administrator to install this application to an application
server w here global security is enabled using the Integrated Solutions Console (ISC). A new data
source w as configured at the server scope for the use of this application. W hile load testing the
application, the developer noticed that the attributes configured on the new data source w ere
ignored by the application server.
How can the administrator ensure that the attributes configured on the new data source are used
by the application server?
Respuesta
-
Create the data source under cell scope instead of server scope.
-
Delete any data source of the same name defined under node, cluster or cell scope.
-
Reinstall the application and clear the Process embedded configuration check box.
-
Correct the component-managed and container-managed authentication aliases set on the data
source
Pregunta 61
Pregunta
In a test environment, a system administrator has configured an external HTTP server in the DMZ
that is routing to a cluster of application servers. The administrator w ants to achieve higher
performance w hen routing and prioritizing incoming requests to the back-end cluster.
How can the system administrator achieve this task?
Respuesta
-
Configure a cluster of external HTTP servers
-
Enable the prefer local option on the cluster members.
-
Set up a Caching Proxy server betw een the external w eb server and the application server.
-
Place an On Demand Router (ODR) between the external web server and the application
servers.
Pregunta 62
Pregunta
W hile monitoring a cluster in the cell, the administrator notices that one server in the cluster
periodically loses connections to the database. W hen this happens, requests to the server have a
significantly decreased response time and various error conditions are listed in the log files for the
server. Since the error codes are returned quickly, the server starts returning responses faster
than the average service times for the application. Due to this, the w eight for the server is
increased and a large percentage of incoming requests are being routed to the erroneous server
and the server is getting overloaded w ith requests.
How can the administrator detect these conditions in the future and take action to prevent this
problem?
Respuesta
-
Configure the storm drain health policy.
-
Configure the on demand router (ODR) transport chain to tune inbound connections.
-
Monitor the JVM heap usage to determine a new server w eight.
-
Enable the PMI Extended statistic set and use the Connection Pool summary report.
Pregunta 63
Pregunta
The application placement controller has been configured w ith elasticity mode enabled.
Intermittently, all instances of a dynamic cluster are removed. After further review , the system
administrator noticed that it occurs during peak load on another dynamic cluster.
The administrator w ants to keep at least one instance available. W hich configuration is needed in
the dynamic clusters?
Respuesta
-
Enable application lazy start w ith elasticity mode.
-
Set theproactiveldleStopcustom property to true
-
Set the Number of instances to a value greater than zero.
-
Disable the option”If other dynamic clusters need resources, stop all instances of this cluster
during periods of inactivity”.