Hi, there:
I assembled the questions available on this forum and ran acroos them and here are my answers. Please let me know what is your take on those answers.
Thanks!
-------------------------------------------------------------
1. Given a non-Network Deployment installation, which of the
following characterizes the IBM WebSphere administrative console?
A. It can be downloaded from a remote machine.
B. It runs in its own
Java Virtual Machine.
C. In the base configuration, it runs on the application server and
can manage only that application server.
D. It connects directly to the Administrative Repository.
2. Which of the following is the default synchronization interval
between nodes and Deployment Manager?
A. 30 seconds
B. 45 seconds
C. 60 seconds
D. 120 seconds
3. Which protocol is used to access directly an application server
on a node remote from the web server?
A. IIOP
B. SNMP
C. OSE
D. HTTP
4. Which of the following tasks does NOT involve the node agent?
A. File transfer services
B. Workload management
C. Configuration synchronization
D. Performance monitoring
5. A systems expert has been asked to install and configure the IBM
WebSphere Application Server V5 with a high level of security.
Given this, which of the following should NOT reside in the DMZ
(Demilitarized Zone) of a firewall configuration?
(Select 2)
A. XML Configuration Repository
B. Web server
C. Application Server
D. The Network Dispatcher
E. Caching Proxy Server
6. Which of the following is NOT a benefit of implementing a
workload management topology?
A. Increased performance
B. Increased maintainability
C. Increased availability
D. Increased scalability
7. Which of the following provides important information about
configuration problems?
(Select 2)
A. FFDC
B.
EJB container
C. Log Files
D. Administrative console messages
8. Which of the following files can be used to locate the version
information for "base" IBM WebSphere Application Server V5.0 ?
(Select 2)
A. SystemOut.log
B. historyReport.html
C. log.txt
D. BASE.product
E. native_stdout.log
9. Which of the following statements are TRUE for IBM WebSphere
Application Server V5.0 "base" installation?
(Select 2)
A. The node agent is installed, but dormant.
B. Only 1 JVM is running in the node.
C. Clustering or workload balancing is configured.
D. The server-cfg.xml file is created.
E. The plug-in configuration file is used by the embedded HTTP
Server.
10. Which operating system users and groups are NOT needed to
install the embedded messaging component of the IBM WebSphere
Application Server V5.0 on Unix or Linux platforms?
A. group mqm
B. group mqbrkrs
C. user mqm
D. user mqbrkrs
E. root
Item 11 of 58 Mark item for review
Which of the following commands can be executed from the IBM WebSphere Application Server V5.0 Network Deployment Manager bin directory for cell administration?
A. removeNode
B. syncNode
C. cleanupNode
D. addNode
E. startNode
Item 12 of 58 Mark item for review
When installing IBM WebSphere Application Server V5.0 and the web server plug-in on a machine that has an existing web server, the administrator will need to:
A. start the IBM WebSphere Application Server during the install. The Application Server configuration file will be updated as a part of the installation.
B. stop the IBM WebSphere Application Server during the install. The Application Server configuration file will be updated as a part of the installation.
C. start the database. The database server configuration file will be updated as a part of the installation.
D. stop the web server during the install. The web server configuration file will be updated as a part of the installation.
Item 13 of 58 Mark item for review
Immediately after installation, to
test the correct independent operation of the web server, open a browser to the following URL:
A.
http://localhost/ B.
http://localhost/servlet/snoop C.
http://localhost/testpage.html D.
http://localhost/servlet/testserver Item 14 of 58 Mark item for review
If there are problems starting or using the administrative console after IBM WebSphere Application Server V5.0 "base" installation, which of the following logs can be used to troubleshoot the problem?
(Select 2)
A. startServer.log
B. SystemOut.log
C. ivt.log
D. ihslog.txt
E. http_plugin.log
Item 15 of 58 Mark item for review
Which of the following properties can be specified when creating a Web module?
A. Security Constraints
B. Web Resource Collections, HTTP methods, and URL
patterns C. Plug-In Routing Options
D. Transport Protocols
E. Local & Remote EJB Interfaces
Item 16 of 58 Mark item for review
An installation of WebSphere Application Server V5 contains an enterprise application named "TestApp". The administrator constructed a jacl file and placed it in the C:\ directory as "TestApp". The file contents are as follows:
A. An error message, $AdminApp list is not a valid command.
B. A list of enterprise applications currently installed, including the TestApp enterprise application.
C. A list of enterprise applications currently installed, excluding the TestApp enterprise application.
D. An empty list, $AdminApp uninstall TestApp removed all applications from the server
Item 17 of 58 Mark item for review
An administrator just deployed a new application to WebSphere Application Server and is getting "404 File not Found" errors when trying to reach the application from a browser. The administrator realizes that the web server plugin needs to be regenerated. What should be done to get the plugin regenerated immediately without shutting down the server?
(Select 2)
A. Restart the web server plugin
B. Run the GenPluginCfg.sh (or GenPluginCfg.bat)
C. Send a mass email giving users 10 min to wrap up, then reboot the server
D. Click Environment > Update Web Server Plugin in the admin console navigation tree
E. Set the reroute options so that the Web server is temporarily unavailable while the modifications are made
Item 18 of 58 Mark item for review
What is the default time interval at which the plug-in checks the configuration file to see if updates or changes have occurred?
A. 60 seconds with a granularity of 1 minute
B. 1 minute with a granularity of 1 second
C. 60 seconds with a granularity of 10 seconds
D. 1 minute with a granularity of 1 minute
Item 19 of 58 Mark item for review
At deployment time, security roles can be mapped to users, groups of users, or special subjects in IBM WebSphere Application Server V5. Which of the following are defined as special subjects?
(Select 2)
A. Administrative Users
B. All Authenticated Users
C. Authorized Users
D. Everyone
E. EJB Users
Item 20 of 58 Mark item for review
Which of the following statements is true for the embedded JMS provider (WebSphere JMS provider)?
A. The WebSphere JMS provider can be used to provide the functionality of full WebSphere MQ.
B. One major limitation is that it cannot
exchange messages with queue managers outside WebSphere.
C. There can be multiple embedded JMS providers per node.
D. The WebSphere administration tools access the embedded JMS server using the http/https protocol.
Item 21 of 58 Mark item for review
Please refer to the exhibit to answer this question. If a federated binding "nsc" is created to bind "nsb" under "nsa", what lookup name would correctly reference EJB Home X in Name Space 1, given the JNDI namespace in the exhibit?
A. nsb/ejba
B. comp-env/ejb/ejba
C. nsc/ejba
D. nsa/nsc/ejba
E. nsa/nsc/nsb/ejba
Item 22 of 58 Mark item for review
What is the purpose of resource adapters?
A. Connect to an enterprise information system
B. Allow J2EE resources to connect to one another
C. Allow web applications to access web services
D. Allow EJBs to communicate with one another
Item 23 of 58 Mark item for review
An application needs to be redeployed because the quality assurance team has just approved a bug fix and delivered a new .ear file. Using the admin console, which is the RECOMMENDED way to redeploy this application?
A. Applications -> Enterprise Applications -> Export -> Update, Save
B. Applications -> Enterprise Applications -> Uninstall, Install, Save
C. Applications -> Enterprise Applications -> Export, Stop, Update, Export,Save, Start
D. Applications -> Enterprise Applications -> Stop, Update, Export, Save, Start
Item 24 of 58 Mark item for review
An administrator is writing a deployment script to create a
JDBC Provider. Using the wsadmin tool, how would the administrator determine which parameters are required to create a new JDBC provider?
A. $AdminApp required JDBCProvider
B. $AdminConfig list JDBCProvider
C. $AdminApp list JDBCProvider required
D. $AdminConfig required JDBCProvider
Item 25 of 58 Mark item for review
Which of the following tasks can be performed using the Application Assembly Tool (AAT)?
(Select 2)
A. Create/Edit J2EE modules
B. Create/Edit SDK Applications
C. Create the EAR expansion directory
D. Modify the binding information attributes and IBM extension attributes
Item 26 of 58 Mark item for review
A system administrator is creating
Ant deployment scripts to automate the deployment process. The stage is reached when a task definition needs to be created to actually install the application on WebSphere. What task definition is appropriate to accomplish this?
A. <taskdef name="wsInstallApp" classname="com.ibm.websphere.ant.tasks.InstallApplication"/>
B. <taskdef name="wsInstallApp" classname="org.apache.tools.ant.tasks.InstallApplication"/>
C. <taskdef name="wsInstallApp" classname="com.ibm.websphere.ant.*"/>
D. <taskdef name="wsInstallApp" classname="com.ibm.apache.tools.ant.tasks.InstallApplication"/>
E. <taskdef name="wsInstallApp" classname="com.ibm.websphere.ant.InstallApplication"/>
Item 27 of 58 Mark item for review
Given that Secure Socket Layer (SSL) is configured properly and working on the IBM HTTP Server. Which of the following need to be performed on the WebSphere Application Server V5.0 Base so that it will accept SSL connections from the HTTP Server?
(Select 2)
A. Global Security must be disabled.
B. The Application Server must be restarted after enabling SSL on the web server.
C. A Virtual Host alias must be added to support SSL
D. The Web Server Plugin configuration file must be updated.
Item 29 of 58 Mark item for review
Java 2 Security guards access to which of the following system resources?
A. JSPs
B. file I/O
C.
servlets D. sockets
E. EJB methods
Item 30 of 58 Mark item for review
Which of the following processes are capable of running a security server?
A. Application Server
B. Administrative Server
C. Web server plug-in
D. Node Agent
Item 31 of 58 Mark item for review
Which of the following statements are TRUE with respect to administrative security?
(Select 2)
A. The administrative roles are defined to permit WebSphere Application Server administrative functions only from the Web-based administrative console.
B. WebSphere Application Server administrative security is automatically enforced when global security is enabled.
C. WebSphere Application Server extends the J2EE security role based access control to include administrative roles.
D. Because the administrative security configuration is at node level, it is not necessary to restart all of the servers.
Item 32 of 58 Mark item for review
To provide JNDI Naming Service, the CosNaming Service utilizes which of the following ports?
A. 9000
B. 2809
C. 50000
D. 900
Item 33 of 58 Mark item for review
In which circumstances might the LDAP server port have to be specified rather than accept the default port?
(Select 3)
A. If the IBM WebSphere Application Server V5 will inter-operate with a previous (e.g. Version 4.x) version IBM WebSphere Application Server.
B. When the port has been pre-empted by IIOP.
C. When multiple IBM WebSphere Application Servers are installed and configured to run in the same "Single Sign On" (SSO) domain.
D. When the "Bootstrap port" has been reset to the LDAP default port.
Item 34 of 58 Mark item for review
Which authentication method permits a site-specific login through an HTML page or
JSP?
A. Basic authentication
B. Digest Authentication
C. Client-certificate authentication
D. Form-based authentication
Item 35 of 58 Mark item for review
Which of the following is a typical reason for implementing vertical scaling?
A. To distribute resources over multiple nodes for failover
B. To fully utilize all of available resources of a node
C. To improve the performance of individual application servers
D. To eliminate a single point of failure
Item 36 of 58 Mark item for review
Where is the default location of web server plugin configuration file?
A. <as-root>/config/plugin-cfg.xml
B. <as-root>/config/cells/plugin-cfg.xml
C. <as-root>/properties/plugin-cfg.xml
D. <as-root>/properties/cells/plugin-cfg.xml
Item 37 of 58 Mark item for review
Which of the following reasons for using persistent session management are TRUE?
(Select 2)
A. For keeping the user's state information permanently for consistent interaction
B. For recovering the user's session data by another cluster member after a cluster member in a cluster failed or is shut down
C. When the user's session data is too valuable to lose through unexpected failure at the WebSphere node
D. For allowing the administrator better control of the session cache memory footprint
Item 38 of 58 Mark item for review
Which of the following phrases accurately describe the concept of a cluster and cluster members?
(Select 3)
A. A set of servers with identical applications deployed on them
B. A blueprint for designing Enterprise Applications
C. A set of servers that participate in workload management
D. A set of servers that may be located on a single node
E. A set of servers that have identical configuration data
Item 39 of 58 Mark item for review
At which level can HTTP session management NOT be configured?
A. Application Server
B. Application
C. EJB container
D. Web Module
Item 40 of 58 Mark item for review
When setting up servlet caching, what is the purpose of assigning 'Caching group members'?
A. Groups JSP, HTML, and other resources with a particular servlet that uses them and may need to be cached with the servlet.
B. Provides a list of servlets and JSPs to cache when used.
C. Specifies which users or roles receive cached copies or regenerated servlets and JSPs.
D. Specifies whether or not to cache all resources associated with a servlet or JSP.
Item 41 of 58 Mark item for review
A WebSphere Application Server V5.0 Administrator is attempting to understand WebSphere Connection Pooling. In which of the following examples should her application use WebSphere Connection Pooling?
(Select 3)
A. Whenever the application cannot tolerate the overhead of obtaining and releasing a database connection.
B. Whenever the application requires Java Transaction API(JTA) transactions within the WebSphere Application Server.
C. Whenever the application developers have implemented connection pooling in the code.
D. Whenever the application needs to share connections among multiple users.
E. Whenever the application manages the specifics of creating a connection, such as the database name, username, or password.
Item 42 of 58 Mark item for review
Which of the following are valid methods for installing a WebSphere Application Server interim fix or fix pack?
(Select 2)
A. Use the updateWizard to install the fix
B. Use the updateSilent command to install the fix
C. Use the WASPreUpgrade tool to install the fix pack
D. Use the WASPostUpgrade tool to check for errors after installing the fix pack
E. Use the setupClient script to install the fix pack
Item 43 of 58 Mark item for review
How does the 'Starting Weight' configuration affect enterprise applications installed in IBM WebSphere Application Server V5?
A. Higher weights get more processing power compared to other applications with lower weights.
B. Lower weights get more processing power before applications with higher weights.
C. Specifies the starting order of applications when the server is started or restarted. The application with the lowest starting weight is started first.
D. Specifies the application weight for plug-in. Based on that value forwards plug-in the request to one or other application server.
Item 44 of 58 Mark item for review
The "restoreConfig myBackupConfig nostop" command restores a node's configuration from a backup called myBackupConfig but does NOT:
A. stop the servers, which could allow a synchronization during restore
B. stop the restoration process if synchronization errors occur - restoring everything EXCEPT what caused the error
C. stop the restoration process if synchronization errors occur - restoring everything INCLUDING what caused the error
D. stop an incoming request to the application being restored if the request can execute without errors
Item 45 of 58 Mark item for review
An administrator has successfully completed a default installation of both the application server and IBM HTTP Server. Which of the following locations contains the plug-in configuration files?
A. /Program Files/IBM HTTP Server/
B. <WASROOT>/AppServer/bin/
C. <WASROOT>/AppServer/config/
D. <WASROOT>/AppServer/properties/
Item 46 of 58 Mark item for review
A web site, that does not make use of certificates must store information within a given user's session. What session tracking mechanism can be used, even if the user has disabled cookies?
A. SSL ID Tracking
B. Cookies
C. URL Rewriting
D. Protocol Switch Rewriting
Item 47 of 58 Mark item for review
What BEST describes setting the 'Minimum Heap Size' close to or equal to the 'Maximum Heap Size'?
A. High performance web applications waste more processing power on low performance functions.
B. Low performance web applications spend more processing power than necessary on low performance functions.
C. Can improve WebSphere Application Server start up.
D. Garbage collection cycles are more frequent that can affect performance.
Item 48 of 58 Mark item for review
Which of the following situations would require a WebSphere administrator to manually edit the plug-in configuration file?
A. When a plug-in is generated on one operating system and needs to be copied to a remote operating system.
B. When enterprise applications are removed from the application server.
C. For any remote application servers that require components or services from another application server whose plug-in was edited.
D. When security roles were edited for components referenced by the plug-in.
Item 49 of 58 Mark item for review
An administrator needs to monitor the percentage of database connections in use for a specific application server. Which of the following tools could the administrator use?
A. Tivoli Performance Viewer
B. WebSphere Administrative Console
C. Log Analyzer
D. Resource Analyzer
Item 50 of 58 Mark item for review
CPU use is being overloaded and performance on the Web server is down. What action could be taken to improve performance of handling incoming requests?
A. Install an additional network adapter to increase network throughput.
B. Increase the MaxServers directive to enable more potential processes.
C. Set up a Caching Proxy to relieve Web Server.
D. Increase the MaxClients directive to minimize average response time.
Item 51 of 58 Mark item for review
Which of the following statements regarding IBM WebSphere Application Server V5 Log Analyzer is TRUE?
A. It is capable of downloading the latest symptom XML file from the IBM support site.
B. It supports functions for ORB trace formatting and message IDs.
C. It creates an activity.log file which can be viewed with any text editor.
D. It can be used to view remote log files.
Item 52 of 58 Mark item for review
Which WebSphere files can contain application print statements?
(Select 2)
A. startServer.log
B. SystemOut.log
C. SystemErr.log
D. native_stdout.log
E. native_stderr.log
Item 53 of 58 Mark item for review
Which of the following prerequisites MUST be met before the JNDI dumpNameSpace utility can be used?
A. The AdminServer containing the application that the administrator will be performing the JNDI dump against, must be active.
B. The application server that an administrator will be performing the JNDI dump against, must be active.
C. The Administrative Console must be used to perform the dumpNameSpace.
D. The PATH environment variable must be set to include the <as-root>/bin/dumpNameSpace.bat command before invoking.
Item 54 of 58 Mark item for review
For a WebSphere Application Server V5.0 Base installation, which output filename conforms to the format created by the Collector Tool?
A. hostname-Base-WASenv.jar
B. hostname-Base_WASenv.log
C. servername-Base_WASenv.log
D. servername-Base-Wasenv.jar
Item 55 of 58 Mark item for review
The Administrative Console provides multiple methods to help an administrator troubleshoot the system. Which of the following are examples of these methods?
A. Console messages
B. Trace
C. Logs
D. Profiling
E. Symptom database
Item 56 of 58 Mark item for review
JVM log files can be rotated based on the following criteria:
(Select 2)
A. Time
B. Remaining disk space
C. At each app server start-up
D. Maximum file size
E. JVM heap size
Item 57 of 58 Mark item for review
Which of the following statements about the First Failure Data Capture (FFDC) tool is correct?
A. The captured data is saved automatically in the <WAS_HOME>/logs/ffdc folder.
B. It is the primary tool to view and analyze log files.
C. It is an optional component to choose during install.
D. It needs to be started and stopped manually.
Item 58 of 58 Mark item for review
If the Admin Console fails to start up, which of the following files should an Administrator check to see errors?
(Select 2)
A. startServer.log
B. native_stderr.log
C. SystemOut.log
D. admin_error.log
E. admin_access.log
-------------------------------------------------------------
Answers:
1. c
2. c
3. d
4. b
5. c e
6. b
7. c d
8. a d
9. b e
10. d
11. c
12. a
13. b
14. a b
15. a
16. c
17. b d
18. b
19. b d
20. b
21. c
22. a
23. a
24. d
25. a d
26. a
27. b d
28.
29. b d
30. a
31. b c
32. b
33. a c d
34. d
35. b
36. b
37. b c
38. a c d
39. a
40. b
41. a c d
42. a b
43. c
44. a
45. c
46. c
47. c
48. a
49. a
50. c
51. a
52. b c
53. b
54. a
55. a
56. a d
57. a
58. a c