Hello to everybody.
This friday I'm taking the test
252. To study, I've corrected the Primer test from the IBM certification site. I think all answers should be correct, if someone disagrees with any answer just tell it and I will correct it.
I hope you enjoy it!!
Item 1 of 54
Which of the following is the MOST accurate description of how the "Single" application class loader policy functions?
A. A single application class loader is used to load all EJBs, utility JARs, and shared libraries within the application server JVM.
B.An application class loader first delegates the loading of classes to its parent class loader before attempting to load the class from its local class path.
C. The class loader attempts to load classes from its local class path before delegating the class loading to its parent.
D. A single application class loader is used to load only the utility JARs and Web modules within the application server JVM.
When the application class loader policy is set to Single, a single application class loader is used to load all EJBs, utility JARs, and shared libraries within the application server (JVM). If the WAR class loader policy then has been set to Application, the Web module contents for this particular application are also loaded by this single class loader.
When the application class loading policy is set to Multiple, the default, each application will receive its own class loader for loading EJBs, utility JARs, and shared libraries. Depending on whether the WAR class loader loading policy is set to Module or Application, the Web module might or might not receive its own class loader.
Reference: WebSphere Application Server V6 System Management & Configuration Handbook. Pag.828
Item 2 of 54
After federating a custom node, an examination of the entries in a log file shows an "INSTCONFFAIL" indicator which denotes a complete failure. All of the following can be contributors to the failure EXCEPT:
A. the deployment manager is not running.
B. the node agent failed to start.
C. security was enabled.
D. a reserved name was used for the node name.
If the deployment manager is not running the federation won�t even start, so it cannot be A. If the node agent fails the synchronization between node and cell will also fail and therefore federation will fail, so it cannot be B. If security is enabled and the proper authentication data is not provided federation will fail, son it cannot be B. I don�t know any reserved name and it cannot be any of the other answers, so the correct answer is D.
Item 3 of 54
client is residing in a client container. The Java client needs to make a request to the EJB
container of an application server in a distributed cell. Which of the following protocols is MOST appropriate for the client request?
Although SOAP can be utilized to access EJB since EJB 2.1, RMI/IIOP is the primary protocol to access EJB services, so it�s answer B. JDBC is an java API for database accessing and HTTP is a communication protocol.
Item 4 of 54
During a WebSphere V6 Network Deployment installation, the system administrator did not select to install "Application Server Samples". Later, the system administrator decided to install "Application Server Samples". Which of the following steps are required to complete this installation?
A. Connect to the admin console. Navigate to Applications -> Enterprise Applications and click on 'Install' tab. Provide sampleapp.ear under samples directory.
B. Start the installation wizard. Select "Add features to the existing copy of the V6 Application Server product". Choose "Application Server Samples" option during the installation.
C. Start the installation wizard. Select "Add features to the existing copy of the V6 Application Server product". Choose "Application Server Samples" option during the installation. Run "install.bat" under samples\bin directory to deploy sample applications.
D. Start the installation wizard. Select "Upgrade existing copy of the V6 Application Server product" and select "Network Deployment" option during the installation.
Item 5 of 54
When using local session management, which of the following configuration settings could cause the loss of user session objects?
A. If HTTP Persistence connections are not used
B.If the Allow overflow property setting is not enabled
C. If Memory-to-memory replication is not configured
D. If the datasource used by the session database is not defined
If the �Allow overflow� property is not set we would lose user session objects if we reach the session memory limit, so the answer is B. Answer A is not relevant and answers C and D refer to distributed session management, not local session management .
Item 6 of 54
Immediately following federation, the process started by the custom profile is the:
A. Deployment manager
D. Web server
Reference: WebSphere Application Server V6 System Management & Configuration Handbook. Pag. 145
Item 7 of 54
A system administrator wants to implement the Upstream Queuing model to improve performance. Which of the following adjustments MUST be made?
A. Set the all cluster members to have the same JVM heap size.
B. Tune each Web container to have a smaller queue than the Web server.
C.Tune the queues to decrease in size from the Web server to the backend resource.
D.Tune the queues to increase in size from the Web server to the backend resource.
In general, requests wait in the network in front of the Web server, rather than waiting in WebSphere Application Server. This configuration only supports those requests that are ready for processing to enter the queuing network. Specify that the queues furthest upstream or closest to the client are slightly larger, and queues further downstream or furthest from the client are progressively smaller.
Item 8 of 54
A system administrator is designing a connection between a Service Integration Bus (SIB) and a WebSphere Message Queue (MQ) manager. The system administrator wants the design to incorporate the following topologies. All of the following are correct EXCEPT:
A.Design the WebSphere message queue to coexist on the same machine as the WebSphere default-messaging provider.
B.Design the messaging engine to participate in a WebSphere MQ cluster.
C.Design the messaging engine to look like another queue manager to WebSphere MQ.
D.Design WebSphere applications to send messages directly to WebSphere MQ and destinations on the SIB.
WebSphere MQ server clustering is only available with the full WebSphere MQ product installed as a JMS provider.
Item 9 of 54
A system administrator has federated a node while creating the custom profile with the profile creation wizard. The system administrator does not see the entries for that node using the deployment manager administrative console. Which log file will give more information about the problem?
A.addNode.log under <PROFILE-ROOT>\logs directory
B.addNode.log under <DEPLOYMENT-MANAGER-ROOT>\logs directory
C.federate.log under <PROFILE-ROOT>\logs directory
D.federate.log under <DEPLOYMENT-MANAGER-ROOT>\logs directory
By default, the log file is called addNode.log and is created in the logs directory of the profile for the node being added.
Item 10 of 54
Which of the following statements is valid about the First Failure Data Capture (FFDC) tool?
A.The First Failure Data Capture tool does not affect the performance of the IBM WebSphere Application Server.
B.The First Failure Data Capture tool is only available in application servers that have been federated into a Network Deployment cluster.
C.The First Failure Data Capture tool is not compatible with J2EE 1.4.
D.The First Failure Data Capture tool is not available on all platforms.
Item 11 of 54
A system administrator is setting up SSL communications between the plugin and the application server. A new keyring file is being used. Which of the following elements in the plugin-cfg.xml file would need to be defined?
A.The public key and the private key
B.The public key and the password file
C.The keyring file and the password file
D. The keyring file and the stashfile
When the Protocol of the Transport is set to HTTPS, use this element to supply the various initialization parameters, such as password, keyring and stashfile
Item 12 of 54
An administrator is configuring the Message Driven Bean (MDB) activation specification to service a queue. Which of the following properties is required when setting up a queue?
You use Destination type of an activation specification to define whether the message-driven bean uses a queue or topic destination.
Item 13 of 54
A WAR file in an enterprise application has been changed. How can a system administrator update it on the server with a minimal amount of work?
A.Re-package the EAR file using Application Server Toolkit then use the "Update -> Full application" function on the administrative console.
B.Use the "Update -> Single file" function of the Administrative console to replace the WAR file.
C.Use the "Update -> Single module" of the Administrative console to replace the WAR file.
D. Use the "Update -> Partial application" of the Administrative console to replace the WAR file.
Item 14 of 54
A system administrator has received an EAR file from the development team. The system administrator has been asked to install it into an application server. The system administrator has been told that there are some J2EE security roles defined within the EAR that need to be mapped to users and groups within the defined user registry. All of the following can be used to map users and groups to J2EE security roles EXCEPT:
A.During initial installation of an Enterprise Application using the administrative console.
B.After the Enterprise Application has already been installed through the administrative console.
C.After the Enterprise Application has already been installed through wsadmin.
D.While installing the Enterprise Application by editing the was.policy file.
The was.policy file contains application-specific permissions for a WebSphere Application Server enterprise application. It does not contain user or groups roles.
Item 15 of 54
Java 2 security must be configured through the console. Which of the following administrative roles is the required minimum?
Item 16 of 54
A new JDBC provider is being created in a cell in which the servers run different operating systems. Which of the following scopes should be used?
Item 17 of 54
A backup configuration was created using the backupConfig command. The configuration must now be restored. Which of the following commands should be used to avoid stopping the server before restoring the configuration?
Item 18 of 54
A system administrator wants to be sure that seven days of SystemOut.log information are available on the local server's disk. What is the easiest way to ensure this will happen using the Log File rotation?
A.Set the "Maximum Size" option to 1 week.
B.Set the "Start Time" option to Sunday and the "Maximum Number of Historical Log Files" to 1.
C. Set the "Maximum Number of Historical Log Files" to 7 and the Time options to Start Time to 1 and Repeat Time to 24.
D.Set the "Maximum Log Files" option to 7.
Item 19 of 54
Before enabling Global security, an administrator must first configure various security settings. All of the following steps are required to be configured before enabling global security, EXCEPT:
A.The default SSL keystore and truststore files.
B.A user registry.
C.The authentication mechanism.
D.The server user ID for the given user registry.
Item 20 of 54
A customer has configured an HTTP session via the Session Manager properties interface. The session is set to timeout in about 30 minutes. However, it typically takes more than 30 minutes and sometimes 35 minutes for a session to timeout. What is the MOST likely cause of the delay?
A.There is a bug in the Session Manager configuration.
B. The Least Recently used algorithm is slow.
C.The session invalidation process is running approximately every 5 minutes.
D.The session timeout is set too high.
Item 21 of 54
A system administrator needs to check the state of an enterprise application within a federated cell. The system administrator can connect using either the administrative console or wsadmin to which of the following components?
Item 22 of 54
A system administrator is called to suggest how to determine the cause of an application error. The system administrator recommends that the Log Analyzer be used over and above just reading the JVM logs because Log Analyzer can:
A.Show a series of errors as one unit of work.
B. Analyze the logs and pinpoint the root cause of an error and then suggest a fix.
C.Collate all logs from every system component and pinpoint the root cause of the error.
D.Dynamically monitor log files at runtime and send an alert when errors occur.
Item 23 of 54
An HTTP plug-in configuration file can be regenerated from the administrative console by selecting which of the following?
A.Servers->Web servers, select a Web server, and click Generate Plug-in
B.Servers->Application servers->server->Web container, and click Generate Plug-in
C.Environment->Update Web Server Plug-in, and click OK
D.Environment->Virtual Hosts, and click Generate Plug-in
Item 24 of 54
Which of the following sets of Web server plugin properties can be modified by using the administrative console's request routing configuration tab?
A.Caching policy and log level
B.Refresh interval and log file location
C.Enable/disable automatic plug-in propagation
D.Load balancing option and retry interval
Item 25 of 54
Which of the following would have to be configured in order to implement memory-to-memory HTTP Session persistence?
A.The Data Replication Service and Web Container
B.EJB session beans and EJB Container
C.The HTTP Plug-in and Embedded HTTP Server
D.The JMS Server and Queue Manager
Item 26 of 54
A security role has been mapped to the special group Everyone. What is the result of this action?
A.Every user defined for the group has access to the resource.
B.Everyone will be denied access to the resource.
C.Every user has access to the resource.
D.Anyone logged in has access to the resource.
Item 27 of 54
Which of the following are used in order to administer the application server?
A.Beans and XML files
B.A relational database repository and datasources
C.Security service and LDAP user registry
D.External HTTP server and HTTP server plugin
Item 28 of 54
How can a system administrator persist trace output that is written to the memory buffer of a running application server?
A.Configure the time interval and/or the memory buffer max size parameters so that if either is reached the memory buffer will be dumped into a file.
B.In the Admin Console, click "Troubleshooting -> Logs and Trace -> <server name> -> Diagnostic Trace" and then go to the Configuration tab and chose to Dump the memory buffer
C. In the Admin Console, click "Troubleshooting -> Logs and Trace -> <server name> -> Diagnostic Trace" and then go to the Runtime tab and chose to Dump the memory buffer
D.It is not possible to perform this task in a running application server.
Item 29 of 54
A system administrator has installed the Network Deployment Manager package and now wishes to build a clustered server environment using custom profiles. All of the following steps are necessary EXCEPT:
A.Create a deployment manager profile.
B.Accept default values, create one custom profile on each node on which application servers will be run.
C.Federate each custom profile to the deployment manager.
D.Create new application servers and clusters on the nodes from the administrative console.
Reference:By default, the Profile Creation wizard federates a custom node when you create a custom profile. http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/topic/com.ibm.websphere.nd.doc/info/ae/ae/tpro_instancesmngdnode.html
Item 30 of 54
A system administrator requires that an EJB JAR file be part of two Enterprise Application Archive (EAR) files. How can this be BEST accomplished using the Application Server Toolkit (AST)?
A.Use the JDK's JAR utility to include the WAR file in the EAR files.
B.Use the Application Deployment Descriptor editor to add the EJB module to each of the applications.
C.Open the Properties dialog for the EJB project and select the applications in the Project References dialog.
D.Open the Properties dialog for both Enterprise Application projects and select the EJB module in the Project References dialog.
Item 31 of 54
A system administrator is asked to help diagnose some application problems. The system administrator considers asking for the log messages to be logged in the Advanced Format. Why might this help the system administrator to diagnose the problem?
A.The exact line of code where an exception occurred will be decompiled and shown as part of the message.
B.The JVM heap metrics at the time of the error will be included in the message.
C.Information about an event, when possible, will be added to the message.
D.Information about the distributed transaction will be included.
Item 32 of 54
A system administrator received a message that the Installation Verification (IVT) failed after creating a profile using the profile creation wizard. Which log file(s) should the system administrator review to find out more information about the failure?
A.ivtClient.log under <PROFILE-ROOT>\logs
B.wasprofile_create_profileName.log under <INSTALL-ROOT>\logs\wasprofile directory
C.ivtlog.txt under <INSTALL-ROOT>\logs directory
D.installlog.txt under system temp directory
Item 33 of 54
A system administrator notices a number of "ConnectionWaitTimeoutException" exceptions associated with a datasource in the SystemOut.log file. Which of the following is the MOST likely cause of this error?
A.The Connection Timeout on the data source has been set to 0.
B.The number of physical connections to the database has reached the number of Maximum Connection as specified in the datasource settings.
C.The number of physical connections to the database has reached the number of Minimum Connection as specified in the Data source settings.
D.The database transaction isolation is set too high.
Item 34 of 54
A system administrator is adding a cluster member to an existing cluster. What is the minimum requirement for the cluster member to qualify for immediate addition to the cluster?
A.Any standalone application server qualifies if it is available on the network.
B.Any application server qualifies if it uses the same hardware and operating system as the other servers in the cell qualifies.
C.The new cluster member is part of a node in the cell, and belongs to the same node group and core group as other servers in the cluster.
D.The new cluster member must belong to a node in the same cell where the cluster is defined.
Item 35 of 54
Cluster creation requires the system administrator to specify the weight for a cluster member. This weight is significant because it is used in the WebSphere WLM runtime by the:
A.Random scheduling algorithm
B.Round Robin scheduling algorithm
C.Both Random and Round Robin scheduling algorithm
D.Weighted Random algorithm
Item 36 of 54
A system administrator is asked to help explain why a NameNotFoundException is happening while attempting to access an enterprise bean, data source, messaging resource, or other resource. What action would be the LEAST useful to do to explain the problem?
A.Browse the properties of the target object in the administrative console, and verify that the JNDI name it specifies matches the JNDI name the client is using.
B.Browse the properties of the target object in its deployment descriptor, and verify that the JNDI name it specifies matches the JNDI name the client is using.
C.Determine if the object being looked up resides on a server different from the one from which the initial context was obtained since, in this case, the fully qualified name must be used.
D.Use the showNameSpace utility to export the entire JNDI tree to determine if the desired resource is listed.
Reference:The deployment descriptor settings can be modified when deploying the application or later using the administrative console. If you�re checking the current settings in the answer A there is no need to the action described in answer B.
Item 37 of 54
Application code can write messages to a server's SystemOut and SystemErr log files. All of the following configurations are valid for application code log messages EXCEPT:
A.Application log messages can be excluded or included entirely.
B.Application log messages can be formatted like WebSphere Application Server system messages.
C.Application log messages can be excluded from either SystemErr.log or SystemOut.log individually.
D.Application log messages can not be formatted like WebSphere Application Server system messages.
Item 38 of 54
A system administrator created an application server profile using the profile creation wizard. The system administrator then ran the Installation Verification program (IVT) immediately after creating it to verify the creation. Which of the following will indicate the appropriate behavior of the IVT program after its invocation?
A.IVT will fail as application server (server1) was not started after profile creation.
B.IVT verifies the log files for accuracy and does not need to be connected to the application server (server1).
C.IVT will start the application server (server1) if it was not already started and verifies the installation.
D.IVT will verify by connecting to the application server (server1) that was started by the profile creation wizard after its creation.
Item 39 of 54
What is the significance of the vpd.properties file in the WebSphere Application Server V6 Network Deployment package?
A.It contains information of usernames and passwords that can install, operate and deploy applications on the application server(s).
B.It contains information about previous installations of WebSphere Application Server products and helps installation program to control options for new installations.
C.It contains the port numbers to be assigned by the installation program during the new install.
D.It contains the list of applications including date and time stamps and user that installed the application.
Item 40 of 54
A system administrator was asked to develop artifacts specifically for the installation of a WebSphere Application Server V6 Network Deployment package. The system administrator also created an application server profile using silent installation scripts (response files). What approach will enable the system administrator to complete the task without using GUI based tools?
A.Create two response files where the first response file is used to install the product binaries and causes the second response file to be used for creating the application server profile.
B. Create a response file that installs product binaries and creates the application server profile.
C.Create a response file that installs product binaries and use profile creation wizard to create the application server profile.
D.Install product binaries using installation wizard and create a response file to create the application server profile.
Item 41 of 54
After changing the JNDI name of a datasource, what must be changed within an application using this datasource to keep them running correctly?
A.The reference to resource mappings.
B.The EJB references to match the new JNDI name.
C.The name of the JDBC provider to match the new datasorce name.
D.The datasources.xml file for the application.
Item 42 of 54
While performing a node federation, the addNode operation failed. From the following list of options, what would MOST likely induce this failure?
A.The cell already exists
B.The cell's deployment manager is running before the addNode command was run
C.The name of the new node is not unique in the cell
D.The addNode did not specify to carry over the applications
Item 43 of 54
2.4 specification requires that an HTTP session honor session affinity. In a clustered environment, a cluster member could possibly fail. Which of the following mechanisms is used to ensure session affinity?
A.Database session persistence
C.Web Server plug-in
Reference: WebSphere Application Server has functionality in the HTTP Server plug-in to help with session affinity. The plug-in reads the cookie data (or encoded URL) from the browser and helps direct the request to the appropriate application or clone based on the assigned session key. This functionality increases use of the in-memory cache and reduces hits to the database or another WebSphere Application Server instance http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/topic/com.ibm.websphere.nd.doc/info/ae/ae/cprs_best_practice.html
Item 44 of 54
A system administrator has been assigned the task of defining a Custom User Registry for a federated cell. The administrative console will be used. All of the following entries are required in the process of configuring the Custom User Registry EXCEPT:
A.Server user ID
B.Server user password
C.Server host name
D.Custom registry implementation class name
Item 45 of 54
A J2EE enterprise application is being assembled to take advantage of J2EE security. During this process, there are a number of configurations and mappings that need to be made. Which of the following items can a method permission be mapped to?
C.A login mechanism
D.A security realm
Reference: Method permissions map one or more methods to a set of roles. An enterprise bean has four types of methods: home methods, remote methods, LocalHome methods and local methods. You can add permissions to enterprise beans on the method level. http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/topic/com.ibm.websphere.nd.doc/info/ae/ae/tsec_secejb_atk.html
Item 46 of 54
A system administrator has configured the Web Container thread
pool with the "Allow thread allocation beyond maximum thread size" option enabled (checked). What is the MOST significant performance implication of this configuration setting?
A.It will allow the system to scale well and eliminate any bottlenecks
B.It could allow unexpectedly high load into the system possibly rendering the system unusable
C.It can cause timeouts in the plugin
D.It can cause thrashing
Item 47 of 54
In order to set up memory-to-memory replication in a WebSphere Application Server V6 clustered environment, which of the following should be created?
A.Replication Domain and specify cluster members to use this Replication Domain
B.Replication Domain on each cluster member and create partitions for each Replication Domain
C.Replication Domain and specify the cell associates with the Replication Domain
D.Replication partition and attach cluster to the partition
Item 48 of 54
Assume that a load balancer and a Federated cell have been installed and are functional. All of the following contain built-in failover capabilities EXCEPT:
Reference: Redbook �WebSphere Application Server Network Deployment V6 High Availability Solutions� (sg246688) pag 104
Item 49 of 54
Which of the following adjustments to the Web module parameter would result in improved response time for servlet clients?
A.Setting the distributable flag.
B.Setting the reload interval to 20 seconds or less.
C.Enabling load on startup.
D.Disabling load on startup.
Item 50 of 54
A systems manager is creating a new virtual host that will be used in a clustered environment. After building the virtual host, the system administrator knows that if the new virtual host is to operate properly in a clustered environment, it is very important to:
A.Set the DNS alias to the TCP/IP host name and port number for servlet requests.
B.Register all host aliases used by servers in the cluster in the virtual host.
C.Map the correct Multi-Purpose Internet Mail Extensions (MIME) to the cluster members in the virtual host.
D.Map Web modules to the new virtual host
Item 51 of 54
A developer at a customer site asks the system administrator to help setup IBM Rational Application Developer (IRAD) to debug the application. The system administrator must make sure the developer has the correct remote JVM debug port configured. Which of the following is the default remote JVM debug port?
Item 52 of 54
The Tivoli Performance Viewer can provide several summary reports to include performance statistics for various application and application server components. Which of the following lists contains the complete set of available summary reports?
A.EJBs, EJB Methods, Connection Pool, Thread Pool, J2C Container
B.Servlets, EJBs, HTTP plug-in, ORB plug-in, JVM
C.Servlets, EJBs, EJB Methods, Connection Pool, Thread Pool
D.Servlets, EJBs, Connection Pool, Thread Pool, Dynamic Cache
Item 53 of 54
A system administrator is asked to configure the JVM log files for log file rollover. Which parameters can be configured to control log file rollover?
A.By file size and/or time
B.By the number or Fatal errors and/or by file size and/or time
C.By file size and/or by time and/or by wsadmin command
D.By file size only
Item 54 of 54
A system administrator would like to deploy an enterprise application running on WebSphere that exchanges messages with a WebSphere MQ based application. What J2EE messaging provider would be the BEST fit?
A.The WebSphere V5 messaging provider
B.The Default messaging provider
C.The generic JMS Provider
D.The Embedded JMS Provider
[ September 11, 2007: Message edited by: miquel adrover ]