Professional Documents
Culture Documents
QUESTION 1
Which statement describes the relationship between WebSphere MQ and Web Sphere
default messaging as a JMS provider?
A. Default messaging relies on WebSphere MQ as the JMS Provider
B. Default messaging is a version of WebSphere MQ
C. WebSphere MQ and default messaging are separate and do not share any modules or
configuration data
D. WebSphere MQ and default messaging must share the same Cloudscape database
QUESTION 2
When attempting to install WebSphere Application Server v6.1 using the silent install,
the installation fails early in the process and no log files appear to be created in the logs
directory. Which two steps can the administrator perform to troubleshoot the issue?
A. Restart the installation after an OS restart
B. Restart the installation with the log parameter
C. Look for the log files in the system temporary area
D. Run the installation verification test (IVT)
E.Start over by creating a new responsefile.txt using the responsefile.base.txt
QUESTION 3
What is the name of the WebSphere scripting tool?
A. wasadmin
B. ws_ant
C. wsadmin
D. wsdeploy
QUESTION 4
An administrator is configuring JDBC database connections. Where is the file system
path to the DB2 or Oracle driver .zip files specified?
A. On the Connection manager J2C configuration panel
B. From the Environment -> WebSphere Variables panel of the administration Console
C. Within the .ear file of the deployed application
D. Within the connection pool parameters for the cell
QUESTION 5
When installing WebSphere Application Server v6.1 along with IBM HTTP server and
related plug-ins, an administrator notices the following message in the
<plugins_root>/logs/install/log.txt
Plug.install, com.ibm.ws.install.ni.ismp.actions.
ISMPComponentizedFileRepositoryDeployAction, Err, Component not found: prereq.jdk
Which two additional entries should the administrator verify?
A. The PLUGIN_JDK_ROOT value in log.txt
B. The JAV_HOME system environment variable
C. The CURRENT_WORKING_DIRECTORY value in log.txt
D. The CLASSPATH system environment variable
E. The JAVA_INSTALL_PATH value in log.txt
QUESTION 6
While an administrator is using the Tivoli Performance Viewer to analyze a performance
problem with a production application server, the administrator notes that the database
connection pools have a much lower percentage of utilization than the other pools. Which
statement explains this observation?
A. The Tivoli Performance Viewer percentages are only useful for performing
performance analysis on a server that is executing in a controlled load test scenario
B. the database server is constrained, causing calls to the database to consume more
resources than are available for processing
C. The connection pools have not been defined to account for parallel application server
calls to the database, causing this particular server to show low utilization
D. This Condition indicates there is a bottleneck in one of the processes upstream in the
pipeline of process flows within the application server
QUESTION 7
It has been decided to use database session persistence for a particular J2EE application.
Which two steps must be performed to implement this feature?
A. Create session database
B. Select a multi row schema
C. Configure the JDBC provider and data source
D. Create session database tables
E. Configure row size to match session size
QUESTION 8
Which statement is true for a managed application server process to startup?
A. Starting a managed server is not dependent on the presence of a running deployment
manager
B. The node agent should not be started before any managed servers on that node
C. A node agent and deployment manager must be running before starting a managed
server
D. The deployment manager needs to be started before the managed server
QUESTION 9
When adding a new member to a cluster, why might it be necessary for an administrator
to select the option for generating unique HTTP ports?
A. To prevent other applications from using these ports
B. To avoid port conflicts with other servers on the same node
C. To enable encryption over the secure HTTP ports
D. To ensure that cluster members on different nodes have unique ports
QUESTION 10
What are the three possible modes that the replication service instance can be set up to
run in?
A. Server mode
B. Broadcast mode
C. Client mode
D. Both Mode
E. Publish/Subscribe mode
F. Event Listener mode
QUESTION 11
The WebSphere scripting tool supports which two scripting languages?
A. Ant
B. Perl
C. Jacl
D. Jython
E. BSF
QUESTION 12
In addition to data sources and shared libraries, which resources can enhanced EARs
support?
A. Class loader policy, Virtual host information and JVM command line parameters
B. JAAS Authentication Aliases, Virtual host information and JVM command line
parameters
C. JAAS Authentication Aliases, Class Loader policy, Virtual host information and JVM
command line parameters
D. JAAS Authentication Aliases, Class loader policy and JVM command lien parameters
E. JAAS Authentication Aliases, Class loader policy and Virtual host information
QUESTION 13
Which statement most accurately describes the effect of increasing the JVM maximum
heap size?
A. More objects will be created and the time required to garbage collect will decrease
B. A larger heap size will cause the server to take longer to start
C. The time between garbage collections will increase, but the garbage collection will
take longer
D. No measurable performance change will result from increasing the heap size
QUESTION 14
Which services are implemented by the WebSphere Application server?
A. Security, JMS messaging, Naming and HTTP Plug-in
B. Security, Naming, Transaction and Dynamic cache
C. HTTP Load Balancing service, JMS messaging and Data Replication Service (DRS)
D. The user registry, Naming and HTTP Plug-in
QUESTION 15
An administrator is analyzing an activity.log file form a profile by using the Application
Server Toolkit (AST) Profiling and Logging perspective. There are hundreds of log
records. Most of the records as informational messages. How can the administrator view
only the records whose severity is at the warning and error level?
A. Update the filter so that it shows only Error and Warning log records
B. When the activity.log file is imported into AST, use the filter option to exclude the
informational messages
C. The activity.log file must be filtered using the Log Analyzer before it is imported into
AST
D. Create two filters, one showing only Errors and one showing only Warnings. Export
each and merge them into a single new activity log
QUESTION 16
Certkiller .com has a WebSphere Application Server V4 client and wishes to look up and
access objects in WebSphere Application Server V6.1 without requiring changes to the
client. What must the customer do to enable WebSphere Application Server V6.1 objects
to be accessible through the legacy name space?
A. Create a configured name binding
B. Configure a leaf binding
C. Create a corbaname binding
D. Use a compound name
QUESTION 17
The application server is architected to use an existing user registry that stores
administrative users and application users. What is needed to setup this architecture?
A. Retrieve a list of nodes and node agents contained within the cell
B. Generate web services binding for the existing user registry
C. Configure the connection to the existing user registry
D. Configure the JNDI path to the security database
QUESTION 18
Which are three possible components of Web Modules?
A. Servlets
B. HTMLs
C. Session and Entity beans
D. RAR files
E. SIP Servlet files
F. MDB files
G. JSPs
QUESTION 19
Which set of parameters can a system administrator adjust to directly improve
performance for the EJB container?
A. Data Source connection pool and server JVM size
B. Session timeout and HTTP session object size
C. Transaction lifetime and client inactivity timeout
D. Cache Size and Cache cleanup interval
QUESTION 20
Which statement is true about WebSphere JVM logs?
A. The JVM logs are self-managing and can roll over based on time or file size
B. The JVM logs should be moved from the default location to make them easier to
access from the command line
C. The number of historical JVM log files is fixed at 3; this value will reset on each
server restart
D. The JVM logs are, by default, kept outside the Application server filesystem directory
tree to prevent them from being overwritten when applying fixpacks
QUESTION 21
A system administrator has enabled dynamic caching across a cluster of servers and
configured a replication domain for the cluster. Which configuration mode should be the
system administrator enable for memory to memory session partitioning to ensure each
object is replicated to every consumer of the replication domain?
A. Specific number of replicas
B. Full Group replica
C. Single replica
D. Entire domain
QUESTION 22
In order to create a new WebSphere cell and implement a horizontal scaling topology, an
administrator needs to perform which task(s)?
A. Federate nodes and create cluster members across multiple machines
B. Deploy multiple database servers using a high availability product
C. Federate nodes and create multiple clusters
D. Load balance multiple HTTP servers using Edge Components
QUESTION 23
Assume that a federated repository is configured from three existing repositories: A,B
and C. A user tries to log in but is denied access. What is a possible reason for the login
failure?
A. The users ID is contained in repository A, which is a file-based repository
B. The users LDAP Distinguished Name (DN) is not the same across all repositories
C. The users IDs does not exist in all three repositories
D. One or more of the three repositories is not accessible
QUESTION 24
From which root can the JNDI DumpNameSpace utility be used to examine the contents
of the namespace when JDNI errors are occurring?
A. Java, which contains naming information unique to the specific server application
B. Server, which contains the objects that are accessible by remote processes
C. Node, which contains all JNDI references used within the cells defined scope
D. Local, which contains objects that are available by local processes only
QUESTION 25
Which statement most accurately defines the location of where the WebSphere security
service runs?
A. The security service urns locally in each of the WebSphere processes (deployment
manager, node agent and application sever.)
B. The security service runs on the deployment manager
C. The security service runs in the federated nodes of the cell
D. The security service runs on the LDAP sever and is accessed through the application
server node agent
QUESTION 26
The Profile Management Tool Allows you to enable WebSphere administrative security.
Which use registry is used for this default security?
A. Standalone LDAP registry
B. Standalone custom registry
C. Local Operating system
D. Federated Repositories
QUESTION 27
A system administrator has just completed installing the core binary files of WebSphere
Application Server Network Deployment. The system administrator wasn't to create a
deployment manager profile with a Federated Node. What is the easiest method to
accomplish this?
A. Create deployment manager and custom profiles using the profile management tool
B. Create a deployment manager profile using the profile management tool
C. Create a Cell profile using the profile management tool
D. Create deployment manager and custom profiles using the manageprofiles command
QUESTION 28
Which approach should be recommended when designing a production topology for
WebSphere application servers providing high availability and failover capabilities?
A. Utilize load balances between the web servers and the application servers to provide
failover support at the application server tier
B. Place the Authentication servers outside of the intrusion firewall with the web servers,
since the web servers will need to access them
C. Create a design using multiple machines that handle the full production load, enabling
the use of application server clustering to provide failover capabilities
D. Use the target processor engines and least number of physical machines for the
application server tier, to minimize the software licensing costs?
QUESTION 29
If an administrator configures session management for an application server to use SSL
ID tracking, which two session tracking mechanism should also be enabled?
A. All
B. Cookies
C. Security Integration
D. URL Rewriting
QUESTION 30
For security reasons, an administrator would like to ensure that HTML resources are
isolated between Web modules running on a server. Which setting should be
administrator configure?
A. HTTPS port configuration
B. Admin Console Configuration
C. Virtual host configuration
D. Class loader configuration
QUESTION 31
What is the correct command to save configuration changes in Jython script file?
A. $AdminConfig.save
B. AdminTask.save()
C. $AdminTask.save
D. The WebSphere scripting tool does a periodic save based on a properly in its
configuration
E. AdminConfig.save()
QUESTION 32
An administrator has a cluster of two members and needs to ensure that roughly twice as
many client requests are routed to cluster member A than are routed to cluster member B.
How should the administrator configure this type of load distribution?
A. Double the OS priority for member As JVM process
B. Double the minimum size of member As Web container thread pool
C. Assign to member A, a weight two times as large as member Bs weight
D. Create two entries for member A in the HTTP plug-in configuration
QUESTION 33
For performance reasons, a J2EE application maintains HTTP session information in
memory (not persisted). The information in the session can be recreated based on the
contents of various cookies. Recreating this data from the cookies would incur
performance penalties. Which mechanism minimizes the need to recreate session data?
A. Database persistence
B. Memory-to-Memory replication in both client and server mode
C. Memory-to-memory replication in server mode
D. Session affinity in web server plug-in
QUESTION 34
When configuring a J2C connection factory, which setting can be configured using the
administrative console?
A. Container-Manager authentication alias
B. Mapping configuration alias
C. Component-managed authentication alias
D. Authentication preference
QUESTION 35
A System Administrator is planning to do a silent install using a customized file. The
system administrator does not want to install the samples that come with the product.
Which option in the response file should the administrator update to NOT include the
samples with the installation?
A. InstallType
B. Custom
C. PROF_Action
D. Feature
QUESTION 36
In order to gather all of the necessary data required by IBM Support to troubleshoot a
A. 45
B. 15
C. 30
D. 10
QUESTION 42
After hearing from clients that they are having problems logging into an application, an
administrator enables tracing on WebSphere security components using the following log
trace string:
com.ibm.ws.security.*=detail and restarts the server
When the administrator examines the trace log, there are no events recorded for any
security components.
What must the administrator do to ensure that the trace information is written to the trace
log?
A. Update the Log Detail levels for the servers node agent
B. Set the Log Detail Levels to one of the following: fine, finer, finest
C. Modify the server.xml file to enable tracing and restart the server
D. Configure the trace output format with the advanced setting
QUESTION 43
After installation and application server profile creation, which servlet is useful for
validating system configuration?
A. HitCount
B. WSSamples
C. HelloHTML
D. Snoop
QUESTION 44
When is J2EE mapping of security roles to users and groups allowed?
A. During application development with Rational Application Developer (RAD) or with
Application Server Toolkit (AST)
B. During application runtime
C. When configuring the user registry
D. During the creation of an application profile
E. After an application is installed
F. During an application installation
QUESTION 45
Which Web server plug-in setting is NOT configurable using the administrative console?
A. Refresh configuration interval
B. Load balancing option
C. Minimum number of connections
D. Retry interval
QUESTION 46
A WAR file containing several JSR 168 complaint portlets has bees successfully installed
in an application server. If portlet serving has been enabled, how can the portlets be
accessed with a browser?
A. Request the wpsServlet servlet and then select the portlet from a portal menu
B. Request the portlets index.jsp and then submit the context root and portlet name
C. Request the portlet directly using a URL that includes the name of the portlet
D. Request the PortletServingservlet servlet and then submit the name of the portlet
QUESTION 47
What has to be configured to implement memory-to-memory HTTP Session persistence?
A. The HTTP Plug-in and embedded HTTP Server
B. EJB session beans and EJB Container
C. The JMS Server and Queue Manager
D. The Data Replication Server (DRS) and Web Container
QUESTION 48
The Profile Management Tool Allows you to enable WebSphere administrative security.
Which use registry is used for this default security?
A. Local Operating system
B. Standalone LDAP registry
C. Standalone custom registry
D. Federated Repositories
QUESTION 49
An administrator should use the IBM Support Assistant (ISA) to perform which tasks?
A. Assemble and package enterprise applications into EAR files and submit to IBM
Support for profiling
B. Submit a Problem Management Report (PMR) electronically to IBM Support and
Check the PMRs status
C. Analyze a service log file against a symptom database and submit the results to IBM
support
D. Create a log of the activity for several components of an application server and submit
the log to IBM support
QUESTION 50
Under which circumstance should the WebSphere administrator use the dumpNameSpace
utility?
A. When applications are experiencing a problem accessing a specific WebSphere data
source
B. When the application server will not start because the JNDI namespace tables have
become corrupted
C. Before regenerating the plug-in for the web server
D. To clear the namespace prior to installing or redeploying an application
QUESTION 51
A WAR file containing JSR 168 compliant portlets has been successfully installed in an
application server. If portlet serving has been enabled, how can the protlets be accessed
with a browser?
A. Request the wpsServlet servlet and then select the portlet from a portal menu
B. Request the PortletServingServlet servlet and then submit the name of the portlet
C. Request the portlet directly using a URL that includes the name of the portlet
D. Request the portlets index.jsp and then submit the context root and portlet name
QUESTION 52
What is needed to load balance the HTTP traffic across a cluster of Web Servers?
A. Enable server affinity for each HTTP server in the cluster
B. Configure proxy server such as Tivoli Access Manager (TAM)
C. Use an IP sprayer from the load balancing component of the WebSphere edge
components
D. Implement the caching proxy server component of the WebSphere Edge
QUESTION 53
If an IBM HTTP Server is defined, the IHS Administration is installed and the IBM
HTTP server is defined to an unmanaged node, which two can be done?
A. Update the sever with new fixpacks
B. Start and stop the server and propagate the plug-in configuration file after it is
generated
C. Display the IBM HTTP Server error log (error.log) and access log (access.log) files as
well as display and edit the IBM HTTP server configuration file (httpd.conf)
D. Flush its local cache
E. Enable dynamic trace
QUESTION 54
When attempting to install WebSphere Application Server v6.1 using the silent install,
the installation fails early in the process and no log files appear to be created in the logs
directory. Which two steps can the administrator perform to troubleshoot the issue?
A. Restart the installation with the log parameter
B. Run the installation verification test (IVT)
C. Look for the log files in the system temporary area
D. Start over by creating a new responsefile.txt using the responsefile.base.txt
E. Restart the installation after an OS restart
QUESTION 55
What are three goals of the Virtual Member Manager (VMM)?
A. Provide a repository-independent programming interface
B. Provide the ability for users to achieve a single view of their own multiple repositories
in a federated model
C. Provide a cache of repository information
D. Provide a repository that can span multiple WebSphere cells
E. Support various pluggable repositories
QUESTION 56
An administrator needs to enable support for a number of applications that use
message-driven beans (MDBs). Some of the beans use point-to-point messaging and
other beans use publish-subscribe messaging. The administrator will typically need to
perform which two sets of tasks?
A. Configure a service integration bus and add the appropriate bus member
B. Deploy the MDBs to the message engine and select the SOAP over JMS protocol
QUESTION 61
What is the minimum administrative role that is required for an enterprise application to
be started through the console?
A. Operator
B. Monitor
C. Administrator
D. Configuration
QUESTION 62
After installation and application server profile creation, which servlet is useful for
validating system configuration?
A. HitCount
B. Snoop
C. HelloHTML
D. WSSamples
QUESTION 63
A J2EE application needs to be configured as follows:
The EJB module and the utility JAR in the application must be loaded by the same class
loader. Web Module WAR1 and the EJB module must use the same Class loader and web
module WAR2 must have its own class loader.
What is the correct Web Module class loader configuration for this application?
A. WAR1 - Module, WAR2 - Application
B. WAR1 - Application, WAR2 - Module
C. WAR1 - Application, WAR2 - Application
D. WAR1 - Module, WAR2 - Module
QUESTION 64
What is the minimum administrative role required for Java 2 security to be enabled
through the administrative console?
A. Configuration
B. Security
C. Operator
D. Administrator
QUESTION 65
When implementing WebSphere security, which statement is true about authentication
and authorization credentials?
A. Both authentication and authorization require lookups to the security server LDAP
database
B. Authentication takes place utilizing a user registry, however authorization is done
based on properties defined within the .ear file
C. Authorization must occur before authentication to ensure the proper J2EE Security
roles are utilized for the LDAP lookup
D. WebSphere security processes run on a centralized security service LDAP database to
facilitate single sign on administration of both authentication and authorization
credentials
QUESTION 66
What is the advantage of implementing a multi-tiered environment across multiple
machines?
A. The tiers allow you to rune individual products
B. It can more closely align with Certkiller .com's business functions (i.e distribution,
ordering and inventory management.)
C. It is the separation of tiers that allows operating system tuning parameters to be used
based on the machine's function
D. Separation reduces maintenance complexities since components are highly available
in a distributed configuration
QUESTION 67
What does a WebSphere application server provide to support the installation and
deployment of JSR 168 Complaint portlets?
A. An embedded version of WebSphere Portal Express
B. An embedded portlet container
C. Several J2EE applications that render and aggregate portlets in a browser
D. A scaled-down version of the WebSphere Portal Server
QUESTION 68
Which statement describes the WebSphere v6.1 FFDC feature?
A. FFDC information is stored in an optimized relational database
B. FFDC does not affect performance of the WebSphere application server
C. FFDC logs are mainly intended for application development teams
D. The application server needs to be restarted after enabling FFDC
QUESTION 69
What is the default connection protocol that the WebSphere scripting tool uses?
A. SOAP
B. RMI
C. SOAP is tried first then RMI is tried second
D. NONE
E. TCP
QUESTION 70
A system administrator needs to create a data source and make it available on multiple
nodes using different directory structure. Which two actions should the system
administrator take to do this?
A. Define the JDBC provider at the cell scope
B. Define the JDBC provider at the node scope
C. Create the data source that uses this JDBC provider at the node scope
D. Define the JDBC provider at the server scope
E. Create the data source that uses this JDBC provider at the server scope
F. Create the data source that uses this JDBC provider at the cell scope
QUESTION 71
Which three statements are true about J2EE security roles?
A. Binding of the users and groups to the J2EE security roles is usually done at the
application install time
B. Authorization is performed using the J2EE security roles
C. Security roles are applied to the web and EJB application components
D. Security roles provide an access control mechanism to manage the applications access
to system level resources
E. Security roles can be modified dynamically at runtime
F. Authentication is performed using the J2EE security roles
QUESTION 72
Which file can a system administrator consult prior to starting an installation to
determine which components are already installed on the machine?
A. prereqChecker.xml
B. log.txt
C. vpd.properties
D. Profileregistry.xml
QUESTION 73
According to the Upstream Queuing Model for performance tuning, what reflects the
correct application of recommended settings for maximum concurrent clients?
A. Web server=75, web container=50, datasource=25
B. Web server=25, web container=50, datasource=75
C. Web server=50, web container=50,datasource=50
D. Web server=75, Web Container=75, Datasource=25
QUESTION 74
A system administrator is federating a node using the addNode command. The Addnode
command can't perform by default which step?
A. Include applications in the cell
B. Create a definition for the node agent
C. Update the node's wsadmin.properties file to reflect the new cell environment settings
D. Create entries in the master repository for the federated node
QUESTION 75
Which two tasks can be performed using the IBM Key Management Utility (Ikeyman)
for managing SSL for IBM HTTP Server?
A. Sign certificates on certificate Authority's (CA) behalf
B. Create self-singed certificates
C. Create a key database file
D. Edit httpd.conf to use a certificate
E. Install GSkit
QUESTION 76
When the application server is experiencing normal to heavy usage, which statement
most accurately describes optimal pool usage?
QUESTION 81
Which of the following must a system administrator define when creating a JDBC
provider at the cluster scope?
A. All datasources for this JDBC provider at the cluster level.
B. An XA data source implementation type, for the JDBC driver.
C. The symbolic Variable used in the class path to the JDBC driver for each node in the
cluster
D. The J2C authentication data entry for the datasource at the cluster scope.
QUESTION 82
A system administrator is installing an enterprise application containing several
entity EJBs. All EJBs are contained in the same EJB JAR file. All CMP EJBs in the
JAR file, except one, access the same datasources. What is the MOST efficient way
to bind the datasources for the EJBs?
A. Create a separate EJB JAR file for the EJB that is different and set EJB module
datasources on both EJB JARs.
B. Ask developers to pre-configure the EJB module with the production datasource JNDI
names.
C. Individually, bind each of the EJBs to the datasource they use.
D. Bind the EJB module to the datasource used by most EJBs, then specify a separate
binding for the EJB that is different
QUESTION 83
The WebSphere Rapid Deployment(WRD) tool is running in the automatic
allocation mode. All of the following enterprise applications will be deployed if the
file types are placed below in WRD's monitored directory EXCEPT.
A. An Enterprise Archive (EAR) file.
B. A Web module (WAR) file.
C. An EJB module JAR file.
D. A Resource Adapter Archive (RAR) file.
QUESTION 84
A customer is in the process of configuring a J2C (JCA) connection factory using
the administrative console. The customer wishes to eventually secure the connection.
The customer also knows that several security settings are now deprecated in
WebSphere Application Server V6 for connection factories. Which of the following
should the system administrator recommend that the customer use?
A. Component-managed Authentication Alias
B. Mapping-Configuration Alias
C. Authentication preference
D. Container-managed authentication alias
QUESTION 85
If a system administrator is creating a wsadmin script, and within the script it is
necessary to create several JMS Connection Factories and JDBC. Dtasources, which
of the following wsadmin scripting objects should be used?
A. AdminConfig
B. AdminControl
C. AdminApp
D. AdminTask
QUESTION 86
A customer is using the WebSphere V6 Default messaging provider as the
messaging service. The customer has the following configuration. Cell C1 has Bus A
and B, whereas Cell C2 has Bus C. All of the following are supported optional
EXCEPT.
A. Configuring a link between Bus A and Bus B.
B. Configuring WebSphere MQ as a Foreign bus.
C. Configuring a link between Bus b AND Bus C.
D. Running a JMS Client on Bus A that gets messages from a destination on Bus C.
QUESTION 87
A system administrator is about to federate a node into a Network Deployment cell.
The node's server has several applications installed and a Service integration Bus is
defined on the node. Before federating the node, the system administrator must
understand that the default behavior of the addNode operation is:
A. To not carry over applications to the cell.
B. To not carry over Service Integration Buses to the cell.
C. To not carry over applications and Service Integration Buses to the cell.
D. To carry over applications and Service Integration buses to the cell.
QUESTION 88
A system administrator is using the administrative console and accidentally closes
the browser without saving any changes made during that session. What must the
system administrator do to make sure any configuration changes that were made
during the last session are not lost?
A. Lo in as a different user and save the master repository.
B. O and hand-edit the configuration xml files in the appropriate places
C. Restore a backup copy of the master configuration
D. Make those changes permanent when the system administrator logs in again.
QUESTION 89
In order to safely and completely backup an Application Server's configuration,
which of the following commands would be MOST appropriate?
A. backupConfig
B. BackupConfig -safeMode
C. backupConfig -stop
D. backupConfi -nostop
QUESTION 90
A system administrator is concerned about disk usage. Although the system
administrator wants to be sure the activity log does not grow too large, the system
administrator also wants to ensure that important messages are not lost. Which of
the following strategies would control the size of the logs and yield the maximum
A. From the Application Servers page select each server. Click stop, then slect the server
again and click Start.
B. From the Application Server page select all servers in the cluster, Click Stop, then
select all the servers again and click start.
C. From the Clusters page select the cluster and click stop, then select cluster again and
click start.
D. From the Cluster page select the cluster and click Ripplestart.
QUESTION 100
A developer is building as EJB that will have exclusive access to a confidential
military database. The developer therefore does not want the EJB to be clustered or
workload managed. In a conference with the system administrator, the developer is
advised to use which caching option when building the bean?
A. Option A Caching
B. Option B Caching
C. Option C Caching
D. Dynamic Caching
QUESTION 101
A system administrator is reviewing a checklist of actions that should occur during
the federation process. The system administrator notes that all of the following
checklist actions are correct EXCEPT:
A. The node is added to the cell
B. The node agent and application server are started
C. The application server becomes a managed server in the cell
D. The application server is stopped, and a new node agent is created.
QUESTION 102
A system administrator wants to federate an application server profile to a cell. All
of the following are valid steps or actions EXCEPT:
A. Install the product on each machine if this is a multiple machine install.
B. Create an application server profile on the application server machine and start the
application server.
C. Add the node defined by the application server profile to the cell, which will delete the
application server cell, and federates the node to the deployment manager cell.
D. Monitor the node agent and application server which will start automatically during
the federation process.
QUESTION 103
Given the following JSESSIONID=000A2ABM41JozU_VM8IffsMNfdR:v544d0o0,
what cluster member (clone ID) would this HTTP request be routed to?
A. 000A2
B. 0000A2AB
C. v544d0o0
D. Route cannot be determined from the above information
QUESTION 104
A system administrator has deployed a horizontally and vertically scaled clustered
application across a 6-NODE wEBsPHERE Application Server cluster. Each node
contains two cluster members. The system administrator is looking for the most
scalable HTTP Session persistence mechanism for this environment. Which of the
following HTTP Session persistence strategies would BEST fit these requirements?
A. Memory-to-Memory Replication in a pure peer-to-peer topology configuration
B. Databse Session persistence
C. Local Sessions
D. Local Session with overflow
QUESTION 105
When can a Data Replication Domino be created from the WebSphere Application
Server V6 administrative console?
A. While adding a new cluster member to the cluster or clicking on Cluster member ->
Replication Domino -> New
B. While creating the cluster or clicking on Environment -> Replication Domino -> New
C. While configuring session management on each cluster member or clicking on
Resources -> Replication Domain -> New
D. The administrative console does not support creation of the Data Replication Domain
at this time.
QUESTION 106
User requests are directed to the web container using the web container inbound
transport chain. The chain consists of all of the following EXCEPT for:
A . An HTTP INBOUND CHANNEL THAT SERVERS http 1.0 and 1.1 requests.
B. A TCP inbound channel that provides the connection to the network.
C. A Web Services inbound channel that provides the connection to the Web Services
Gateway.
D. A Web container channel over which requests for servlets and JSPs are sent to the Web
container for processing
QUESTION 107
Which of the following statements BEST describes the relationship between
WebSphere MQ and WebSphere Platform Messaging?
A. WebSphere MQ and Platform Messaging are separate and do not share any modules
or configuration data.
B. Platform Messaging relies on WebSphere MQ as the JMS provider.
C. WebSphere MQ and Platform Messaging must share the same Cloudscape database.
D. Platform Messaging is simply a scaled down version of WebSphere MQ.
QUESTION 108
A customer called a WebSphere support analyst and asked about J2EE extensions.
The analyst said that these extensions are included with Programming Model
Extension (PME) which is part of WebSphere Application Server V6. The analyst
also mentioned of the included extensions, but made a mistake on one of the
extensions. All of the following are correct EXCEPT:
QUESTION 118
A system administrator was troubleshooting a problem after configuring the
environment for the remote plug-in (http://webserver-hostname/snoop does not
work). The system administrator could verify that
http://app-server-hostname:9080/snoop and http://webserver-hostname are
working properly. Assuming that the system administrator used default
values during the installation, which log file will give more information
about the problem?
A. error.log under HTTP Server logs directory
B. http_plugin.log under PLUGIN logs directory
C. SystemOut.log under PROFILE logs directory
D. plugin-cf.xml under PLUGIN logs directory
There is an http_plugin.log under plugin log directory and it is a log file.
Not D:
There is no plugin-cf.xml file in plugin log directory.
There is a plugin-cfg.xml file within plugin config directory but it is not a log file, it is an
xml configuration file for the plugin module.
QUESTION 119
When a J2EE enterprise application is being assembled to take advantage of J2EE
security, there are a number of configurations and mapping that need to be made.
Which of the following items can a security constraint be mapped to?
A. A Web resources
B. An EJB
C. A login mechanism
D. A security realm
QUESTION 120
A system administrator is working in a federated cell with Global security enabled.
The system administrator wants to use various command line tools to manage the
application servers. All of the following command line tools require the system
administrator to provide a username and password EXCEPT:
A. startServer
B. stopServer
C. wsadmin
D. stopManager
QUESTION 121
An enterprise application must be started through the console. Which of these
administrative roles would be the minimum required?
A. Monitor
B. Configurator
C. Administrator
D. Operator
QUESTION 122
After installing IBM WebSphere Application Server and creating a fedrated cell, a
system administrator wants to enable Global security. After making the appropriate
configuration changes, which steps must the system administrator take in order for
Global security to become fully active?
A. Restart the Deployment Manager
B. Restart the Deployment Manager and all Node Agents
C. Restart the Deployment Manager, all Node Agents and all Application Servers
D. Restart the Deployment Manager, all Node Agents, all Application Servers and the
User Registry
QUESTION 123
Two enterprise applications need to be installed into the WebSphere Application
Server environment. Each application has to rely upon authentication through
WebSphere security, but must map to different user registers. Which of the
following statements is valid?
A. Both applications can be installed into the same application server and each need to be
mapped to separate user registries.
B. Both applications can be installed into the same node but different application servers.
C. The applications need to be installed on separate nodes which can be in the same cell.
D. The applications need to be installed in separate cells.
QUESTION 124
A system administrator is making sure that the SSL communications between the
plug-in and the application server are as secure as possible. While configuring SSL
for the plug-in what steps should be taken to ensure the BEST possible security?
A. Replace the private key
B. Replace the plugin-key.kdb file
C. Remove the public key
D. Remove the DummyKeyring.kdb file
QUESTION 125
The First Failure Data Capture (FFDC) is a diagnostic component of WebSphere
Application Server and serves a very specific role. Which of the following
descriptions BEST defines the role of FFDC?
A. The First Failure Data Capture tool preserves the information generated from a
processing failure and returns control to the affected engines. The captured data is saved
in a log file for use in analyzing the problem.
B. The First Failure Data Capture tool preserves the information generated from a
processing failure and forces the application server to shut down.
C. The First Failure Data Capture tool preserves the information generated from a
processing failure and invokes the Collector tool to take a snapshot of the system
environment.
D. The First Failure Data Capture tool preserves the information generated from a
processing failure and forces the application server to do a thread dump.
QUESTION 126
A system administrator has to determine the root cause of and decides to enable
tracing application server. How can the system administrator accomplish this task?
A. Inside the administrative console, click Troubleshooting -> Logs and Trace and Select
the Runtime tab.
B. Inside the administrative console, click Troubleshooting -> Logs and Trace ->server
-> Diagnostic Trace and select the Runtime tab.
C. Edit the tracLog properties file and restart the application server.
D. This is not possible. The trace configuration of a running application server cannot be
changed.
QUESTION 127
When using the administrative console to configure logging on a particular server,
the Diagnostic Trace Service can be configured to write messaging to log files in one
of three formats. Which of the following are the supported formats?
A. Basic, CBE, JRas
B. Basic, Advanced
C. Basic, Intermediate, Advanced
D. Basic, Advanced, Log Analyzer
QUESTION 128
Not every name space can be dumped using the dumpNameSpace utility. Using
wsadmin, the NameServer MBean can be invoked to dump these name spaces. All of
the following can be dumped with the NameServer MBean EXCEPT.
A. Name space java:
B. Name space local:
C. Name space Server:
D. Name space jdbc:
QUESTION 129
A problem has been reported to a system administrator, however the system
administrator is unable to use the Log Analyzer for some reason. Which of the
following is an alternative way for the system administrator to review the Log
Analyzer log file?
A. Use the dumplog command.
B. Use the showin command
C. Use any text editor although the formatting wont be as nice.
D. Format the Log Analyzer log with wsadmin and then use any text editor.
E. Use the showlog command
QUESTION 130
A system administrator is asked to write a PERL script to output only those error
messages in System Out log that refer to some sort of error or warning. Which event
types should the system administrator include?
A. F,E,W
B. F,E,W,D
C. F,E,W,A
D. F,E,W,H
QUESTION 131
A system administrator notices that web requests are falling on a particular
application server which has already started. Which log files should be reviewed for
application server errors?
A. SystemErr.log.SystemOut.log
B. startServer.log. stopServer.log.System Err.log.SystemOu.log
C. SystemOut.log
D. SystemErr.log
QUESTION 132
What is required to configure a WebSphere application server for remote
debugging?
A. Edit the WebSphere remoteDebug.properties file.
B. Edit the WebSphere remotAppServerDebug properties file
C. Go to the administrative console and enable the Debuging Service to start under the
System Administration tab.
D. Go to the administrative console and enable the Debugging Service to start along with
the application server.
QUESTION 133
While testing the HTTP Session affinity behavior of a WebSphere cluster, the
system administrator noticed that there were two versions of the plugin-cfg.xml file
used:
Version #1: plugin-cfg.xml
<ServerCluster Name= "abcCluster">
<ServerCloneID="abcdefgh"LoadBalanceWeight="2"Name="ServerA">
Version #2: plugin-cfg.xml
<ServerCluster Name= "abcCluster">
<ServerLoadBalanceWeight="2"Name="ServerA">
What would be the expected behavioral differences between the two versions of the
WebSphere plugin configuration file in terms of honoring HTTP session addinity?
A. Version #1 supports HTTP Session affinity
B. Version #1 and version #2 both support session affinity
C. Version #2 supports HTTP session affinity
D. Version #1 and version #2 do not support HTTP session affinity
QUESTION 134
A system administrator is creating a wsadmin script. Within the script, it is
necessary to list the running applications on a server. Which of the following
wsadmin scripting objects should be used?
A. AdminMBeans
B. AdminConfig
C. AdminOperations
D. AdminControl
QUESTION 135
A system administrator is developing an application to a 2-node cluster. One of the
nodes is a powerful AIX-based machine and the other is a smaller Windows-based
machine with less processing capability. How would the cluster BEST be configured
to ensure more work gets routed to the more powerful server?
A. Use the Random algorithm and assign a smaller weight to the Windows box.
B. Use the First-Come-First-Served algorithm
C. Use the Round Robin and assign a larger weight to the AIX machine
D. Use the Least Recently Used algorithm with weights.
QUESTION 136
On receipt of a JMS message on a queue (Q ), a message-driven bean (MDB)
processes the message by invoking a stateless session bean that does a data base
update. Both enterprise beans execute within the same transaction context. The
queue type destination in the underlying Service integration Bus corresponding to Q
is defined with the "Maximum failed deliveries" attribute set to 0, and the
"Exception destination" specific as 'None'. What happens when the processing of a
particular message results in a transaction rollback?
A. The application server hosting the MDB is shutdown
B. The JMS runtime stops the delivery of the message to the application
C. The JMS runtime keeps delivering the message to the application
D. The message gets stranded on the queue (Q)
QUESTION 137
The log files reveal naming exceptions after a system administrator has just created
a new datasource. What tool would the system administrator use to verify that the
datasource is correctly registered in the JNDI namespace?
A. dumpJNDINameSpace
B. dumpNameSpace
C. dumpJNDICache
D. showNameSpace
QUESTION 138
A system administrator is asked to diagnose a problem on a remote node using the
Log Analyzer. In order to accomplish this task, what is the name of the Log
Analyzer source log file that the system administrator will have to access?
A. service.log
B. activity.log
C. loganalyzer.log
D. trace.log
QUESTION 139
Where in the administrator console can the log detail levels be changed?
A. Troubleshooting -> Logs and Trace
B. System administration -> Console settings -> Preferences
C. Environment -> WebSphere Variable
D. System administration -> Console settings -> Logging
QUESTION 140
A system administrator notices that an application server (with servlets and EJBs)
is receiving llOP requests, but not any HTTP requests. Which of the following log
file(s) should be checked?
A. SystemOut.log and SystemErr.log
B. startServer.log
C. activity.log
D. HTTP_plugin.log and native_stdout.log
QUESTION 141
Sometimes it is required to force an application to create a thread dump (or
javacore). Which of the following processes would be used to force a thread dump?
A. Using the wsadmin command prompt, get a handle to the problem application server.
---------------------------------------------wsadmin>setjvm[$AdminControl completeObjectName type=JVM,process=server1.*]
-----------------wsadmin>$AdminControl invoke$jvm dumpAllThreads
Look for an output file in the installation root directory with a name like
javacore.date.time.id.txt.
B. Using the wsadmin command prompt, geta handle to the problem application server.
---------------------------------------------wsadmin>set jvm[$AdminControl completeObjectName
type=JVM,process=server1,*]
Generate the thread dump:
--------------------wsadmin>$AdminControl invoke $jvm dumpAppServerThreads
Look for an output file in the installation root directory with a name like
javacore.date.time.id.txt.
C. Using the wsadmin command prompt, geta handle to the problem application server.
---------------------------------------------wsadmin>set jvm[$AdminControl completeObjectName
type=JVM,process=server1,*]
Generate the thread dump:
--------------------wsadmin>$AdminControl invoke $jvm dumpJVMThreads
Look for an output file in the installation root directory with a name like
javacore.date.time.id.txt.
D. Using the wsadmin command prompt, geta handle to the problem application server.
---------------------------------------------wsadmin>set jvm[$AdminControl completeObjectName
type=JVM,process=server1,*]
Generate the thread dump:
--------------------wsadmin>$AdminControl invoke $jvm dumpThreads
Look for an output file in the installation root directory with a name like
javacore.date.time.id.txt.
QUESTION 142
In WebSphere Application Server V6, a logging infrastructure that extends Java
Logging in used. Which of the following contains the BEST subset of logging levels
that a system administrator can use to log only errors?
A. Severe, fatal
B. All, finest, finer, fine, server, fatal
C. All debug, entryExit, Info, warning, fatal
D. All, debug, entryExit, info, warning, error, fatal
QUESTION 143
There are multiple property files which control the behavior of the FFDC filter. All
of the following are FFDC property files EXCEPT:
A. ffdcStart.properties - used while the server is starting
B. ffdcRun.properties - used after the server is ready
C. ffdcException.properties - used whenever an exception occurs
D. ffdcStop.properties - used while the server is in the process of stopping
QUESTION 144
A system administrator is asked how best to suppress System out or System.err
messages from the customer's application. Which of the following actions should the
system administrator recommend to the customer?
A. Covert their logging to use Log4j.
B. Use the Common Base Event API and the Java Logging API.
C. Use JRas to log messages.
D. Click Troubleshooting > Logs and Trace >server name > JVM Logs and change the
installed Application Output parameter from the Admin Console
QUESTION 145
A system administrator has just installed the WebSphere Application Server. The
system administrator is interested in turning on global security in order to protect
the environment. By enabling global security, all of the following security features
will be activated EXCEPT:
A. Common Secure interoperability Version 2 (CSIV2)
B. Authentication to the administrative console
C. SSL between the plug-in and the embedded Web server
D. J2EE security
QUESTION 146
A site using J2EE security to protect their application the websphere Application
Server. An Application is being assembled with Application Server Toolkit and
needs to be configured for security. All of these steps are appropriate in this case
EXCEPT:
A. Creating the J2EE security roles
B. Creating the j2eesecurity.policy file
C. Creating the security constraints
D. Configuring the loin mechanism for the Web module
QUESTION 147
A secured network is being set up between an external Web server and the
application server's embedded web server. Given that mutual SSL authentication is
a required part of the process, which of the following configuration steps needs to be
selected?
A. WebSphere Base configuration does not provide any built-in support for Workload
Management and Failover capabilities.
B. Multiple installations of WebSphere base servers do not have a central point of
administration
C. WebSphere Network Deployment Configuration can be used to manage web server
nodes
D. Web Sphere Base configuration does not provide built-in support for service
integration bus.
QUESTION 153
Which of the following is a valid statement concerning the WebSphere V6 High
Availability Manager ?
A. The HA Manager enhances the availability of WebSphere singleton services like
transaction services, JMS Message services, and Service integration Bus services.
B. The HA Manager runs as an enterprise application within each application server
process that monitors the "health" of WebSphere clusters.
C. In the event of a server failure, the HA Manager could failover the transaction service
which could recover in-flight transactions.
D. The HA Manager leverages latest storage technologies to provide fast recovery time
of both single and two-phase transactions
QUESTION 154
A customer must enable High Availability and failover for a cluster of external
HTTP servers. Which of the following actions should the system administrator
recommend to a accomplish this task?
A. Use the load balancing component of the WebSphere Edge Components
B. Configure a proxy server such as Tivoli Access Manager
C. Enable server affinity for each HTTP server in the cluster
D. Implement the caching proxy server component of the WebSphere Edge Components.
QUESTION 155
An internet client is requesting a servlet from their web browser. Assuming that all
internet client requests are first routed to an IP sprayer, which of the following
components would typically be involved in the flow of the request from client to
servlet?
A. JMS server, LDAP server, and EJB container
B. External HTTP server, HTTP server Plug-in, and web container
C. Embedded HTTP server, web container, and EJB container
D. Embedded HTTP server, JMS server, and authentication proxy server
QUESTION 156
A developer is attempting to setup the Web SERVER DEFINITION WITHIN THE
APPLICATION SERVER FOR A CUSTOMER DEMONSTARTION. The
developer designed a chart that lists information about the definition process. A
system administrator was asked to confirm the accuracy of the chart. Which of the
following information would the system administrator indicate is NOT included in
the Web server definition?
QUESTION 161
When using the addNode command to federate a node to a cell, It may be necessary
to know the Deployment Manager's SOAP connection port. What is the BEST way
to locate this port?
A. Navigate to the profiles directory of the WebSphere Application Server installation
root directory, and issuing the wsadmin $AdminConfig getPort command.
B. Navigate to the bin directory of the node to be federated and issuing the following
command ivt.bat server1 <node>
C. Examine the serverindex.xml file corresponding to the Deployment Manager's node
D. Examine the responsefile.oct file in the WebSphere Application Server Installation
root directory
QUESTION 162
A system administrator is configuring application servers for using the Data
Replication Service in a WebSphere Application Server V6 cluster environment.
Which of the following replication modes are available?
A. Client Only, Server Only, Both Client and Server
B. Cluster Only, Both Client and Cluster
C. Cluster Only, Both Cluster and Server
D. Cluster Only, Node Only, Both Cluster and Node
QUESTION 163
A system administrator wants to share system information like Workload
Management among core groups. Which of the following statements is valid in this
context?
A. Core groups in same or different cells use the service integration bus to share
Workload Management information.
B. Core groups can overlap by including common servers and the common servers are
used to share Workload Management information
C. Core groups in different cells can only use the core group bridge service to share
Workload Management information
D. Core groups use the core group bridge service to share Workload Management
information
QUESTION 164
A server has its application class-loader policy set to "Single". What additional
configuration is necessary to ensure that the application class-loader will load Web
modules for a particular application on the server?
A. The application must have its WAR class-loader policy set to "Module"
B. The application must have its WAR class-loader policy set to "Application"
C. The class-loader mode for the application server must be set to "Parent Last"
D. No additional configuration is required. Setting the class-loader policy to "Single" is
sufficient
QUESTION 165
If a system administrator uses the Tivoli Performance Viewer to monitor
application servlets and EJB's which of the following sets of metrics should be
viewed in order to BEST evaluate the performance of the application?
A. The sum of all JDBC client connections in the cell are bounded by 10 connections
B. If the server is a cluster member, then it cannot have more than 10 connections
C. Each server in the cell can have a maximum of 10 connections
D. All the servers in the cell cannot exceed a maximum of 10 connections
QUESTION 171
According to the so-called Upstream Queuing model for performance tuning, which
of the following would reflect the correct application of recommended settings for
maximum concurrent clients?
A. Web server=75, Web container=50, Datasource=25
B. Web server=50, Web container=50, Datasource=50
C. Web server=25, Web container=50, Datasource=75
D. Web server=75, Web container=25, Datasource=50
QUESTION 172
A system administrator managing a WebSphere Application Server and wants to
ensure that the JVM SystemOut log does not take up too much disk space. Which of
the following approaches would assure the least amount of disk space is used?
A. Using the administrative console, set the Log File Rotation, Maximum Files Size to 5
MB.
B. Using the Log Analyzer, set the Maximum File Size to 3 MB
C. Using the Log Rotation tool, set the Log File Count to 2 and the File Size to 2 MB.
D. Using wsadmin, set the Maximum Number of Historical Log Files to 3 with a File
Size of 1 MB.
QUESTION 173
A system administrator wishes to create a configuration archive in order to create a
similar configuration on another system. Using the "Admin Task exportServer"
functionality within wsadmin, it is possible to export a configuration archive for
which of the following items?
A. An application module
B. An enterprise application
C. A stand-alone application Server
D. A federated profile
QUESTION 174
A system administrator is receiving an error while trying to connect to the
administrative console of an application server profile. The connection is being
made from a remote web browser that has been installed and verified previously.
Assuming that this application server is using default ports, what is the MOST
probable cause of this error?
A. The adminconsole application was stopped previously from the adminconsole
B. The Application Server was not started
C. The WebSphere configuration database is not running
D. The adminconsole application was uninstalled from the adminconsole
QUESTION 175
When using the installation wizard to install the WebSphere Application Server v6
QUESTION 180
A system administrator was asked to develop necessary artifacts to install
WebSphere Application Server V6 Network Deployment Package, create custom
profile and federate to the existing deployment manager. Silent installation scripts
(response files) must be used. What is the BEST approach to accomplish this task
without using UI based tools?
A. Create a response file that installs product binaries, create the custom profile and
federates the node.
B. Create two response files. The first one installs product binaries and calls the second
response file that create the custom profile and federates the node.
C. Create a response file that installs product binaries, use profile creation wizard to
create the custom profile and federate the node from the deployment manager's
administrative console.
D. Install product binaries using installation wizard and create a response file to create
the custom profile and federate the node.
QUESTION 181
While updating an enterprise application on a production cluster running across
multiple machines, a system administrator must ensure that the application relains
available at all times to the users. After updating the application components, what
srep can be used to accomplish this requirement?
A. On the last page of the Enterprise Application -> Update wizard, click Rollout Update
B. Select System Administration -> Nodes, select node names and click Full
Resynchronize
C. Select Enterprise Application -> [application name] -> Stop and then Enterprise
Applications ->[application name] -> Start
D. Select Servers -> Clusters ->[clustername] -> RippleStart
QUESTION 182
A system administrator is installing an application and discovers that a required
security role has not been defined by the procedures of the application modules.
How can the system administrator create a new security role for the application?
A. Use the Security Global Security page of WebSphere administrative console.
B. Use Application Server Toolkit (AST) to define a new role on the module that requires
it.
C. Use wsadmin to define the required security role.
D. Edit the source of Application Deployment Descriptor and add a properly formed
<sec-role-name>element
QUESTION 183
A customer needs to connect an application server to a third party vendor's EIS.
The customer asks the consultant about the functionalities that should be available
with a JCA Resource Adapter that has been supplied by the EIS vendor. The
consultant responds that all of the functionalities should be available EXCEPT for
the one stating that it
A. Provide connectivity between J2EE components such as an application server or an
application client and an EIS
B. Collaborates with the application server to provide contract services such as
A. SystemErr.log
B. SystemErr.log, SystemOut.log
C. SystemOut.log
D. startServer.log, stopServer.log, SystemErr.log, SystemOut.log
Q
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Ans
C
B,C
C
B
C,E
D
A,C
A
B
A,C,D
C,D
E
C
B
A
Q
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Ans
A
C
A,B,G
D
A
B
A
D
B
A
D
C
C
C
C
Q
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
Ans
E
C
D
C
D
D
D,E
B
A
A
C
B
D
A,E,F
C
Q
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Ans
C
D
D
B
A
C
C
B,C
A,C
A,B,E
A,E
C
D
D
A
Q
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
Ans
A
B
B
D
B
C
B
B
A
A,F
A,B,C
C
A
A
B,C
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
D
A
C
D
C
C
D
D
A
A
D
C
D
A
A
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
B
D
B
D
D
A
C
A
D
A
B
D
C
B
B
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
C
A
B
D
B
D
B
C
B
C
B
D
B
A
A
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
D
C
D
B
A
B
D
D
E
A
A
D
A
D
C
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
C
B
B
A
D
D
A
C
D
C
B
D
B
C
C
151
152
153
154
155
156
157
158
C
D
C
A
B
B
D
C
159
160
161
162
163
164
165
166
A
A
C
A
D
B
B
A
167
168
169
170
171
172
173
174
B
B
A
C
A
D
C
B
175
176
177
178
179
180
181
182
D
D
C
C
B
B
A
B
183
184
185
186
187
B
C
C
B
B