You are on page 1of 41

000-253

QUESTION 1
Which statement describes the relationship between WebSphere MQ and Web Sphere
default messaging as a JMS provider?
A. Default messaging relies on WebSphere MQ as the JMS Provider
B. Default messaging is a version of WebSphere MQ
C. WebSphere MQ and default messaging are separate and do not share any modules or
configuration data
D. WebSphere MQ and default messaging must share the same Cloudscape database
QUESTION 2
When attempting to install WebSphere Application Server v6.1 using the silent install,
the installation fails early in the process and no log files appear to be created in the logs
directory. Which two steps can the administrator perform to troubleshoot the issue?
A. Restart the installation after an OS restart
B. Restart the installation with the log parameter
C. Look for the log files in the system temporary area
D. Run the installation verification test (IVT)
E.Start over by creating a new responsefile.txt using the responsefile.base.txt
QUESTION 3
What is the name of the WebSphere scripting tool?
A. wasadmin
B. ws_ant
C. wsadmin
D. wsdeploy
QUESTION 4
An administrator is configuring JDBC database connections. Where is the file system
path to the DB2 or Oracle driver .zip files specified?
A. On the Connection manager J2C configuration panel
B. From the Environment -> WebSphere Variables panel of the administration Console
C. Within the .ear file of the deployed application
D. Within the connection pool parameters for the cell
QUESTION 5
When installing WebSphere Application Server v6.1 along with IBM HTTP server and
related plug-ins, an administrator notices the following message in the
<plugins_root>/logs/install/log.txt
Plug.install, com.ibm.ws.install.ni.ismp.actions.
ISMPComponentizedFileRepositoryDeployAction, Err, Component not found: prereq.jdk
Which two additional entries should the administrator verify?
A. The PLUGIN_JDK_ROOT value in log.txt
B. The JAV_HOME system environment variable
C. The CURRENT_WORKING_DIRECTORY value in log.txt
D. The CLASSPATH system environment variable
E. The JAVA_INSTALL_PATH value in log.txt

QUESTION 6
While an administrator is using the Tivoli Performance Viewer to analyze a performance
problem with a production application server, the administrator notes that the database
connection pools have a much lower percentage of utilization than the other pools. Which
statement explains this observation?
A. The Tivoli Performance Viewer percentages are only useful for performing
performance analysis on a server that is executing in a controlled load test scenario
B. the database server is constrained, causing calls to the database to consume more
resources than are available for processing
C. The connection pools have not been defined to account for parallel application server
calls to the database, causing this particular server to show low utilization
D. This Condition indicates there is a bottleneck in one of the processes upstream in the
pipeline of process flows within the application server
QUESTION 7
It has been decided to use database session persistence for a particular J2EE application.
Which two steps must be performed to implement this feature?
A. Create session database
B. Select a multi row schema
C. Configure the JDBC provider and data source
D. Create session database tables
E. Configure row size to match session size
QUESTION 8
Which statement is true for a managed application server process to startup?
A. Starting a managed server is not dependent on the presence of a running deployment
manager
B. The node agent should not be started before any managed servers on that node
C. A node agent and deployment manager must be running before starting a managed
server
D. The deployment manager needs to be started before the managed server
QUESTION 9
When adding a new member to a cluster, why might it be necessary for an administrator
to select the option for generating unique HTTP ports?
A. To prevent other applications from using these ports
B. To avoid port conflicts with other servers on the same node
C. To enable encryption over the secure HTTP ports
D. To ensure that cluster members on different nodes have unique ports
QUESTION 10
What are the three possible modes that the replication service instance can be set up to
run in?
A. Server mode
B. Broadcast mode
C. Client mode
D. Both Mode

E. Publish/Subscribe mode
F. Event Listener mode
QUESTION 11
The WebSphere scripting tool supports which two scripting languages?
A. Ant
B. Perl
C. Jacl
D. Jython
E. BSF
QUESTION 12
In addition to data sources and shared libraries, which resources can enhanced EARs
support?
A. Class loader policy, Virtual host information and JVM command line parameters
B. JAAS Authentication Aliases, Virtual host information and JVM command line
parameters
C. JAAS Authentication Aliases, Class Loader policy, Virtual host information and JVM
command line parameters
D. JAAS Authentication Aliases, Class loader policy and JVM command lien parameters
E. JAAS Authentication Aliases, Class loader policy and Virtual host information
QUESTION 13
Which statement most accurately describes the effect of increasing the JVM maximum
heap size?
A. More objects will be created and the time required to garbage collect will decrease
B. A larger heap size will cause the server to take longer to start
C. The time between garbage collections will increase, but the garbage collection will
take longer
D. No measurable performance change will result from increasing the heap size
QUESTION 14
Which services are implemented by the WebSphere Application server?
A. Security, JMS messaging, Naming and HTTP Plug-in
B. Security, Naming, Transaction and Dynamic cache
C. HTTP Load Balancing service, JMS messaging and Data Replication Service (DRS)
D. The user registry, Naming and HTTP Plug-in
QUESTION 15
An administrator is analyzing an activity.log file form a profile by using the Application
Server Toolkit (AST) Profiling and Logging perspective. There are hundreds of log
records. Most of the records as informational messages. How can the administrator view
only the records whose severity is at the warning and error level?
A. Update the filter so that it shows only Error and Warning log records
B. When the activity.log file is imported into AST, use the filter option to exclude the
informational messages
C. The activity.log file must be filtered using the Log Analyzer before it is imported into

AST
D. Create two filters, one showing only Errors and one showing only Warnings. Export
each and merge them into a single new activity log
QUESTION 16
Certkiller .com has a WebSphere Application Server V4 client and wishes to look up and
access objects in WebSphere Application Server V6.1 without requiring changes to the
client. What must the customer do to enable WebSphere Application Server V6.1 objects
to be accessible through the legacy name space?
A. Create a configured name binding
B. Configure a leaf binding
C. Create a corbaname binding
D. Use a compound name
QUESTION 17
The application server is architected to use an existing user registry that stores
administrative users and application users. What is needed to setup this architecture?
A. Retrieve a list of nodes and node agents contained within the cell
B. Generate web services binding for the existing user registry
C. Configure the connection to the existing user registry
D. Configure the JNDI path to the security database
QUESTION 18
Which are three possible components of Web Modules?
A. Servlets
B. HTMLs
C. Session and Entity beans
D. RAR files
E. SIP Servlet files
F. MDB files
G. JSPs
QUESTION 19
Which set of parameters can a system administrator adjust to directly improve
performance for the EJB container?
A. Data Source connection pool and server JVM size
B. Session timeout and HTTP session object size
C. Transaction lifetime and client inactivity timeout
D. Cache Size and Cache cleanup interval
QUESTION 20
Which statement is true about WebSphere JVM logs?
A. The JVM logs are self-managing and can roll over based on time or file size
B. The JVM logs should be moved from the default location to make them easier to
access from the command line
C. The number of historical JVM log files is fixed at 3; this value will reset on each
server restart

D. The JVM logs are, by default, kept outside the Application server filesystem directory
tree to prevent them from being overwritten when applying fixpacks
QUESTION 21
A system administrator has enabled dynamic caching across a cluster of servers and
configured a replication domain for the cluster. Which configuration mode should be the
system administrator enable for memory to memory session partitioning to ensure each
object is replicated to every consumer of the replication domain?
A. Specific number of replicas
B. Full Group replica
C. Single replica
D. Entire domain
QUESTION 22
In order to create a new WebSphere cell and implement a horizontal scaling topology, an
administrator needs to perform which task(s)?
A. Federate nodes and create cluster members across multiple machines
B. Deploy multiple database servers using a high availability product
C. Federate nodes and create multiple clusters
D. Load balance multiple HTTP servers using Edge Components
QUESTION 23
Assume that a federated repository is configured from three existing repositories: A,B
and C. A user tries to log in but is denied access. What is a possible reason for the login
failure?
A. The users ID is contained in repository A, which is a file-based repository
B. The users LDAP Distinguished Name (DN) is not the same across all repositories
C. The users IDs does not exist in all three repositories
D. One or more of the three repositories is not accessible
QUESTION 24
From which root can the JNDI DumpNameSpace utility be used to examine the contents
of the namespace when JDNI errors are occurring?
A. Java, which contains naming information unique to the specific server application
B. Server, which contains the objects that are accessible by remote processes
C. Node, which contains all JNDI references used within the cells defined scope
D. Local, which contains objects that are available by local processes only
QUESTION 25
Which statement most accurately defines the location of where the WebSphere security
service runs?
A. The security service urns locally in each of the WebSphere processes (deployment
manager, node agent and application sever.)
B. The security service runs on the deployment manager
C. The security service runs in the federated nodes of the cell
D. The security service runs on the LDAP sever and is accessed through the application
server node agent

QUESTION 26
The Profile Management Tool Allows you to enable WebSphere administrative security.
Which use registry is used for this default security?
A. Standalone LDAP registry
B. Standalone custom registry
C. Local Operating system
D. Federated Repositories
QUESTION 27
A system administrator has just completed installing the core binary files of WebSphere
Application Server Network Deployment. The system administrator wasn't to create a
deployment manager profile with a Federated Node. What is the easiest method to
accomplish this?
A. Create deployment manager and custom profiles using the profile management tool
B. Create a deployment manager profile using the profile management tool
C. Create a Cell profile using the profile management tool
D. Create deployment manager and custom profiles using the manageprofiles command
QUESTION 28
Which approach should be recommended when designing a production topology for
WebSphere application servers providing high availability and failover capabilities?
A. Utilize load balances between the web servers and the application servers to provide
failover support at the application server tier
B. Place the Authentication servers outside of the intrusion firewall with the web servers,
since the web servers will need to access them
C. Create a design using multiple machines that handle the full production load, enabling
the use of application server clustering to provide failover capabilities
D. Use the target processor engines and least number of physical machines for the
application server tier, to minimize the software licensing costs?
QUESTION 29
If an administrator configures session management for an application server to use SSL
ID tracking, which two session tracking mechanism should also be enabled?
A. All
B. Cookies
C. Security Integration
D. URL Rewriting
QUESTION 30
For security reasons, an administrator would like to ensure that HTML resources are
isolated between Web modules running on a server. Which setting should be
administrator configure?
A. HTTPS port configuration
B. Admin Console Configuration
C. Virtual host configuration
D. Class loader configuration
QUESTION 31

What is the correct command to save configuration changes in Jython script file?
A. $AdminConfig.save
B. AdminTask.save()
C. $AdminTask.save
D. The WebSphere scripting tool does a periodic save based on a properly in its
configuration
E. AdminConfig.save()
QUESTION 32
An administrator has a cluster of two members and needs to ensure that roughly twice as
many client requests are routed to cluster member A than are routed to cluster member B.
How should the administrator configure this type of load distribution?
A. Double the OS priority for member As JVM process
B. Double the minimum size of member As Web container thread pool
C. Assign to member A, a weight two times as large as member Bs weight
D. Create two entries for member A in the HTTP plug-in configuration
QUESTION 33
For performance reasons, a J2EE application maintains HTTP session information in
memory (not persisted). The information in the session can be recreated based on the
contents of various cookies. Recreating this data from the cookies would incur
performance penalties. Which mechanism minimizes the need to recreate session data?
A. Database persistence
B. Memory-to-Memory replication in both client and server mode
C. Memory-to-memory replication in server mode
D. Session affinity in web server plug-in
QUESTION 34
When configuring a J2C connection factory, which setting can be configured using the
administrative console?
A. Container-Manager authentication alias
B. Mapping configuration alias
C. Component-managed authentication alias
D. Authentication preference
QUESTION 35
A System Administrator is planning to do a silent install using a customized file. The
system administrator does not want to install the samples that come with the product.
Which option in the response file should the administrator update to NOT include the
samples with the installation?
A. InstallType
B. Custom
C. PROF_Action
D. Feature
QUESTION 36
In order to gather all of the necessary data required by IBM Support to troubleshoot a

database connection pooling problem, an administrator should perform which task(s)?


A. Reproduce the problem, use the Tivoli Performance Viewer to log the JDBC
connection pool activity then submit the log file to IBM support
B. Reproduce the problem, create a JAR file including the systemout.log and
native_stdout.log files ten submit the JAR file to IBM support
C. Run the collector command, use the problem type option to specify database
connection pooling and submit the resulting JAR file to IBM support
D. Use the service component of the IBM Support Assistant (ISA) to gather data for the
database connection pooling problem type
QUESTION 37
What functionality does the Caching Proxy server provide?
A. File service enabler
B. Integration with Dynacache and third party object caches
C. HTTP compression
D. Dynamic content caching and integration with servlet caching
E. Reverse Proxy and content-based routing
QUESTION 38
What is the name of the WebSpehere scripting tool?
A. wsdeploy
B. wsadmin
C. ws_ant
D. wasadmin
QUESTION 39
Session Initiation Protocol (SIP) servlets are packaged in which type of archive file?
A. SAR
B. JAR
C. SIP-JAR
D. WAR
E. EJB-JAR
QUESTION 40
A DB2 data source is used across different applications. The application is installed in
multiple machines for horizontal scaling but the database driver location differs from
machine to machine. When using WebSphere variables, what is the most maintainable
way to define the scope for this data source?
A. JDBC provider - cell scope data source - cell scope
B. JDBC provider - node scope data source - cell scope
C. JDBC provider - node scope data source - node scope
D. JDBC provider - cell scope data source - node scope
QUESTION 41
An application has 15 concurrent users and a connection pool size of 10. Each user uses 3
prepared statements. For this application, what is the recommended prepared statement
cache size?

A. 45
B. 15
C. 30
D. 10
QUESTION 42
After hearing from clients that they are having problems logging into an application, an
administrator enables tracing on WebSphere security components using the following log
trace string:
com.ibm.ws.security.*=detail and restarts the server
When the administrator examines the trace log, there are no events recorded for any
security components.
What must the administrator do to ensure that the trace information is written to the trace
log?
A. Update the Log Detail levels for the servers node agent
B. Set the Log Detail Levels to one of the following: fine, finer, finest
C. Modify the server.xml file to enable tracing and restart the server
D. Configure the trace output format with the advanced setting
QUESTION 43
After installation and application server profile creation, which servlet is useful for
validating system configuration?
A. HitCount
B. WSSamples
C. HelloHTML
D. Snoop
QUESTION 44
When is J2EE mapping of security roles to users and groups allowed?
A. During application development with Rational Application Developer (RAD) or with
Application Server Toolkit (AST)
B. During application runtime
C. When configuring the user registry
D. During the creation of an application profile
E. After an application is installed
F. During an application installation
QUESTION 45
Which Web server plug-in setting is NOT configurable using the administrative console?
A. Refresh configuration interval
B. Load balancing option
C. Minimum number of connections
D. Retry interval
QUESTION 46
A WAR file containing several JSR 168 complaint portlets has bees successfully installed
in an application server. If portlet serving has been enabled, how can the portlets be
accessed with a browser?

A. Request the wpsServlet servlet and then select the portlet from a portal menu
B. Request the portlets index.jsp and then submit the context root and portlet name
C. Request the portlet directly using a URL that includes the name of the portlet
D. Request the PortletServingservlet servlet and then submit the name of the portlet
QUESTION 47
What has to be configured to implement memory-to-memory HTTP Session persistence?
A. The HTTP Plug-in and embedded HTTP Server
B. EJB session beans and EJB Container
C. The JMS Server and Queue Manager
D. The Data Replication Server (DRS) and Web Container
QUESTION 48
The Profile Management Tool Allows you to enable WebSphere administrative security.
Which use registry is used for this default security?
A. Local Operating system
B. Standalone LDAP registry
C. Standalone custom registry
D. Federated Repositories
QUESTION 49
An administrator should use the IBM Support Assistant (ISA) to perform which tasks?
A. Assemble and package enterprise applications into EAR files and submit to IBM
Support for profiling
B. Submit a Problem Management Report (PMR) electronically to IBM Support and
Check the PMRs status
C. Analyze a service log file against a symptom database and submit the results to IBM
support
D. Create a log of the activity for several components of an application server and submit
the log to IBM support
QUESTION 50
Under which circumstance should the WebSphere administrator use the dumpNameSpace
utility?
A. When applications are experiencing a problem accessing a specific WebSphere data
source
B. When the application server will not start because the JNDI namespace tables have
become corrupted
C. Before regenerating the plug-in for the web server
D. To clear the namespace prior to installing or redeploying an application
QUESTION 51
A WAR file containing JSR 168 compliant portlets has been successfully installed in an
application server. If portlet serving has been enabled, how can the protlets be accessed
with a browser?
A. Request the wpsServlet servlet and then select the portlet from a portal menu
B. Request the PortletServingServlet servlet and then submit the name of the portlet

C. Request the portlet directly using a URL that includes the name of the portlet
D. Request the portlets index.jsp and then submit the context root and portlet name
QUESTION 52
What is needed to load balance the HTTP traffic across a cluster of Web Servers?
A. Enable server affinity for each HTTP server in the cluster
B. Configure proxy server such as Tivoli Access Manager (TAM)
C. Use an IP sprayer from the load balancing component of the WebSphere edge
components
D. Implement the caching proxy server component of the WebSphere Edge
QUESTION 53
If an IBM HTTP Server is defined, the IHS Administration is installed and the IBM
HTTP server is defined to an unmanaged node, which two can be done?
A. Update the sever with new fixpacks
B. Start and stop the server and propagate the plug-in configuration file after it is
generated
C. Display the IBM HTTP Server error log (error.log) and access log (access.log) files as
well as display and edit the IBM HTTP server configuration file (httpd.conf)
D. Flush its local cache
E. Enable dynamic trace
QUESTION 54
When attempting to install WebSphere Application Server v6.1 using the silent install,
the installation fails early in the process and no log files appear to be created in the logs
directory. Which two steps can the administrator perform to troubleshoot the issue?
A. Restart the installation with the log parameter
B. Run the installation verification test (IVT)
C. Look for the log files in the system temporary area
D. Start over by creating a new responsefile.txt using the responsefile.base.txt
E. Restart the installation after an OS restart
QUESTION 55
What are three goals of the Virtual Member Manager (VMM)?
A. Provide a repository-independent programming interface
B. Provide the ability for users to achieve a single view of their own multiple repositories
in a federated model
C. Provide a cache of repository information
D. Provide a repository that can span multiple WebSphere cells
E. Support various pluggable repositories
QUESTION 56
An administrator needs to enable support for a number of applications that use
message-driven beans (MDBs). Some of the beans use point-to-point messaging and
other beans use publish-subscribe messaging. The administrator will typically need to
perform which two sets of tasks?
A. Configure a service integration bus and add the appropriate bus member
B. Deploy the MDBs to the message engine and select the SOAP over JMS protocol

C. Configure queue managers using the WebSpehere MQ JMS provider


D. Deploy the MDBs to JCA container and select bean managed persistence
E. Configure the default JMS provider and define the necessary destinations (queues and
topics)
QUESTION 57
Which statement is NOT true about Application Server Toolkit (AST)?
A. It has Jython editor and source debugger
B. It has a similar look and feel to the IBM Rational family of products and is based on
Eclipse
C. It is supported on Windows, Linux and AIX
D. It has a complete development environment for enterprise applications including EJBs
E. It can run wsadmin scripts inside AST
QUESTION 58
Which web module parameter adjustments would result in improved response time for
web clients?
A. Disable load on startup
B. Set the reload internal to 20 seconds or less
C. Set the distributable flag
D. Enable pre-compile JSP option
QUESTION 59
A J2EE application needs to be configured as follows:
The EJB module and the utility JAR in the application must be loaded by the same Class
loader. Each web module must have its own unique class loader.
What is the correct application server and web module class loader configuration for this
application?
A. Isolation Policy -> Multiple, Class loader policy -> Application
B. Isolation Policy -> Single, Class loader policy -> Module
C. Isolation Policy -> Single, Class loader policy -> Application
D. Isolation Policy -> Multiple, Class loader policy -> Module
QUESTION 60
To enable tracing on a WebSphere component, such as the naming or the rsadapter using
a servers Diagnostic Trace Service, which set of tasks should an administrator perform?
A. Use the administrative console to direct the trace output to a memory buffer, select a
trace output format, select a component to trace and set the log detail level to either fine,
finer or finest
B. From the administrative console select Tracing, select a node agent, select process
logs, select a trace output format, select a component to trace and set the log detail levels
to detail
C. Edit the wsadmin.properties file to specify a trace string for the component and accept
all of the default tracing properties then perform a full-resynchronize of the node agent
D. Use the Application Server Toolkit (AST) to import the activity.log file and edit this
file to specify a trace string for the component then export the activity.log file to the node
agents configuration directory.

QUESTION 61
What is the minimum administrative role that is required for an enterprise application to
be started through the console?
A. Operator
B. Monitor
C. Administrator
D. Configuration
QUESTION 62
After installation and application server profile creation, which servlet is useful for
validating system configuration?
A. HitCount
B. Snoop
C. HelloHTML
D. WSSamples
QUESTION 63
A J2EE application needs to be configured as follows:
The EJB module and the utility JAR in the application must be loaded by the same class
loader. Web Module WAR1 and the EJB module must use the same Class loader and web
module WAR2 must have its own class loader.
What is the correct Web Module class loader configuration for this application?
A. WAR1 - Module, WAR2 - Application
B. WAR1 - Application, WAR2 - Module
C. WAR1 - Application, WAR2 - Application
D. WAR1 - Module, WAR2 - Module
QUESTION 64
What is the minimum administrative role required for Java 2 security to be enabled
through the administrative console?
A. Configuration
B. Security
C. Operator
D. Administrator
QUESTION 65
When implementing WebSphere security, which statement is true about authentication
and authorization credentials?
A. Both authentication and authorization require lookups to the security server LDAP
database
B. Authentication takes place utilizing a user registry, however authorization is done
based on properties defined within the .ear file
C. Authorization must occur before authentication to ensure the proper J2EE Security
roles are utilized for the LDAP lookup
D. WebSphere security processes run on a centralized security service LDAP database to
facilitate single sign on administration of both authentication and authorization
credentials

QUESTION 66
What is the advantage of implementing a multi-tiered environment across multiple
machines?
A. The tiers allow you to rune individual products
B. It can more closely align with Certkiller .com's business functions (i.e distribution,
ordering and inventory management.)
C. It is the separation of tiers that allows operating system tuning parameters to be used
based on the machine's function
D. Separation reduces maintenance complexities since components are highly available
in a distributed configuration
QUESTION 67
What does a WebSphere application server provide to support the installation and
deployment of JSR 168 Complaint portlets?
A. An embedded version of WebSphere Portal Express
B. An embedded portlet container
C. Several J2EE applications that render and aggregate portlets in a browser
D. A scaled-down version of the WebSphere Portal Server
QUESTION 68
Which statement describes the WebSphere v6.1 FFDC feature?
A. FFDC information is stored in an optimized relational database
B. FFDC does not affect performance of the WebSphere application server
C. FFDC logs are mainly intended for application development teams
D. The application server needs to be restarted after enabling FFDC
QUESTION 69
What is the default connection protocol that the WebSphere scripting tool uses?
A. SOAP
B. RMI
C. SOAP is tried first then RMI is tried second
D. NONE
E. TCP
QUESTION 70
A system administrator needs to create a data source and make it available on multiple
nodes using different directory structure. Which two actions should the system
administrator take to do this?
A. Define the JDBC provider at the cell scope
B. Define the JDBC provider at the node scope
C. Create the data source that uses this JDBC provider at the node scope
D. Define the JDBC provider at the server scope
E. Create the data source that uses this JDBC provider at the server scope
F. Create the data source that uses this JDBC provider at the cell scope

QUESTION 71
Which three statements are true about J2EE security roles?
A. Binding of the users and groups to the J2EE security roles is usually done at the
application install time
B. Authorization is performed using the J2EE security roles
C. Security roles are applied to the web and EJB application components
D. Security roles provide an access control mechanism to manage the applications access
to system level resources
E. Security roles can be modified dynamically at runtime
F. Authentication is performed using the J2EE security roles
QUESTION 72
Which file can a system administrator consult prior to starting an installation to
determine which components are already installed on the machine?
A. prereqChecker.xml
B. log.txt
C. vpd.properties
D. Profileregistry.xml
QUESTION 73
According to the Upstream Queuing Model for performance tuning, what reflects the
correct application of recommended settings for maximum concurrent clients?
A. Web server=75, web container=50, datasource=25
B. Web server=25, web container=50, datasource=75
C. Web server=50, web container=50,datasource=50
D. Web server=75, Web Container=75, Datasource=25
QUESTION 74
A system administrator is federating a node using the addNode command. The Addnode
command can't perform by default which step?
A. Include applications in the cell
B. Create a definition for the node agent
C. Update the node's wsadmin.properties file to reflect the new cell environment settings
D. Create entries in the master repository for the federated node
QUESTION 75
Which two tasks can be performed using the IBM Key Management Utility (Ikeyman)
for managing SSL for IBM HTTP Server?
A. Sign certificates on certificate Authority's (CA) behalf
B. Create self-singed certificates
C. Create a key database file
D. Edit httpd.conf to use a certificate
E. Install GSkit
QUESTION 76
When the application server is experiencing normal to heavy usage, which statement
most accurately describes optimal pool usage?

A. The Performance Management Interface (PMI) must be explicitly enabled on the


application server to be monitored, since it requires CPU resources on the server being
monitored
B. The pools will all show similar numerical values, indicating balanced workload is
occurring throughout the application server
C. Pools used by the application should be released and rebuilt in conjunction with JVM
garbage collection cycles ensuring that no stale connections persist
D. Pools used by the application should be nearly fully utilized, indicating that resources
are being efficiently used
QUESTION 77
After creating a profile, a system administrator discovers there are port conflicts. Which
action should the system administrator take to fix the port conflicts in the existing
profile?
A. Run the updatePorts.ant script
B. Edit the server.xml file
C. Update the portdef.props file
D. Re-create the profile entering different ports
QUESTION 78
How can an administrator view the contents of the activity.log file in the profile root
directory?
A. Run the waslogbr script from the command line and use the Log analyzer
B. Open the file using any text editor
C. Use the profiling and Logging perspective in the Application Server Toolkit (AST)
D. Open the file using the IBM Support Assistant (ISA) and use the Thread Analyzer tool
QUESTION 79
A system administrator is installing an enterprise application in a secured
WebSphere Application Server environment. The application has been configured
to use security roles. Which of the following is considered a BEST practice when
mapping the security roles to the current user registry?
A. Map the security roles of EJB methods to groups and the security roles of Web
resources to users.
B. Map the security roles of Web resources to groups and security roles of EJB methods
to users.
C. Map all security roles to users
D. Map all security roles to groups
QUESTION 80
A system administrator has created data source definition using the Application
Deployment Descriptor editor in the Application Server Toolkit (AST). These
datasource can be accessed by any:
A. Applications running on the server
B. Applications in the current AST workspace.
C. Modules contained in the EAR file where the definition is made
D. J2EE Application clients accessing the server

QUESTION 81
Which of the following must a system administrator define when creating a JDBC
provider at the cluster scope?
A. All datasources for this JDBC provider at the cluster level.
B. An XA data source implementation type, for the JDBC driver.
C. The symbolic Variable used in the class path to the JDBC driver for each node in the
cluster
D. The J2C authentication data entry for the datasource at the cluster scope.
QUESTION 82
A system administrator is installing an enterprise application containing several
entity EJBs. All EJBs are contained in the same EJB JAR file. All CMP EJBs in the
JAR file, except one, access the same datasources. What is the MOST efficient way
to bind the datasources for the EJBs?
A. Create a separate EJB JAR file for the EJB that is different and set EJB module
datasources on both EJB JARs.
B. Ask developers to pre-configure the EJB module with the production datasource JNDI
names.
C. Individually, bind each of the EJBs to the datasource they use.
D. Bind the EJB module to the datasource used by most EJBs, then specify a separate
binding for the EJB that is different
QUESTION 83
The WebSphere Rapid Deployment(WRD) tool is running in the automatic
allocation mode. All of the following enterprise applications will be deployed if the
file types are placed below in WRD's monitored directory EXCEPT.
A. An Enterprise Archive (EAR) file.
B. A Web module (WAR) file.
C. An EJB module JAR file.
D. A Resource Adapter Archive (RAR) file.
QUESTION 84
A customer is in the process of configuring a J2C (JCA) connection factory using
the administrative console. The customer wishes to eventually secure the connection.
The customer also knows that several security settings are now deprecated in
WebSphere Application Server V6 for connection factories. Which of the following
should the system administrator recommend that the customer use?
A. Component-managed Authentication Alias
B. Mapping-Configuration Alias
C. Authentication preference
D. Container-managed authentication alias
QUESTION 85
If a system administrator is creating a wsadmin script, and within the script it is
necessary to create several JMS Connection Factories and JDBC. Dtasources, which
of the following wsadmin scripting objects should be used?

A. AdminConfig
B. AdminControl
C. AdminApp
D. AdminTask
QUESTION 86
A customer is using the WebSphere V6 Default messaging provider as the
messaging service. The customer has the following configuration. Cell C1 has Bus A
and B, whereas Cell C2 has Bus C. All of the following are supported optional
EXCEPT.
A. Configuring a link between Bus A and Bus B.
B. Configuring WebSphere MQ as a Foreign bus.
C. Configuring a link between Bus b AND Bus C.
D. Running a JMS Client on Bus A that gets messages from a destination on Bus C.
QUESTION 87
A system administrator is about to federate a node into a Network Deployment cell.
The node's server has several applications installed and a Service integration Bus is
defined on the node. Before federating the node, the system administrator must
understand that the default behavior of the addNode operation is:
A. To not carry over applications to the cell.
B. To not carry over Service Integration Buses to the cell.
C. To not carry over applications and Service Integration Buses to the cell.
D. To carry over applications and Service Integration buses to the cell.
QUESTION 88
A system administrator is using the administrative console and accidentally closes
the browser without saving any changes made during that session. What must the
system administrator do to make sure any configuration changes that were made
during the last session are not lost?
A. Lo in as a different user and save the master repository.
B. O and hand-edit the configuration xml files in the appropriate places
C. Restore a backup copy of the master configuration
D. Make those changes permanent when the system administrator logs in again.
QUESTION 89
In order to safely and completely backup an Application Server's configuration,
which of the following commands would be MOST appropriate?
A. backupConfig
B. BackupConfig -safeMode
C. backupConfig -stop
D. backupConfi -nostop
QUESTION 90
A system administrator is concerned about disk usage. Although the system
administrator wants to be sure the activity log does not grow too large, the system
administrator also wants to ensure that important messages are not lost. Which of
the following strategies would control the size of the logs and yield the maximum

amount of log information?


A. Set the Maximum File Size to 3 MB for the IBM Service Logs in the administrative
console.
B. In the Log Analyzer, set the Maximum File Size to 3 MB for the IBM Service Logs.
C. Using wsadmin, set the Maximum Number of Historical Log Files to 2 with a File
Size of 2 MB.
D. Through the administrative console, set the Maximum File Size to 2 MB and the
Maximum Number of Historical Log Files to 3
QUESTION 91
Which of the follow statements MOST accurately describes the effect of increasing
the JVM heap size?
A. More objects will be created and the time required to garbage collect will decrease.
B. Applications run longer before a garbage collection occurs.
C. A larger heap size will cause the server to take loner to start.
D. No measurable performance change will result from increasing the heap size.
QUESTION 92
A performance analysis of a customer application revealed that the overhead of
persistent HTTP sessions was the main contributor to performance slow down. All
of the following factors will help with improving the performance of persistent
HTTP session performance EXCEPT:
A. Reducing the size of the session object
B. Invalidating unneeded sessions
C. Increasing the memory available
D. Increasing the cache overflow size.
QUESTION 93
A system administrator needs to gather performance data for several servlets that
are used by an application running on a particular server. Using the Tivoli
Performance Viewer, which of the following performance statistics would the
system administrator be able to monitor?
A. The number of failed servlet requests
B. The average response time for servlet requests.
C. The average wait time for a particular servlet.
D. The minimum and maximum response times for servlet requests.
QUESTION 94
For testing purposes, a system administrator needs to disable automatic
propagation of the plugin-cfg xml file for an HTTP server which has already been
configured on a managed node. Which of the following steps must be performed
from within the administrative console?
A. Select Environment->Update Web Server Plug-in, uncheck the "Automatically
propagate the plug-in configuration file" option
B. Select Environment ->Virtual Hosts, uncheck the "Automatically propagate the
plug-in configuration file" option
C. Select Server, select an application server, select Web container, uncheck the

"Automatically propagate the plug-in configuration file" option


D. Select Servers->Web servers, click the Web server, select Plug-in properties, uncheck
the "Automatically propagate the plug-in configuration file" option
QUESTION 95
The customer has deployed a WebSphere-based application that performs excessive
database operations. The application is deployed to a 2-node symmetric cluster,
with 2 application servers per node, for a cluster size of 4 members. All cluster
members are configured identically and there exists no other servers on clusters in
this cell. In addition, a data source is defined at the cell-scoped level with a
maximum of 100 connections. Given that each database connection consumes 2MB
of memory, under peak load, how much of the JVM heap on each server is
consumed by connections?
A. 25MB
B. 50 MB
C. 100MB
D. 200MB
QUESTION 96
Which of the following sets of parameters can a system administrator adjust in
order to directly improve performance for the EJB container?
A. Cache size, cache cleanup interval
B. Datasource connection pool, server JVM size
C. Session timeout, HTTP session object size
D. Transaction lifetime, client inactivity timeout
QUESTION 97
Which of the following changes to an application server's configuration will cause
the HTTP plug-in configuration file to be regenerated?
A. The Web CONTAINER'S CLASS-LOADER POLICY HAS BEEN MODIFIED
B. An application's class-loder policy has been modified
C. A new application has been installed on the server
D. The server's PMI monitoring level has been modified.
QUESTION 98
Which of the following lists contains all of the class loader settins that can be
configured at the application server level?
A. Single, Multiple, Parent First, Parent Last
B. Single, Application, Parent First, Parent Last
C. Module, Application, Parent First, Parent Last
D. Enable class reloading, Realod Interval, Parent First, Parent Last
QUESTION 99
When working with a cluster, a system administrator needs to stop and restart all
servers in the cluster. This will ensure that applications running in the cluster
remain available at all times. Using the administrative console., which actions will
MOST efficiently accomplish this task?

A. From the Application Servers page select each server. Click stop, then slect the server
again and click Start.
B. From the Application Server page select all servers in the cluster, Click Stop, then
select all the servers again and click start.
C. From the Clusters page select the cluster and click stop, then select cluster again and
click start.
D. From the Cluster page select the cluster and click Ripplestart.
QUESTION 100
A developer is building as EJB that will have exclusive access to a confidential
military database. The developer therefore does not want the EJB to be clustered or
workload managed. In a conference with the system administrator, the developer is
advised to use which caching option when building the bean?
A. Option A Caching
B. Option B Caching
C. Option C Caching
D. Dynamic Caching
QUESTION 101
A system administrator is reviewing a checklist of actions that should occur during
the federation process. The system administrator notes that all of the following
checklist actions are correct EXCEPT:
A. The node is added to the cell
B. The node agent and application server are started
C. The application server becomes a managed server in the cell
D. The application server is stopped, and a new node agent is created.
QUESTION 102
A system administrator wants to federate an application server profile to a cell. All
of the following are valid steps or actions EXCEPT:
A. Install the product on each machine if this is a multiple machine install.
B. Create an application server profile on the application server machine and start the
application server.
C. Add the node defined by the application server profile to the cell, which will delete the
application server cell, and federates the node to the deployment manager cell.
D. Monitor the node agent and application server which will start automatically during
the federation process.
QUESTION 103
Given the following JSESSIONID=000A2ABM41JozU_VM8IffsMNfdR:v544d0o0,
what cluster member (clone ID) would this HTTP request be routed to?
A. 000A2
B. 0000A2AB
C. v544d0o0
D. Route cannot be determined from the above information

QUESTION 104
A system administrator has deployed a horizontally and vertically scaled clustered
application across a 6-NODE wEBsPHERE Application Server cluster. Each node
contains two cluster members. The system administrator is looking for the most
scalable HTTP Session persistence mechanism for this environment. Which of the
following HTTP Session persistence strategies would BEST fit these requirements?
A. Memory-to-Memory Replication in a pure peer-to-peer topology configuration
B. Databse Session persistence
C. Local Sessions
D. Local Session with overflow
QUESTION 105
When can a Data Replication Domino be created from the WebSphere Application
Server V6 administrative console?
A. While adding a new cluster member to the cluster or clicking on Cluster member ->
Replication Domino -> New
B. While creating the cluster or clicking on Environment -> Replication Domino -> New
C. While configuring session management on each cluster member or clicking on
Resources -> Replication Domain -> New
D. The administrative console does not support creation of the Data Replication Domain
at this time.
QUESTION 106
User requests are directed to the web container using the web container inbound
transport chain. The chain consists of all of the following EXCEPT for:
A . An HTTP INBOUND CHANNEL THAT SERVERS http 1.0 and 1.1 requests.
B. A TCP inbound channel that provides the connection to the network.
C. A Web Services inbound channel that provides the connection to the Web Services
Gateway.
D. A Web container channel over which requests for servlets and JSPs are sent to the Web
container for processing
QUESTION 107
Which of the following statements BEST describes the relationship between
WebSphere MQ and WebSphere Platform Messaging?
A. WebSphere MQ and Platform Messaging are separate and do not share any modules
or configuration data.
B. Platform Messaging relies on WebSphere MQ as the JMS provider.
C. WebSphere MQ and Platform Messaging must share the same Cloudscape database.
D. Platform Messaging is simply a scaled down version of WebSphere MQ.
QUESTION 108
A customer called a WebSphere support analyst and asked about J2EE extensions.
The analyst said that these extensions are included with Programming Model
Extension (PME) which is part of WebSphere Application Server V6. The analyst
also mentioned of the included extensions, but made a mistake on one of the
extensions. All of the following are correct EXCEPT:

A. Asynchronous beans offer performance enhancements for resource-Intensive tasks by


enabling single tasks to run as multiple tasks.
B. Startup beans allow the automatic execution of business logic when the node agent
starts or stops.
C. Internationalization service is a WebSphere extension that allows one to automatically
recognize the time zone and locale information of a calling client.
D. Scheduler service is a WebSphere programming extension responsible for starting
actions at specific times or intervals.
QUESTION 109
Which of the following are services implemented by the WebSphere Application
Server?
A. Session management, Naming, Messaging engine, and the user registry
B. Security, Messaging engine, Naming, HTTP Plug-in
C. The user registry, Transaction service, Naming, and HTTP Plug-in
D. Security, Naming, Messaging engine, and Dynamic Cache.
QUESTION 110
Which of the following components are supported by Express/Base WebSphere
Application Server V6 through the WebSphere administrative console?
A. Application server clustering
B. External web server
C. External generic server
D. WebServer V5 JMS server
QUESTION 111
The EJB container in one of the cluster members handles an EJB client call from
outside of the container. The cluster member fails. The client's request will be
automatically redirected to a service in another available server. All of the following
are involved in redirecting the client's request EXCEPT:
A. The High Availability Manager
B. Application Server cluster
C. EJB workload amangement (WLM)
D. IBM Dispatcher Service
QUESTION 112
A system administrator was asked to use pre-defined port numbers for the new
application server profile. The system administrator can use the wasprofile
command line utility to accomplish this task by defining port numbers. The system
administrator will need follow the format in.
A. vpd.properties and use that file for the -portsFile argument.
B. Portdef.props and use that file for the -portsFile argument.
C. Wasprofile.properties and use that file for the -portsFile argument.
D. Sas.client.props and use that file for the -portsFile argument.
QUESTION 113
Which of the following is the correct way to delete a profile in WebSphere
Application Server V6?

A. Use the "Profile creation wizard"


B. Delete the profile Template directory
C. Use the wasprofile command line utility
D. Delete the profile directory
QUESTION 114
A system administrator installed the WebSphere Application Server V6 Network
Deployment product. The system administrator also created Application Server
profile to deploy a J2EE application that is using Message Driven Beans (MDB).
The system administrator did not install sample applications during or after the
installation. What does the system administrator have to do to display and run the
application successfully?
A. Create a customer profile and deploy the application on it.
B. Create and configure Service Integration Bus (SIB) and add the Server to it to create a
messaging engine
C. Install Embedded Messaging from the installation CD to create a messaging engine.
D. Install WebSphere MQ and deploy the application on it
QUESTION 115
A system administrator was asked to develop necessary artifacts to install a
WebSphere Application Server V6 Network Deployment package, create a
deployment manager profile and a customer profile, all on a single machine. Silent
installation script response files were used. How many response files does the system
administrator need to create to accomplish this task without using UI based tools?
A. 1
B. 2
C. 3
D. 4
QUESTION 116
A system administrator is unable to start the installation wizard while installing the
WebShere Application Server V6 Network Deployment package. In addition, the
system administrator cannot see any log files under the temp directory. What is the
MOST probable cause?
A. The JDK is not installed yet.
B. There is not enough Disk Space.
C. There is not enough CPU power.
D. The installation Database Repository (IDR) is not functioning.
QUESTION 117
A system administrator fedrated a custom profile to the deployment manager. The
system administrator then created a new server (server1) on the fedrated node. How
should the system administrator verify that the server was successfully created?
A. Use the snoop servlet
B. Run the installation Verification proram
C. View the addNode.lo file of the node agent.
D. View SystemOut.log file of the deployment manager.

QUESTION 118
A system administrator was troubleshooting a problem after configuring the
environment for the remote plug-in (http://webserver-hostname/snoop does not
work). The system administrator could verify that
http://app-server-hostname:9080/snoop and http://webserver-hostname are
working properly. Assuming that the system administrator used default
values during the installation, which log file will give more information
about the problem?
A. error.log under HTTP Server logs directory
B. http_plugin.log under PLUGIN logs directory
C. SystemOut.log under PROFILE logs directory
D. plugin-cf.xml under PLUGIN logs directory
There is an http_plugin.log under plugin log directory and it is a log file.
Not D:
There is no plugin-cf.xml file in plugin log directory.
There is a plugin-cfg.xml file within plugin config directory but it is not a log file, it is an
xml configuration file for the plugin module.
QUESTION 119
When a J2EE enterprise application is being assembled to take advantage of J2EE
security, there are a number of configurations and mapping that need to be made.
Which of the following items can a security constraint be mapped to?
A. A Web resources
B. An EJB
C. A login mechanism
D. A security realm
QUESTION 120
A system administrator is working in a federated cell with Global security enabled.
The system administrator wants to use various command line tools to manage the
application servers. All of the following command line tools require the system
administrator to provide a username and password EXCEPT:
A. startServer
B. stopServer
C. wsadmin
D. stopManager
QUESTION 121
An enterprise application must be started through the console. Which of these
administrative roles would be the minimum required?
A. Monitor
B. Configurator
C. Administrator
D. Operator

QUESTION 122
After installing IBM WebSphere Application Server and creating a fedrated cell, a
system administrator wants to enable Global security. After making the appropriate
configuration changes, which steps must the system administrator take in order for
Global security to become fully active?
A. Restart the Deployment Manager
B. Restart the Deployment Manager and all Node Agents
C. Restart the Deployment Manager, all Node Agents and all Application Servers
D. Restart the Deployment Manager, all Node Agents, all Application Servers and the
User Registry
QUESTION 123
Two enterprise applications need to be installed into the WebSphere Application
Server environment. Each application has to rely upon authentication through
WebSphere security, but must map to different user registers. Which of the
following statements is valid?
A. Both applications can be installed into the same application server and each need to be
mapped to separate user registries.
B. Both applications can be installed into the same node but different application servers.
C. The applications need to be installed on separate nodes which can be in the same cell.
D. The applications need to be installed in separate cells.
QUESTION 124
A system administrator is making sure that the SSL communications between the
plug-in and the application server are as secure as possible. While configuring SSL
for the plug-in what steps should be taken to ensure the BEST possible security?
A. Replace the private key
B. Replace the plugin-key.kdb file
C. Remove the public key
D. Remove the DummyKeyring.kdb file
QUESTION 125
The First Failure Data Capture (FFDC) is a diagnostic component of WebSphere
Application Server and serves a very specific role. Which of the following
descriptions BEST defines the role of FFDC?
A. The First Failure Data Capture tool preserves the information generated from a
processing failure and returns control to the affected engines. The captured data is saved
in a log file for use in analyzing the problem.
B. The First Failure Data Capture tool preserves the information generated from a
processing failure and forces the application server to shut down.
C. The First Failure Data Capture tool preserves the information generated from a
processing failure and invokes the Collector tool to take a snapshot of the system
environment.
D. The First Failure Data Capture tool preserves the information generated from a
processing failure and forces the application server to do a thread dump.

QUESTION 126
A system administrator has to determine the root cause of and decides to enable
tracing application server. How can the system administrator accomplish this task?
A. Inside the administrative console, click Troubleshooting -> Logs and Trace and Select
the Runtime tab.
B. Inside the administrative console, click Troubleshooting -> Logs and Trace ->server
-> Diagnostic Trace and select the Runtime tab.
C. Edit the tracLog properties file and restart the application server.
D. This is not possible. The trace configuration of a running application server cannot be
changed.
QUESTION 127
When using the administrative console to configure logging on a particular server,
the Diagnostic Trace Service can be configured to write messaging to log files in one
of three formats. Which of the following are the supported formats?
A. Basic, CBE, JRas
B. Basic, Advanced
C. Basic, Intermediate, Advanced
D. Basic, Advanced, Log Analyzer
QUESTION 128
Not every name space can be dumped using the dumpNameSpace utility. Using
wsadmin, the NameServer MBean can be invoked to dump these name spaces. All of
the following can be dumped with the NameServer MBean EXCEPT.
A. Name space java:
B. Name space local:
C. Name space Server:
D. Name space jdbc:
QUESTION 129
A problem has been reported to a system administrator, however the system
administrator is unable to use the Log Analyzer for some reason. Which of the
following is an alternative way for the system administrator to review the Log
Analyzer log file?
A. Use the dumplog command.
B. Use the showin command
C. Use any text editor although the formatting wont be as nice.
D. Format the Log Analyzer log with wsadmin and then use any text editor.
E. Use the showlog command
QUESTION 130
A system administrator is asked to write a PERL script to output only those error
messages in System Out log that refer to some sort of error or warning. Which event
types should the system administrator include?
A. F,E,W
B. F,E,W,D
C. F,E,W,A
D. F,E,W,H

QUESTION 131
A system administrator notices that web requests are falling on a particular
application server which has already started. Which log files should be reviewed for
application server errors?
A. SystemErr.log.SystemOut.log
B. startServer.log. stopServer.log.System Err.log.SystemOu.log
C. SystemOut.log
D. SystemErr.log
QUESTION 132
What is required to configure a WebSphere application server for remote
debugging?
A. Edit the WebSphere remoteDebug.properties file.
B. Edit the WebSphere remotAppServerDebug properties file
C. Go to the administrative console and enable the Debuging Service to start under the
System Administration tab.
D. Go to the administrative console and enable the Debugging Service to start along with
the application server.
QUESTION 133
While testing the HTTP Session affinity behavior of a WebSphere cluster, the
system administrator noticed that there were two versions of the plugin-cfg.xml file
used:
Version #1: plugin-cfg.xml
<ServerCluster Name= "abcCluster">
<ServerCloneID="abcdefgh"LoadBalanceWeight="2"Name="ServerA">
Version #2: plugin-cfg.xml
<ServerCluster Name= "abcCluster">
<ServerLoadBalanceWeight="2"Name="ServerA">
What would be the expected behavioral differences between the two versions of the
WebSphere plugin configuration file in terms of honoring HTTP session addinity?
A. Version #1 supports HTTP Session affinity
B. Version #1 and version #2 both support session affinity
C. Version #2 supports HTTP session affinity
D. Version #1 and version #2 do not support HTTP session affinity
QUESTION 134
A system administrator is creating a wsadmin script. Within the script, it is
necessary to list the running applications on a server. Which of the following
wsadmin scripting objects should be used?
A. AdminMBeans
B. AdminConfig
C. AdminOperations
D. AdminControl

QUESTION 135
A system administrator is developing an application to a 2-node cluster. One of the
nodes is a powerful AIX-based machine and the other is a smaller Windows-based
machine with less processing capability. How would the cluster BEST be configured
to ensure more work gets routed to the more powerful server?
A. Use the Random algorithm and assign a smaller weight to the Windows box.
B. Use the First-Come-First-Served algorithm
C. Use the Round Robin and assign a larger weight to the AIX machine
D. Use the Least Recently Used algorithm with weights.
QUESTION 136
On receipt of a JMS message on a queue (Q ), a message-driven bean (MDB)
processes the message by invoking a stateless session bean that does a data base
update. Both enterprise beans execute within the same transaction context. The
queue type destination in the underlying Service integration Bus corresponding to Q
is defined with the "Maximum failed deliveries" attribute set to 0, and the
"Exception destination" specific as 'None'. What happens when the processing of a
particular message results in a transaction rollback?
A. The application server hosting the MDB is shutdown
B. The JMS runtime stops the delivery of the message to the application
C. The JMS runtime keeps delivering the message to the application
D. The message gets stranded on the queue (Q)
QUESTION 137
The log files reveal naming exceptions after a system administrator has just created
a new datasource. What tool would the system administrator use to verify that the
datasource is correctly registered in the JNDI namespace?
A. dumpJNDINameSpace
B. dumpNameSpace
C. dumpJNDICache
D. showNameSpace
QUESTION 138
A system administrator is asked to diagnose a problem on a remote node using the
Log Analyzer. In order to accomplish this task, what is the name of the Log
Analyzer source log file that the system administrator will have to access?
A. service.log
B. activity.log
C. loganalyzer.log
D. trace.log
QUESTION 139
Where in the administrator console can the log detail levels be changed?
A. Troubleshooting -> Logs and Trace
B. System administration -> Console settings -> Preferences
C. Environment -> WebSphere Variable
D. System administration -> Console settings -> Logging

QUESTION 140
A system administrator notices that an application server (with servlets and EJBs)
is receiving llOP requests, but not any HTTP requests. Which of the following log
file(s) should be checked?
A. SystemOut.log and SystemErr.log
B. startServer.log
C. activity.log
D. HTTP_plugin.log and native_stdout.log
QUESTION 141
Sometimes it is required to force an application to create a thread dump (or
javacore). Which of the following processes would be used to force a thread dump?
A. Using the wsadmin command prompt, get a handle to the problem application server.
---------------------------------------------wsadmin>setjvm[$AdminControl completeObjectName type=JVM,process=server1.*]
-----------------wsadmin>$AdminControl invoke$jvm dumpAllThreads
Look for an output file in the installation root directory with a name like
javacore.date.time.id.txt.
B. Using the wsadmin command prompt, geta handle to the problem application server.
---------------------------------------------wsadmin>set jvm[$AdminControl completeObjectName
type=JVM,process=server1,*]
Generate the thread dump:
--------------------wsadmin>$AdminControl invoke $jvm dumpAppServerThreads
Look for an output file in the installation root directory with a name like
javacore.date.time.id.txt.
C. Using the wsadmin command prompt, geta handle to the problem application server.
---------------------------------------------wsadmin>set jvm[$AdminControl completeObjectName
type=JVM,process=server1,*]
Generate the thread dump:
--------------------wsadmin>$AdminControl invoke $jvm dumpJVMThreads
Look for an output file in the installation root directory with a name like
javacore.date.time.id.txt.
D. Using the wsadmin command prompt, geta handle to the problem application server.
---------------------------------------------wsadmin>set jvm[$AdminControl completeObjectName
type=JVM,process=server1,*]
Generate the thread dump:
--------------------wsadmin>$AdminControl invoke $jvm dumpThreads
Look for an output file in the installation root directory with a name like
javacore.date.time.id.txt.
QUESTION 142
In WebSphere Application Server V6, a logging infrastructure that extends Java
Logging in used. Which of the following contains the BEST subset of logging levels
that a system administrator can use to log only errors?

A. Severe, fatal
B. All, finest, finer, fine, server, fatal
C. All debug, entryExit, Info, warning, fatal
D. All, debug, entryExit, info, warning, error, fatal
QUESTION 143
There are multiple property files which control the behavior of the FFDC filter. All
of the following are FFDC property files EXCEPT:
A. ffdcStart.properties - used while the server is starting
B. ffdcRun.properties - used after the server is ready
C. ffdcException.properties - used whenever an exception occurs
D. ffdcStop.properties - used while the server is in the process of stopping
QUESTION 144
A system administrator is asked how best to suppress System out or System.err
messages from the customer's application. Which of the following actions should the
system administrator recommend to the customer?
A. Covert their logging to use Log4j.
B. Use the Common Base Event API and the Java Logging API.
C. Use JRas to log messages.
D. Click Troubleshooting > Logs and Trace >server name > JVM Logs and change the
installed Application Output parameter from the Admin Console
QUESTION 145
A system administrator has just installed the WebSphere Application Server. The
system administrator is interested in turning on global security in order to protect
the environment. By enabling global security, all of the following security features
will be activated EXCEPT:
A. Common Secure interoperability Version 2 (CSIV2)
B. Authentication to the administrative console
C. SSL between the plug-in and the embedded Web server
D. J2EE security
QUESTION 146
A site using J2EE security to protect their application the websphere Application
Server. An Application is being assembled with Application Server Toolkit and
needs to be configured for security. All of these steps are appropriate in this case
EXCEPT:
A. Creating the J2EE security roles
B. Creating the j2eesecurity.policy file
C. Creating the security constraints
D. Configuring the loin mechanism for the Web module
QUESTION 147
A secured network is being set up between an external Web server and the
application server's embedded web server. Given that mutual SSL authentication is
a required part of the process, which of the following configuration steps needs to be
selected?

A. SERVER AUTHENTICATION ONLY


B. Both Server and Client authentication
C. Cluster authentication
D. Client authentication only
QUESTION 148
A system administrator is considering how to configure WebSphere Application
Server with Global security to use the Local OS user registry. Which of the
following limitations does the system administrator need to take into account?
A. CSIV2 is not supported with the Local OS user registry
B. Global security can not use the Local OS user registry if WebSphere Application
Server is running as non-root
C. Java client certificates will not be able to be authenticated
D. Mapping J2EE security roles can not be done with groups
QUESTION 149
In considering security requirements for an Application Server, a system
administrator is interested in implementing Java 2 security. Which of the following
statements is valid regarding the enabling of Java 2 security?
A. Global security must be enabled for Java2 security to function
B. Global security does not need to be enabled for J2EE security to function
C. Java 2 security does not require Global security to be enabled
D. Java 2 security must be enabled for Global security to function
QUESTION 150
While setting up global security for a WebSphere environment, system
administrators need to be assigned various accesses. In order to configure SSL
(Security Socket Layer) through the administrative console, which of the following
administrative roles would be required?
A. Monitor
B. Security
C. Configurator
D. Operator
QUESTION 151
Which of the following external servers is normally found outside the firewall or in
the demilitarized zone?
A. Generic servers
B. Managed Web servers
C. Unmanaged Web servers
D. JMS Servers
QUESTION 152
The capabilities of WebSphere base are being compared and contrasted with
WebSphere Network Deployment configurations. All of the following statements are
valid EXCEPT:

A. WebSphere Base configuration does not provide any built-in support for Workload
Management and Failover capabilities.
B. Multiple installations of WebSphere base servers do not have a central point of
administration
C. WebSphere Network Deployment Configuration can be used to manage web server
nodes
D. Web Sphere Base configuration does not provide built-in support for service
integration bus.
QUESTION 153
Which of the following is a valid statement concerning the WebSphere V6 High
Availability Manager ?
A. The HA Manager enhances the availability of WebSphere singleton services like
transaction services, JMS Message services, and Service integration Bus services.
B. The HA Manager runs as an enterprise application within each application server
process that monitors the "health" of WebSphere clusters.
C. In the event of a server failure, the HA Manager could failover the transaction service
which could recover in-flight transactions.
D. The HA Manager leverages latest storage technologies to provide fast recovery time
of both single and two-phase transactions
QUESTION 154
A customer must enable High Availability and failover for a cluster of external
HTTP servers. Which of the following actions should the system administrator
recommend to a accomplish this task?
A. Use the load balancing component of the WebSphere Edge Components
B. Configure a proxy server such as Tivoli Access Manager
C. Enable server affinity for each HTTP server in the cluster
D. Implement the caching proxy server component of the WebSphere Edge Components.
QUESTION 155
An internet client is requesting a servlet from their web browser. Assuming that all
internet client requests are first routed to an IP sprayer, which of the following
components would typically be involved in the flow of the request from client to
servlet?
A. JMS server, LDAP server, and EJB container
B. External HTTP server, HTTP server Plug-in, and web container
C. Embedded HTTP server, web container, and EJB container
D. Embedded HTTP server, JMS server, and authentication proxy server
QUESTION 156
A developer is attempting to setup the Web SERVER DEFINITION WITHIN THE
APPLICATION SERVER FOR A CUSTOMER DEMONSTARTION. The
developer designed a chart that lists information about the definition process. A
system administrator was asked to confirm the accuracy of the chart. Which of the
following information would the system administrator indicate is NOT included in
the Web server definition?

A. Information about the location of the Web server


B. Information about its application server configuration files
C. Information about its plug-in configuration
D. Information about configuration files, and plug-in configuration
QUESTION 157
A customer has an application running on WebSphere Application Server. When a
user logs on, the application retrieves the relevant Product code information from
the database and stores it in a HashMap. A reference to the HashMap is then stored
in the HTTP Session object. Which of the following should be recommended as a
means for improving HTTP Session persistence performance?
A. Use memory-to-memory replication
B. Use peer-to-peer topology
C. Use database persistence
D. Declare the reference to the HashMap as transient
QUESTION 158
A system administrator wants to ensure that nodes with different hardware
resources participate in a cluster as efficiently as possible. Which of the following
should be used to BEST meet this goal?
A. A load balancer to evenly distribute requests to cluster members
B. A fine grain application update with capabilities to tune cluster member applications
to the hardware
C. Weighted definitions for cluster members
D. Identical application components for all cluster members
QUESTION 159
A system administrator is creating a new cluster. The servers in the cluster will need
several configuration steps to support the applications. Which of the following ways
is MOST efficient to create and configure the cluster members?
A. Create and properly configure a server then add this server as the first member of the
cluster.
B. Create and properly configure as standalone server then add this server as the last
member of the cluster
C. Create the cluster and add all the cluster members, then make configuration changes at
the cluster scope.
D. Create the cluster and add all the cluster members, then set the configuration in any of
the clustered servers.
QUESTION 160
A proposed WebSphere cell contains about 25 nodes. The environment will be
horizontally and vertically scaled and can potentially grow over time. What strategy
for HTTP Session persistence would work BEST for this situation?
A. Database session persistence
B. Memory-t-Memory replication in a peer-to-peer topology
C. Local sessions
D. Peer-to-Peer session persistence

QUESTION 161
When using the addNode command to federate a node to a cell, It may be necessary
to know the Deployment Manager's SOAP connection port. What is the BEST way
to locate this port?
A. Navigate to the profiles directory of the WebSphere Application Server installation
root directory, and issuing the wsadmin $AdminConfig getPort command.
B. Navigate to the bin directory of the node to be federated and issuing the following
command ivt.bat server1 <node>
C. Examine the serverindex.xml file corresponding to the Deployment Manager's node
D. Examine the responsefile.oct file in the WebSphere Application Server Installation
root directory
QUESTION 162
A system administrator is configuring application servers for using the Data
Replication Service in a WebSphere Application Server V6 cluster environment.
Which of the following replication modes are available?
A. Client Only, Server Only, Both Client and Server
B. Cluster Only, Both Client and Cluster
C. Cluster Only, Both Cluster and Server
D. Cluster Only, Node Only, Both Cluster and Node
QUESTION 163
A system administrator wants to share system information like Workload
Management among core groups. Which of the following statements is valid in this
context?
A. Core groups in same or different cells use the service integration bus to share
Workload Management information.
B. Core groups can overlap by including common servers and the common servers are
used to share Workload Management information
C. Core groups in different cells can only use the core group bridge service to share
Workload Management information
D. Core groups use the core group bridge service to share Workload Management
information
QUESTION 164
A server has its application class-loader policy set to "Single". What additional
configuration is necessary to ensure that the application class-loader will load Web
modules for a particular application on the server?
A. The application must have its WAR class-loader policy set to "Module"
B. The application must have its WAR class-loader policy set to "Application"
C. The class-loader mode for the application server must be set to "Parent Last"
D. No additional configuration is required. Setting the class-loader policy to "Single" is
sufficient
QUESTION 165
If a system administrator uses the Tivoli Performance Viewer to monitor
application servlets and EJB's which of the following sets of metrics should be
viewed in order to BEST evaluate the performance of the application?

A. Average response time, heap size, garbage collection statistics


B. Average response time, number of requests/transactions, number of HTTP sessions
C. Average response time, heap size of datasource connection pool.
D. Number of transactions, size of datasource connection pool, CPU utilization
QUESTION 166
Which of the following events will cause the HTTP plug-in configuration file to be
regenerated?
A. When a new virtual host is created or an existing virtual host is modified
B. Whenever an application server is restarted
C. Whenever a Web server is restarted
D. When a new datasource is created or an existing datasource is modified
QUESTION 167
A customer has a clustered application deployed to a very stable WebSphere cell.
The HTTP Session are persisted to a database. Under heavy load, which of the
following Write Frequency settings would yield best performance?
A. End of Servlet service
B. Time-based writes to the session database
C. Update attributes only
D. Update cache only
QUESTION 168
When the HTTP plug-in configuration file is regenerated either manually or
automatically the file must be propagated to the Web servers. If a system
administrator needs to configure automatic propagation of the plugin-cfg.xml file
for an Apache HTTP server, which of the following tasks must be performed?
A. Enable session management for the HTTP server
B. Configure the HTTP server on a managed node.
C. Automatic propagation is not supported, the plugin-cfg.xml file must be transferred
manually
D. Set the automatic propagation flag in the pluin-cfg.xml file.
QUESTION 169
A system administrator needs to gather performance data for several databases that
are accessed by the applications on a particular server. The system administrator
has decided to use the Tivoli Performance Viewer to monitor each application's
database access. Which of the following performance modules would provide the
required performance data?
A. JDBC Connection Pools
B. Thread Pools
C. System Data
D. Transaction Manager
QUESTION 170
A customer has a data source configured at the cell scope with the Maximum
connections set to 10. Which of the following statements is valid about the
connections?

A. The sum of all JDBC client connections in the cell are bounded by 10 connections
B. If the server is a cluster member, then it cannot have more than 10 connections
C. Each server in the cell can have a maximum of 10 connections
D. All the servers in the cell cannot exceed a maximum of 10 connections
QUESTION 171
According to the so-called Upstream Queuing model for performance tuning, which
of the following would reflect the correct application of recommended settings for
maximum concurrent clients?
A. Web server=75, Web container=50, Datasource=25
B. Web server=50, Web container=50, Datasource=50
C. Web server=25, Web container=50, Datasource=75
D. Web server=75, Web container=25, Datasource=50
QUESTION 172
A system administrator managing a WebSphere Application Server and wants to
ensure that the JVM SystemOut log does not take up too much disk space. Which of
the following approaches would assure the least amount of disk space is used?
A. Using the administrative console, set the Log File Rotation, Maximum Files Size to 5
MB.
B. Using the Log Analyzer, set the Maximum File Size to 3 MB
C. Using the Log Rotation tool, set the Log File Count to 2 and the File Size to 2 MB.
D. Using wsadmin, set the Maximum Number of Historical Log Files to 3 with a File
Size of 1 MB.
QUESTION 173
A system administrator wishes to create a configuration archive in order to create a
similar configuration on another system. Using the "Admin Task exportServer"
functionality within wsadmin, it is possible to export a configuration archive for
which of the following items?
A. An application module
B. An enterprise application
C. A stand-alone application Server
D. A federated profile
QUESTION 174
A system administrator is receiving an error while trying to connect to the
administrative console of an application server profile. The connection is being
made from a remote web browser that has been installed and verified previously.
Assuming that this application server is using default ports, what is the MOST
probable cause of this error?
A. The adminconsole application was stopped previously from the adminconsole
B. The Application Server was not started
C. The WebSphere configuration database is not running
D. The adminconsole application was uninstalled from the adminconsole
QUESTION 175
When using the installation wizard to install the WebSphere Application Server v6

Network Deployment package, product binaries are copied to the installation


directory. Which of the following will also occur as a result of the installation?
A. A profile for deployment manager will be created by default.
B. A profile for application server will be created by default
C. A custom profile will be created by default
D. A system administrator has an option to create a profile using the create profile wizard
QUESTION 176
A system administrator installed the WebSphere v6 plug-in on a machine that has a
Web server and multiple application server profiles. A deployment manager was
not used at this time. In this situation, Web server can be managed from the
administrative console by connecting to which profile (s)?
A. Any of the profiles on that machine
B. The profile that was created first
C. The profile that was created last
D. The default profile
QUESTION 177
A system administrator received a message that the System prerequisites check
failed during the installation of the WebSphere Application server V6 Network
Deployment package. Which log file should the system administrator review to find
more information about the failure?
A. SystemOut.log under<INSTALL-ROOT>\logs directory
B. Log.txt under <INSTALL-ROOT>\logs directory
C. Log.txt under system temp directory
D. SystemErr.log under <INSTALL-ROOT>\logs directory
QUESTION 178
Non-IBM supported Web server (start, stop and change configuration) must be
managed from the WebSphere Application Server V6 administrative console in a
Network Deployment environment. Which of the following processes has to be
started on the WebServer machine that has been configured as a managed node?
A. Deployment manager
B. Custom profile
C. Node agent
D. Application server
QUESTION 179
A system administrator is having problems starting the application server (server1)
Which log files should be checked to et more information about the problem?
A. SystemOut.log and SystemErr.log under
<WEBSPHERE-INSTALL-ROOT>\logs\server1 dircetory
B. SystemOut.log and SystemErr.log under
<WEBSPHERE-INSTALL-ROOT>\profiles\<profiles name>directory
C. Log.txt and startWerver.log under <WEBSPHERE-INSTALL-ROOT>\logs directory
D. Log.txt and startServer.log under system temp directory

QUESTION 180
A system administrator was asked to develop necessary artifacts to install
WebSphere Application Server V6 Network Deployment Package, create custom
profile and federate to the existing deployment manager. Silent installation scripts
(response files) must be used. What is the BEST approach to accomplish this task
without using UI based tools?
A. Create a response file that installs product binaries, create the custom profile and
federates the node.
B. Create two response files. The first one installs product binaries and calls the second
response file that create the custom profile and federates the node.
C. Create a response file that installs product binaries, use profile creation wizard to
create the custom profile and federate the node from the deployment manager's
administrative console.
D. Install product binaries using installation wizard and create a response file to create
the custom profile and federate the node.
QUESTION 181
While updating an enterprise application on a production cluster running across
multiple machines, a system administrator must ensure that the application relains
available at all times to the users. After updating the application components, what
srep can be used to accomplish this requirement?
A. On the last page of the Enterprise Application -> Update wizard, click Rollout Update
B. Select System Administration -> Nodes, select node names and click Full
Resynchronize
C. Select Enterprise Application -> [application name] -> Stop and then Enterprise
Applications ->[application name] -> Start
D. Select Servers -> Clusters ->[clustername] -> RippleStart
QUESTION 182
A system administrator is installing an application and discovers that a required
security role has not been defined by the procedures of the application modules.
How can the system administrator create a new security role for the application?
A. Use the Security Global Security page of WebSphere administrative console.
B. Use Application Server Toolkit (AST) to define a new role on the module that requires
it.
C. Use wsadmin to define the required security role.
D. Edit the source of Application Deployment Descriptor and add a properly formed
<sec-role-name>element
QUESTION 183
A customer needs to connect an application server to a third party vendor's EIS.
The customer asks the consultant about the functionalities that should be available
with a JCA Resource Adapter that has been supplied by the EIS vendor. The
consultant responds that all of the functionalities should be available EXCEPT for
the one stating that it
A. Provide connectivity between J2EE components such as an application server or an
application client and an EIS
B. Collaborates with the application server to provide contract services such as

connection pooling transaction management caching and messaging


C. Implements the Common Client interface (CCI) for EIS access
D. Implements the standard Service Provider Interface
QUESTION 184
While packaging an enterprise application, a system administrator notices that the
JNDI names of some of the EJBs conflict with existing names in the JNDI
namespace. What action should the system administrator take to correct this
problem?
A. Ask the developers to prefix the JNDI names of the EJB references with the name of
the application to avoid clashes.
B. Use the WebSphere administrative console to change the names of the EJB references
C. Use the Application Server Toolkit (AST) to map the EJB references to unique names
in the name space.
D. Use the WebSphere administrative console to create a separate name space for the
application
QUESTION 185
A system administrator has been requested to package an enterprise application so
that all of its required resource definitions are contained in the Enterprise Archive
(EAR) File. How can this task be accomplished by using the Application Server
Toolkit (AST)?
A. While running in AST, configure the application resources using the administrative
console, then export an Enhanced EAR file.
B. While using AST, import the EAR file into the workspace of the Resources
perspective, import a previously configured resource .xml file and export an Enhanced
EAR file.
C. While using AST, open the application's deployment descriptor editor. Switch to the
Deployment page, define the needed resources and export the Enhanced EAR file.
D. Using AST, open each module of the application and define the required resources.
Include the configured modules in an enterprise application project and export an
Enhanced EAR file.
QUESTION 186
A JDBC provider has been defined at both the cell and node scope. Duplicate
datasources have been defined at both levels. An application has defined the same
provider and datasource as part of an Enhanced EAR file. Which datasource will be
used by the application?
A. The datasource defined on the JDBC provider at the cell scope.
B. The datasource defined in the Enhanced EAR file.
C. The datasource defined at the node scope.
D. No datasource will be used as the server and will not start when duplicate resources
are defined.
QUESTION 187
A system administrator notices that web requests are failing on a particular
application server which has already started. Which log file(s) should be reviewed
for application server errors?

A. SystemErr.log
B. SystemErr.log, SystemOut.log
C. SystemOut.log
D. startServer.log, stopServer.log, SystemErr.log, SystemOut.log
Q
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15

Ans
C
B,C
C
B
C,E
D
A,C
A
B
A,C,D
C,D
E
C
B
A

Q
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30

Ans
A
C
A,B,G
D
A
B
A
D
B
A
D
C
C
C
C

Q
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45

Ans
E
C
D
C
D
D
D,E
B
A
A
C
B
D
A,E,F
C

Q
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60

Ans
C
D
D
B
A
C
C
B,C
A,C
A,B,E
A,E
C
D
D
A

Q
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75

Ans
A
B
B
D
B
C
B
B
A
A,F
A,B,C
C
A
A
B,C

76
77
78
79
80
81
82
83
84
85
86
87
88
89
90

D
A
C
D
C
C
D
D
A
A
D
C
D
A
A

91
92
93
94
95
96
97
98
99
100
101
102
103
104
105

B
D
B
D
D
A
C
A
D
A
B
D
C
B
B

106
107
108
109
110
111
112
113
114
115
116
117
118
119
120

C
A
B
D
B
D
B
C
B
C
B
D
B
A
A

121
122
123
124
125
126
127
128
129
130
131
132
133
134
135

D
C
D
B
A
B
D
D
E
A
A
D
A
D
C

136
137
138
139
140
141
142
143
144
145
146
147
148
149
150

C
B
B
A
D
D
A
C
D
C
B
D
B
C
C

151
152
153
154
155
156
157
158

C
D
C
A
B
B
D
C

159
160
161
162
163
164
165
166

A
A
C
A
D
B
B
A

167
168
169
170
171
172
173
174

B
B
A
C
A
D
C
B

175
176
177
178
179
180
181
182

D
D
C
C
B
B
A
B

183
184
185
186
187

B
C
C
B
B

You might also like