Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium IBM C9510-418 Dumps Questions Answers

Page: 1 / 5
Total 128 questions

IBM WebSphere Application Server Network Deployment V9.0 Core Administration Questions and Answers

Question 1

Which is true when an administrator properly updates a single file within an application?

Options:

A.

The administrator can use a partial application update.

B.

The administrator must redeploy the full application file.

C.

The administrator can manually update the file on the file system.

D.

The administrator must uninstall the application, and then, reinstall with the updated application file.

Buy Now
Question 2

An administrator notices performance degradation after a new deployment of an application. After investigation, increased CPU usage is observed due to frequent GC cycles. However, there is no significant growth in the heap memory.

How can the resource consumption issue be resolved?

Options:

A.

Increase max heap.

B.

Increase perm space.

C.

Increase nursery size.

D.

Change the GC policy.

Question 3

How can an administrator configure Web services security?

Options:

A.

Customize WS-Security policy set and bindings and attach to Web services.

B.

Configure global security with LDAP authentication and map the configuration to Web services.

C.

Request application developer to use Web Services Security API to achieve Web services security.

D.

Enable the Web Services Metadata Exchange (WS-MetadataExchange) protocol to enable message-level security.

Question 4

What are two automated administrative tasks that can be done with configuration checkpoints? (Choose two.)

Options:

A.

delete

B.

restore

C.

archive

D.

backup

E.

compress

Question 5

What state must an application edition be in before it can be started?

Options:

A.

Active

B.

Inactive

C.

Validation

D.

Deactivated

Question 6

A corporation has two distinct cells configured with several applications on each one, and wants to have only one Web server instance to distribute workload to both cells.

What can an administrator do to achieve this?

Options:

A.

Install an On Demand Router in front of the Web server, and install the plugin.cfg on it.

B.

Register both deployment managers in one Job Manager, and federate the Web server in the Job Manager.

C.

Federate the Web server on both deployment managers, and run the GenPluginCfg command in each one.

D.

Generate the plug-in.cfg in each cell. Then, run the pluginCfgMerge script, and install the merged plugin.cfg onto the Web server.

Question 7

What is the maximum number of heap dumps that can exist at once in the IBM WebSphere Application Server home directory?

Options:

A.

10

B.

20

C.

No limit

D.

As many as allowed by disk space

Question 8

Which type of profile provides management capabilities for multiple stand-alone application servers?

Options:

A.

Custom

B.

Secure Proxy

C.

Administrative agent

D.

Deployment manager

Question 9

What is one way to determine if administrative security for IBM WebSphere Application Server is disabled when logging into the Integrated Solutions Console?

Options:

A.

A user is not forced to use HTTPS (SSL).

B.

An administrator is allowed to type any random password.

C.

An administrator is prompted for user name, but not password.

D.

When the username wasadmin is used to log in, the password used is the default “password”.

Question 10

How can the administrator change the console session expiration for the Integrated Solutions Console?

Options:

A.

Modify timeout value and run the timeout.jacl script.

B.

Set the timeout value in the Console Preferences panel.

C.

Use the settimeout wsadmin command and specify the value.

D.

Set the ConnectionResponseTimeout value in the Integrated Solutions Console.

Question 11

An administrator needs to resolve port conflicts after creating a managed node using the Profile Management Tool.

Which supported method can be used to resolve the port conflicts?

Options:

A.

Edit serverindex.xml.

B.

Use updatePorts.ant.

C.

Use Profile Port Checker tool and set ports.

D.

Use manageProfile tool and set port range on the profile.

Question 12

Which is true statement regarding High Performance Extensible Logging (HPEL)?

Options:

A.

Log and trace data is stored in a binary format.

B.

The server does not have to be restarted to enable it.

C.

Logging information in a text log file is disabled by default.

D.

Information and data is logged to the activity.log file.

Question 13

When verbose Garbage Collection is enabled, in which file(s) does the operating system collect the data?

Options:

A.

trace.log

B.

activity.log

C.

SystemOut.log and SystemErr.log

D.

native_stdout.log and native_stderr.log

Question 14

If an administrator dynamically generates a plugin-cfg file after setting up high availability automatic generation, what will be the results?

Options:

A.

The dynamic generation issues a propagation request.

B.

The dynamic generation creates a second plugin-cfg file.

C.

The dynamic generation overwrites the intelligent management settings.

D.

An error message is shown that cannot be dynamically generated.

Question 15

What does the delta configuration checkpoint contain?

Options:

A.

All the changed (newer version) configuration files.

B.

Before and after versions of configuration files that have changed

C.

Backup (older version) of the configuration files that have changed

D.

An .xml file containing a list of changes and configuration file details

Question 16

How can an administrator reduce overhead when utilizing monitored directories?

Options:

A.

Increase the polling interval so that the process runs less often.

B.

Decrease the amount of time that the monitored directory is accessible by users.

C.

Decrease the size of the monitored directory so that larger files will not be able to be stored in it.

D.

Configure the monitored directory settings to not automatically synchronize the application once it is installed.

Question 17

Which of the following is true about executing the Installation Verification Tool?

Options:

A.

The Installation Verification Tool creates profile1.

B.

The Installation Verification Tool starts the application server.

C.

The Installation Verification Tool restarts the application server.

D.

The Installation Verification Tool starts the administrative console.

Question 18

Which of the following is a requirement when performing a silent install?

Options:

A.

A response file must be used.

B.

Artifacts must be saved for performing a roll back.

C.

The repositories must be defined before starting the install.

D.

The repositories must be downloaded before performing the install.

Question 19

Which statement describes a cell in a Network Deployment configuration?

Options:

A.

A cell can consist of multiple nodes and node groups.

B.

A cell only contains one node that contains one server.

C.

Nodes and node groups in the cell are administered from the node agent.

D.

Nodes and node groups in the cell are administered from the job manager.

Page: 1 / 5
Total 128 questions