Was8.5 Dumps
Was8.5 Dumps
Was8.5 Dumps
A WebSphere Application Server cell was configured with a deployment manager node and a
custom node. An operator manually changed some configuration files in the custom node, and the
node became out of synch with the master repository.
The system administrator used the Synchronize button in the system administration session of the
Integrated Solutions Console (ISC) to try to resynchronize the node, but the node remained out of
sync.
Answer: A
Reference:https://books.google.com.pk/books?id=oLq6AgAAQBAJ&pg=PA30&lpg=PA30&dq=Use
+the+Full+Resynchronize+button&source=bl&ots=rdUMDel7n0&sig=YeWe8vnPOUZtxtD7DZP8IZ
dMF1Y&hl=en&sa=X&ei=manTVK-
2KIXVau6lgrgG&ved=0CCEQ6AEwAQ#v=onepage&q=Use%20the%20Full%20Resynchronize%2
0button&f=false
QUESTION NO: 2
A system administrator needs to install WebSphere Application Server using response files, so
that silent install can be done. The administrator has ensured that all required prerequisites have
already been installed and, has downloaded and expanded the required WebSphere Application
Server installation files.
Answer: A
Reference:http://www-01.ibm.com/support/knowledgecenter/SSHRKX_8.5.0/mp/install/inst_silent-
QUESTION NO: 3
A system administrator needs to create a cell for a test environment. The administrator uses the
Profile Management Tool (PMT) to create the deployment manager profile using the advanced
profile creation option and creates a custom profile using the typical profile creation option. The
administrator examines the log files for the custom profile creation and sees an INSTCONFFAIL
message indicating the deployment manager was not running during the custom profile creation.
Answer: A
Explanation:
QUESTION NO: 4
Answer: D
Reference:http://setgetweb.com/p/portal80/p8/additional.html
QUESTION NO: 5
The installation of WebSphere Application Server did not complete successfully, and a system
administrator needs to troubleshoot the installation.
What can the administrator do to identify the cause of the installation failure?
A. Run the installer command with the appropriate command line options.
B. Check the files under the Agent data location of IBM Installation Manager.
C. Check the files under the logs directory of IBM Installation Manager installation directory.
D. Check the log.txt under <WebSphere Application Server install directory><log directory>.
Answer: D
Explanation:
QUESTION NO: 6
The computer where a federated node was running had a failure and cannot be recovered. A
system administrator wants to recreate the node with the same configurations in another
computer.
Which steps should the administrator execute in order to recover the damaged node?
Answer: B
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSD28V_8.5.5/com.ibm.websphere.zseries.doc/ae/tagt_ad
dNode_asExistingNode.html(See the Heading Procedure).
QUESTION NO: 7
A system administrator, Admin1, with Administrator privileges has archived full repository
checkpoints. Another administrator, Configurator1, with Configurator privileges has copied the
checkpoint contents directory from one of the archived check points to its original location.
Configurator1 tries to restore the configuration using the copied archived checkpoint contents
and the restore fails.
How can Configurator1 restore the configuration using the copied archived full repository
checkpoint?
Answer: A
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5///com.ibm.websphere.zseries.doc/ae/twve_x
dappedcfg.html
QUESTION NO: 8
How can the administrator decrease the size and remove some of the content from the shared
resources directory?
Answer: D
Reference:http://www-
QUESTION NO: 9
A system administrator has installed WebSphere Application Server Network Deployment V8.5.5
using the silent installation process and needs to verify that the installation completed
successfully.
A. Launch the Installation Manager GUI, and verify the installation by going to File -> View
Installed Packages.
B. Run the command IBMIM listinstalledPackages and check that the appropriate WebSphere
Application Server package is listed.
C. Check for INSTCONFSUCCESS message at the end of the <webSphere Application Server
install directory><log directory>log.txt file.
D. Use the installer command to compare the checksum of the product file to the correct
checksum value in the bill-of-materials file and make sure that the checksums match.
Answer: C
:http://www-
01.ibm.com/support/knowledgecenter/SSAW57_7.0.0/com.ibm.websphere.installation.nd.doc/info/
ae/ae/tins_trouble.html?cp=SSAW57_7.0.0%2F1-5-0-7
QUESTION NO: 10
A system administrator ran the backup Config command to backup the configuration using the -
nostop option. The administrator changed the properties for the service integration environment by
modifying the sib.properties file. During testing the administrator noticed Service Integration Bus
related errors and wanted to restore the service integration environment. The administrator used
the restore config command, but the tuning properties for the service integration environment were
not restored.
A. Use full repository checkpoints for both the backup and the restore.
B. Use the restoreconfig command with -nostop for the restore.
Answer: B
Explanation:
QUESTION NO: 11
A system administrator suspects that the slow performance of an application might be caused by
lock contention.
To debug this further, what can the administrator do using IBM Support Assistant?
A. Analyze the running server using IBM Monitoring and Diagnostic Tools for Java -Health center.
B. Collect a javacore and analyze it using IBM Monitoring and Diagnostic Tools for Java - Health
Center.
C. Collect three thread dumps at equal time intervals and analyze them using IBM Monitoring and
Diagnostic Tools for Java - Dump Analyzer.
D. Collect three system dumps at equal time intervals and analyze them using IBMMonitoring and
Diagnostic Toolsfor Java - Memory Analyzer.
Answer: A
Reference:http://www-01.ibm.com/support/docview.wss?uid=swg27040548
QUESTION NO: 12
A system administrator was asked by the development team to inform them of any warning
message which contains a string "Connection" on a WebSphere Application Server with High
Performance Extensible Logging (HPEL) enabled.
What should the administrator do to continuously monitor logs for the required message?
QUESTION NO: 13
An EJB application posts a request message into a JMS destination and waits for a response
message on a different JMS destination. To correlate the response message to the request
message, the application uses the JMS correlation ld of the message. The application waits up to
five seconds for a response before timing out the request.
A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the
request message, process it and post a response message.
The destinations are defined in a Service Integration Bus (SIB) within the cell.
Intermittent timeout exceptions have occurred for the requester application. How can a system
administrator correlate and analyze the debug information from both requester and consumer
applications?
Answer: C
Explanation:
QUESTION NO: 14
After collecting diagnostic trace from a server running under a cell, a system administrator noticed
that the trace files contained sensitive information.
Answer: C
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5/com.ibm.websphere.nd.multiplatform.doc/ae
/utrb_loglevel.html
QUESTION NO: 15
A system administrator is required to monitor the application server logs for heap memory issues
and determine if the heap memory usage is reaching close to 70% of the maximum heap. The
application server is configured with an initial heap of 256 MB and a max heap of 1 GB.
How should the administrator determine if the application server is utilizing 70% of the max
allocated heap memory?
Answer: A
Reference:http://www.ibm.com/developerworks/bpm/bpmjournal/1312_chan/1312_chan.html
QUESTION NO: 16
What does the administrator have to configure to trigger the javacore dump?
Answer: A
Reference:http://publib.boulder.ibm.com/infocenter/javasdk/tools/index.jsp?topic=%2Fcom.ibm.jav
a.doc.igaa%2F_1vg00014884d287-11c3fb28dae-7ffc_1001.html
QUESTION NO: 17
An application deployed to a multi-node cluster is reported to have slowness and hung threads. A
system administrator is asked to review the logs on each node and identify if the hung threads are
a false alarm.
How can the administrator determine that the hung threads are a false alarm?
Analyze the:
A. ffdc logs.
B. SystemErr.log.
C. SystemOut.log.
D. native_stderr.log.
Answer: C
Explanation: http://www-
01.ibm.com/support/knowledgecenter/ssw_i5_54/rzatz/trbhangdet.htm(See the False Alarm).
QUESTION NO: 18
• Monitor how much time is spent in the various parts of the environment.
Which PMI modules can the administrator examine to obtain this data?
Answer: B
Explanation:
QUESTION NO: 19
A system administrator decides to use the advice from the Performance and Diagnostic Advisor to
identify the optimum connection pool settings for data sources. In a cell, the data source
db2datasource is defined under node scope and used by two servers from that node. The
administrator receives two different sets of advice for db2datasource.
. One set of advice suggests to increase the maximum connection pool size for
db2datasource.
. The other suggests reducing the maximum connection pool size for db2datasource.
How should the administrator configure the data sources before reusing the Performance and
Diagnostic Advisor?
Answer: B
Explanation:
QUESTION NO: 20
A system administrator in a bank was asked by business users to determine the most accessed
JSP page in a web application at normal work load for marketing purpose.
Which tool should the administrator use to find the most used JSP page?
Answer: C
Explanation:
QUESTION NO: 21
What should the administrator do to fix the problem using ORB settings?
Answer: C
Explanation:
QUESTION NO: 22
A system administrator has deployed web applications to a clustered environment where database
session persistence is configured. The administrator needs to improve the response time and the
throughput.
Answer: B
Reference:http://www.ibm.com/developerworks/websphere/techjournal/1008_genkin/1008_genkin.
html
QUESTION NO: 23
How should the administrator configure the Application Placement Controller (APC) in a star
topology?
Answer: D
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSEQTP_8.5.5/com.ibm.websphere.nd.multiplatform.doc/a
e/twve_mcpconfig.html
QUESTION NO: 24
A performance test team was testing the capacity of concurrent users of a web application
deployed on a multi-processor server. While testing 250 concurrent users, the administrator
discovers connections to the database are failing.
How should the system administrator tune the data source properties to improve the application
response time?
Answer: A
Explanation:
QUESTION NO: 25
An organization updated their LDAP directories and modified user roles. The roles that were
configured to have access to a highly secured enterprise application were deleted and new roles
with new names were created. The application then had security related exceptions.
How can a system administrator resolve the exceptions and restore security for the application?
A. Modify the mapping of security roles of the application to the new LDAP roles.
B. Modify the application and remove all security constraints and redeploy the application.
C. Modify the application to have a runas role for each new LDAP role and redeploy the
application.
D. Create an administrative authorization group with administrator privileges scoped for the
application with an administrative group role for the new LDAP roles.
Answer: D
Reference:http://www.novell.com/documentation/idmrbpm36/install/data/bb1zmw0.html(See the
Role of Administrator).
QUESTION NO: 26
There are many applications deployed in a large WebSphere Application Server cluster. A system
administrator is required to give Configuration role access to a developer for a single application
deployed in that cluster.
Answer: A
Explanation:
QUESTION NO: 27
A web application has a configured session timeout of eight hours and a default LTPA token
timeout of two hours. After every two hours, the users have to log in again from their HTTP
browser. The system administrator is required to make configuration changes so users only have
to log in once, while keeping the above-mentioned timeouts the same. The authentication
mechanism available is Kerberos.
Answer: C
Explanation:
QUESTION NO: 28
How can a system administrator secure a WebSphere Application Server environment to ensure
that an application code will not be allowed to access any files in the server's file system?
QUESTION NO: 29
A customer has enabled LTPA as their authentication mechanism and has web resources that are
not secured by proper security constraints. A system administrator is required to ensure that all
web resources are secured.
Answer: B
Explanation:
QUESTION NO: 30
A newly deployed application has authorization errors when invoking EJB methods from a servlet.
An additional review indicates that users are authenticated, but do not have the correct
authorization.
How can a system administrator fix the issue ensuring only authorized access?
A. Using the Integrated Solutions Console (ISC), map all security roles to the special subject
Everyone.
B. Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped
to groups in the current user registry.
C. Edit the application using an assembly tool to add a security constraint for the servlet and
reinstall the application.
D. Edit the application using an assembly tool to remove the security constraint defined for the
servlet and reinstall the application.
Answer: B
Explanation:
QUESTION NO: 31
A system administrator needs to deploy a new enterprise application which requires that
application security be enabled, but, the existing applications in the cell cannot be executed with
application security enabled. The cell has the global security and Java 2 security disabled.
Answer: C
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/csec_sec_m
ultiple_domains.html?cp=SSAW57_8.5.5%2F1-8-2-33-1-0(See the Java 2 security).
QUESTION NO: 32
A system administrator needs to view the list of certificates for unmanaged web server located on
a remote system.
QUESTION NO: 33
A system administrator is configuring the security of a new environment. The administrator has
been asked to configure one LDAP server that has different sub-trees for business users and
administration users.
Answer: C
Explanation:
QUESTION NO: 34
A web application was deployed on a WebSphere Application Server cluster. While users are
using the application, one of the cluster servers fails and the users lose their working data.
What can the system administrator configure to ensure users can continue to work if one of the
cluster servers fails?
Answer: D
Reference:http://websphere.sys-con.com/node/1299059
A system administrator has created a cluster containing two servers in a same node. The
administrator did not select the option Generate unique HTTP ports during the creation of the
cluster members. After the cluster creation, the administrator changed the HTTP port of the
second cluster member to 9081.
Testing the servers using the snoop servlet directly to the server's HTTP port, the administrator
got the following error message for the second server;
Answer: C
Reference:http://www-01.ibm.com/support/docview.wss?uid=swg21438842
QUESTION NO: 36
A web application is hosted on an application server that receives HTTP requests from a third
party application named myApp. The URlGroup mapping for this application is called
default_host_myApp.
The development team asks a system administrator to configure the HTTP plug-in to prevent
routing requests to any application server except serverl.
The following exhibit shows the parts of the plugin-cfg.xml file that are relevant for myApp. The
UriGroups for other applications are not shown in the exhibit.
What should the administrator do to the plugin-cfg.xml file to ensure that requests for
default_host_myApp URIGroup are routed only to machine1?
Answer: C
Explanation:
QUESTION NO: 37
A system administrator has configured a cluster containing 40 servers. The cluster members all
belong to one core group. While examining the log files, the administrator notices that the core
group coordinator is consuming abnormally high amounts of memory and CPU resources.
How can the system administrator reduce the memory and CPU resource usage of the core group
coordinator?
Answer: A
Explanation:
QUESTION NO: 38
A system administrator needs to set a new Liberty profile environment to support an application.
What should the administrator do to enable this environment for high availability and scalability of
the application?
Answer: C
Explanation:
QUESTION NO: 39
A system administrator has added a server cluster as a member of a service integration bus (SIB).
The administrator needs to configure one messaging engine for each server in this cluster and to
have a failover location for each messaging engine.
Answer: C
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5/com.ibm.websphere.nd.doc/ae/cjt1004_.htm
l(second paragraph)
Which one of the following options describes the runtime flow starting from the client browser in a
clustered WebSphere Application Server Network Deployment topology?
A. HTTP server -> job manager -> admin agent -> HTTP server plug-in
B. Load balancer -> HTTP server -> HTTP server plug-in -> application server
C. Application server -> node agent -> deployment manager -> load balancer
D. Deployment manager -> node agent -> HTTP server plug-in -> HTTP server
Answer: A
Explanation:
QUESTION NO: 41
A JAX-WS EJB stateless session bean web service needs to be accessed by consumers outside
the corporate domain.
A. Open firewall ports for both bootstrap and orb listener ports within the cell.
B. Configure plug-in in the DMZ to send request to the cluster members.
C. Configure on demand router (ODR) in the DMZ to send requests to the cluster members.
D. Configure HTTP tunneling to send the client-side Object Request Broker (ORB) request to the
server-side ORB.
Answer: A
Reference:http://www.ibm.com/developerworks/websphere/techjournal/0310_alcott/alcott.html
QUESTION NO: 42
A system administrator has to design a new production environment to host a web application.
The workload of this web application is expected to increase during special marketing campaigns.
Which one of the following topologies should the administrator configure to address the
requirements for this new environment?
A. A Liberty collective environment with autonomic managers and on demand router (ODR).
B. A flexible management environment supported by one admin agent running in each node of
Answer: C
Explanation:
QUESTION NO: 43
A new cell contains a cluster with members defined in two managed nodes running on two
different machines. The cell also contains two unmanaged nodes running on HTTP servers with
HTTP plug-in. Session persistence has been enabled.
Which additional component(s) can the system administrator configure to make this environment
highly available?
Answer: C
Explanation:
QUESTION NO: 44
Answer: C
Reference:https://www-
01.ibm.com/support/knowledgecenter/was_beta_liberty/com.ibm.websphere.wlp.nd.multiplatform.
doc/ae/cwlp_about.html(See the Liberty Profile Overview).
QUESTION NO: 45
While coordinating a flexible management topology, the job manager can send commands to
which components?
Answer: C
Reference:http://java.boot.by/ibm-377/ch01s06.html(See the Flexible management 2ndParagraph
5thLine, and 3rdParagraph).
QUESTION NO: 46
A system administrator has configured a network deployment cell containing multiple nodes and
global security enabled with an LDAP repository. To increase capacity, the administrator needs to
add additional nodes to the cell. After adding the nodes by using both scripts and the Integrated
Solutions Console (ISC), the administrator examines the System.out log for the deployment
manager and notices the following message:
The client and server could not negotiate the desired level of security.
Answer: B
QUESTION NO: 47
A system administrator wants to learn some of the Python scripting commands for the
administration of the environment.
Answer: D
Explanation:
QUESTION NO: 48
What should the administrator do to ensure globalScript. py is loaded when the wsadmin shell is
used?
Answer: D
Explanation:
QUESTION NO: 49
A system administrator has been asked to uninstall an application from a cluster running in a
Answer: A
Explanation:
QUESTION NO: 50
A system administrator has created a Python script that will run in WebSphere Network cell where
administrative security is enabled. This script is named doUpdate.py and will be run by using the
following:
How can the administrator suppress a user/password prompt from appearing when this script is
run?
A. sas.client.props file.
B. ssl.client.props file.
C. soap.client.props file.
D. wsadmin.properties file.
Answer: D
Explanation:
QUESTION NO: 51
Before running the script again, what can the administrator add to the script after each task so the
completed tasks are committed even if other tasks fail?
A. AdminApp.update ()
B. AdminConfig.save()
C. AdminControl.invoke(server, 'sync’)
D. AdminTask.backupJobManager('server')
Answer: C
Explanation:
QUESTION NO: 52
What step must the administrator take before submitting a job from the Integrated Solutions
Console (ISC) to install the IM on <machine2>?
Answer: A
Explanation:
QUESTION NO: 53
Within a WebSphere Application Server Network Deployment cell, a system administrator needs
to write a script to determine if a particular server is stopped. It is important that the wsadmin script
explicitly return a status of stopped as opposed to just failing.
What wsadmin object should the administrator use to write this script?
Answer: D
Explanation:
QUESTION NO: 54
A system administrator discovers an issue that requires a change to a federated server. In this
cell, WebSphere administrative security is enabled, but application security is not enabled.
Answer: B
Explanation:
QUESTION NO: 55
A system administrator has created a wsadmin script with several steps to install and configure an
application and some resources in a WebSphere Application Server process. The script executed
but the application was not installed successfully. The administrator suspects that the script has
problems.
A. In WebSphere Application Server Developer Tools for Eclipse, right click on the script file and
select validate from context menu.
B. Execute the script using the wsadmin with the option -conntype NONE and monitor the
commandAssistancePythonCommands.log file.
C. Use WebSphere Application Server Developer Tools for Eclipse in the debug perspective
connected to the server and execute the script step by step.
Answer: C
Explanation:
QUESTION NO: 56
An application contains a web services client and the application is deployed and running. A
system administrator has to add a response timeout to the deployed web services client, so the
call fails in a timely fashion.
A. web.xml
B. was-webservices-sca.xml
C. ibm-webservices-bnd.xmi
D. ibm-webservicesclient-bnd.xmi
Answer: C
Explanation:
QUESTION NO: 57
Answer: A
Explanation:
A system administrator has started a Liberty profile server using the default values. Later, the
administrator modified the server.xml file for the server to include
The administrator placed the application ServletApp.war in the apps directory under
S{ server.config.dir}. While accessing the correct URL for the home page of the application, the
Answer: D
Explanation:
QUESTION NO: 59
A system administrator needs to configure a JDBC provider and a data source for an application in
a clustered environment. The administrator also needs to copy the JDBC drivers from the
database server to the application server machines.
A. Create a JDBC provider and the data source in the cluster scope.
Copy the driver to all nodes.
Set the environment variable at the node level to the driver's path.
B. Create a JDBC provider in the server scope and the data source in the node scope.
Copy the driver to all application servers.
Set the environment variable at the node level to the driver's path.
C. Create a JDBC provider in the node scope and the data source in the cell scope. Copy the
driver to the deployment manager.
Set the environment variable at the server level to point to the deployment manager path.
D. Create a JDBC provider in the application scope and the data source in the server scope. Copy
Answer: B
Explanation:
QUESTION NO: 60
The administrator needs to identify any security role references and security constraints in a web
application.
Answer: A
Explanation:
QUESTION NO: 61
A developer created an enterprise application which contained data source and security role
information. The developer asked a system administrator to install this application to an application
server where global security is enabled using the Integrated Solutions Console (ISC). A new data
source was configured at the server scope for the use of this application. While load testing the
application, the developer noticed that the attributes configured on the new data source were
ignored by the application server.
How can the administrator ensure that the attributes configured on the new data source are used
by the application server?
A. Create the data source under cell scope instead of server scope.
B. Delete any data source of the same name defined under node, cluster or cell scope.
C. Reinstall the application and clear the Process embedded configuration check box.
D. Correct the component-managed and container-managed authentication aliases set on the data
source.
Answer: D
QUESTION NO: 62
In a test environment, a system administrator has configured an external HTTP server in the DMZ
that is routing to a cluster of application servers. The administrator wants to achieve higher
performance when routing and prioritizing incoming requests to the back-end cluster.
Answer: D
Explanation:
QUESTION NO: 63
While monitoring a cluster in the cell, the administrator notices that one server in the cluster
periodically loses connections to the database. When this happens, requests to the server have a
significantly decreased response time and various error conditions are listed in the log files for the
server. Since the error codes are returned quickly, the server starts returning responses faster
than the average service times for the application. Due to this, the weight for the server is
increased and a large percentage of incoming requests are being routed to the erroneous server
and the server is getting overloaded with requests.
How can the administrator detect these conditions in the future and take action to prevent this
problem?
Answer: D
Explanation:
QUESTION NO: 64
The application placement controller has been configured with elasticity mode enabled.
Intermittently, all instances of a dynamic cluster are removed. After further review, the system
administrator noticed that it occurs during peak load on another dynamic cluster.
The administrator wants to keep at least one instance available. Which configuration is needed in
the dynamic clusters?
Answer: D
Reference:http://pic.dhe.ibm.com/infocenter/wxdinfo/v6r1/index.jsp?topic=%2Fcom.ibm.webspher
e.ops.doc%2Finfo%2Freference%2Frodccustprop.html
QUESTION NO: 65
A system administrator has deployed an application. The development team has updated a new
version of this application. The administrator needs to immediately deploy this updated application
and guarantee that only this new edition is used by clients and that any service requests for the
application are queued during the deployment of the new application.
How can the administrator achieve this task without any downtime to the application?
Answer: C
Explanation: