没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
000-377 IBM WebSphere Application Server Network Deployment V7.0, Core
Administration
Exam A
QUESTION 1
An administrator would like to use the Centralized Installation Manager (CIM) to install WebSphere
Application Server Network Deployment V7.0 on a remote Solaris host. The Solaris host has been updated
with all the required operating system patches.
What is the next step the administrator must perform?
A. Configure an installation target for the Solaris host.
B. Download Solaris interim fixes to the CIM repository.
C. Use the Job manager to create a remote installation job.
D. Copy WebSphere Application Sewer Network Deployment V7.0 software to the Solaris host.
Answer: A
QUESTION 2
Which one of the following profile related tasks can only be performed using the manageprofiles
commandline facility?
A. Delete a profile
B. Secure a profile
C. Federate a profile
D. Update profile templates
Answer: A
QUESTION 3
Which of the following items best gives a reason to perform an unattended installation of WebSphere
Application Server?
A. The installation for the particular target platform is being done for the first time.
B. The installation for the particular target platform has been done before and will be repeated in the future.
C. The installation for WebSphere Application Sewer would initially not be able to include administrative
security.
D. The installation for the particular target platform is expected to require a lot of adjustments to be done
over several installation attempts.
Answer: B
QUESTION 4
A system administrator has successfully installed WebSphere Application Server V7.0 and has run the
Installation Verification Tool (IVT) with a success message. Which additional step can be taken to further
verify the installation?
A. Check to see if the InstallShield application will run again.
B. Check to see if the installation directory specified exists in the file system.
C. Use a browser to access the launch page of the IBM HTTP Server.
D. Use a browser to access the administrative console and log in successfully.
Answer: D
QUESTION 5
A WebSphere Application Server installation finishes and the primary installation log indicates an exit code
of INSTCONFSUCCESS. What is the best conclusion that can be resolved from this result?
A. The Web server installed successfully.
B. The WebSphere Application Server installed successfully.
C. The InstallShield Wizard executed successfully to launch WebSphere Application Server installation.
D. The target operating system determined that it is compatible with WebSphere Application Server and
had configured environment variables for it.
Answer: B
QUESTION 6
In order to verify that a server has started successfully and all of its components have initialized without
throwing any exceptions, what steps should an administrator perform?
A. Use the Log Analyzer to view the servers activity.log file.
B. View the servers startServer.log and native_stdout.log files.
C. Examine the SystemOut.log file for the current server process.
D. Log in to the administrative console and examine the runtime messages.
Answer: C
QUESTION 7
A stand-alone application server with hostname HOST and port 1234 is running a Web application which is
trying to access EJBs hosted on a cluster. The Web application is throwing a NameNotFoundException
when attempting to lookup clusters/cluster01/ejbs/MyHome. The administrator runs the dumpNameSpace
command on the standalone server and gets the following output:
Linked to URL
Corbaloc::bptenote35:2833,BPTENOTE35:2831/NameServiceServerRoot What command should the
admin run next to find the MyHome entry?
A. dumpNameSpace host bptenote35 port 2833
B. dumpNameSpace startAt clusters/cluster01/ejbs
C. dumpNameSpace root cluter01
D. dumpNameSpace root ejbs
Answer: A
QUESTION 8
Which statement describes WebSphere V7 FFDC feature?
A. The application server needs to be restarted after enabling FFDC
B. FFDC information is stored in an optimized relational database
C. FFDC logs are mainly intended for application development teams
D. FFDC does not affect the performance of the WebSphere Application Server
Answer: D
QUESTION 9
An application server is hung and has to be killed and restarted by the administrator. In order to
troubleshoot the server hang problem, the administrator decides to reproduce the hang condition and
trigger thread dumps for further analysis. What is the most effective way to collect the thread dump data?
A. Trigger one thread dump before and one thread dump after the server restart.
B. Take three consecutive thread dumps 10 seconds apart immediately after the server restart.
C. After server restart wait for the thread monitor to create the first thread dump, then take two more.
D. Wait for the thread monitor to signal a possible hung thread, then take three thread dumps several
seconds apart.
Answer: D
QUESTION 10
Data replication service (DRS) is turned on for replicating in-memory data among WebSphere processes.
During peak load, the developer found an OutOfMemoryError in the log. The developer suggests turning off
data replication service (DRS).
What services would be impacted?
A. Stateful session EJB persistence and failover.
B. HTTP session persistence and failover.
C. JDBC data source failover.
D. Dynamic cache replication.
E. JVM in memory replication and failover.
Answer: ABD
QUESTION 11
An administrator has been asked by IBM Support to gather diagnostic trace data relevant to a problem
involving some components of the application server. How should the administrator prepare to gather the
data?
A. Enable the IBM Service log for the server and set the number of historical logs to 10.
B. Enable verbose garbage collection for the server and specify that the data be written to the trace.log file.
C. Configure Diagnostic Trace for the server by selecting that the trace output be written to a file.
D. Configure the ffdcRun.properties file to trace the specific server components and write the data to a
memory buffer.
Answer: C
QUESTION 12
Due to network problems, the IBM Support Assistant (ISA) Agent is not available. Which service will be
inoperable?
A. Case manager tool
B. Guided troubleshooter
C. Remote debugging, data collection and file transfer
D. WebSphere Application Server Network Deployment V7.0 add-on Customization
Answer: C
QUESTION 13
An administrator has enabled security auditing for the WebSphere Application Server. They wish to view the
audit records in order to verify that it is working properly. Which tool would best allow them to view the audit
data?
A. IBM Support Assistant using the AuditLogReporter tool
B. wsadmin, using the AdminTask.binaryAuditLogReader command
C. The administrative console - they could invoke the Tivoli Audit Viewer (TAV)
D. The LogAna|yzer from within the Rational Application Developer Assembly and Deploy Tool.
Answer: B
QUESTION 14
An administrator manages a cell that is configured to use an LDAP sewer for its user registry. But, there are
several cases where he needs certain application servers to authenticate against a file based registry. How
can this be accomplished?
A. From the deployment managers administrative console, use the application servers security
configuration wizard for each application server to override the cell level registry.
B. In the cell level security configuration panel, define LDAP authentication at the cell scope, and file based
registry at the application server scope for the desired application servers.
C. Configure Global security to use an LDAP registry and create a new security domain with a user realm
definition for the file based registry and assign it to the desired application servers.
D. Create a global security repertoire that includes a global definition for the LDAP registry as well as
entries for each node is the cell. For those nodes that have application servers that require file based
registry, include a registry override.
Answer: C
QUESTION 15
What must an administrator do before he can create method permissions for an Enterprise JavaBean
(EIB)?
A. Map role to groups.
B. Define one or more security roles.
C. Map logical role name to runtime rule.
D. Exclude a set of EIB methods from access.
Answer: B
QUESTION 16
A federated cell has two nodes, Node01 and NodeO2. Global Security is turned on and is using a file based
user registry. Node01 has servers A, B, C and D. A developer has deployed a new security check-in
application to servers A and D. As a security requirement, this new application is required to use local
operating system registry for user authentications. Identify which one of the following is the most direct way
to enable this secured application.
A. Migrate user information from operating system registry to LDAP registry.
B. Create a security domain and scope it to application server A and D.
C. Update global security configuration file security.xml with operating system registry definition.
D. Merge operating system registry and file based user registry to a new LDAP and assign the new LDAP
to the federated cell.
Answer: B
QUESTION 17
In a test cell which has WebSphere global security disabled, an administrator has created a service
integration bus (SIBus) with security enabled for testing applications that use messaging resources. Now
the administrator needs to enable security on the bus for further testing. Which of the following tasks must
be performed to enable security on the bus?
A. Enable administrative security for the cell.
B. Configure a separate security domain for the bus.
剩余90页未读,继续阅读
sjepy
- 粉丝: 16
- 资源: 31
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
- 1
- 2
前往页