• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

Passed 700,701 and 340 last Thursday

 
Greenhorn
Posts: 7
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
I'm fresh to this website and I am so exciting to see all of you guys share your experience and give some guide to clear some exam.
I wanna share a little with you about DB2 700,701 and WAS 340

Just before the Xmas Eve, I take 3 exam: DB2 700&701 and WebSphere Application Server test 340.

Among the 3, DB2 701 is difficult, for I have no time to read all the tutorials from developerWorks. I skipped a very important chapter "Backup and Recovery". I only read half of the chapter "Monitoring DB activity". As a result, I only got 4/10 for the Backup and Recovery section and only 3/11 for Monitoring DB2 Activity section.

DB2 701 required 61% to pass, I only get 62.9%

to pass this DB2 700&701 testing, in my mind, if you have some database experience before, go through the tutorial of ibm developerworks is enough. Here is a very good article to read: http://www-900.ibm.com/developerWorks/cn/dmdd/library/techarticles/dm-0401fosdick/index_eng.shtml
You can find the useful reference there and thus you can pass the exam.

For WAS 340 testing, it checked some detailed info of WebSphere Applicaion Server 5. Fortunately, I have been testing WAS5 for some months. I recommend those want to take this exam, read this book "IBM WebSphere Application Server V5.1 System Management and Configuration WebSphere Handbook Series" You can find this book from www.redbooks.ibm.com (reference number sg246195).

I am glad to reply to you if you post your question here.
 
Ranch Hand
Posts: 4982
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
You might also find my sharing at:
https://coderanch.com/t/144840/po/certification/Passed-today
and
https://coderanch.com/t/144850/po/certification/Passed-IBM-wih

Nick
 
Ranch Hand
Posts: 782
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi,

Great Job! I am aslo preparing for IBM 340. For this we have a group http://groups.yahoo.com/group/IBM340Exam/ I request you to please join and help the guyz preparing for 340.
Question: How much you scored in Prime Sample Test of 340? We have Sample Test answers but only 27 out of 51 are correct. Could you please review and highlight the 24 wrong answers?

Bye,
Viki.

******************IBM 340 Sample Test*************************************

----------------------------------------------------------------------------
Pre-Assessment/Sample Test for Test 340 IBM WebSphere Application Server, V5.0, Basic Administration
EXAM: IBM WebSphere Application Server, V5.0, Basic Administration
NUMBER: 340

PASSING SCORE: 53% (27 out of 51)
----------------------------------------------------------------------------

1. Which one of the following is NOT a supported type of authentication according to the IBM WebSphere Application Server, V5.0 authentication model?

A. Basic

B. Client-certificate

C. Digest

D. Form-based

(select 1)

2. By default, IBM WebSphere Application Server, V5.0 uses which of the following IP ports for the administration console and the administration console secure port, respectively?

A. 9080,9443

B. 9443,9080

C. 9090,9043

D. 2809,8880

(select 1)

3. An application is ready to be deployed. The team developing the application has worked within corporate guidelines and reused common functionality that other development teams have used before. Upon review, it appears that the development team used the same version of several JAR files that are currently being used by other production teams. Which of the following actions should be taken or suggested?

A. Repackage the EAR using the AAT tool, excluding the duplicated JAR files. Ensure that the duplicated .jar files are in an appropriately defined shared library and deploy the application

B. Combine the EAR with all other EAR files, thus combining all applications into one, so no JAR files are duplicated.

C. Use the AAT tool to combine all the duplicate JAR files into a master shared EAR, then deploy the application, and have set all of the applications using the duplicated JAR files to reference the master shared .ear from the IBM WebSphere Administrative Console.

D. Shared JAR files are not supported

(select 1)

4. Defining the "Scope" of resources such as JDBC Providers, Namespace bindings, or shared libraries can be defined for which levels?

A. Module

B. Application

C. Node

D. Cell

E. Server

(select 3)

5. When enabling tracing on an Application Server, which of the following options can be configured from the administrative console?

A. Trace Output File Name

B. Trace Specification String

C. Show FATAL Messages

D. Show WARNING Messages

E. Trace Output Format

(select 3)

6. Once IBM WebSphere Application Server, V5.0 is installed, what additional task needs to be completed so that the Application Server can be started?

A. Edit the plug-in file

B. Install an administrative database

C. Reboot the machine

D. No action is required

(select 1)


7. Which of the following are TRUE statements with respect to LDAP and the IBM HTTP Server?

A. LDAP is an information directory where users and groups can be defined only once and shared across multiple machines and applications.

B. LDAP is an Internet protocol for exchanging basic management information.

C. The IBM HTTP Server "LDAP Plug-in" allows authentication and delegation to be performed by the directory.

D. LDAP is a proprietary protocol that IBM uses to communicate between the IBM HTTP Server and the Web container

(select 1)

8. If the administrative console fails to start up, which of the following files should an administrator check to see errors?

A. startServer.log

B. native_stderr.log

C. SystemOut.log

D. admin_error.log

E. admin_access.log

(select 2)

9. A machine is experiencing a bottleneck. Which of the following actions could an administrator take to improve database performance?

A. Change your CMPs to be BMPs

B. Lower the tcp-wait time from 4 minutes to 60 seconds

C. Set the number of DB connections less than the number of WebSphere Application Server threads

D. Lower the default session timeout to less than 30 minutes

(select 1)


10. What is the likely reason for decreasing the "Maximum size" parameter of the thread pool for a Web container?

A. To limit the size a thread can grow before refreshing

B. To limit the amount of threads to what the hardware can withstand

C. To lower the amount of unused threads

D. To limit the amount of time a thread exists before refreshing

(select 1)

11. When SSL ID tracking is used as the session affinity mechanism, the lifetime of an SSL session ID is controlled by configuration options in ___________ .

A. Edge Server

B. Web server

C. Application Server

D. Enterprise application

(select 1)

12. A database administrator needs the DDL to create tables for an application that was recently deployed. What does the IBM WebSphere Application Server, V5.0 administrator need to do to export the DDL for the database administrator to use?

A. Environment -> DDL Generator -> <select application checkbox>, Export DDL

B. Enterprise Applications -> <select application checkbox>, Export DDL

C. Enterprise Applications -> <application_name> -> Export DDL

D. Environment -> DDL Generator -> <application_name> -> Export DDL

(select 1)

13. To enable monitoring of individual enterprise bean methods with the Tivoli Performance Viewer, what must an administrator set?

A. In the Tivoli Performance Viewer console, select the Standard monitoring

B. In the Tivoli Performance Viewer console, select Custom monitoring

C. In the Tivoli Performance Viewer console, set the monitoring level to at least High

D. In the Tivoli Performance Viewer console, set the monitoring level to Max

(select 2)

14. What are CMP Connection Factories used for?

A. Allows CMP beans to interact with Web services and EJBs

B. Allows CMP beans to interact with other EJBs

C. Allows CMP beans to access the HTTP stream

D. Allows CMP beans to access a backend data store

(select 1)


15. An application on a server is running very slowly. A number of the servlets are performing simple database queries. What should the administrator do to help the application perform faster?

A. Increase the maximum pool size for the data source

B. Add more RAM to the machine

C. Increase the JVM maximum heap size

D. Increase the maximum thread size

(select 1)

16. A permission violation occurs for a client application within IBM WebSphere Application Server, V5.0. Java 2 security has been enabled, and the JVM com.ibm.websphere.java2secman.norethrow property is set and has a value of true. The Security Manager component will ________ .

A. throw an AccessControl exception and log the exception

B. log the exception to the WebSphere SystemOut.log

C. throw a PermissionViolation exception and log the exception

D. log the exception to both the activity and native log files

(select 1)

17. When making changes to an application server datasource configuration in the administrative console, when do changes become effective?

A. Immediately upon clicking apply

B. When the application server configuration is saved

C. When the application server is restarted

D. As soon as the form is submitte

(select 1)

18. Which of the following statements are FALSE with respect to an SSL connection?

A. SSL can be used between an "Applet Container" and the embedded HTTP server.

B. SSL can be used between an "Applet Container" and an "EJB Container".

C. SSL can be used between an "Applet Container" and a "Web Container".

D. SSL can be used between an "Applet Container" and a "Web server".

E. SSL can be used between an "Applet Container" and a "Client Container".

(select 2)

19. What options are available when binding EJB and resource references to the IBM WebSphere Application Server, V5.0 name space?

A. Simple name

B. Node defined name

C. Corbaname

D. Compound / fully qualified name

E. Generated base name

(select 2)


20. What is the first IBM WebSphere Application Server, V5.0 component that receives a servlet request from a browser?

A. Web server

B. Web server plug-in

C. Application server

D. Servlet redirector

(select 1)


21. The WSAdmin tool provides access to all the functionality found in the administrative console via four management objects. What are they?

A. AdminApp, AdminConfig, AdminControl, and AdminSecure

B. AdminConfig, AdminControl, AdminSecure, and Help

C. AdminApp, AdminControl, AdminServer, and Help

D. AdminConfig, AdminControl, AdminApp, and Help

E. AdminControl, AdminConfig, AdminServer, and Help

(select 1)

22. Which of the following statements is TRUE with respect to the Application Assembly Tool (AAT)?

A. The AAT can be started from the Administrative Console.

B. Scripts to run the AAT are located in the directory where IBM WebSphere Application Server V5.0 is installed, under the "bin" directory.

C. The administrative server needs to be running to launch or use the AAT.

D. The AAT can be used to install an application onto the IBM WebSphere Application Server, V5.0.

(select 1)

23. A datasource needs to be configured for all application servers on a single machine. What is the best way to handle creating this datasource so the datasource is always available to all application servers no matter how many application servers are added to the current machine?

A. Create a datasource at the Server level

B. Create a datasource at the Node level

C. Create a datasource at the Cell levelv

D. Send the application back to the developers and have them create their own datasource within the application

(select 1)

24. Which log is written in a binary format that captures events that show a history of the WebSphere Application Server's activities?

A. event log

B. JVM log

C. activity log

D. native log

(select 1)

25. Which one of the following files contains security role mapping information?

A. application.xml

B. ibm-application-bnd.xmi

C. ibm-application-ext.xmi

D. ibm-mapping-bnd.xmi

(select 1)

26. A new Enterprise Application is installed in IBM WebSphere Application Server, V5.0. What script will identify the new application to the Web server?

A. assembly

B. clientConfig

C. GenPluginCfg

D. EARExpander

(select 1)

27. Which log files should an administrator reference to find IBM WebSphere Application Server, V5.0 startup errors?

A. startServer.log

B. native_stderr.log

C. admin_error.log

D. native.log

E. adminserver_stdout.txt

(select 2)

28. Which of the following components are NOT used for Workload management?

A. Load balancer

B. Web server plug-in

C. Node Agent

D. ORB WLM plug-in

(select 1)

29. Running the command script 'backupConfig' makes a backup copy of which directories in addition to the Web server plug-in files?

A. <as-root>\AppServer\properties

B. <as-root>\AppServer\config\.repository

C. <as-root>\AppServer\config\backup

D. <as-root>\AppServer\config\cells

E. <as-root>\AppServer\config\templates

F. <as-root>\AppServer\installedApps

G. <as-root>\AppServer\logs

(select 2)

30. To execute the Collector Tool, which of the following prerequisites must be met?

A. JDK 1.2.2 or higher must be installed

B. The PATH environment variable should be set to include the <as-root>/bin directory

C. The Collector Tool command must be executed from the <as-root>/bin directory

D. The CLASSPATH environment variable should be set to include the <as-root>/bin directory

E. The user must be logged into the system as the Administrator or Root

(select 3)


31. What does running the script �backupConfig myBackupConfig� on a given node produce (from the default \AppServer\bin location)?

A. A directory called �myBackupConfig� in the current directory containing all the node's configuration files

B. A directory called �myBackupConfig� in \AppServer\config\backup containing all the node's configuration files

C. An XML file called �myBackupConfig.xml� in the current directory containing all the node's configuration data

D. A Zip file called �myBackupConfig� in the current directory containing all the node's configuration files

(select 1)


32. Which IBM WebSphere Application Server, V5.0 servlet is useful for validating system configuration?

A. Snoop

B. ShowCfg

C. HitCount

D. BeenThere

(select 1)

33. Which of the following statements best describe the characteristics of the Web server plug-in?

A. It provides communication between the Web server and the Application Server.

B. It is configured while installing the Web server.

C. It handles workload management between multiple application servers.

D. It communicates via the HTTP protocol.

E. It communicates via the OSE protocol.

(select 3)

34. Multiple fixpacks are installed on IBM WebSphere Application Server, V5.0. At some point it is realized that WebSphere must be rolled back to a previous fixpack level. What should an administrator do to roll the Application Server back?

A. Reinstall IBM WebSphere Application Server, V5.0 then the appropriate fixpack

B. Run the uninstall of any fixpacks installed after the desired level

C. Remove the latest fixpack JARs

D. Reinstall the appropriate fixpack level

(select 1)


35. Which of the following are valid ways to invoke the name space dump utility?

A. Execute the "JNDIDumpNameSpace" command from the command prompt

B. Invoke the com.ibm.websphere.naming.JNIDDumpNameSpace utility from a Java program

C. Execute the "dumpNameSpace" command from the command prompt

D. Invoke the com.ibm.websphere.naming.DumpNameSpace utility from a Java program

E. The JNDIDumpNameSpace command can only be executed from the command line

(select 2)

36. Secure Sockets Layer (SSL) provides connection security through ______ .

A. encryption

B. Lightweight Third-Party Authentication (LTPA)

C. communication integrity

D. digital certificate authentication

E. Lightweight Directory Access Protocol (LDAP)

(select 3)


37. With regard to security, which of the following protocols should be used to transport requests from the Web server plug-in to the Application Server?

A. OSE

B. HTTP

C. HTTPS

D. IIOP

(select 1)


38. What are the advantages of using memory replication method instead of database persistence as a session persistence mechanism?

A. Lower network traffic

B. Eliminates the single point of failure

C. Failover from server crash

D. Better performance

E. High scalability

(select 2)

39. An administrator needs to add several .class files and .jsp files to an existing .ear file. The .ear file is really large and crashes the application assembly tool (AAT) every time the administrator tries to open it. What should be done?

A. Install WebSphere and the AAT tool on a machine with more memory and open the .ear on it

B. Ship the .ear, class, and .jsp files off to the development team that developed the .ear file originally

C. Increase the AAT maximum heap size

D. Force the garbage collector to run more frequently

(select 1)


40. Which of the following administrative roles allow a user to change the run time state by using either the administrative console or the system management scripting interface.

A. Administrator

B. Configurator

C. Operator

D. Monitor

E. Admin

(select 2)

41. A constraint consists of which of the following?

A. Web resource collection

B. Authorization constraint

C. User data constraint

D. Web resource constraint

E. Administrative constraint

(select 3)


42. In a multi-node configuration where each node has an application server, which of the following protocols is used for direct communication between the two application servers?

A. HTTP

B. IIOP

C. OSE

D. LDAP

(select 1)


43. A systems expert has been asked to design an IBM WebSphere Application Server, V5.0 architecture that provides workload management (WLM) support. Which of the following provides for WLM?

A. Load Balancer.

B. Web server plug-in

C. Caching proxy

D. WebSEAL

E. PMI Interface

(select 2)

44. To change the default size of the activity.log file, an administrator must ____________ .

A. edit the logging.properties file

B. change the logging and tracing preferences from within the administrative console

C. edit the com.ibm.ws.ras.ActivityLogSize=xxxx entry in the activity.log file

D. uncomment the dynamicLogSize=on line in the waslogbrsys.cfg file

(select 1)


45. Which of the following are TRUE with respect to distributed administration?

A. A managed process is an individual server process, like a JMS Server.

B. A node consists of a set of 'managed processes' managed via a cell agent.

C. A managed process on machine "Y" can communicate directly with a managed process on machine "X".

D. Only one active Network Deployment may be installed in the environment.

E. The Deployment Manager AdminService passes object requests directly to a node agent.

(select 2)

46. When configuring WebSphere to use a JMS Provider, which of the following must be configured?

A. The scope

B. A Generic JMS Provider

C. A WebSphere JMS Provider

D. A Resource Environment Provider

(select 1)


47. Which utility gathers information about the Application Server installation and packages it in an output JAR file?

A. Collector tool

B. Thread Analyzer

C. Log Analyzer

D. FFDC

(select 1)

48. An administrator installed an Enterprise Application into WebSphere Application Server, V5.0 and upon invoking it for the first time noticed that a required EJB JAR file was missing. Which tool can be used?

A. ejbdeploy

B. EARExpander

C. earconvert

D. Application Assembly Tool

(select 1)

49. A user navigates a Web site that uses SSL (Secure Sockets Layer) for some but not all of its pages. If the user�s HTTP session is required to be accessed from both secured and non-secured pages, which of the following Session Manager options must be enabled?

A. Enable SSL ID Tracking

B. Enable Cookies

C. Enable URL Rewriting

D. Enable Protocol Switch Rewriting

(select 1)

50. In which of the following scenarios can the administrator choose NOT to install the Java 1.3.1 SDK from the IBM WebSphere Application Server, V5.0 installation program?

A. When using a "Silent Installation" on a Windows system

B. When using a "Custom Installation", and selecting "Other JDK" on a UNIX system

C. When using a "Typical Installation"

D. When migrating from a previous version

(select 1)


51. When creating cluster members on machines with different WebSphere installation directories or operating systems, the directory structures of which of the following cluster member properties must be changed to match the directory structure of the product installation root directory on the machine where the cluster member is running?

A. The Standard Output field of clustered application servers

B. The Standard Input field of clustered servlet engines

C. The Standard Output field of clustered servlet engines

D. The JAR File field of clustered enterprise beans

E. The Working Directory field of clustered Web applications

(select 2)

--------------------------------------------------------------------------

Answers

1. c
2. c
3. a
4. c d e
5. a b e
6. d
7. a
8. a c
9. c
10. c
11. c
12. b
13. b d
14. d
15. a
16. b
17. c
18. b d
19. a d
20. b
21. d
22. b
23. b
24. c
25. b
26. c
27. a b
28. c
29. b f
30. a b e
31. d
32. c
33. a c d
34. b
35. c d
36. a c d
37. c
38. a b
39. c
40. a c
41. a b c
42. b
43. a b
44. b
45. d e
46. a
47. a
48. d
49. d
50. b
51. d e

******************IBM 340 Sample Test*************************************
 
Steven Zheng
Greenhorn
Posts: 7
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
hi Vikrama

I have a quick glance at your questions about 340, and some questions need to be investigated. cos I will take 285 exam tomorrow morning, I promise to give my answer asap.
 
Vikrama Sanjeeva
Ranch Hand
Posts: 782
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi Steven,

Wish You All The Best!!!

Waiting for your answers.

Bye,
Viki.
 
Steven Zheng
Greenhorn
Posts: 7
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
hi Vikrama

I got 84.5% with my 340 exam. The quesions in my exam are about 70% different from yours, I looked through your items, worked to give my own answer. Following is the list of our difference(answers with an bracket indicate my answer):
10. c(b)
17. c(b)
18. b d(be)
25. b(a)
29. b f(de)
32. c(a)
36. a c d(abe)
38. a b(bd)
44. b(a)
48. d(a)

btw: For the items number 11, 13, 16 and 37. I could give the answer at present, need further investigation. You can search the redbook for help.

Wish this info will help you with 340 exam.

Good luck!
[ December 27, 2004: Message edited by: Steven Zheng ]
 
Vikrama Sanjeeva
Ranch Hand
Posts: 782
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi,

Here are my "doubts" for wrong answers. So be ready to check and correct.

*****************************************************************************************************
29. Running the command script 'backupConfig' makes a backup copy of which directories in addition to the Web server plug-in files?
A. <as-root>\AppServer\properties
B. <as-root>\AppServer\config\.repository
C. <as-root>\AppServer\config\backup
D. <as-root>\AppServer\config\cells
E. <as-root>\AppServer\config\templates
F. <as-root>\AppServer\installedApps
G. <as-root>\AppServer\logs
(select 2)

Explanation:
I run backupConfig.bat and it creates a "zip" file "WebSphereConfig_yyyy-mm-dd.zip". When I uncompressed this file, it conatins the folowing folders:
1) .repository
2) cells
3) templates

The questions says to select "two", wherease in my observation there are 3 answers i.e. a,d and e. Selected answers in the original sample test posted earlier is b & f.
*****************************************************************************************************


*****************************************************************************************************

45. Which of the following are TRUE with respect to distributed administration?
A. A managed process is an individual server process, like a JMS Server.
B. A node consists of a set of 'managed processes' managed via a cell agent.
C. A managed process on machine "Y" can communicate directly with a managed process on machine "X".
D. Only one active Network Deployment may be installed in the environment.
E. The Deployment Manager AdminService passes object requests directly to a node agent.
(select 2)

Explanation:

I have a doubt in option "E". The AdminService passes the request to MBean which in turn passes the request to the node agent. That is AdminService does not directly pass the request to node agent. Selected answers in original sample test posted earlier is d & e.

*****************************************************************************************************


*****************************************************************************************************
32. Which IBM WebSphere Application Server, V5.0 servlet is useful for validating system configuration?
A. Snoop
B. ShowCfg
C. HitCount
D. BeenThere
(select 1)

Explanation:

Snoop and HitCount both are used to test the successfull installation of WAS [Chapter 5 of sg264195.pdf]. One asnwer is to be selected. Why not Snoop? That is "a". Selected answers in original sample test posted earlier is "c".

*****************************************************************************************************

I am working on more questions. Will post more questions if doubt.

Bye,
Viki.
 
Vikrama Sanjeeva
Ranch Hand
Posts: 782
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi,

Originally posted by Steven Zheng:
btw: For the items number 11, 13, 16 and 37. I could give the answer at present, need further investigation. You can search the redbook for help.
[ December 27, 2004: Message edited by: Steven Zheng ]



11)c (b) see page 343 of sg246195.
13)b,d (d,?) I am sure for "d" but not for "b".
16) don't know.
37) c (c) see page 40 of sg246195 it says "The plug-in can use HTTP or HTTPs to transmit the request"

Bye,
Viki.
 
Greenhorn
Posts: 5
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
19. What options are available when binding EJB and resource references to the IBM WebSphere Application Server, V5.0 name space?

A. Simple name
B. Node defined name
C. Corbaname
D. Compound / fully qualified name
E. Generated base name

(select 2)

Answer: A, D

Why not C, D ?
Simple name is not always guaranteed to work as stated in the redbook.
Can any one help ?
 
Vikrama Sanjeeva
Ranch Hand
Posts: 782
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi,

Originally posted by George Cox:
Why not C, D ?
Simple name is not always guaranteed to work as stated in the redbook.
Can any one help ?



You are right. See page 403 of sg246195.pdf. Below is a copy-paste.



Bye,
Viki.
 
Steven Zheng
Greenhorn
Posts: 7
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
29. Running the command script 'backupConfig' makes a backup copy of which directories in addition to the Web server plug-in files?
A. <as-root>\AppServer\properties
B. <as-root>\AppServer\config\.repository
C. <as-root>\AppServer\config\backup
D. <as-root>\AppServer\config\cells
E. <as-root>\AppServer\config\templates
F. <as-root>\AppServer\installedApps
G. <as-root>\AppServer\logs
(select 2)

yes, I run backupConfig and got 3 folder included:
.repository
cells
templates

So this item should select B D E
 
Steven Zheng
Greenhorn
Posts: 7
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
btw, I cleared 285 this morning, only scored 70%.

Some questions are over detailed as you guys indicated from this forum.

I will study WSAD bit by bit to prepare for 286 exam.

Any way, I will take a good rest from tomorrow cos I caught a cold yesterday.

Also, I have joined the group of IBM340 hosted in Yahoo.

Thanks for your invitation!
 
joke time: What is brown and sticky? ... ... ... A stick! Use it to beat this tiny ad!
a bit of art, as a gift, that will fit in a stocking
https://gardener-gift.com
reply
    Bookmark Topic Watch Topic
  • New Topic