Hello everyone, I recently took a trial test for websphere-340. i have no clue for the following questions. Could anyone of you please help me by giving answers to atleast some of these questions.It would be really helpful for me to prepare for the V5-340 test which i am about to take in the next week. Thanks in advance.
1.Why would an administrator decide to create multiple configuration instances of WebSphere Application Server on the same machine? (Select 2) a. Simplify the install/uninstall of many WebSphere Application servers with the install and uninstall commands. b. Enable virtical scaling to take advantage of abundant resources on the machine. c. Create identical testing environments for multiple developers. d. Easy migration from prior WebSphere version configurations. e. Share the same properties, and log directories among multiple WebSphere instances. f. Share the same SDK across multiple environments.
2.Which of the following is TRUE about SSL and WebSphere? (Select 1) a. It ensures data integrity of the Request/Response in transit. b. WebSphere can impliment SSL using LTPA c. Global Security must be enabled in order to use SSL d. Encryption is not supported.
3.An application is being deployed to WebSphere V5. This application uses a utility JAR that is also used by other applications in the enviornment. What should be done with the JAR file? (Select 1) a. Remove the JAR from the EAR. If the JAR exists in other deployed EARs - it is already on WebSpheres claspath. b. Remove the JAR from the EAR, and all deployed EARs. Then define a shared library in WebSphere. c. You must include the JAR in each EAR that is deployed. There is no way to share common JARs in WebSphere. d. Remove the JAR from the EAR and add it to the application servers classpath.
4.When uninstalling a fixpack, what first must be done? (Select 3) a. Start all Java processes that use the IBM Software Developer Kit (SDK) that WebSphere Application Server provides. b. The JAVA_HOME environment variable must be set. c. Always uninstall the highest level interim fix, cumulative fix, or fix pack before uninstalling other interim fixes or fix packs. d. Stop all Java processes that use the IBM Software Developer Kit (SDK) that WebSphere Application Server provides. e. Make sure that the Deployment Manager remains at the same fix level or lower than any of its nodes.
5.When connecting to an Enterprise Information System (EIS), which authentication mechanism is supported by WebSphere? (Select 1) a. digest b. form based c. Kerbv5 d. BasicPassword
6.Which of the following is true regarding SSL session affinity? (Select 1)
a. SSL session tracking is only supported with IBM Http Server and iPlanet web servers. b. The session time-out interval is configured in WebSphere Application Server. c. SSL session tracking does not support cookies or URL rewriting. d. SSL session tracking cannot survive an app server failure.
7.An administrator needs to modify an application in a production environment. Under what circumstances can he do this without restarting the Enterprise Application? (Select 3) a. An existing servlet .class file in the application_root is overwritten with an updated version. Automatic reloading is enabled. b. A new servlet .class file is added to the application_root directory, and the web.xml is modified to include mappings for the new servlet. Automatic reloading is enabled. c. A new servlet .class file is added to the application_root directory. The web.xml is not modified because the new servlet will be accessed via the Invoker. Automatic reloading is enabled. d. Updating the implementation class for an EJB file in the application_root. Automatic reloading is enabled.
8.A particular enterprise application is comprised of three web archives. What can be done so that session data can be shared from one web module to another? (Select 1) a. This cannot be done. Session data is specific to the servlet context of each WAR. b. Enable session context sharing in the application.xml c. Enable session context sharing in the web.xml d. Enable session context sharing in one of the IBM EAR extensions
9.When installing multiple instances of WebSphere on the same computer without checking the co-existence box, what behavior is to be expected? (Select 1) a. All instances of WebSphere can run at the same time. b. Each WebSphere instance can run, but not at the same time. c. None of the instances can run because of port conflicts d. Only the last instance that is installed will be installed, and run correctly
10.What are valid reason to separate the Web container and the EJB container to different machines? (Select 2) a. Less competition for resources. b. Increase availability. c. Decrease administrative maintenance overhead. d. Allows for firewalls to be employed providing same level of security for Entity EJBs as is used for the data layer (Database).
11.Which of the following accurately describes the positives/negatives of using a XA datasource? (Select 2) a. XA datasources cannot support connection pooling. b. XA datasources support only two phase transations. A different datasource must be used to support single phase transactions. c. All XA-compliant transactions are distributed transactions d. Transaction can always be committed or always rolled back, even if parts of the system crash while the transaction is being committed.
12.An administrator is given a J2EE 1.2 EAR. What must be done before she can deploy it to WebSphere 5? (Select 2) a. Open the EAR in AAT and from the file menu, select 'Convert EAR'. b. Run the earconvert.bat or earconvert.sh from the commandline. c. Run the convertear.bat or convertear.sh from the commandline. d. Open the EAR in AAT and from the file menu, select 'Save As..J2EE 1.2' e. If the application does not use any deprecated code, then there is no need to convert the EAR.
13When enabling global security, which of the following is TRUE when using Local OS as the authentication mechanism? (Select 2) a. When WebSphere Application Server is installed on Windows, it is not recommended to use it as the authentication mechanism due to possible security holes. b. You can use Local OS in a distributed environment, as long as the user registries of each machine contain the same user id's and passwords. c. You can use Local OS in a distributed environment, as long as the Local OS is a Windows Domain. d. With the exception of a Windows Domain, using Local OS in a clustered environment may behave inconsistently. e. The server id requires root privileges in Unix, and 'Act as part of the operating system' privileges in Windows
14.When would you consider enabling Java 2 Security in WebSphere? (Select 2) a. Prevents unauthorized users from loggin into the WebSphere Administration Console. b. Prevents application code from accessing static content. c. Allows multiple applications to run on the same VM without effecting each other. d. Allows an application to perform authentication against a repository such as LDAP, Local OS or custome user registry. e. Prevents application code from writing to the file system.
15.An administrator wants to view the service log. What should he do to accomplish this? (Select 2) a. Use the showlog command. b. Open the log in a text editor. c. Use the Microsoft Windows Event viewer. d. Use the Log Analyzer. e. From the admin console, navigate to the Troubleshooting, Logs and Trace, IBM Service Logs, Runtime tab.
16.An administrator wants to explicitly add bindings to the cell name space without having to write code. What objects can he configure in the cell persistant root? (Select 3) a. Java Serialized Object b. EJB c. String d. LDAP name server
17.When considering which JMS provider to use with WebSphere, what are some considerations when deciding between the embedded WebSphere JMS provider verses WebSphere MQ? (Select 2) a. Both allow heterogeneous communication between WebSphere and other Environments. b. Both provide point to point messaging support. c. Both provide message transformation. d. Both provide pub/sub messaging support. e. Only WebSphere MQ supports the full JMS API.
18.When installing WebSphere Base and WebSphere ND, which log files are created for both? (Select 3) a. log.txt b. mq_install.log c. installFiletransfer.log d. installAdminConsole.log
19.When attempting to reinstall WebSphere Application Server with embedded Messaging, the administrator encounters errors while reinstalling. What should the administrator do to ensure that the embedded messaging subcomponent is removed properly? (Select 2) a. Run the cleanNode.sh or cleanNode.bat b. Delete the product's registry keys by removing the key HKLM\SOFTWARE\IBM\WebSphereEmbeddedMessagingPublishAndSubscribe c. Delete the product's Microsoft Software Installer (MSI) record. Use Microsoft's "MSI Cleanup Utility", available from Microsoft's Web site as msicuu.exe d. Add Que destinations to the configuration, and reinstall the product.
20.Why would an administrator decide to create multiple configuration instances of WebSphere Application Server on the same machine? (Select 2) a. Simplify the install/uninstall of many WebSphere Application servers with the install and uninstall commands. b. Enable virtical scaling to take advantage of abundant resources on the machine. c. Create identical testing environments for multiple developers. d. Easy migration from prior WebSphere version configurations. e. Share the same properties, and log directories among multiple WebSphere instances. f. Share the same SDK across multiple environments.
21.An administrator has created a script file that he would like to use to setup variables for use with other wsadmin scripts. (Select 3) a. Running wsadmin from the command line, use the -profile option to specify the script file. b. Specify the location of the script file in the $WAS_ROOT/properties/wsadmin.properties c. Running wsadmin from the command line, use the -p option to specify the script file. d. Specify the location of the script file in the $user_home/wsadmin.properties
22.An administrator needs to enable session failover. Which method would allow him to set it up in the least amount of time? (Select 1) a. Client-server topology. b. Peer-to-peer topology single replica. c. Database Session Persistence d. Peer-to-peer topology N-way.
23.In a clustered environment consisting of a Deployment Manager and multiple Nodes, what can be expected if an attempted http request is made to a clustered member that is unavailable? (Select 2) a. The request will be routed to the next available clustered member, only if the retry interval has not expired. b. If the retry interval is expired, the Deployment Manager will attempt to route the request back to the original clustered member. c. The deployment manager determins if a clustered member should be marked unavailable by communicating with each node agent. d. The Http pluggin will mark the clustered member unavailable.
24.An administrator is clustering an application across three machines. He would like the smallest machine to handle approximately 15% of the load, and the largest machine to handle approximately 50% of the load. Which would be appropriate weights for each cluster member? (Select 2) a. memberA = 5, memberB = 9, memberC = 18 b. memberA = 5, memberB = 5, memberC = 10 c. memberA = 6, memberB = 9, memberC = 11 d. memberA = 3, memberB = 7, memberC = 11
Because those who mind don't matter and those who matter don't mind - Seuss. Tiny ad: