Win a copy of Testing JavaScript Applications this week in the HTML Pages with CSS and JavaScript forum!

Ping She

Greenhorn
+ Follow
since Sep 28, 2004
Cows and Likes
Cows
Total received
0
In last 30 days
0
Total given
0
Likes
Total received
0
Received in last 30 days
0
Total given
0
Given in last 30 days
0
Forums and Threads
Scavenger Hunt
expand Ranch Hand Scavenger Hunt
expand Greenhorn Scavenger Hunt

Recent posts by Ping She

Hi,

Anybody has experience and practice exam for IBM AIX Test 232?

Regards!

Ping
Hi, Nicholas Cheung:

I have a question regarding to a question in Exam 701 - IBM DB2 UDB 8.1 Admin.

Which of the following actions is required before forcing a user off of a remote database?

Catalog the remote database
Quiesce the remote database
Connect to the remote database
Attach to the remote DB2 instance
Update DB2INSTANCE environment variable

Some books say C and some books say D, which one is correct?

thanks!
Nick:

Anyway, you did not see those odd questions in the 700 exam, right?
Are the exam 700 questions similar to the exercises in the book that you recommended: DB2 UDB V8.1 Certification Exam 700 Study Guide
by Roger E. Sanders ?

thanks!

yan
For this one:

_________________________________________________________________________
I have figured out what we might miss in the previous question. It stated that: SQL source statements for which two of the following are stored in the system catalog?

For source statement, I believe it means the raw SQL statement, e.g. SELECT * FROM TABLE_A, hence, only view and trigger will be stored in such format. All other options are in database specific format.

Do you think that this is reasonable?

Nick
__________________________________________________________________________


Cannot SQL like create index/table... be stored in the syscat?
No, the answer is Cursor Stability
Hi, Nick:

From the test source, I got another question for you:

Given a read-only application that requires consistent data for every query, which of the following isolation levels should it use to provide the most concurrency with other applications doing updates?

Read Stability
Repeatable Read
Cursor Stability
Uncommitted Read

which one is the answer?
Hi, Nick:

I have the same feeling as you. However, the answer is views and triggers.
The source of the exam is http://www.selftestsoftware.com/Assessments/DB2.aspx

It is free. You are welcome to take the exam and give me your thoughts.

Thanks!
Hi,Nic:

I understand that you passed IBM cert 700 exam.
I have a question here for you:

SQL source statements for which two of the following are stored in the system catalog?

Views
Tables
Indexes
Triggers
Constraints

I did some research and found all of them are stored in the syscat.
Can you please tell me the answer and source of your reference?

Thanks and regards!

ping
Hi, Nic:

Thanks for your information. I will go ahead buy that book!
The Exam 340 is for Wabsphere Application Administration, V5.0, I passed the exam last week, so now I am IBM certified system admin for WAS 5.0.
Based on your information, I am working towards the DB2 DBA.
I hope you won't mind if I ask you some db2 questions in the near future.
Are you in Singapore or HongKong?

Thanks and Regards!

Ping
Hey, Nic:

Thanks for the prompt reply, I appreciate it!
I am currently preparing the exam 700. Besides the book that you recommanded, do you have any other recommendation? like practice/mock exam, discussion forum, books, and other resources?
I just passed exam 340, WAS Admin exam, and I got a voucher from IBM certificate website. Do you know any deal like this?

Appreciate your help! Have a nice weekend.

pad
Hi, Mr.Nicholas Cheung:

Are you in the USA? If so, do you mind selling the DB2 book for Exam 700 that you recommended? Did you take Exam 701 as well?

Regards!

ping
Hi, there:

I assembled the questions available on this forum and ran acroos them and here are my answers. Please let me know what is your take on those answers.

Thanks!

-------------------------------------------------------------


1. Given a non-Network Deployment installation, which of the
following characterizes the IBM WebSphere administrative console?

A. It can be downloaded from a remote machine.
B. It runs in its own Java Virtual Machine.
C. In the base configuration, it runs on the application server and
can manage only that application server.
D. It connects directly to the Administrative Repository.


2. Which of the following is the default synchronization interval
between nodes and Deployment Manager?

A. 30 seconds
B. 45 seconds
C. 60 seconds
D. 120 seconds


3. Which protocol is used to access directly an application server
on a node remote from the web server?

A. IIOP
B. SNMP
C. OSE
D. HTTP


4. Which of the following tasks does NOT involve the node agent?

A. File transfer services
B. Workload management
C. Configuration synchronization
D. Performance monitoring


5. A systems expert has been asked to install and configure the IBM
WebSphere Application Server V5 with a high level of security.
Given this, which of the following should NOT reside in the DMZ
(Demilitarized Zone) of a firewall configuration?

(Select 2)
A. XML Configuration Repository
B. Web server
C. Application Server
D. The Network Dispatcher
E. Caching Proxy Server


6. Which of the following is NOT a benefit of implementing a
workload management topology?

A. Increased performance
B. Increased maintainability
C. Increased availability
D. Increased scalability


7. Which of the following provides important information about
configuration problems?
(Select 2)

A. FFDC
B. EJB container
C. Log Files
D. Administrative console messages


8. Which of the following files can be used to locate the version
information for "base" IBM WebSphere Application Server V5.0 ?
(Select 2)

A. SystemOut.log
B. historyReport.html
C. log.txt
D. BASE.product
E. native_stdout.log


9. Which of the following statements are TRUE for IBM WebSphere
Application Server V5.0 "base" installation?

(Select 2)

A. The node agent is installed, but dormant.
B. Only 1 JVM is running in the node.
C. Clustering or workload balancing is configured.
D. The server-cfg.xml file is created.
E. The plug-in configuration file is used by the embedded HTTP
Server.


10. Which operating system users and groups are NOT needed to
install the embedded messaging component of the IBM WebSphere
Application Server V5.0 on Unix or Linux platforms?

A. group mqm
B. group mqbrkrs
C. user mqm
D. user mqbrkrs
E. root


Item 11 of 58 Mark item for review
Which of the following commands can be executed from the IBM WebSphere Application Server V5.0 Network Deployment Manager bin directory for cell administration?
A. removeNode
B. syncNode
C. cleanupNode
D. addNode
E. startNode


Item 12 of 58 Mark item for review
When installing IBM WebSphere Application Server V5.0 and the web server plug-in on a machine that has an existing web server, the administrator will need to:
A. start the IBM WebSphere Application Server during the install. The Application Server configuration file will be updated as a part of the installation.
B. stop the IBM WebSphere Application Server during the install. The Application Server configuration file will be updated as a part of the installation.
C. start the database. The database server configuration file will be updated as a part of the installation.
D. stop the web server during the install. The web server configuration file will be updated as a part of the installation.


Item 13 of 58 Mark item for review
Immediately after installation, to test the correct independent operation of the web server, open a browser to the following URL:
A. http://localhost/
B. http://localhost/servlet/snoop
C. http://localhost/testpage.html
D. http://localhost/servlet/testserver


Item 14 of 58 Mark item for review
If there are problems starting or using the administrative console after IBM WebSphere Application Server V5.0 "base" installation, which of the following logs can be used to troubleshoot the problem?
(Select 2)
A. startServer.log
B. SystemOut.log
C. ivt.log
D. ihslog.txt
E. http_plugin.log


Item 15 of 58 Mark item for review
Which of the following properties can be specified when creating a Web module?
A. Security Constraints
B. Web Resource Collections, HTTP methods, and URL patterns
C. Plug-In Routing Options
D. Transport Protocols
E. Local & Remote EJB Interfaces


Item 16 of 58 Mark item for review
An installation of WebSphere Application Server V5 contains an enterprise application named "TestApp". The administrator constructed a jacl file and placed it in the C:\ directory as "TestApp". The file contents are as follows:
A. An error message, $AdminApp list is not a valid command.
B. A list of enterprise applications currently installed, including the TestApp enterprise application.
C. A list of enterprise applications currently installed, excluding the TestApp enterprise application.
D. An empty list, $AdminApp uninstall TestApp removed all applications from the server


Item 17 of 58 Mark item for review
An administrator just deployed a new application to WebSphere Application Server and is getting "404 File not Found" errors when trying to reach the application from a browser. The administrator realizes that the web server plugin needs to be regenerated. What should be done to get the plugin regenerated immediately without shutting down the server?
(Select 2)
A. Restart the web server plugin
B. Run the GenPluginCfg.sh (or GenPluginCfg.bat)
C. Send a mass email giving users 10 min to wrap up, then reboot the server
D. Click Environment > Update Web Server Plugin in the admin console navigation tree
E. Set the reroute options so that the Web server is temporarily unavailable while the modifications are made


Item 18 of 58 Mark item for review
What is the default time interval at which the plug-in checks the configuration file to see if updates or changes have occurred?
A. 60 seconds with a granularity of 1 minute
B. 1 minute with a granularity of 1 second
C. 60 seconds with a granularity of 10 seconds
D. 1 minute with a granularity of 1 minute


Item 19 of 58 Mark item for review
At deployment time, security roles can be mapped to users, groups of users, or special subjects in IBM WebSphere Application Server V5. Which of the following are defined as special subjects?
(Select 2)
A. Administrative Users
B. All Authenticated Users
C. Authorized Users
D. Everyone
E. EJB Users


Item 20 of 58 Mark item for review
Which of the following statements is true for the embedded JMS provider (WebSphere JMS provider)?
A. The WebSphere JMS provider can be used to provide the functionality of full WebSphere MQ.
B. One major limitation is that it cannot exchange messages with queue managers outside WebSphere.
C. There can be multiple embedded JMS providers per node.
D. The WebSphere administration tools access the embedded JMS server using the http/https protocol.


Item 21 of 58 Mark item for review
Please refer to the exhibit to answer this question. If a federated binding "nsc" is created to bind "nsb" under "nsa", what lookup name would correctly reference EJB Home X in Name Space 1, given the JNDI namespace in the exhibit?
A. nsb/ejba
B. comp-env/ejb/ejba
C. nsc/ejba
D. nsa/nsc/ejba
E. nsa/nsc/nsb/ejba


Item 22 of 58 Mark item for review
What is the purpose of resource adapters?
A. Connect to an enterprise information system
B. Allow J2EE resources to connect to one another
C. Allow web applications to access web services
D. Allow EJBs to communicate with one another


Item 23 of 58 Mark item for review
An application needs to be redeployed because the quality assurance team has just approved a bug fix and delivered a new .ear file. Using the admin console, which is the RECOMMENDED way to redeploy this application?
A. Applications -> Enterprise Applications -> Export -> Update, Save
B. Applications -> Enterprise Applications -> Uninstall, Install, Save
C. Applications -> Enterprise Applications -> Export, Stop, Update, Export,Save, Start
D. Applications -> Enterprise Applications -> Stop, Update, Export, Save, Start


Item 24 of 58 Mark item for review
An administrator is writing a deployment script to create a JDBC Provider. Using the wsadmin tool, how would the administrator determine which parameters are required to create a new JDBC provider?
A. $AdminApp required JDBCProvider
B. $AdminConfig list JDBCProvider
C. $AdminApp list JDBCProvider required
D. $AdminConfig required JDBCProvider


Item 25 of 58 Mark item for review
Which of the following tasks can be performed using the Application Assembly Tool (AAT)?
(Select 2)
A. Create/Edit J2EE modules
B. Create/Edit SDK Applications
C. Create the EAR expansion directory
D. Modify the binding information attributes and IBM extension attributes


Item 26 of 58 Mark item for review
A system administrator is creating Ant deployment scripts to automate the deployment process. The stage is reached when a task definition needs to be created to actually install the application on WebSphere. What task definition is appropriate to accomplish this?
A. <taskdef name="wsInstallApp" classname="com.ibm.websphere.ant.tasks.InstallApplication"/>
B. <taskdef name="wsInstallApp" classname="org.apache.tools.ant.tasks.InstallApplication"/>
C. <taskdef name="wsInstallApp" classname="com.ibm.websphere.ant.*"/>
D. <taskdef name="wsInstallApp" classname="com.ibm.apache.tools.ant.tasks.InstallApplication"/>
E. <taskdef name="wsInstallApp" classname="com.ibm.websphere.ant.InstallApplication"/>


Item 27 of 58 Mark item for review
Given that Secure Socket Layer (SSL) is configured properly and working on the IBM HTTP Server. Which of the following need to be performed on the WebSphere Application Server V5.0 Base so that it will accept SSL connections from the HTTP Server?
(Select 2)
A. Global Security must be disabled.
B. The Application Server must be restarted after enabling SSL on the web server.
C. A Virtual Host alias must be added to support SSL
D. The Web Server Plugin configuration file must be updated.


Item 29 of 58 Mark item for review
Java 2 Security guards access to which of the following system resources?
A. JSPs
B. file I/O
C. servlets
D. sockets
E. EJB methods


Item 30 of 58 Mark item for review
Which of the following processes are capable of running a security server?
A. Application Server
B. Administrative Server
C. Web server plug-in
D. Node Agent


Item 31 of 58 Mark item for review
Which of the following statements are TRUE with respect to administrative security?
(Select 2)
A. The administrative roles are defined to permit WebSphere Application Server administrative functions only from the Web-based administrative console.
B. WebSphere Application Server administrative security is automatically enforced when global security is enabled.
C. WebSphere Application Server extends the J2EE security role based access control to include administrative roles.
D. Because the administrative security configuration is at node level, it is not necessary to restart all of the servers.


Item 32 of 58 Mark item for review
To provide JNDI Naming Service, the CosNaming Service utilizes which of the following ports?
A. 9000
B. 2809
C. 50000
D. 900


Item 33 of 58 Mark item for review
In which circumstances might the LDAP server port have to be specified rather than accept the default port?
(Select 3)
A. If the IBM WebSphere Application Server V5 will inter-operate with a previous (e.g. Version 4.x) version IBM WebSphere Application Server.
B. When the port has been pre-empted by IIOP.
C. When multiple IBM WebSphere Application Servers are installed and configured to run in the same "Single Sign On" (SSO) domain.
D. When the "Bootstrap port" has been reset to the LDAP default port.


Item 34 of 58 Mark item for review
Which authentication method permits a site-specific login through an HTML page or JSP?
A. Basic authentication
B. Digest Authentication
C. Client-certificate authentication
D. Form-based authentication


Item 35 of 58 Mark item for review
Which of the following is a typical reason for implementing vertical scaling?
A. To distribute resources over multiple nodes for failover
B. To fully utilize all of available resources of a node
C. To improve the performance of individual application servers
D. To eliminate a single point of failure


Item 36 of 58 Mark item for review
Where is the default location of web server plugin configuration file?
A. <as-root>/config/plugin-cfg.xml
B. <as-root>/config/cells/plugin-cfg.xml
C. <as-root>/properties/plugin-cfg.xml
D. <as-root>/properties/cells/plugin-cfg.xml


Item 37 of 58 Mark item for review
Which of the following reasons for using persistent session management are TRUE?
(Select 2)
A. For keeping the user's state information permanently for consistent interaction
B. For recovering the user's session data by another cluster member after a cluster member in a cluster failed or is shut down
C. When the user's session data is too valuable to lose through unexpected failure at the WebSphere node
D. For allowing the administrator better control of the session cache memory footprint


Item 38 of 58 Mark item for review
Which of the following phrases accurately describe the concept of a cluster and cluster members?
(Select 3)
A. A set of servers with identical applications deployed on them
B. A blueprint for designing Enterprise Applications
C. A set of servers that participate in workload management
D. A set of servers that may be located on a single node
E. A set of servers that have identical configuration data


Item 39 of 58 Mark item for review
At which level can HTTP session management NOT be configured?
A. Application Server
B. Application
C. EJB container
D. Web Module


Item 40 of 58 Mark item for review
When setting up servlet caching, what is the purpose of assigning 'Caching group members'?
A. Groups JSP, HTML, and other resources with a particular servlet that uses them and may need to be cached with the servlet.
B. Provides a list of servlets and JSPs to cache when used.
C. Specifies which users or roles receive cached copies or regenerated servlets and JSPs.
D. Specifies whether or not to cache all resources associated with a servlet or JSP.


Item 41 of 58 Mark item for review
A WebSphere Application Server V5.0 Administrator is attempting to understand WebSphere Connection Pooling. In which of the following examples should her application use WebSphere Connection Pooling?
(Select 3)
A. Whenever the application cannot tolerate the overhead of obtaining and releasing a database connection.
B. Whenever the application requires Java Transaction API(JTA) transactions within the WebSphere Application Server.
C. Whenever the application developers have implemented connection pooling in the code.
D. Whenever the application needs to share connections among multiple users.
E. Whenever the application manages the specifics of creating a connection, such as the database name, username, or password.


Item 42 of 58 Mark item for review
Which of the following are valid methods for installing a WebSphere Application Server interim fix or fix pack?
(Select 2)
A. Use the updateWizard to install the fix
B. Use the updateSilent command to install the fix
C. Use the WASPreUpgrade tool to install the fix pack
D. Use the WASPostUpgrade tool to check for errors after installing the fix pack
E. Use the setupClient script to install the fix pack


Item 43 of 58 Mark item for review
How does the 'Starting Weight' configuration affect enterprise applications installed in IBM WebSphere Application Server V5?
A. Higher weights get more processing power compared to other applications with lower weights.
B. Lower weights get more processing power before applications with higher weights.
C. Specifies the starting order of applications when the server is started or restarted. The application with the lowest starting weight is started first.
D. Specifies the application weight for plug-in. Based on that value forwards plug-in the request to one or other application server.


Item 44 of 58 Mark item for review
The "restoreConfig myBackupConfig nostop" command restores a node's configuration from a backup called myBackupConfig but does NOT:
A. stop the servers, which could allow a synchronization during restore
B. stop the restoration process if synchronization errors occur - restoring everything EXCEPT what caused the error
C. stop the restoration process if synchronization errors occur - restoring everything INCLUDING what caused the error
D. stop an incoming request to the application being restored if the request can execute without errors


Item 45 of 58 Mark item for review
An administrator has successfully completed a default installation of both the application server and IBM HTTP Server. Which of the following locations contains the plug-in configuration files?
A. /Program Files/IBM HTTP Server/
B. <WASROOT>/AppServer/bin/
C. <WASROOT>/AppServer/config/
D. <WASROOT>/AppServer/properties/


Item 46 of 58 Mark item for review
A web site, that does not make use of certificates must store information within a given user's session. What session tracking mechanism can be used, even if the user has disabled cookies?
A. SSL ID Tracking
B. Cookies
C. URL Rewriting
D. Protocol Switch Rewriting


Item 47 of 58 Mark item for review
What BEST describes setting the 'Minimum Heap Size' close to or equal to the 'Maximum Heap Size'?
A. High performance web applications waste more processing power on low performance functions.
B. Low performance web applications spend more processing power than necessary on low performance functions.
C. Can improve WebSphere Application Server start up.
D. Garbage collection cycles are more frequent that can affect performance.


Item 48 of 58 Mark item for review
Which of the following situations would require a WebSphere administrator to manually edit the plug-in configuration file?
A. When a plug-in is generated on one operating system and needs to be copied to a remote operating system.
B. When enterprise applications are removed from the application server.
C. For any remote application servers that require components or services from another application server whose plug-in was edited.
D. When security roles were edited for components referenced by the plug-in.


Item 49 of 58 Mark item for review
An administrator needs to monitor the percentage of database connections in use for a specific application server. Which of the following tools could the administrator use?
A. Tivoli Performance Viewer
B. WebSphere Administrative Console
C. Log Analyzer
D. Resource Analyzer


Item 50 of 58 Mark item for review
CPU use is being overloaded and performance on the Web server is down. What action could be taken to improve performance of handling incoming requests?
A. Install an additional network adapter to increase network throughput.
B. Increase the MaxServers directive to enable more potential processes.
C. Set up a Caching Proxy to relieve Web Server.
D. Increase the MaxClients directive to minimize average response time.


Item 51 of 58 Mark item for review
Which of the following statements regarding IBM WebSphere Application Server V5 Log Analyzer is TRUE?
A. It is capable of downloading the latest symptom XML file from the IBM support site.
B. It supports functions for ORB trace formatting and message IDs.
C. It creates an activity.log file which can be viewed with any text editor.
D. It can be used to view remote log files.


Item 52 of 58 Mark item for review
Which WebSphere files can contain application print statements?
(Select 2)
A. startServer.log
B. SystemOut.log
C. SystemErr.log
D. native_stdout.log
E. native_stderr.log


Item 53 of 58 Mark item for review
Which of the following prerequisites MUST be met before the JNDI dumpNameSpace utility can be used?
A. The AdminServer containing the application that the administrator will be performing the JNDI dump against, must be active.
B. The application server that an administrator will be performing the JNDI dump against, must be active.
C. The Administrative Console must be used to perform the dumpNameSpace.
D. The PATH environment variable must be set to include the <as-root>/bin/dumpNameSpace.bat command before invoking.


Item 54 of 58 Mark item for review
For a WebSphere Application Server V5.0 Base installation, which output filename conforms to the format created by the Collector Tool?
A. hostname-Base-WASenv.jar
B. hostname-Base_WASenv.log
C. servername-Base_WASenv.log
D. servername-Base-Wasenv.jar


Item 55 of 58 Mark item for review
The Administrative Console provides multiple methods to help an administrator troubleshoot the system. Which of the following are examples of these methods?
A. Console messages
B. Trace
C. Logs
D. Profiling
E. Symptom database


Item 56 of 58 Mark item for review
JVM log files can be rotated based on the following criteria:
(Select 2)
A. Time
B. Remaining disk space
C. At each app server start-up
D. Maximum file size
E. JVM heap size


Item 57 of 58 Mark item for review
Which of the following statements about the First Failure Data Capture (FFDC) tool is correct?
A. The captured data is saved automatically in the <WAS_HOME>/logs/ffdc folder.
B. It is the primary tool to view and analyze log files.
C. It is an optional component to choose during install.
D. It needs to be started and stopped manually.


Item 58 of 58 Mark item for review
If the Admin Console fails to start up, which of the following files should an Administrator check to see errors?
(Select 2)
A. startServer.log
B. native_stderr.log
C. SystemOut.log
D. admin_error.log
E. admin_access.log

-------------------------------------------------------------

Answers:

1. c
2. c
3. d
4. b
5. c e
6. b
7. c d
8. a d
9. b e
10. d
11. c
12. a
13. b
14. a b
15. a
16. c
17. b d
18. b
19. b d
20. b
21. c
22. a
23. a
24. d
25. a d
26. a
27. b d
28.
29. b d
30. a
31. b c
32. b
33. a c d
34. d
35. b
36. b
37. b c
38. a c d
39. a
40. b
41. a c d
42. a b
43. c
44. a
45. c
46. c
47. c
48. a
49. a
50. c
51. a
52. b c
53. b
54. a
55. a
56. a d
57. a
58. a c
----------------------------------------------------------------------------
Pre-Assessment/Sample Test for Test 340 IBM WebSphere Application Server, V5.0, Basic Administration
EXAM: IBM WebSphere Application Server, V5.0, Basic Administration
NUMBER: 340

PASSING SCORE: 53% (27 out of 51)
----------------------------------------------------------------------------

1. Which one of the following is NOT a supported type of authentication according to the IBM WebSphere Application Server, V5.0 authentication model?

A. Basic

B. Client-certificate

C. Digest

D. Form-based

(select 1)

2. By default, IBM WebSphere Application Server, V5.0 uses which of the following IP ports for the administration console and the administration console secure port, respectively?

A. 9080,9443

B. 9443,9080

C. 9090,9043

D. 2809,8880

(select 1)

3. An application is ready to be deployed. The team developing the application has worked within corporate guidelines and reused common functionality that other development teams have used before. Upon review, it appears that the development team used the same version of several JAR files that are currently being used by other production teams. Which of the following actions should be taken or suggested?

A. Repackage the EAR using the AAT tool, excluding the duplicated JAR files. Ensure that the duplicated .jar files are in an appropriately defined shared library and deploy the application

B. Combine the EAR with all other EAR files, thus combining all applications into one, so no JAR files are duplicated.

C. Use the AAT tool to combine all the duplicate JAR files into a master shared EAR, then deploy the application, and have set all of the applications using the duplicated JAR files to reference the master shared .ear from the IBM WebSphere Administrative Console.

D. Shared JAR files are not supported

(select 1)

4. Defining the "Scope" of resources such as JDBC Providers, Namespace bindings, or shared libraries can be defined for which levels?

A. Module

B. Application

C. Node

D. Cell

E. Server

(select 3)

5. When enabling tracing on an Application Server, which of the following options can be configured from the administrative console?

A. Trace Output File Name

B. Trace Specification String

C. Show FATAL Messages

D. Show WARNING Messages

E. Trace Output Format

(select 3)

6. Once IBM WebSphere Application Server, V5.0 is installed, what additional task needs to be completed so that the Application Server can be started?

A. Edit the plug-in file

B. Install an administrative database

C. Reboot the machine

D. No action is required

(select 1)


7. Which of the following are TRUE statements with respect to LDAP and the IBM HTTP Server?

A. LDAP is an information directory where users and groups can be defined only once and shared across multiple machines and applications.

B. LDAP is an Internet protocol for exchanging basic management information.

C. The IBM HTTP Server "LDAP Plug-in" allows authentication and delegation to be performed by the directory.

D. LDAP is a proprietary protocol that IBM uses to communicate between the IBM HTTP Server and the Web container

(select 1)

8. If the administrative console fails to start up, which of the following files should an administrator check to see errors?

A. startServer.log

B. native_stderr.log

C. SystemOut.log

D. admin_error.log

E. admin_access.log

(select 2)

9. A machine is experiencing a bottleneck. Which of the following actions could an administrator take to improve database performance?

A. Change your CMPs to be BMPs

B. Lower the tcp-wait time from 4 minutes to 60 seconds

C. Set the number of DB connections less than the number of WebSphere Application Server threads

D. Lower the default session timeout to less than 30 minutes

(select 1)


10. What is the likely reason for decreasing the "Maximum size" parameter of the thread pool for a Web container?

A. To limit the size a thread can grow before refreshing

B. To limit the amount of threads to what the hardware can withstand

C. To lower the amount of unused threads

D. To limit the amount of time a thread exists before refreshing

(select 1)

11. When SSL ID tracking is used as the session affinity mechanism, the lifetime of an SSL session ID is controlled by configuration options in ___________ .

A. Edge Server

B. Web server

C. Application Server

D. Enterprise application

(select 1)

12. A database administrator needs the DDL to create tables for an application that was recently deployed. What does the IBM WebSphere Application Server, V5.0 administrator need to do to export the DDL for the database administrator to use?

A. Environment -> DDL Generator -> <select application checkbox>, Export DDL

B. Enterprise Applications -> <select application checkbox>, Export DDL

C. Enterprise Applications -> <application_name> -> Export DDL

D. Environment -> DDL Generator -> <application_name> -> Export DDL

(select 1)

13. To enable monitoring of individual enterprise bean methods with the Tivoli Performance Viewer, what must an administrator set?

A. In the Tivoli Performance Viewer console, select the Standard monitoring

B. In the Tivoli Performance Viewer console, select Custom monitoring

C. In the Tivoli Performance Viewer console, set the monitoring level to at least High

D. In the Tivoli Performance Viewer console, set the monitoring level to Max

(select 2)

14. What are CMP Connection Factories used for?

A. Allows CMP beans to interact with Web services and EJBs

B. Allows CMP beans to interact with other EJBs

C. Allows CMP beans to access the HTTP stream

D. Allows CMP beans to access a backend data store

(select 1)


15. An application on a server is running very slowly. A number of the servlets are performing simple database queries. What should the administrator do to help the application perform faster?

A. Increase the maximum pool size for the data source

B. Add more RAM to the machine

C. Increase the JVM maximum heap size

D. Increase the maximum thread size

(select 1)

16. A permission violation occurs for a client application within IBM WebSphere Application Server, V5.0. Java 2 security has been enabled, and the JVM com.ibm.websphere.java2secman.norethrow property is set and has a value of true. The Security Manager component will ________ .

A. throw an AccessControl exception and log the exception

B. log the exception to the WebSphere SystemOut.log

C. throw a PermissionViolation exception and log the exception

D. log the exception to both the activity and native log files

(select 1)

17. When making changes to an application server datasource configuration in the administrative console, when do changes become effective?

A. Immediately upon clicking apply

B. When the application server configuration is saved

C. When the application server is restarted

D. As soon as the form is submitte

(select 1)

18. Which of the following statements are FALSE with respect to an SSL connection?

A. SSL can be used between an "Applet Container" and the embedded HTTP server.

B. SSL can be used between an "Applet Container" and an "EJB Container".

C. SSL can be used between an "Applet Container" and a "Web Container".

D. SSL can be used between an "Applet Container" and a "Web server".

E. SSL can be used between an "Applet Container" and a "Client Container".

(select 2)

19. What options are available when binding EJB and resource references to the IBM WebSphere Application Server, V5.0 name space?

A. Simple name

B. Node defined name

C. Corbaname

D. Compound / fully qualified name

E. Generated base name

(select 2)


20. What is the first IBM WebSphere Application Server, V5.0 component that receives a servlet request from a browser?

A. Web server

B. Web server plug-in

C. Application server

D. Servlet redirector

(select 1)


21. The WSAdmin tool provides access to all the functionality found in the administrative console via four management objects. What are they?

A. AdminApp, AdminConfig, AdminControl, and AdminSecure

B. AdminConfig, AdminControl, AdminSecure, and Help

C. AdminApp, AdminControl, AdminServer, and Help

D. AdminConfig, AdminControl, AdminApp, and Help

E. AdminControl, AdminConfig, AdminServer, and Help

(select 1)

22. Which of the following statements is TRUE with respect to the Application Assembly Tool (AAT)?

A. The AAT can be started from the Administrative Console.

B. Scripts to run the AAT are located in the directory where IBM WebSphere Application Server V5.0 is installed, under the "bin" directory.

C. The administrative server needs to be running to launch or use the AAT.

D. The AAT can be used to install an application onto the IBM WebSphere Application Server, V5.0.

(select 1)

23. A datasource needs to be configured for all application servers on a single machine. What is the best way to handle creating this datasource so the datasource is always available to all application servers no matter how many application servers are added to the current machine?

A. Create a datasource at the Server level

B. Create a datasource at the Node level

C. Create a datasource at the Cell levelv

D. Send the application back to the developers and have them create their own datasource within the application

(select 1)

24. Which log is written in a binary format that captures events that show a history of the WebSphere Application Server's activities?

A. event log

B. JVM log

C. activity log

D. native log

(select 1)

25. Which one of the following files contains security role mapping information?

A. application.xml

B. ibm-application-bnd.xmi

C. ibm-application-ext.xmi

D. ibm-mapping-bnd.xmi

(select 1)

26. A new Enterprise Application is installed in IBM WebSphere Application Server, V5.0. What script will identify the new application to the Web server?

A. assembly

B. clientConfig

C. GenPluginCfg

D. EARExpander

(select 1)

27. Which log files should an administrator reference to find IBM WebSphere Application Server, V5.0 startup errors?

A. startServer.log

B. native_stderr.log

C. admin_error.log

D. native.log

E. adminserver_stdout.txt

(select 2)

28. Which of the following components are NOT used for Workload management?

A. Load balancer

B. Web server plug-in

C. Node Agent

D. ORB WLM plug-in

(select 1)

29. Running the command script 'backupConfig' makes a backup copy of which directories in addition to the Web server plug-in files?

A. <as-root>\AppServer\properties

B. <as-root>\AppServer\config\.repository

C. <as-root>\AppServer\config\backup

D. <as-root>\AppServer\config\cells

E. <as-root>\AppServer\config\templates

F. <as-root>\AppServer\installedApps

G. <as-root>\AppServer\logs

(select 2)

30. To execute the Collector Tool, which of the following prerequisites must be met?

A. JDK 1.2.2 or higher must be installed

B. The PATH environment variable should be set to include the <as-root>/bin directory

C. The Collector Tool command must be executed from the <as-root>/bin directory

D. The CLASSPATH environment variable should be set to include the <as-root>/bin directory

E. The user must be logged into the system as the Administrator or Root

(select 3)


31. What does running the script �backupConfig myBackupConfig� on a given node produce (from the default \AppServer\bin location)?

A. A directory called �myBackupConfig� in the current directory containing all the node's configuration files

B. A directory called �myBackupConfig� in \AppServer\config\backup containing all the node's configuration files

C. An XML file called �myBackupConfig.xml� in the current directory containing all the node's configuration data

D. A Zip file called �myBackupConfig� in the current directory containing all the node's configuration files

(select 1)


32. Which IBM WebSphere Application Server, V5.0 servlet is useful for validating system configuration?

A. Snoop

B. ShowCfg

C. HitCount

D. BeenThere

(select 1)

33. Which of the following statements best describe the characteristics of the Web server plug-in?

A. It provides communication between the Web server and the Application Server.

B. It is configured while installing the Web server.

C. It handles workload management between multiple application servers.

D. It communicates via the HTTP protocol.

E. It communicates via the OSE protocol.

(select 3)

34. Multiple fixpacks are installed on IBM WebSphere Application Server, V5.0. At some point it is realized that WebSphere must be rolled back to a previous fixpack level. What should an administrator do to roll the Application Server back?

A. Reinstall IBM WebSphere Application Server, V5.0 then the appropriate fixpack

B. Run the uninstall of any fixpacks installed after the desired level

C. Remove the latest fixpack JARs

D. Reinstall the appropriate fixpack level

(select 1)


35. Which of the following are valid ways to invoke the name space dump utility?

A. Execute the "JNDIDumpNameSpace" command from the command prompt

B. Invoke the com.ibm.websphere.naming.JNIDDumpNameSpace utility from a Java program

C. Execute the "dumpNameSpace" command from the command prompt

D. Invoke the com.ibm.websphere.naming.DumpNameSpace utility from a Java program

E. The JNDIDumpNameSpace command can only be executed from the command line

(select 2)

36. Secure Sockets Layer (SSL) provides connection security through ______ .

A. encryption

B. Lightweight Third-Party Authentication (LTPA)

C. communication integrity

D. digital certificate authentication

E. Lightweight Directory Access Protocol (LDAP)

(select 3)


37. With regard to security, which of the following protocols should be used to transport requests from the Web server plug-in to the Application Server?

A. OSE

B. HTTP

C. HTTPS

D. IIOP

(select 1)


38. What are the advantages of using memory replication method instead of database persistence as a session persistence mechanism?

A. Lower network traffic

B. Eliminates the single point of failure

C. Failover from server crash

D. Better performance

E. High scalability

(select 2)

39. An administrator needs to add several .class files and .jsp files to an existing .ear file. The .ear file is really large and crashes the application assembly tool (AAT) every time the administrator tries to open it. What should be done?

A. Install WebSphere and the AAT tool on a machine with more memory and open the .ear on it

B. Ship the .ear, class, and .jsp files off to the development team that developed the .ear file originally

C. Increase the AAT maximum heap size

D. Force the garbage collector to run more frequently

(select 1)


40. Which of the following administrative roles allow a user to change the run time state by using either the administrative console or the system management scripting interface.

A. Administrator

B. Configurator

C. Operator

D. Monitor

E. Admin

(select 2)

41. A constraint consists of which of the following?

A. Web resource collection

B. Authorization constraint

C. User data constraint

D. Web resource constraint

E. Administrative constraint

(select 3)


42. In a multi-node configuration where each node has an application server, which of the following protocols is used for direct communication between the two application servers?

A. HTTP

B. IIOP

C. OSE

D. LDAP

(select 1)


43. A systems expert has been asked to design an IBM WebSphere Application Server, V5.0 architecture that provides workload management (WLM) support. Which of the following provides for WLM?

A. Load Balancer.

B. Web server plug-in

C. Caching proxy

D. WebSEAL

E. PMI Interface

(select 2)

44. To change the default size of the activity.log file, an administrator must ____________ .

A. edit the logging.properties file

B. change the logging and tracing preferences from within the administrative console

C. edit the com.ibm.ws.ras.ActivityLogSize=xxxx entry in the activity.log file

D. uncomment the dynamicLogSize=on line in the waslogbrsys.cfg file

(select 1)


45. Which of the following are TRUE with respect to distributed administration?

A. A managed process is an individual server process, like a JMS Server.

B. A node consists of a set of 'managed processes' managed via a cell agent.

C. A managed process on machine "Y" can communicate directly with a managed process on machine "X".

D. Only one active Network Deployment may be installed in the environment.

E. The Deployment Manager AdminService passes object requests directly to a node agent.

(select 2)

46. When configuring WebSphere to use a JMS Provider, which of the following must be configured?

A. The scope

B. A Generic JMS Provider

C. A WebSphere JMS Provider

D. A Resource Environment Provider

(select 1)


47. Which utility gathers information about the Application Server installation and packages it in an output JAR file?

A. Collector tool

B. Thread Analyzer

C. Log Analyzer

D. FFDC

(select 1)

48. An administrator installed an Enterprise Application into WebSphere Application Server, V5.0 and upon invoking it for the first time noticed that a required EJB JAR file was missing. Which tool can be used?

A. ejbdeploy

B. EARExpander

C. earconvert

D. Application Assembly Tool

(select 1)

49. A user navigates a Web site that uses SSL (Secure Sockets Layer) for some but not all of its pages. If the user�s HTTP session is required to be accessed from both secured and non-secured pages, which of the following Session Manager options must be enabled?

A. Enable SSL ID Tracking

B. Enable Cookies

C. Enable URL Rewriting

D. Enable Protocol Switch Rewriting

(select 1)

50. In which of the following scenarios can the administrator choose NOT to install the Java 1.3.1 SDK from the IBM WebSphere Application Server, V5.0 installation program?

A. When using a "Silent Installation" on a Windows system

B. When using a "Custom Installation", and selecting "Other JDK" on a UNIX system

C. When using a "Typical Installation"

D. When migrating from a previous version

(select 1)


51. When creating cluster members on machines with different WebSphere installation directories or operating systems, the directory structures of which of the following cluster member properties must be changed to match the directory structure of the product installation root directory on the machine where the cluster member is running?

A. The Standard Output field of clustered application servers

B. The Standard Input field of clustered servlet engines

C. The Standard Output field of clustered servlet engines

D. The JAR File field of clustered enterprise beans

E. The Working Directory field of clustered Web applications

(select 2)

--------------------------------------------------------------------------

Answers

1. c
2. c
3. a
4. c d e
5. a b e
6. d
7. a
8. a c
9. c
10. c
11. c
12. b
13. b d
14. d
15. a
16. b
17. c
18. b d
19. a d
20. b
21. d
22. b
23. b
24. c
25. b
26. c
27. a b
28. c
29. b f
30. a b e
31. d
32. c
33. a c d
34. b
35. c d
36. a c d
37. c
38. a b
39. c
40. a c
41. a b c
42. b
43. a b
44. b
45. d e
46. a
47. a
48. d
49. d
50. b
51. d e
Here are the questions and answers for the ICE, please inform us if you have any different answers than mine. Thanks!


----------------------------------------------------------------------------
Pre-Assessment/Sample Test for Test 340 IBM WebSphere Application Server, V5.0, Basic Administration
EXAM: IBM WebSphere Application Server, V5.0, Basic Administration
NUMBER: 340

PASSING SCORE: 53% (27 out of 51)


1. Which one of the following is NOT a supported type of authentication according to the IBM WebSphere Application Server, V5.0 authentication model?

A. Basic

B. Client-certificate

C. Digest

D. Form-based

(select 1)

2. By default, IBM WebSphere Application Server, V5.0 uses which of the following IP ports for the administration console and the administration console secure port, respectively?

A. 9080,9443

B. 9443,9080

C. 9090,9043

D. 2809,8880

(select 1)

3. An application is ready to be deployed. The team developing the application has worked within corporate guidelines and reused common functionality that other development teams have used before. Upon review, it appears that the development team used the same version of several JAR files that are currently being used by other production teams. Which of the following actions should be taken or suggested?

A. Repackage the EAR using the AAT tool, excluding the duplicated JAR files. Ensure that the duplicated .jar files are in an appropriately defined shared library and deploy the application

B. Combine the EAR with all other EAR files, thus combining all applications into one, so no JAR files are duplicated.

C. Use the AAT tool to combine all the duplicate JAR files into a master shared EAR, then deploy the application, and have set all of the applications using the duplicated JAR files to reference the master shared .ear from the IBM WebSphere Administrative Console.

D. Shared JAR files are not supported

(select 1)

4. Defining the "Scope" of resources such as JDBC Providers, Namespace bindings, or shared libraries can be defined for which levels?

A. Module

B. Application

C. Node

D. Cell

E. Server

(select 3)

5. When enabling tracing on an Application Server, which of the following options can be configured from the administrative console?

A. Trace Output File Name

B. Trace Specification String

C. Show FATAL Messages

D. Show WARNING Messages

E. Trace Output Format

(select 3)

6. Once IBM WebSphere Application Server, V5.0 is installed, what additional task needs to be completed so that the Application Server can be started?

A. Edit the plug-in file

B. Install an administrative database

C. Reboot the machine

D. No action is required

(select 1)


7. Which of the following are TRUE statements with respect to LDAP and the IBM HTTP Server?

A. LDAP is an information directory where users and groups can be defined only once and shared across multiple machines and applications.

B. LDAP is an Internet protocol for exchanging basic management information.

C. The IBM HTTP Server "LDAP Plug-in" allows authentication and delegation to be performed by the directory.

D. LDAP is a proprietary protocol that IBM uses to communicate between the IBM HTTP Server and the Web container

(select 1)

8. If the administrative console fails to start up, which of the following files should an administrator check to see errors?

A. startServer.log

B. native_stderr.log

C. SystemOut.log

D. admin_error.log

E. admin_access.log

(select 2)

9. A machine is experiencing a bottleneck. Which of the following actions could an administrator take to improve database performance?

A. Change your CMPs to be BMPs

B. Lower the tcp-wait time from 4 minutes to 60 seconds

C. Set the number of DB connections less than the number of WebSphere Application Server threads

D. Lower the default session timeout to less than 30 minutes

(select 1)


10. What is the likely reason for decreasing the "Maximum size" parameter of the thread pool for a Web container?

A. To limit the size a thread can grow before refreshing

B. To limit the amount of threads to what the hardware can withstand

C. To lower the amount of unused threads

D. To limit the amount of time a thread exists before refreshing

(select 1)

11. When SSL ID tracking is used as the session affinity mechanism, the lifetime of an SSL session ID is controlled by configuration options in ___________ .

A. Edge Server

B. Web server

C. Application Server

D. Enterprise application

(select 1)

12. A database administrator needs the DDL to create tables for an application that was recently deployed. What does the IBM WebSphere Application Server, V5.0 administrator need to do to export the DDL for the database administrator to use?

A. Environment -> DDL Generator -> <select application checkbox>, Export DDL

B. Enterprise Applications -> <select application checkbox>, Export DDL

C. Enterprise Applications -> <application_name> -> Export DDL

D. Environment -> DDL Generator -> <application_name> -> Export DDL

(select 1)

13. To enable monitoring of individual enterprise bean methods with the Tivoli Performance Viewer, what must an administrator set?

A. In the Tivoli Performance Viewer console, select the Standard monitoring

B. In the Tivoli Performance Viewer console, select Custom monitoring

C. In the Tivoli Performance Viewer console, set the monitoring level to at least High

D. In the Tivoli Performance Viewer console, set the monitoring level to Max

(select 2)

14. What are CMP Connection Factories used for?

A. Allows CMP beans to interact with Web services and EJBs

B. Allows CMP beans to interact with other EJBs

C. Allows CMP beans to access the HTTP stream

D. Allows CMP beans to access a backend data store

(select 1)


15. An application on a server is running very slowly. A number of the servlets are performing simple database queries. What should the administrator do to help the application perform faster?

A. Increase the maximum pool size for the data source

B. Add more RAM to the machine

C. Increase the JVM maximum heap size

D. Increase the maximum thread size

(select 1)

16. A permission violation occurs for a client application within IBM WebSphere Application Server, V5.0. Java 2 security has been enabled, and the JVM com.ibm.websphere.java2secman.norethrow property is set and has a value of true. The Security Manager component will ________ .

A. throw an AccessControl exception and log the exception

B. log the exception to the WebSphere SystemOut.log

C. throw a PermissionViolation exception and log the exception

D. log the exception to both the activity and native log files

(select 1)

17. When making changes to an application server datasource configuration in the administrative console, when do changes become effective?

A. Immediately upon clicking apply

B. When the application server configuration is saved

C. When the application server is restarted

D. As soon as the form is submitte

(select 1)

18. Which of the following statements are FALSE with respect to an SSL connection?

A. SSL can be used between an "Applet Container" and the embedded HTTP server.

B. SSL can be used between an "Applet Container" and an "EJB Container".

C. SSL can be used between an "Applet Container" and a "Web Container".

D. SSL can be used between an "Applet Container" and a "Web server".

E. SSL can be used between an "Applet Container" and a "Client Container".

(select 2)

19. What options are available when binding EJB and resource references to the IBM WebSphere Application Server, V5.0 name space?

A. Simple name

B. Node defined name

C. Corbaname

D. Compound / fully qualified name

E. Generated base name

(select 2)


20. What is the first IBM WebSphere Application Server, V5.0 component that receives a servlet request from a browser?

A. Web server

B. Web server plug-in

C. Application server

D. Servlet redirector

(select 1)


21. The WSAdmin tool provides access to all the functionality found in the administrative console via four management objects. What are they?

A. AdminApp, AdminConfig, AdminControl, and AdminSecure

B. AdminConfig, AdminControl, AdminSecure, and Help

C. AdminApp, AdminControl, AdminServer, and Help

D. AdminConfig, AdminControl, AdminApp, and Help

E. AdminControl, AdminConfig, AdminServer, and Help

(select 1)

22. Which of the following statements is TRUE with respect to the Application Assembly Tool (AAT)?

A. The AAT can be started from the Administrative Console.

B. Scripts to run the AAT are located in the directory where IBM WebSphere Application Server V5.0 is installed, under the "bin" directory.

C. The administrative server needs to be running to launch or use the AAT.

D. The AAT can be used to install an application onto the IBM WebSphere Application Server, V5.0.

(select 1)

23. A datasource needs to be configured for all application servers on a single machine. What is the best way to handle creating this datasource so the datasource is always available to all application servers no matter how many application servers are added to the current machine?

A. Create a datasource at the Server level

B. Create a datasource at the Node level

C. Create a datasource at the Cell levelv

D. Send the application back to the developers and have them create their own datasource within the application

(select 1)

24. Which log is written in a binary format that captures events that show a history of the WebSphere Application Server's activities?

A. event log

B. JVM log

C. activity log

D. native log

(select 1)

25. Which one of the following files contains security role mapping information?

A. application.xml

B. ibm-application-bnd.xmi

C. ibm-application-ext.xmi

D. ibm-mapping-bnd.xmi

(select 1)

26. A new Enterprise Application is installed in IBM WebSphere Application Server, V5.0. What script will identify the new application to the Web server?

A. assembly

B. clientConfig

C. GenPluginCfg

D. EARExpander

(select 1)

27. Which log files should an administrator reference to find IBM WebSphere Application Server, V5.0 startup errors?

A. startServer.log

B. native_stderr.log

C. admin_error.log

D. native.log

E. adminserver_stdout.txt

(select 2)

28. Which of the following components are NOT used for Workload management?

A. Load balancer

B. Web server plug-in

C. Node Agent

D. ORB WLM plug-in

(select 1)

29. Running the command script 'backupConfig' makes a backup copy of which directories in addition to the Web server plug-in files?

A. <as-root>\AppServer\properties

B. <as-root>\AppServer\config\.repository

C. <as-root>\AppServer\config\backup

D. <as-root>\AppServer\config\cells

E. <as-root>\AppServer\config\templates

F. <as-root>\AppServer\installedApps

G. <as-root>\AppServer\logs

(select 2)

30. To execute the Collector Tool, which of the following prerequisites must be met?

A. JDK 1.2.2 or higher must be installed

B. The PATH environment variable should be set to include the <as-root>/bin directory

C. The Collector Tool command must be executed from the <as-root>/bin directory

D. The CLASSPATH environment variable should be set to include the <as-root>/bin directory

E. The user must be logged into the system as the Administrator or Root

(select 3)


31. What does running the script �backupConfig myBackupConfig� on a given node produce (from the default \AppServer\bin location)?

A. A directory called �myBackupConfig� in the current directory containing all the node's configuration files

B. A directory called �myBackupConfig� in \AppServer\config\backup containing all the node's configuration files

C. An XML file called �myBackupConfig.xml� in the current directory containing all the node's configuration data

D. A Zip file called �myBackupConfig� in the current directory containing all the node's configuration files

(select 1)


32. Which IBM WebSphere Application Server, V5.0 servlet is useful for validating system configuration?

A. Snoop

B. ShowCfg

C. HitCount

D. BeenThere

(select 1)

33. Which of the following statements best describe the characteristics of the Web server plug-in?

A. It provides communication between the Web server and the Application Server.

B. It is configured while installing the Web server.

C. It handles workload management between multiple application servers.

D. It communicates via the HTTP protocol.

E. It communicates via the OSE protocol.

(select 3)

34. Multiple fixpacks are installed on IBM WebSphere Application Server, V5.0. At some point it is realized that WebSphere must be rolled back to a previous fixpack level. What should an administrator do to roll the Application Server back?

A. Reinstall IBM WebSphere Application Server, V5.0 then the appropriate fixpack

B. Run the uninstall of any fixpacks installed after the desired level

C. Remove the latest fixpack JARs

D. Reinstall the appropriate fixpack level

(select 1)


35. Which of the following are valid ways to invoke the name space dump utility?

A. Execute the "JNDIDumpNameSpace" command from the command prompt

B. Invoke the com.ibm.websphere.naming.JNIDDumpNameSpace utility from a Java program

C. Execute the "dumpNameSpace" command from the command prompt

D. Invoke the com.ibm.websphere.naming.DumpNameSpace utility from a Java program

E. The JNDIDumpNameSpace command can only be executed from the command line

(select 2)

36. Secure Sockets Layer (SSL) provides connection security through ______ .

A. encryption

B. Lightweight Third-Party Authentication (LTPA)

C. communication integrity

D. digital certificate authentication

E. Lightweight Directory Access Protocol (LDAP)

(select 3)


37. With regard to security, which of the following protocols should be used to transport requests from the Web server plug-in to the Application Server?

A. OSE

B. HTTP

C. HTTPS

D. IIOP

(select 1)


38. What are the advantages of using memory replication method instead of database persistence as a session persistence mechanism?

A. Lower network traffic

B. Eliminates the single point of failure

C. Failover from server crash

D. Better performance

E. High scalability

(select 2)

39. An administrator needs to add several .class files and .jsp files to an existing .ear file. The .ear file is really large and crashes the application assembly tool (AAT) every time the administrator tries to open it. What should be done?

A. Install WebSphere and the AAT tool on a machine with more memory and open the .ear on it

B. Ship the .ear, class, and .jsp files off to the development team that developed the .ear file originally

C. Increase the AAT maximum heap size

D. Force the garbage collector to run more frequently

(select 1)


40. Which of the following administrative roles allow a user to change the run time state by using either the administrative console or the system management scripting interface.

A. Administrator

B. Configurator

C. Operator

D. Monitor

E. Admin

(select 2)

41. A constraint consists of which of the following?

A. Web resource collection

B. Authorization constraint

C. User data constraint

D. Web resource constraint

E. Administrative constraint

(select 3)


42. In a multi-node configuration where each node has an application server, which of the following protocols is used for direct communication between the two application servers?

A. HTTP

B. IIOP

C. OSE

D. LDAP

(select 1)


43. A systems expert has been asked to design an IBM WebSphere Application Server, V5.0 architecture that provides workload management (WLM) support. Which of the following provides for WLM?

A. Load Balancer.

B. Web server plug-in

C. Caching proxy

D. WebSEAL

E. PMI Interface

(select 2)

44. To change the default size of the activity.log file, an administrator must ____________ .

A. edit the logging.properties file

B. change the logging and tracing preferences from within the administrative console

C. edit the com.ibm.ws.ras.ActivityLogSize=xxxx entry in the activity.log file

D. uncomment the dynamicLogSize=on line in the waslogbrsys.cfg file

(select 1)


45. Which of the following are TRUE with respect to distributed administration?

A. A managed process is an individual server process, like a JMS Server.

B. A node consists of a set of 'managed processes' managed via a cell agent.

C. A managed process on machine "Y" can communicate directly with a managed process on machine "X".

D. Only one active Network Deployment may be installed in the environment.

E. The Deployment Manager AdminService passes object requests directly to a node agent.

(select 2)

46. When configuring WebSphere to use a JMS Provider, which of the following must be configured?

A. The scope

B. A Generic JMS Provider

C. A WebSphere JMS Provider

D. A Resource Environment Provider

(select 1)


47. Which utility gathers information about the Application Server installation and packages it in an output JAR file?

A. Collector tool

B. Thread Analyzer

C. Log Analyzer

D. FFDC

(select 1)

48. An administrator installed an Enterprise Application into WebSphere Application Server, V5.0 and upon invoking it for the first time noticed that a required EJB JAR file was missing. Which tool can be used?

A. ejbdeploy

B. EARExpander

C. earconvert

D. Application Assembly Tool

(select 1)

49. A user navigates a Web site that uses SSL (Secure Sockets Layer) for some but not all of its pages. If the user�s HTTP session is required to be accessed from both secured and non-secured pages, which of the following Session Manager options must be enabled?

A. Enable SSL ID Tracking

B. Enable Cookies

C. Enable URL Rewriting

D. Enable Protocol Switch Rewriting

(select 1)

50. In which of the following scenarios can the administrator choose NOT to install the Java 1.3.1 SDK from the IBM WebSphere Application Server, V5.0 installation program?

A. When using a "Silent Installation" on a Windows system

B. When using a "Custom Installation", and selecting "Other JDK" on a UNIX system

C. When using a "Typical Installation"

D. When migrating from a previous version

(select 1)


51. When creating cluster members on machines with different WebSphere installation directories or operating systems, the directory structures of which of the following cluster member properties must be changed to match the directory structure of the product installation root directory on the machine where the cluster member is running?

A. The Standard Output field of clustered application servers

B. The Standard Input field of clustered servlet engines

C. The Standard Output field of clustered servlet engines

D. The JAR File field of clustered enterprise beans

E. The Working Directory field of clustered Web applications

(select 2)

----------------------------------------------------------------------------
Answers

1. c
2. c
3. a
4. c d e
5. a b e
6. d
7. a
8. a c
9. c
10. c
11. c
12. b
13. b d
14. d
15. a
16. b
17. c
18. b d
19. a d
20. b
21. d
22. b
23. b
24. c
25. b
26. c
27. a b
28. c
29. b f
30. a b e
31. d
32. c
33. a c d
34. b
35. c d
36. a c d
37. c
38. a b
39. c
40. a c
41. a b c
42. b
43. a b
44. b
45. d e
46. a
47. a
48. d
49. d
50. b
51. d e