Q1. A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization.
How can a system administrator fix the issue ensuring only authorized access?
A. Using the Integrated Solutions Console (ISC), map all security roles to the special subject Everyone.
B. Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped to groups in the current user registry.
C. Edit the application using an assembly tool to add a security constraint for the servlet and reinstall the application.
D. Edit the application using an assembly tool to remove the security constraint defined for the servlet and reinstall the application.
Answer: B
Q2. A system administrator, Admin1, with Administrator privileges has archived full repository checkpoints. Another administrator, Configurator1, with Configurator privileges has copied
the checkpoint contents directory from one of the archived check points to its original location. Configurator1 tries to restore the configuration using the copied archived checkpoint contents and the restore fails.
How can Configurator1 restore the configuration using the copied archived full repository checkpoint?
A. Copy the archived checkpoint metadata directory to its original location.
B. Increase the Automatic checkpoint depth to keep all the delta checkpoints.
C. Delete the delta checkpoints taken after the full repository checkpoint was taken.
D. Ask an administrator to update the privileges for Configurator1 to match Admin1.
Answer: A
Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5///com.ibm.websphere.zseries.doc/ae/twve_xdappedcfg.html
Q3. Within a WebSphere Application Server Network Deployment cell, a system administrator needs to write a script to determine if a particular server is stopped. It is important that the wsadmin script explicitly return a status of stopped as opposed to just failing.
What wsadmin object should the administrator use to write this script?
A. AdminApp
B. AdminTask
C. AdminConfig
D. AdminControl
Answer: D
Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSAW57_8.0.0/com.ibm.websphere.nd.doc/info/ae/ae/welc6topscripting.html
Q4. A system administrator has created a wsadmin script with several steps to install and configure an application and some resources in a WebSphere Application Server process. The script executed but the application was not installed successfully. The administrator suspects that the script has problems.
How can the administrator test and debug the script?
A. In WebSphere Application Server Developer Tools for Eclipse, right click on the script file and select validate from context menu.
B. Execute the script using the wsadmin with the option -conntype NONE and monitor the commandAssistancePythonCommands.log file.
C. Use WebSphere Application Server Developer Tools for Eclipse in the debug perspective connected to the server and execute the script step by step.
D. Run the script using wsadmin with these parameters:-lang Python -javaoption "-Xdebug" and then execute the log Viewer command with the option –listlnstances
Answer: C
Q5. Which of the following comprises an initial Liberty profile server process?
A. A single JVM, the Liberty kernel, and feature manager.
B. A single JVM, an OSGI framework and an object request broker.
C. An OSGI framework, a web container and an EJB container.
D. An administrative agent, the Liberty kernel and shared libraries.
Answer: C
Explanation: Reference: https://www-01.ibm.com/support/knowledgecenter/was_beta_liberty/com.ibm.websphere.wlp.nd.multiplatform.doc/ae/cwlp_about.html (See the Liberty Profile Overview).
Q6. A system administrator decides to use the advice from the Performance and Diagnostic Advisor to identify the optimum connection pool settings for data sources. In a cell, the data source db2datasource is defined under node scope and used by two servers from that node. The administrator receives two different sets of advice for db2datasource.
. One set of advice suggests increasing the maximum connection pool size for db2datasource.
. The other suggests reducing the maximum connection pool size for db2datasource.
How should the administrator configure the data sources before reusing the Performance and Diagnostic Advisor?
A. Create a data source of the same name under cell scope.
B. Create a data source of the same name under server scope for each server.
C. Increase the minimum connection pool size for the data source.
D. Decrease the maximum connection pool size for the data source.
Answer: B
Q7. A system administrator has deployed an application. The development team has updated a new version of this application. The administrator needs to immediately deploy this updated application and guarantee that only this new edition is used by clients and that any service requests for the application are queued during the deployment of the new application.
How can the administrator achieve this task without any downtime to the application?
A. Perform a soft rollout.
B. Perform a hard rollout.
C. Perform an atomic rollout.
D. Perform a concurrent activation rollout.
Answer: C
Q8. A system administrator completed a WebSphere Application Server installation by using the Installation Manager. During installation, all defaults were selected for the installation root directories and the shared resources directory. Over time, the administrator has updated the installation with various interim fixes and fix packs. The administrator notices that the shared resources directory is very large in size and grows larger each time the Installation Manager is run.
How can the administrator decrease the size and remove some of the content from the shared resources directory?
A. Manually delete content from the directory.
B. During an update, create a new shared resources directory.
C. Clear the Delete Saved Files option for the Installation Manager.
D. Set the preserve Downloaded Artifacts preference to false.
Answer: D
Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSAW57_7.0.0/com.ibm.websphere.installation.soafepnd.doc/info/ae/ae/tins_installfp_dist.html?lang=en (Shared resources directory)
Q9. A JAX-WS EJB stateless session bean web service needs to be accessed by consumers outside the corporate domain.
Which configuration will help a system administrator meet the requirement?
A. Open firewall ports for both bootstrap and orb listener ports within the cell.
B. Configure plug-in in the DMZ to send request to the cluster members.
C. Configure on demand router (ODR) in the DMZ to send requests to the cluster members.
D. Configure HTTP tunneling to send the client-side Object Request Broker (ORB) request to the server-side ORB.
Answer: A
Explanation: Reference: http://www.ibm.com/developerworks/websphere/techjournal/0310_alcott/alcott.html
Q10. A system administrator in a bank was asked by business users to determine the most accessed JSP page in a web application at normal work load for marketing purpose.
Which tool should the administrator use to find the most used JSP page?
A. Performance and Diagnostic Advisor
B. IBM Support Assistant Data Collector
C. High Performance Extensible Logging Log Viewer
D. Tivoli Performance Viewer (TPV) summary reports
Answer: C