IBM C1000-174 IBM WebSphere Application Server Network Deployment v9.0.5 Administrator Online Training
IBM C1000-174 Online Training
The questions for C1000-174 were last updated at Nov 22,2024.
- Exam Code: C1000-174
- Exam Name: IBM WebSphere Application Server Network Deployment v9.0.5 Administrator
- Certification Provider: IBM
- Latest update: Nov 22,2024
Which is true when an administrator properly updates a single file within an application?
- A . The administrator can use a partial application update.
- B . The administrator must redeploy the full application file.
- C . The administrator can manually update the file on the file system.
- D . The administrator must uninstall the application, and then, reinstall with the updated application file.
In a three-tier architecture, what is the relationship between the presentation, application, and data tiers?
- A . They are independent and do not interact
- B . Each tier communicates directly with the other two
- C . Only the presentation tier interacts with the application tier
- D . The data tier is isolated from the other two tiers
Which deployment approach involves packaging an application and its dependencies into a single unit for seamless deployment and execution?
- A . Containerization
- B . Virtualization
- C . Multi-tenancy
- D . Monolithic Deployment
What are two automated administrative tasks that can be done with configuration checkpoints? (Select two.)
- A . delete
- B . restore
- C . archive
- D . backup
- E . compress
Which attack involves an attacker intercepting communication between two parties, secretly altering it, and then relaying it?
- A . Man-in-the-Middle (MitM) attack
- B . Trojan horse attack
- C . Ransomware attack
- D . Buffer overflow attack
If a printer fails to print after being installed, what might be a potential cause?
- A . Low ink levels
- B . Insufficient paper in the tray
- C . Printer driver issues or connection problems
- D . Network firewall blocking printing
Which factor is often monitored to assess the availability and response time of a website or service?
- A . Uptime
- B . Energy consumption
- C . RAM allocation
- D . Network bandwidth
What does the term "Garbage Collection" refer to in software performance optimization?
- A . Disposing of unused memory objects
- B . Reducing processor load
- C . Optimizing network bandwidth
- D . Upgrading software versions
Which of the following is true about creating multiple security domains?
- A . A new security domain can be created only using the administrative console.
- B . Global security must be enabled before creating new multiple security domains.
- C . Only users assigned to the security-admin role can create new multiple security domains.
- D . If a unique name for the domain is not specified, the system will automatically create one.
A administrator has configured memory to memory (M2M) session persistence for a large WebSphere Application Server ND cluster with a dedicated data replication service (DRS) domain.
How can they keep the DRS domain secure?
- A . Select encryption type DES and TRIPLE_DES.
- B . Select DCS-Secure as transport chain under Core Group name.
- C . Nothing needs to be done, the environment is secured when using M2M session persistence.
- D . Select encryption type DES and TRIPLE_DES and regenerate the encryption key periodically.