Which component dynamically allocates resources to applications based on demand in an intelligent management framework?
- A . Resource Scheduler
- B . Load Balancer
- C . Policy Director
- D . Application Controller
What is the purpose of a load balancer in the deployment of applications?
- A . Ensuring application compatibility
- B . Managing application updates
- C . Distributing incoming network traffic across multiple servers
- D . Securing data during deployment
An administrator installed an enterprise application in fast mode and noticed that the application is failing because J2EE roles have not been mapped.
How can this issue be resolved?
- A . Re-deploy the application.
- B . Request that the application developer create an enhanced .ear file which has roles mapped, and deploy the enhanced .ear file.
- C . Map a security role to the user/group for the application using the Integrated Solutions Console, save changes, and restart the application.
- D . Map a security role to the user runAs roles for the application using the Integrated Solutions Console, save changes, and restart the application.
An administrator has removed a node, but all the resources associated with the deleted node still exist.
What can the administrator do to ensure the node configuration is removed from the cell repository?
- A . Run the command syncNoode.
- B . Refederate and remove the node.
- C . Run the command cleanupNode.
- D . Perform node synchronization via the Integrated Solutions Console.
Which of the following is NOT a version control system?
- A . Git
- B . Subversion (SVN)
- C . Docker
- D . Mercurial
What is the purpose of a "build tool" in software development?
- A . To create documentation
- B . To generate reports
- C . To compile, test, and package code
- D . To design user interfaces
What is needed on order to integrate IBM WebSphere Application Serve security and third-party security servers?
- A . Set up a Trust Association.
- B . Create a new session cookie definition.
- C . Enable Java Authentication SPI (JASPI).
- D . Implement a custom single sign on token.
What is a common method for achieving high availability in a network?
- A . Load Balancing
- B . Debugging
- C . Single-Point-of-Failure
- D . Bottlenecking
An administrator has made a configuration change to a server in network deployment topology.
Which statement describes the synchronization process in this scenario?
- A . Configuration changes on a server are prohibited
- B . Node agent synchronizes its files with the master repository
- C . Configuration changes are maintained on the node’s master repository
- D . Node agent synchronizes its files with the master repository when the deployment manager is restarted
What aspect characterizes a multi-tier environment?
- A . Single-layered system
- B . Centralized data processing
- C . Division of functionalities into separate layers
- D . Lack of user interaction
Which of the following is true about certificate expiration monitoring?
- A . Must be run manually.
- B . Must be run on the deployment manager.
- C . Deletes the certificates after they are expired, but does not replace them.
- D . Can replace expired certificates or certificates in the expiration threshold with a new certificate
What is a Cell in the context of IBM WebSphere Application Server Network Deployment?
- A . It is a single instance of WebSphere.
- B . It is a combination of multiple application servers.
- C . It represents a grouping of physical servers.
- D . It refers to a collection of administrative agents.
Which of the following is a package manager for JavaScript?
- A . npm
- B . Pip
- C . Composer
- D . Maven
Which tool can be used to collect data to be used for monitoring and tuning the environment?
- A . Thread and Monitor Dump Analyzer
- B . Performance Monitoring Infrastructure
- C . IBM Tivoli Performance Viewer Advisor
- D . Garbage Collection and Memory Visualizer
When adding a repository to a federated repository configuration, which type of repository can be added only using wsadmin commands?
- A . File repository
- B . LDAP repository
- C . SAML repository
- D . Database repository
How can an administrator deploy or update an EAR, JAR, WAR, or SAR file to an application server or cluster in a development environment?
- A . Place the file in the monitored directory.
- B . Place the file in the operating system defined temporary directory.
- C . Place the file in the operating system defined user home directory for the user that owns the Java process.
- D . Email the file to wasadmin@hostname.com, where hotname.com is the host of the IBM WebSphere Application Server.
Which step must be completed when placing an application edition in validation mode?
- A . Roll out the new edition.
- B . Stop the currently active edition.
- C . Create routing policies for the new edition.
- D . Verify that three cluster members are used in the task.
What is the primary function of the Deployment Manager in IBM WebSphere Application Server Network Deployment?
- A . It manages applications across multiple servers.
- B . It serves as the primary web server.
- C . It is responsible for hosting the database.
- D . It controls the routing of HTTP requests.
In an intelligent management setup, what does "Autonomic Computing" primarily aim to achieve?
- A . Automated and self-configuring systems
- B . Manual and fixed system configurations
- C . Reducing network speed
- D . Static allocation of resources
How would an administrator configure Cross Component Trace?
- A . Through wsadmin script only
- B . Through the Integrated Solutions Console only
- C . Through the supplied Cross Component Trace enablement tool
- D . Through either the Integrated Solutions Console or through wsadmin script
Which is true when an administrator properly updates a single file within an application?
- A . The administrator can use a partial application update.
- B . The administrator must redeploy the full application file.
- C . The administrator can manually update the file on the file system.
- D . The administrator must uninstall the application, and then, reinstall with the updated application file.
In a three-tier architecture, what is the relationship between the presentation, application, and data tiers?
- A . They are independent and do not interact
- B . Each tier communicates directly with the other two
- C . Only the presentation tier interacts with the application tier
- D . The data tier is isolated from the other two tiers
Which deployment approach involves packaging an application and its dependencies into a single unit for seamless deployment and execution?
- A . Containerization
- B . Virtualization
- C . Multi-tenancy
- D . Monolithic Deployment
What are two automated administrative tasks that can be done with configuration checkpoints? (Select two.)
- A . delete
- B . restore
- C . archive
- D . backup
- E . compress
Which attack involves an attacker intercepting communication between two parties, secretly altering it, and then relaying it?
- A . Man-in-the-Middle (MitM) attack
- B . Trojan horse attack
- C . Ransomware attack
- D . Buffer overflow attack
If a printer fails to print after being installed, what might be a potential cause?
- A . Low ink levels
- B . Insufficient paper in the tray
- C . Printer driver issues or connection problems
- D . Network firewall blocking printing
Which factor is often monitored to assess the availability and response time of a website or service?
- A . Uptime
- B . Energy consumption
- C . RAM allocation
- D . Network bandwidth
What does the term "Garbage Collection" refer to in software performance optimization?
- A . Disposing of unused memory objects
- B . Reducing processor load
- C . Optimizing network bandwidth
- D . Upgrading software versions
Which of the following is true about creating multiple security domains?
- A . A new security domain can be created only using the administrative console.
- B . Global security must be enabled before creating new multiple security domains.
- C . Only users assigned to the security-admin role can create new multiple security domains.
- D . If a unique name for the domain is not specified, the system will automatically create one.
A administrator has configured memory to memory (M2M) session persistence for a large WebSphere Application Server ND cluster with a dedicated data replication service (DRS) domain.
How can they keep the DRS domain secure?
- A . Select encryption type DES and TRIPLE_DES.
- B . Select DCS-Secure as transport chain under Core Group name.
- C . Nothing needs to be done, the environment is secured when using M2M session persistence.
- D . Select encryption type DES and TRIPLE_DES and regenerate the encryption key periodically.
What state must an application edition be in before it can be started?
- A . Active
- B . InActive
- C . Validation
- D . Deactivated
Which of the following could be diagnosed using one of the Diagnostic tools in the IBM Support Assistant?
- A . Port conflicts
- B . Capacity problems
- C . Network performance problems
- D . Operating system prerequisites
Which of the following is a potential consequence when using an external session management store over a server level store?
- A . A server level store makes a smaller footprint.
- B . Only half the current sessions can be saved externally.
- C . External session management stores can use additional system resources.
- D . Using an external session management store takes 10X as long to rebuild the session after a failure.
Which tool is commonly used to automate the deployment of applications in a server environment?
- A . Jenkins
- B . Photoshop
- C . Microsoft Excel
- D . Slack
Which technique involves creating redundant systems that can immediately take over if the main system fails?
- A . Parallel Processing
- B . Data Mirroring
- C . Clustering
- D . Replication
Which process involves configuring and managing software, applying updates, and ensuring application availability in a live environment?
- A . Development
- B . Deployment
- C . Application Administration
- D . Debugging
An administrator wants to verify an IBM WebSphere Application Server installation by examining the installation’s directory structure. In this example, <WAS_installation_directory> indicates the installation’s root directory.
What is one directory tree structure that indicates a successful installation of the product files?
- A . <WAS_installation_directory>/web
- B . <WAS_installation_directory>/bin
- C . <WAS_installation_directory>/profiles
- D . <WAS_installation_directory>/installableApps
What does "CPU utilization" refer to in the context of system monitoring?
- A . The percentage of time the CPU is executing processes
- B . The frequency at which the CPU accesses memory
- C . The capacity of the CPU cache
- D . The rate of data transfer between the CPU and peripherals
What information must the system administrator have to successfully tune a connection pool?
- A . The requests per second that occur during a peak.
- B . The MaxConnections and WaitingCount values.
- C . The number of concurrent requests waiting for a connection.
- D . How long the database takes to respond to SELECT operations only.
Which tool is commonly used for remotely administering servers or workstations?
- A . PowerShell
- B . Notepad
- C . WinZip
- D . Google Chrome
If an administrator dynamically generates a plugin-cfg file after setting up high availability automatic generation, what will be the results?
- A . The dynamic generation issues a propagation request.
- B . The dynamic generation creates a second plugin-cfg file.
- C . The dynamic generation overwrites the intelligent management settings.
- D . An error message is shown that cannot be dynamically generated.
Heapdumps, javacores, and system cores are recommended to be generated for which kind of IBM WebSphere Application Server problems?
- A . Slow page rendering
- B . High CPU and disk I/O
- C . Slow File uploads and downloads
- D . System hangs and out of memory
What feature in intelligent management allows servers to join or leave a cluster without disrupting the system?
- A . Elastic Clustering
- B . Static Membership
- C . Dynamic Scaling
- D . Failover Mechanism
In WebSphere Application Server Network Deployment, what does the term ‘Node’ refer to?
- A . A physical server.
- B . A specific machine hosting application server instances.
- C . An administrative console.
- D . A container for web applications.
What must be done to delete one or more files from an application when using a partial application update?
- A . Manually delete the files from the file system (on all nodes if clustered).
- B . Supply the paths to the files that should be deleted in the administrative console.
- C . Include a META-INF/ibm-partialapp-delete.props in the partial application update file.
- D . Select the files that need to be deleted in the file selector section of the form for the partial application update.
Which tool is used to remotely access another system’s desktop?
- A . Telnet
- B . SSH
- C . RDP
- D . SNMP
What is a benefit of using the IBM Extended Cache Monitor?
- A . It invalidates cacheids.
- B . It displays the contents of the cache instances.
- C . It displays the contents of object cache instances.
- D . It displays the dependency ids of the cache instances.
Which type of fix would typically be downloaded to address a specific problem?
- A . Interim fix
- B . Cumulative fix
- C . Product fix pack
- D . Cumulative interim fix
What does the term "Continuous Integration" refer to in the context of deploying applications?
- A . Continuous testing of applications
- B . Continuous and automated integration of code changes into a shared repository
- C . Continuous deployment of applications to production servers
- D . Continuous monitoring of application performance
What does the “Update all” selection install by default if no further action is taken?
- A . All updates are installed for all installed package groups.
- B . All updates for only the selected package group are installed.
- C . Only recommended updates for all installed package groups are installed.
- D . Only recommended updates for the selected package groups are installed.
Which concept involves deploying and maintaining multiple independent instances of an application for different clients or user groups?
- A . Microservices
- B . Monolithic Architecture
- C . Multi-tenancy
- D . Single-Tenant Deployment
Which tool can be used to get dynamic cache size details and monitoring and tuning suggestions?
- A . Request metrics
- B . Performance servlet
- C . Performance and Diagnostic Advisor
- D . IBM Tivoli Performance Viewer advisor
An administrator would like to uninstall an instance of a multiple instance installation via response file.
How does the administrator ensure that the correct instance is uninstalled?
- A . All the features must be listed.
- B . The profile ID must point to the correct instance.
- C . The offering ID must point to the correct instance.
- D . The repository location must point to the correct instance.
If an administrator sets the regenerate time for high availability plug-in generation to 10, what is the effect?
- A . The plugin-cfg file is generated exactly every 10 minutes.
- B . The plugin-cfg file is generated at most every 10 minutes.
- C . The plugin-cfg file is generated 10 minutes after a rebuild request.
- D . The plugin-cfg file is generated after doing a poll every 10 minutes.
Which encryption protocol is commonly used for securing internet communication?
- A . WEP
- B . SSH
- C . HTTPS
- D . FTPS
Which of the following is true regarding disk offload?
- A . The amount of disk space to use cannot be specified.
- B . On server startup, DynaCache loads the entire disk cache into memory.
- C . The number of cache entries that are offloaded to disk cannot be specified.
- D . Disk offload can be enabled to have a cache entry copied to the file system at a configurable location.
Which of the following is an allowed sharing policy in the cachespec.xml?
- A . delete
- B . replicate
- C . syndicate
- D . not-shared
What is the default programming model for application development in WebSphere Application Server?
- A . Servlets and JSP
- B . EJBs
- C . JavaBeans
- D . Spring Framework
How would an administrator analyze Cross Component Trace output?
- A . Use the logViewer command to review the information
- B . Review the SystemErr.log files to review the information.
- C . Use the Integrated Solutions Console to review the information.
- D . Use the included Cross Component Trace servlet to review the information.
When configuring a dynamic cluster, which option can improve bottleneck conditions in deployed applications by enabling the placement controller to start more than one instance of the dynamic cluster on a node?
- A . Automatic mode
- B . Vertical stacking
- C . Number of server instances
- D . Custom dynamic server template
After executing the command: imcl listInstalledPackages, an administrator sees the following result: com.ibm.websphere.ND.v90_9.0.0.20160203_0234.
What does this indicate to the administrator?
- A . IBM Installation Manager was installed.
- B . Installation Manager installed IBM WebSphere Application Server.
- C . The Profile Management Tool installed WebSphere Application Server.
- D . WebSphere Customization Toolbox installed WebSphere Application Server.
An administrator configures an IBM DB2data source at cell scope. The environment variable DB2UNIVERSAL_JDBC_DRIVER_PATH is configured at cluster scope.
The data source test connection on one node succeeds, but fails on the other node with java.lang.ClassNotFoundException:com.ibm.db2.jcc.DB2ConnectionPoolDataSource.
Which of the below is the likely cause for the exception?
- A . The data source is configured at cell scope.
- B . Multiple driver JARs are installed on the second node.
- C . DB2UNIVERSAL_JDBC_DRIVER_PATH is configured at cluster scope.
- D . A different version of the JDBC driver JAR does not exist on the second node.
When updating an application, what is important to keep in mind?
- A . The application is only updated during the next server restart.
- B . The application is automatically stopped, updated, and restarted.
- C . The application is only updated during the next restart of the application.
- D . The application is stopped, updated, and restarted at the scheduled time.
When enabling SSL directives in the IBM HTTP Server configuration file, which parameter is required?
- A . The name of the key file
- B . The AllowOverride statement
- C . The IP address of the VirtualHost
- D . The DocumentRoot directory path
Which metric is commonly used to measure the responsiveness of a system under a given workload?
- A . Throughput
- B . Latency
- C . Bandwidth
- D . Capacity
Which protocol is commonly used for secure shell access and secure file transfers?
- A . FTP
- B . SSH
- C . Telnet
- D . HTTP
Which two ways are valid ways to install applications to IBM WebSphere Application Server? (Select two.)
- A . wsadmin script
- B . JMS messaging
- C . IBM Installation Manager
- D . IBM Tivoli Access Manager
- E . Integrated Solutions Console
To write a Jython script to stop a running application server, an administrator should use which administrative object?
- A . AdminApp
- B . AdminTask
- C . AdminConfig
- D . AdminControl
Which of the following is true for federated Repositories?
- A . Does not support identity profiles
- B . Provides read only capability for the registries.
- C . Supports one registry only in a realm within a cell
- D . Supports multiple repositories in a realm within a cell
An administrator is using the Guided Troubleshooter in the IBM Support Assistant to troubleshoot IBM WebSphere Application Server issues. After going through data collection and analysis, no reliable solution is found.
What is the administrator’s best next step?
- A . Call in a new PMR with IBM and upload Troubleshooter data to ECuREP.
- B . Open a new PMR with IBM and upload SystemOut.log from the IBM WebSphere Application Server.
- C . Submit results to the IBM WebSphere Application Server forum for a quick response from other forum users.
- D . Use the Guided Troubleshooter to open a service request with IBM, so all the troubleshooting data analyzed so far is uploaded automatically.
When installing interim fixes, which of the following is a valid repository option?
- A . Main repository
- B . Local repository
- C . Secured repository
- D . Compressed repository
What data source property can an administrator configure to minimize the chances of encountering StaleConnectionExceptions?
- A . Minimum connections = 0
- B . Reap Timeout < Unused Timeout
- C . Purge Policy = FailingConnectionOnly
- D . Unused Timeout > Half firewall timeout
After enabling High Performance Extensible Logging (HPEL), which configuration change will improve performance?
- A . Enabling HPEL Text logging
- B . Disabling HPEL Text logging
- C . Increasing Maximum log size
- D . Disabling Log record buffering
Which is true statement regarding the Administrative security role and its purpose?
- A . The Admin Security Manager has the ability to map other users to applications.
- B . The Admin Security Manager has the ability to map other users to administrative roles.
- C . The Integrated Solutions Console administrator has ability to map other users to applications.
- D . The Integrated Solutions Console administrator has ability to map other users to administrative roles.
What is something an administrator needs to keep on mind regarding the relationship between an IBM WebSphere Application Server install and an IBM Installation Manager install?
- A . IBM Installation Manager should be used in GUI mode.
- B . IBM Installation Manager can be uninstalled and reinstalled without impacting WebSphere Application Server
- C . IBM Installation Manager repository information points to the install location of Websphere Application Server
- D . IBM Installation Manager can be used by either a user with administrator privileges or a regular user to administer the same installation
What is the significance of a ‘Cluster’ in WebSphere Application Server Network Deployment?
- A . It refers to a group of interconnected databases.
- B . It is used to synchronize Deployment Managers.
- C . It provides high availability and scalability.
- D . It represents the configuration settings for LDAP.
Which statement is true when synchronizing a web server in a cell topology?
- A . Web server are managed servers and can be synchronized.
- B . Web server are unmanaged nodes and can be synchronized.
- C . Web server are managed nodes and cannot be synchronized.
- D . Web server are unmanaged servers and cannot be synchronized.
What happens when the JDBC data source prepared statement cache is full?
- A . The cache size is increased to accommodate new entries.
- B . Old entries in the cache are discarded to make room for new ones.
- C . The cache switches to a different storage mechanism for new entries.
- D . The cache is paused and entries are not added to it until it is emptied.
How can the administrator change the console session expiration for the Integrated Solutions Console?
- A . Modify timeout value and run the timeout.jacl script.
- B . Set the timeout value in the Console Preferences panel.
- C . Use the settimeout wsadmin command and specify the value.
- D . Set the ConnectionResponseTimeout value in the Integrated Solutions Console.
When deploying a new edition of an application, which edition rollout configuration option should be used to ensure that the two editions of the application are not active at the same time?
- A . Atomic
- B . Grouped
- C . Soft reset
- D . Hard reset
Which of the following can be queried to get PMI data?
- A . Server Cell
- B . JMX Connectors
- C . MBean ObjectNames
- D . Application ServerNames
What can an administrator use to remotely manage multiple stand-alone (unfederated) application servers?
- A . Job Manager
- B . Administrative agent
- C . Deployment manager
- D . remoteServer.jaclscript
Which programming language is often used in configuration management tools like Chef and Puppet?
- A . Java
- B . Ruby
- C . C++
- D . Swift
What is the primary purpose of an Application Server in the deployment of applications?
- A . Managing user authentication
- B . Running applications and providing runtime environments
- C . Storing application data
- D . Controlling network traffic
Which process involves identifying and resolving software, hardware, or network-related issues that affect system performance?
- A . Debugging
- B . System Formatting
- C . Code Refactoring
- D . Version Control
Which factor is critical for achieving scalability in application deployment?
- A . Single point of failure
- B . Redundant resources
- C . Fixed application architecture
- D . Static configurations
Which protocol is commonly used for secure file transfer in a networked environment?
- A . HTTP
- B . FTP
- C . SSH
- D . SMTP
Which security measure involves transforming plain text into an unreadable form using a key?
- A . Encoding
- B . Decryption
- C . Encryption
- D . Hashing
Which component in a network environment manages IP addresses and domain names?
- A . DHCP Server
- B . DNS Resolver
- C . FTP Server
- D . HTTP Proxy
What does the principle of "Least Privilege" refer to in security?
- A . Providing every user with maximum privileges
- B . Limiting user access rights to the minimum necessary to perform their tasks
- C . Allowing unrestricted access to sensitive data
- D . Granting access based on job titles