Assuming there are no custom properties defined in current plugin-cfg.xml file, what should be done before running the GenPluginCfg command?
- A . Delete the global plugin-cfg.xml in the <profile_root>/config/cells directory.
- B . Delete the current plugin-cfg.xml in the <profile_root>/config/cells directory.
- C . Clear the Enable automated web server configuration processing option in the web server plugin configuration service.
- D . Use either the Integrated Solutions Console or the ConfigurewebServerDefinition.jacl script to create a web server definition.
B
Explanation:
Delete the plugin-cfg.xml file in the profile_root/config/cells directory before you use the GenPluginCfg command. Otherwise, configuration changes do not persist to the plugin-cfg.xml file.
However, do not delete the plugin-cfg.xml file if you have custom properties that you previously set in it that you need to persist.
Note: You can update the global plugin-cfg.xml file using the administrative console or running the GenPluginCfg command for all of the clusters in a cell.
However, you must delete the config/cells/plugin-cfg.xml file before you update the global plugin-cfg.xml file. If you do not delete the config/cells/plugin-cfg.xml file, only the new properties and their values are added to the global plugin-cfg.xml file. Any updates to existing plug-in property values are not added to the global plugin-cfg.xml file.
An administrator installs IBM WebSphere Application Server and an HTTP server, but when configuring the environment, the administrator finds that the WebSphere Plug-in is missing.
Which tool can be used to fix this issue?
- A . Customization Tool Box
- B . IBM Installation Manager
- C . Profile Management Tool
- D . Integrated Solutions Console
B
Explanation:
In the WebSphere Integrated Solutions Console, the web server is represented as a specific server type, and you can view or modify all of the configuration properties used in the plugin-cfg.xml file for the web server plug-in from the WebSphere Integrated Solutions Console.
How can an administrator deploy or update an EAR, JAR, WAR, or SAR file to an application server or cluster in a development environment?
- A . Place the file in the monitored directory.
- B . Place the file in the operating system defined temporary directory.
- C . Place the file in the operating system defined user home directory for the user that owns the Java process.
- D . Email the file to wasadmin@hostname.com, where hotname.com is the host of the IBM WebSphere Application Server.
A
Explanation:
You can install an enterprise application file on an application server or cluster by dragging or copying an enterprise archive (EAR), web application archive (WAR), Java archive (JAR), or Session Initiation Protocol (SIP) archive (SAR) to a monitored directory.
An administrator notices that the Message Driven Beans (MDBs) are slow to complete, and decides to increase the ‘Maximum concurrent MDB invocations per endpoint’.
Which thread pool should be tuned to ensure it can run the maximum number of MDBs without waiting?
- A . Default
- B . WebContainer
- C . SIBJMSRAThreadPool
- D . WMQJCAResourceAdapter
C
Explanation:
The thread pool WMQJCAResourceAdapter is referenced by the WebSphere MQ (WMQ) resource adapter inbound delivery to MDB’s. When WebSphere MQ resource adapter is used in conjunction with the activation specs, the resource adapter’s Work Manager uses the values defined for the WMQJCAResourceAdapter for utilizing the total number of threads defined.
Ideally the default values provides for the WMQJCAResourceAdapter will be sufficient for the resource adapter. But in case there is an heavy load on the system processing huge number of messages, you can increase the maximum number of threads the thread pool can hold.
What does the CDcom.ibm.webshpere.alarmthreadmonitor.generate.javacore JVM argument do?
- A . Creates a javacore dump when a thread is hung
- B . Generates a Trace message that a javacore should be generated
- C . Generates a SystemOut message that a javacore should be generated
- D . Allows the administrator to choose whether or not to generate a javacore when a hang is detected
A
Explanation:
If you want to monitor the activity of threads on which system alarms execute, add the following JVM generic arguments to the server settings.
-Dcom.ibm.websphere.alarmthreadmonitor.generate.javacore
Set to any value to cause a javacore dump to be created when an hung system alarm thread is detected. The threads section of the javacore dump can be analyzed to determine what the reported thread and other related threads are doing.
What is one of the benefits of using a federated repository over a user registry?
- A . Does not support identity profiles
- B . Supports only one registry in a realm
- C . Supports multiple registries within a realm
- D . Provides account and password policy support
C
Explanation:
Federated repositories enable you to use multiple repositories with WebSphere® Application Server. These repositories, which can be file-based repositories, LDAP repositories, or a sub-tree of an LDAP repository, are defined and theoretically combined under a single realm. All of the user repositories that are configured under the federated repository functionality are invisible to WebSphere Application Server.
Which statement describes the capabilities of the deployment manager?
- A . Logical grouping of application servers
- B . Created and installed when a node is federated into a cell
- C . Created automatically when an application server is federated into a cell
- D . Manages nodes, node agents, and the configuration repository for the cell
D
Explanation:
The deployment manager is an administration application that runs in a special application server, which is created when you install the WebSphere Application Server Network Deployment product or when you create a management profile using the deployment manager profile template.
When verbose Garbage Collection is enabled, in which file(s) does the operating system collect the data?
- A . trace.log
- B . activity.log
- C . SystemOut.log and SystemErr.log
- D . native_stdout.log and native_stderr.log
D
Explanation:
Depending on the operating system in use, the verboseGC output will be written to the following file by default:
AIX, Linux, or Windows: native_stderr.log
Solaris or HP-UX native_stdout.log
When setting up high availability settings for the web server, at what level should an administrator configure the custom properties?
- A . cell
- B . node
- C . server
- D . nodeagent
Through what protocol can a Java client directly access EJBs running on an application server?
- A . JDBC
- B . RMI/IIOP
- C . SOAP/JMS
- D . SOAP/HTTP
B
Explanation:
Provided that it uses the correct protocols (SOAP, HTTP, WSDL), any web service client can access a stateless session bean, whether or not the client is written in the Java programming language. The client doesn’t even “know” what technology implements the service: stateless session bean, JAX-WS, or some other technology. In addition, enterprise beans and web components can be clients of web services. This flexibility enables you to integrate Java EE applications with web services.
What is a benefit of using the IBM Extended Cache Monitor?
- A . It invalidates cacheids.
- B . It displays the contents of the cache instances.
- C . It displays the contents of object cache instances.
- D . It displays the dependency ids of the cache instances.
C
Explanation:
The IBM Extended Cache Monitor for IBM WebSphere Application Server provides you with two functions that are not available with the cache monitor that is supplied with WebSphere Application Server. These two functions enable you to:
display the contents of object cache instances
display the Dynamic Cache mbean statistics for cache instances
Which two methods are used for communicating session linkages between the client and the server? (Choose two.)
- A . Cookies
- B . LTPA Token
- C . Rest Services
- D . URL Rewriting
- E . HTTP Response codes
AD
Explanation:
Representational State Transfer (REST) is a lightweight framework for designing applications that use HTTP to make calls. REST uses HTTP to perform the Create, Read, Update, and Delete (CRUD) operations between client and server. Applications interact with the services by using HTTP, POST, PUT, GET, and DELETE operations.
Which type of profile provides management capabilities for multiple stand-alone application servers?
- A . Custom
- B . Secure Proxy
- C . Administrative agent
- D . Deployment manager
C
Explanation:
You can use the following different configurations of the application server to combine the plug-in configuration files of multiple application server profiles into a single output file:
* Using multiple stand-alone base application server profiles with an administrative agent using the job manager. The job manager function is a part of WebSphere Application Server Network Deployment.
However, you can use the job manager function with stand-alone, base application server profiles. Use this topic to complete this configuration.
Etc.
An administrator wants to verify an IBM WebSphere Application Server installation by examining the installation’s directory structure. In this example, <WAS_installation_directory> indicates the installation’s root directory.
What is one directory tree structure that indicates a successful installation of the product files?
- A . <WAS_installation_directory>/web
- B . <WAS_installation_directory>/bin
- C . <WAS_installation_directory>/profiles
- D . <WAS_installation_directory>/installableApps
B
Explanation:
WebSphere Application Server Version 8.5.5 for Network Deployment:
/QIBM/UserData/WebSphere/AppServer/V85/ND/profiles/wp_profile/PortalServer
Which statement describes the functionality of web containers?
- A . Web containers forward EJB requests to the EJB container.
- B . Web containers process JSPs, servlets, and various server-side objects.
- C . Servlets requests are forwarded from an EJB container to a web container.
- D . Each application server can contain multiple web containers, depending upon the number of JSPs and servlets.
B
Explanation:
The runtime environment for Web components is called the Web container. It processes servlets, JSP files, and other types of server-side components.
Which of the following is required for Secure Sockets Layer (SSL) enablement within an HTTP server?
- A . A JDK
- B . A valid, issued certificate
- C . IPv6 (Internet Protocol Version 6)
- D . Updating the https.conf file and not the httpd.conf file
B
Explanation:
The iKeyman GUI, which is included within the IBM HTTP Server distribution, can be used to create a key database file (for example: key.kdb) needed to store personal server certificates required by the client browser during an SSL handshake.
What data source property can an administrator configure to minimize the chances of encountering StaleConnectionExceptions?
- A . Minimum connections = 0
- B . Reap Timeout < Unused Timeout
- C . Purge Policy = FailingConnectionOnly
- D . Unused Timeout > Half firewall timeout
C
Explanation:
The configuration options below help minimize the chances of encountering StaleConnectionExceptions by helping to ensure that your WebSphere Application Server maintains control of database connections, specifically, the only one closing them, rather than other components in your network:
The datasource MIN connections should be set to 0. By setting a MIN > 0, you are telling the application server that this number of connections will be valid for the life of the application server JVM. Unless you can guarantee the MIN number of connections will never be timed out or dropped, setting a MIN will cause a StaleConnectionException when the connection becomes invalid.
Which is true about software repositories for IBM Installation Manager?
- A . Repositories must be local.
- B . Repositories must be online.
- C . Repositories can be either local or online.
- D . Repositories are only in the media package.
C
Explanation:
IBM Installation Manager is a single installation program that can use remote or local software repositories to install, modify, or update certain IBM products. It determines and shows available packages, checks prerequisites and interdependencies, and installs or modifies the selected packages. You also use IBM Installation Manager to uninstall the packages that it installed.
What is one way to determine if administrative security for IBM WebSphere Application Server is disabled when logging into the Integrated Solutions Console?
- A . A user is not forced to use HTTPS (SSL).
- B . An administrator is allowed to type any random password.
- C . An administrator is prompted for user name, but not password.
- D . When the username wasadmin is used to log in, the password used is the default “password”.
C
Explanation:
Congratulations! You have successfully manually disabled Global Security for your IBM WebSphere Application Server instance. You should now be able to access the WAS Integrated Solutions Console (ISC) without having to specify a password.
An administrator needs to resolve port conflicts after creating a managed node using the Profile Management Tool.
Which supported method can be used to resolve the port conflicts?
- A . Edit serverindex.xml.
- B . Use updatePorts.ant.
- C . Use Profile Port Checker tool and set ports.
- D . Use manageProfile tool and set port range on the profile.
B
Explanation:
If you discover ports conflicts, then you can reassign ports manually. To reassign ports, run the updatePorts.ant file by using the ws_ant script.
A system administrator has just enabled HPEL in the environment.
How can the administrator examine the logged data?
- A . Use the ViewLog command.
- B . Use the administrative console.
- C . Use a text editor to open the systemOut.log file.
- D . Use the IBM Support Assistant to analyze the text log.
A
Explanation:
High Performance Extensible Logging (HPEL) is a log and trace facility that is provided as a part of WebSphere® Application Server. HPEL provides a log data repository, a trace data repository, and a text log file.
The HPEL LogViewer is an easy-to-use, command-line tool provided for HPEL users to work with the log data and trace data repositories.
Use the following command to view the full contents of your log and trace repositories:
[Windows] (Windows) logViewer.bat
[AIX HP-UX Solaris] (Unix- full profile) logViewer.sh
[AIX HP-UX Solaris] (Unix- Liberty profile) logViewer
How can an administrator configure Web services security?
- A . Customize WS-Security policy set and bindings and attach to Web services.
- B . Configure global security with LDAP authentication and map the configuration to Web services.
- C . Request application developer to use Web Services Security API to achieve Web services security.
- D . Enable the Web Services Metadata Exchange (WS-MetadataExchange) protocol to enable message-level security.
A
Explanation:
The Web Services Security specification provides a flexible framework for building secure web services to implement message content integrity and confidentiality. The Web Services Security service programming model supports this flexible framework by providing extension points to integrate new token formats, and methods to obtains keys needed for message protection. The application server programming model provides Web Services Security programming application programming interfaces (WSS API) for securing SOAP messages.
Note: WS-Security is a message-level standard that is based on securing SOAP messages through XML digital signature, confidentiality through XML encryption, and credential propagation through security tokens. The Web services security specification defines the facilities for protecting the integrity and confidentiality of a message and provides mechanisms for associating security-related claims with the message.
When installing a new application to IBM WebSphere Application Server, which location is valid for the application file?
- A . Client Machine
- B . Managed Node
- C . Unmanaged Node
- D . Remote Web Server
B
Explanation:
Configuration file location during application installation
Several things occur upon installation of an application onto WebSphere Application Server:
Note: A node is a logical grouping of managed servers. Nodes can be managed or unmanaged. An unmanaged node does not have a node agent or administrative agent to manage its servers, whereas a managed node does. Both application servers and supported web servers can be on unmanaged or managed nodes.
An administrator is using the Guided Troubleshooter in the IBM Support Assistant to troubleshoot IBM WebSphere Application Server issues. After going through data collection and analysis, no reliable solution is found.
What is the administrator’s best next step?
- A . Call in a new PMR with IBM and upload Troubleshooter data to ECuREP.
- B . Open a new PMR with IBM and upload SystemOut.log from the IBM WebSphere Application Server.
- C . Submit results to the IBM WebSphere Application Server forum for a quick response from other forum users.
- D . Use the Guided Troubleshooter to open a service request with IBM, so all the troubleshooting data analyzed so far is uploaded automatically.
When installing IBM WebSphere Application Server on a network file system, IBM Installation Manager fails with an insufficient disk space error.
How could this be resolved?
- A . Increase disk space and try again.
- B . Delete temporary files and try again.
- C . Reboot operating system and try again.
- D . Disable disk space checking in the config.ini and try again.
D
Explanation:
On some network file systems, disk space might not be reported correctly at times; and you might need to bypass disk-space checking and proceed with your installation.
To disable disk-space checking, specify the following system property in the config.ini file in IM_install_root/eclipse/configuration and restart Installation Manager.
Which of the following is true about certificate expiration monitoring?
- A . Must be run manually.
- B . Must be run on the deployment manager.
- C . Deletes the certificates after they are expired, but does not replace them.
- D . Can replace expired certificates or certificates in the expiration threshold with a new certificate
B
Explanation:
Certificate monitor configuration settings can be configured on the administrative console by selecting Security > SSL certificate and key management > Manage certificate expiration. . On the Manage certificate expiration panel, you can perform the following functions.
Etc.
Which of the following is true regarding disk offload?
- A . The amount of disk space to use cannot be specified.
- B . On server startup, DynaCache loads the entire disk cache into memory.
- C . The number of cache entries that are offloaded to disk cannot be specified.
- D . Disk offload can be enabled to have a cache entry copied to the file system at a configurable location.
A,C,D
Explanation:
AC: Before you enable disk offload, consider the following:
You cannot specify the number of cache entries that are offloaded to disk.
You cannot specify the amount of disk space to use.
D: You can enable disk offload to have a cache entry copied to the file system (the location is configurable).
Which is true when an administrator properly updates a single file within an application?
- A . The administrator can use a partial application update.
- B . The administrator must redeploy the full application file.
- C . The administrator can manually update the file on the file system.
- D . The administrator must uninstall the application, and then, reinstall with the updated application file.
How can the administrator change the console session expiration for the Integrated Solutions Console?
- A . Modify timeout value and run the timeout.jacl script.
- B . Set the timeout value in the Console Preferences panel.
- C . Use the settimeout wsadmin command and specify the value.
- D . Set the ConnectionResponseTimeout value in the Integrated Solutions Console.
A
Explanation:
Change the <timeout value> on the two lines of the timeout.jacl script to the new session expiration value. This number specifies the number of minutes the console preserves the session during inactivity.
Which of the following statements is true regarding the relationship of nodes and node groups?
- A . Nodes can belong to only one node group.
- B . Nodes managed by a node group cannot be deleted.
- C . All nodes are initially not associated with a node group.
- D . All nodes are initially associated with a default node group.
D
Explanation:
D: a node must be a member of a node group. Initially, all Application Server nodes are members of the default DefaultNodeGroup node group.
Note: A node group is a collection of managed nodes.
In addition to logging changes, what can Cross Component Trace capture?
- A . The user agent of the browser that has initiated the request.
- B . The last time that the component was updated by a code deploy.
- C . The time that the component was started in the application server.
- D . Data snapshots that store entire request and response bodies on the file system.
D
Explanation:
Cross Component Trace (XCT) annotates the logs so that log entries that are related to a request that is serviced by more than one thread, process, or even server are identified as belonging to the same unit of work.
XCT log records are typically added to the logs to:
Which type of fix would typically be downloaded to address a specific problem?
- A . Interim fix
- B . Cumulative fix
- C . Product fix pack
- D . Cumulative interim fix
A
Explanation:
A WebSphere Commerce interim fix (iFix) is a software patch that contains fixes for one or more APARs. A WebSphere Commerce cumulative iFix is a comprehensive collection of interim fixes for a specific release. Both types of fixes are installed with the WebSphere Commerce Update Installer (UPDI).
Note: An Authorized Program Analysis Report, or APAR, is a formal report from IBM development to customers that have notified IBM of a problem or suspected defect. If IBM development is able to confirm the existence of the issue they will create an APAR with any known work around and perhaps an indication of which future release, if any, of the IBM program they intend to target for a formal fix to the defect and whether or not a Program Temporary Fix (PTF) is planned. The APAR will then be published so that it is visible to supported customers.
What determines which On Demand Routers (ODRs) a Web server forwards requests to?
- A . The default order in the ODR_Module_Routing_Poilicy.xml.
- B . The configuration scope determines which ODRs are included in httpd.conf.
- C . The configuration scope determines which ODRs are included in plugin-cfg.xml.
- D . The configuration scope determines which ODRs are included in HTTPplugin-cfg.xml.
C
Explanation:
In a topology with a web server which forwards requests to an on demand router (ODR), the ODR can be set to dynamically generate and update the web server plug-in configuration file plugin-cfg.xml. By configuring an ODR to dynamically update plugin-cfg.xml, you avoid manually updating the file during administrative actions, which can affect the content.
When enabling SSL directives in the IBM HTTP Server configuration file, which parameter is required?
- A . The name of the key file
- B . The AllowOverride statement
- C . The IP address of the VirtualHost
- D . The DocumentRoot directory path
A
Explanation:
Enable SSL and define a key file to use. Uncomment the following lines to enable SSL and define a key file to use:
Which of the following is a prerequisite for configuring single sign-on for authentication using LTPA cookies?
- A . All server must use the same IBM HTTP Server.
- B . All servers must be configured as part of the same DNS domain.
- C . All servers must use an IBM Domino Directory that is configured for LDAP access.
- D . All servers must be managed by the same IBM WebSphere Application Server Deployment Manager.
B
Explanation:
To take advantage of support for SSO between WebSphere Application Servers or between WebSphere Application Server and a Domino server, applications must meet the following prerequisites and conditions:
* Verify that all servers are configured as part of the same DNS domain.
* Etc.
To write a Jython script to stop a running application server, an administrator should use which administrative object?
- A . AdminApp
- B . AdminTask
- C . AdminConfig
- D . AdminControl
D
Explanation:
You can use the wsadmin tool to stop applications.
There are two ways to complete this task. Firstly, you can use the AdminControl object to stop the application. Alternatively, you can use the scripts in the AdminApplication script library to start, stop, and administer your application configurations.
Which of the following can be queried to get PMI data?
- A . Server Cell
- B . JMX Connectors
- C . MBean ObjectNames
- D . Application ServerNames
B
Explanation:
PMI data can be gathered from the J2EE managed object MBeans or the WebSphere Application Server PMI Perf MBean.
What is the main difference between interim fixes and product fix packs as they relate to IBM WebSphere Application Server?
- A . Interim fixes typically contain new features or functionality ahead of future product fix packs.
- B . Product fix packs are a combination of interim fixes and internal fixes to make patching easier.
- C . Product fix packs are generally reserved for new features or functionality whereas interim fixes are provided only to fix known issues.
- D . Product fix packs bring WebSphere Application Server to a new product level whereas interim fixes provide corrective service for specific known problems.
D
Explanation:
Product fix packs contain bundled service to bring WebSphere Application Server up to a new product level. Interim fixes provide corrective service for specific known problems.
Which statement is true about a request made from a browser for a jsp running in an application server?
- A . The HTTP server plug-in loaded with the embedded HTTP server within the application server forwards the request to the application server.
- B . The plug-in configuration file loaded with the embedded HTTP server within the application server forwards the request to the application server.
- C . The HTTP server plug-in loaded with the HTTP server forwards the request to the embedded HTTP server within the application server. The embedded server forwards the request into the web container.
- D . The plug-in configuration file loaded with the HTTP server forwards the request to the embedded HTTP server within the application server. The embedded server forwards the request into the web container.
C
Explanation:
When IBM HTTP Server receives a request for a JSP file, it passes the request to WebSphere Application Server – Express’s servlet engine, which calls the JSP processor. The JSP processor is an internal servlet which converts a JSP file into Java source code and compiles it. The servlet that implements the JSP processor is org.apache.jasper.runtime.JspServlet.
An administrator would like to uninstall an instance of a multiple instance installation via response file.
How does the administrator ensure that the correct instance is uninstalled?
- A . All the features must be listed.
- B . The profile ID must point to the correct instance.
- C . The offering ID must point to the correct instance.
- D . The repository location must point to the correct instance.