12/23/08

activity.log

The application server creates the activity.log file from the activity of the various WebSphere Application Server components. you cannot read this log with a text reader. You ca use this script called, showlog under appserver root.
Ex.,
./WAS_INST_ROOT/bin/showlog PATH_TOACTIVITY_LOG/activity.log
like this
websphe: /software/opt/IBM/WebSphere/AppServer/bin
$ ./showlog ../profiles/AppSrv*/logs/activity.log
This displays ur activity log something like this, just as a sample:
ExtendedMessage:
---------------------------------------------------------------
ComponentId: Application Server
ProcessId: 18124
ThreadId: 0000005d
ThreadName: WebContainer : 4
SourceId: com.ibm.ws.webcontainer.srt.SRTServletResponse
ClassName:
MethodName:
Manufacturer: IBM
Product: WebSphere
Version: Platform 6.0 [BASE 6.0.2.0 o0526.07]
ServerName: Node01Cell\Node01\server1
TimeStamp: 2008-12-22 12:27:17.175000000
UnitOfWork:
Severity: 2
Category: WARNING
PrimaryMessage: WARNING: Cannot set status. Response already committed

12/2/08

How can we configure Remote Plugin?

This is the procedure
Machine A: WAS
Machine B: IHS
Thumb Rule: Install Plugins on IHS Machine and propagrate them to WAS.
Procedure
Machine A : Install WAS.
Machine B: Install IHS
Machine B : Install Plugins: In the installation process, you have to select remote WAS, and name for ur webserverconfig, say webserver1. After installation, in the IHS_INST/conf/httpd.conf check for IBM Module entry and Plugin installation paths
Goto the plugin installation path/bin
Check for configurewebserver1.sh/bat
Now,
Copy that file, configurewebserver1.sh/bat to WAS box, that is Machine A. The file contains this info.
./wsadmin.sh -f configureWebserverDefinition.jacl webserver1 IHS '/software/IBM/IHS' '
/software/IBM/IHS/conf/httpd.conf' 7700 MAP_ALL '/software/IBM/Plugins' unmanage
d webserver1 hostname solaris
(This is an example, 7700 is port number.)
If you already have enabled global security on WAS, you need to add -username adminusername and -password hispassword at the end of the above script.

Then run the script.

Which creates a WebServer definition in the AppServer.

U need to configure WAS to remote admin WebServer.

Click Here to Download

configuration change when fedarated

1. what are all configuration files got changed when we add a node into cell?

When you federate, dmgr takes control of ur federated node. so, it copys DMGRCell into ur node, and pushes ur node info into dmgrcell.

2. What are server.xml and serverindex.xml?

Server.xml is an xml file :). Which contains the information needed for your JVM, like, ur jvm name, clustername, services, properties, threadpoolsettings, process definitions, components and so on
serverindex.xml :
This is the file whoch holds : host name info, deployed application info, ur app server ports info, etc

3. what is FFDC?

FFDC - First Failure Data Capture.
WebSphere Application Server V6 includes a feature called First Failure Data
Capture (FFDC). The FFDC feature runs in the background and collects events
and errors that occur during WebSphere Application Server runtime. The
information that it collects are written to log files in the
/profiles//logs/ffdc directory.

11/10/08

Maintenance Packs Info

How to check for interim packs, APARs covered in installated Fix Packs or Refresh Packs?
WAS_INST_ROOT/properties/version/update/backup
This the place holder for all the fix packs, interim fix packs if u have install them seperately, refresh packs and so on.
Here you see the following files along with .pak files
update.status.xml
maintenanceStack.xml
maintenanceHistory.xml
If you are looking for a specific APAR, The best way to do it is
grep for that apar in this file maintenanceHistory.xml.
maintenanceStack.xml lists all the apars.

9/26/08

truss

truss is a command to trace system calls and signals

SYNOPSIS
truss [-fcaeildDE] [- [tTvx] [!] syscall ,...]
[- [sS] [!] signal ,...] [- [mM] [!] fault ,...]
[- [rw] [!] fd ,...]
[- [uU] [!] lib ,... : [:] [!] func ,...]
[-o outfile] command | -p pid[/lwps]...

DESCRIPTION
The truss utility executes the specified command and produces a trace ofthe system calls it performs, the signals it receives, and the machine faults it incurs. Each line of the trace output reports either the fault or signal name or the system call name with its arguments and return value(s).
System call arguments are displayed symbolically when possible using defines from relevant system headers. For any path name pointer argument, the pointed-to string is displayed.
Error returns are reported using the error code names described in intro(3). If, in the case of an error, the kernel reports a missing privilege, a privilege name as described in privileges(5) is reported in square brackets ([
]) after the error code name.
Optionally (see the -u option), truss also produce an entry/exit trace of user-level function calls executed by the traced process, indented to indicate nesting.

Why to know about truss?

In the day today admin job, you may want to see what a process is doing? or you may want to check an installation process. Or ur installation process is failing, you want check whats going on. You use truss in such conditions.

Some examples:

truss -p pid
gives you that specific pids systemcalls
$ truss -p 883
/14: lwp_cond_wait(0x0193BFF8, 0x0193BFE0, 0xD287F710, 0) Err#62 ETIME
/14: lwp_cond_broadcast(0x016BA688) = 0
/14: lwp_cond_broadcast(0x01299A98) = 0
/205: lwp_cond_wait(0x016BA688, 0x016BA670, 0xD187F748, 0) = 0
/205: lwp_cond_broadcast(0x0193BFF8) = 0
/14: lwp_cond_wait(0x0193BFF8, 0x0193BFE0, 0x00000000, 0) = 0
/205: lwp_mutex_wakeup(0x0193BFE0) = 0
/14: lwp_mutex_timedlock(0x0193BFE0, 0x00000000) = 0
/205: lwp_mutex_wakeup(0x000F8AD8) = 0
/14: lwp_mutex_timedlock(0x000F8AD8, 0x00000000) = 0
/14: lwp_cond_broadcast(0x000D2E80) = 0
/205: stat64("/software/IBM/WebSphere/AppServer/profiles/AppSrv01/installedApps/hornblowerNode01Cell/FRPApp.ear/FRPApp-WebModule.war/WEB-INF/classes/us/ny/state/oag/model/OrganizationDetail.class", 0xD187F628) = 0

883 is a WebSphere pid.

$ truss -o example.out -p 883
truss traces pid 883 and outputs to example.out

$truss -o example.out install.sh
install.sh is an installer of a software. truss traces the installation process's system calls and outputs to example.out

9/18/08

find, grep

find:
NAME
find - find files
SYNOPSIS
/usr/bin/find [-H -L] path... expression
/usr/xpg4/bin/find [-H -L] path... expression
DESCRIPTION
The find utility recursively descends the directory hierar- chy for each path seeking files that match a Boolean expres- sion written in the primaries given below.
find is able to descend to arbitrary depths in a file hierarchy and does not fail due to path length limitations (unless a path operand specified by the application exceeds PATH_MAX requirements).

Examples :
find . -name "bla.log" -print
This command will search in the current directory and all sub directories for a file named bla.log.
Note: The -print option will print out the path of any file that is found with that name. In general -print wil print out the path of any file that meets the find criteria.

find /usr/src -not \( -name "*,v" -o -name ".*,v" \) '{}' \; -print
This command will search in the /usr/src directory and all sub directories. All files that are of the form '*,v' and '.*,v' are excluded. Important arguments to note are:
-not means the negation of the expression that follows
\( means the start of a complex expression.
\) means the end of a complex expression.
-o means a logical or of a complex expression. In this case the complex expression is all files like '*,v' or '.*,v'
find . -exec grep "size" '{}' \; -print
This command will search in the current directory and all sub directories. All files that contain the string will have their path printed to standard output.
grep:

NAME
grep - search a file for a pattern
SYNOPSIS
/usr/bin/grep [-bchilnsvw] limited-regular-expression [filename...]
/usr/xpg4/bin/grep [-E -F] [-c -l -q] [-bhinsvwx] -e pattern_list... [-f pattern_file]... [file...]
/usr/xpg4/bin/grep [-E -F] [-c -l -q] [-bhinsvwx] [-e pattern_list...] -f pattern_file... [file...]
/usr/xpg4/bin/grep [-E -F] [-c -l -q] [-bhinsvwx] pattern [file...]
DESCRIPTION
The grep utility searches text files for a pattern and prints all lines that contain that pattern. It uses a com- pact non-deterministic algorithm.
Be careful using the characters $, *, [, ^, , (, ), and \ in the pattern_list because they are also meaningful to the shell. It is safest to enclose the entire pattern_list in single quotes '...'.
If no files are specified, grep assumes standard input. Nor- mally, each line found is copied to standard output. The file name is printed before each line found if there is more than one input file.
/usr/bin/grep The /usr/bin/grep utility uses limited regular expressions like those described on the regexp(5) manual page to match the patterns.
/usr/xpg4/bin/grep The options -E and -F affect the way /usr/xpg4/bin/grep interprets pattern_list. If -E is specified, /usr/xpg4/bin/grep interprets pattern_list as a full regular expression (see -E for description). If -F is specified, grep interprets pattern_list as a fixed string. If neither are specified, grep interprets pattern_list as a basic regular expression as described on regex(5) manual page.

Example:
U want to find a string "size" in a folder and in its subfloders. This is the example
grep -i size `find . name *.* -print`

Grep can be used in so many ways and for so many reasons.
If I want to check the java processes
ps -ef grep java
If I want to check java processes owned by a particular user
ps -ef grep java grep websphe

If I want to check network statistics and specifically for a specific host
netstat -a grep hostname
..
netstat -a grep 8080

and so on.

9/9/08

cp

U might know this
But, just FYI

If you want to copy a file in UNIX, cp is the command
man cp gives the following info.
cp - copy files

SYNOPSIS /usr/bin/cp [-fip@] source_file target_file
/usr/bin/cp [-fip@] source_file... target
/usr/bin/cp -r -R [-H -L -P] [-fip@] source_dir... target
/usr/xpg4/bin/cp [-fip@] source_file target_file
/usr/xpg4/bin/cp [-fip@] source_file... target
/usr/xpg4/bin/cp -r -R [-H -L -P] [-fip@] source_dir... target


Usage Example:

$ mkdir testcp
$ mkdir testcpdest
$ cd testcp
$ touch x1.txt
$ cd ..
$ cp -r testcp testcpdest

I made a dir called testcp (which is the source dir)
I made another dir called testcpdest (destination dir)
I have touched a file x1.txt in testcp
I have copied testcp to testcpdest with files using cp -r meaning copy recursively.

Another ex.,
I have a file like this
-rw-r--r-- 1 websphe websphe 13593 Mar 18 11:53 n1.log
I want to cp it to n2.log with the same time stamp and same uid,gid permissions. This is the way
cp -p n1.log n2.log
n2.log will have same time stamp and other info as n1.log
-rw-r--r-- 1 websphe websphe 13593 Mar 18 11:53 n2.log
-rw-r--r-- 1 websphe websphe 13593 Mar 18 11:53 n1.log

8/5/08

umask

umask stands for user file creation mode mask.
777 stands for rwxrwxrwx. first set of rwx is for user, second set of rwx for group and last set is for others. to know what umask u have, at the prompt type umask, which will return a value, say 022.
What does that mean o22?
Its simple.
777-022=755.
umask 022 = rwxr-xr-x, meaning, user has all permissions, group has read and execute, others have read and execute.
To understand umask in permissions mode try this command, umask -S
for example
$ umask
022
$ umask -S
u=rwx,g=rx,o=rx

3/19/08

Another Practise Test 252

1. A developer at a customer site asks the system administrator to help setup IBM Rational Application Developer (IRAD) to debug the application. The system administrator must make sure the developer has the correct remote JVM debug port configured. Which of the following is the default remote JVM debug port?
A. 7777
B. 8888
C. 9060
D. 9080

A

2. A system administrator is asked to help explain why a NameNotFoundException is happening while attempting to access an enterprise bean, data source, messaging resource, or other resource. What action would be the LEAST useful to do to explain the problem?
A. Browse the properties of the target object in the administrative console, and verify that the JNDI name it specifies matches the JNDI name the client is using.
B. Browse the properties of the target object in its deployment descriptor, and verify that the JNDI name it specifies matches the JNDI name the client is using.
C. Determine if the object being looked up resides on a server different from the one from which the initial context was obtained since, in this case, the fully qualified name must be used.
D. Use the showNameSpace utility to export the entire JNDI tree to determine if the desired resource is listed.

C
Correct : A

3. A system administrator is asked to configure the JVM log files for log file rollover. Which parameters can be configured to control log file rollover?
A. By file size and/or time
B. By the number or Fatal errors and/or by file size and/or time
C. By file size and/or by time and/or by wsadmin command
D. By file size only

A

4. A systems manager is creating a new virtual host that will be used in a clustered environment. After building the virtual host, the system administrator knows that if the new virtual host is to operate properly in a clustered environment, it is very important to:
A. Set the DNS alias to the TCP/IP host name and port number for servlet requests.
B. Register all host aliases used by servers in the cluster in the virtual host.
C.
map the correct Multi-Purpose Internet Mail Extensions (MIME) to the cluster members in the virtual host.
D.
map Web modules to the new virtual host

B
I think A is correct

5. A system administrator is designing a connection between a Service Integration Bus (SIB) and a WebSphere Message Queue (MQ) manager. The system administrator wants the design to incorporate the following topologies. All of the following are correct EXCEPT:
A. design the WebSphere message queue to coexist on the same machine as the WebSphere default-messaging provider.
B. design the messaging engine to participate in a WebSphere MQ cluster.
C. design the messaging engine to look like another queue manager to WebSphere MQ.
D. design WebSphere applications to send messages directly to WebSphere MQ and destinations on the SIB.

C

6. A system administrator needs to check the state of an enterprise application within a federated cell. The system administrator can connect using either the administrative console or wsadmin to which of the following components?

A. Application server
B. JMS Server
C. Deployment manager
D. Node agent

C

7. After changing the JNDI name of a datasource, what must be changed within an application using this datasource to keep them running correctly?

A. The reference to resource mappings.
B. The EJB references to match the new JNDI name.
C. The name of the JDBC provider to match the new datasorce name.
D. The datasources.xml file for the application.

B

8. What is the significance of the vpd.properties file in the WebSphere Application Server V6 Network Deployment package?

A. It contains information of usernames and passwords that can install, operate and deploy applications on the application server(s).
B. It contains information about previous installations of WebSphere Application Server products and helps installation program to control options for new installations.
C. It contains the port numbers to be assigned by the installation program during the new install.
D. It contains the list of applications including date and time stamps and user that installed the application.

B

9. A system administrator has configured the Web Container thread pool with the "Allow thread allocation beyond maximum thread size" option enabled (checked). What is the MOST significant performance implication of this configuration setting?

A. It will allow the system to scale well and eliminate any bottlenecks
B. It could allow unexpectedly high load into the system possibly rendering the system unusable
C. It can cause timeouts in the plugin
D. It can cause thrashing

B

10. A system administrator requires that an EJB JAR file be part of two Enterprise Application Archive (EAR) files. How can this be BEST accomplished using the Application Server Toolkit (AST)?

A. Use the JDK's JAR utility to include the WAR file in the EAR files.
B. Use the Application Deployment Descriptor editor to add the EJB module to each of the applications.
C. Open the Properties dialog for the EJB project and select the applications in the Project References dialog.
D. Open the Properties dialog for both Enterprise Application projects and select the EJB module in the Project References dialog.

D

11. Application code can write messages to a server's SystemOut and SystemErr log files. All of the following configurations are valid for application code log messages EXCEPT:

A. application log messages can be excluded or included entirely.
B. application log messages can be formatted like WebSphere Application Server system messages.
C. application log messages can be excluded from either SystemErr.log or SystemOut.log individually.
D. application log messages can not be formatted like WebSphere Application Server system messages.

D

12. A system administrator created an application server profile using the profile creation wizard. The system administrator then ran the Installation Verification program (IVT) immediately after creating it to verify the creation. Which of the following will indicate the appropriate behavior of the IVT program after its invocation?

A. IVT will fail as application server (server1) was not started after profile creation.
B. IVT verifies the log files for accuracy and does not need to be connected to the application server (server1).
C. IVT will start the application server (server1) if it was not already started and verifies the installation.
D. IVT will verify by connecting to the application server (server1) that was started by the profile creation wizard after its creation.

C

13. A backup configuration was created using the backupConfig command. The configuration must now be restored. Which of the following commands should be used to avoid stopping the server before restoring the configuration?


A. restoreConfig
B. restoreConfig -nostop
C. restoreConfig -nowait
D. restoreConfig -safeMode

C

14. A system administrator wants to be sure that seven days of SystemOut.log information are available on the local server's disk. What is the easiest way to ensure this will happen using the Log File rotation?


A. Set the "Maximum Size" option to 1 week.
B. Set the "Start Time" option to Sunday and the "Maximum Number of Historical Log Files" to 1.
C. Set the "Maximum Number of Historical Log Files" to 7 and the Time options to Start Time to 1 and Repeat Time to 24.
D. Set the "Maximum Log Files" option to 7.

C

15. A system administrator would like to deploy an enterprise application running on WebSphere that exchanges messages with a WebSphere MQ based application. What J2EE messaging provider would be the BEST fit?


A. The WebSphere V5 messaging provider
B. The Default messaging provider
C. The generic JMS Provider
D. The Embedded JMS Provider

C

16. A system administrator is asked to help diagnose some application problems. The system administrator considers asking for the log messages to be logged in the Advanced Format. Why might this help the system administrator to diagnose the problem?

A. The exact line of code where an exception occurred will be decompiled and shown as part of the message.
B. The JVM heap metrics at the time of the error will be included in the message.
C. Information about an event, when possible, will be added to the message.
D. Information about the distributed transaction will be included.

C

17. A system administrator has federated a node while creating the custom profile with the profile creation wizard. The system administrator does not see the entries for that node using the deployment manager administrative console. Which log file will give more information about the problem?

A. addNode.log under \logs directory
B. addNode.log under \logs directory
C. federate.log under \logs directory
D. federate.log under \logs directory

A

18. Cluster creation requires the system administrator to specify the weight for a cluster member. This weight is significant because it is used in the WebSphere WLM runtime by the:

A. Random scheduling algorithm
B. Round Robin scheduling algorithm
C. Both Random and Round Robin scheduling algorithm
D. Weighted Random algorithm

B

19. While performing a node federation, the addNode operation failed. From the following list of options, what would MOST likely induce this failure?

A. The cell already exists
B. The cell's deployment manager is running before the addNode command was run
C. The name of the new node is not unique in the cell
D. The addNode did not specify to carry over the applications

C

20. Immediately following federation, the process started by the custom profile is the:

A. Deployment manager
B. Application server
C. Nodeagent
D. Web server

C

20. Which of the following is the MOST accurate description of how the "Single" application class loader policy functions?


A. A single application class loader is used to load all EJBs, utility JARs, and shared libraries within the application server JVM.
B. An application class loader first delegates the loading of classes to its parent class loader before attempting to load the class from its local class path.
C. The class loader attempts to load classes from its local class path before delegating the class loading to its parent.
D. A single application class loader is used to load only the utility JARs and Web modules within the application server JVM.

A

21. After federating a custom node, an examination of the entries in a log file shows an "INSTCONFFAIL" indicator which denotes a complete failure. All of the following can be contributors to the failure EXCEPT:

A. the deployment manager is not running.
B. the node agent failed to start.
C. security was enabled.
D. a reserved name was used for the node name.

C

22. A system administrator has received an EAR file from the development team. The system administrator has been asked to install it into an application server. The system administrator has been told that there are some J2EE security roles defined within the EAR that need to be mapped to users and groups within the defined user registry. All of the following can be used to map users and groups to J2EE security roles EXCEPT:

A. during initial installation of an Enterprise Application using the administrative console.
B. after the Enterprise Application has already been installed through the administrative console.
C. after the Enterprise Application has already been installed through wsadmin.
D. while installing the Enterprise Application by editting the was.policy file.

D

23. An administrator is configuring the Message Driven Bean (MDB) activation specification to service a queue. Which of the following properties is required when setting up a queue?

A. destinationType
B. messageSelector
C. acknowledgeMode
D. subscriptionDurability

B

24. When using local session management, which of the following configuration settings could cause the loss of user session objects?

A. If HTTP Persistence connections are not used
B. If the Allow overflow property setting is not enabled
C. If Memory-to-memory replication is not configured
D. If the datasource used by the session database is not defined

C

25. During a WebSphere V6 Network Deployment installation, the system administrator did not select to install "Application Server Samples". Later, the system administrator decided to install "Application Server Samples". Which of the following steps are required to complete this installation?

A. Connect to the admin console. Navigate to Applications -> Enterprise Applications and click on 'Install' tab. Provide sampleapp.ear under samples directory.
B. Start the installation wizard. Select "Add features to the existing copy of the V6 Application Server product". Choose "Application Server Samples" option during the installation.
C. Start the installation wizard. Select "Add features to the existing copy of the V6 Application Server product". Choose "Application Server Samples" option during the installation. Run "install.bat" under samples\bin directory to deploy sample applications.
D. Start the installation wizard. Select "Upgrade existing copy of the V6 Application Server product" and select "Network Deployment" option during the installation.

B

26. A system administrator has been assigned the task of defining a Custom User Registry for a federated cell. The administrative console will be used. All of the following entries are required in the process of configuring the Custom User Registry EXCEPT:

A. Server user ID
B. Server user password
C. Server host name
D. Custom registry implementation class name

C

27. Which of the following adjustments to the Web module parameter would result in improved response time for servlet clients?

A. Setting the distributable flag.
B. Setting the reload interval to 20 seconds or less.
C. Enabling load on startup.
D. Disabling load on startup.

B

28. A system administrator notices a number of "ConnectionWaitTimeoutException" exceptions associated with a datasource in the SystemOut.log file. Which of the following is the MOST likely cause of this error?

A. The Connection Timeout on the data source has been set to 0.
B. The number of physical connections to the database has reached the number of Maximum Connection as specified in the datasource settings.
C. The number of physical connections to the database has reached the number of Minimum Connection as specified in the Data source settings.
D. The database transaction isolation is set too high.

C

29. A J2EE enterprise application is being assembled to take advantage of J2EE security. During this process, there are a number of configurations and mappings that need to be made. Which of the following items can a method permission be mapped to?

A. Web resources
B. An EJB
C. A login mechanism
D. A security realm

B

30. A system administrator is setting up SSL communications between the plugin and the application server. A new keyring file is being used. Which of the following elements in the plugin-cfg.xml file would need to be defined?

A. The public key and the private key
B. The public key and the password file
C. The keyring file and the password file
D. The keyring file and the stashfile

D

31. A new JDBC provider is being created in a cell in which the servers run different operating systems. Which of the following scopes should be used?

A. Cluster scope
B. Server scope
C. Node scope
D. Cell scope

A

32. A system administrator has installed the Network Deployment Manager package and now wishes to build a clustered server environment using custom profiles. All of the following steps are necessary EXCEPT:

A. create a deployment manager profile.
B. accept default values, create one custom profile on each node on which application servers will be run.
C. federate each custom profile to the deployment manager.
D. create new application servers and clusters on the nodes from the administrative console.

B

33. A Java client is residing in a client container. The Java client needs to make a request to the EJB container of an application server in a distributed cell. Which of the following protocols is MOST appropriate for the client request?

A. JDBC
B. RMI/IIOP
C. SOAP
D. HTTP(S)

B

34. Which of the following sets of Web server plugin properties can be modified by using the administrative console's request routing configuration tab?

A. Caching policy and log level
B. Refresh interval and log file location
C. Enable/disable automatic plug-in propagation
D. Load balancing option and retry interval

D

35. How can a system administrator persist trace output that is written to the memory buffer of a running application server?

A. Configure the time interval and/or the memory buffer max size parameters so that if either is reached the memory buffer will be dumped into a file.
B. In the Admin Console, click "Troubleshooting -> Logs and Trace -> -> Diagnostic Trace" and then go to the Configuration tab and chose to Dump the memory buffer
C. In the Admin Console, click "Troubleshooting -> Logs and Trace -> -> Diagnostic Trace" and then go to the Runtime tab and chose to Dump the memory buffer
D. It is not possible to perform this task in a running application server.

C

36. An HTTP plug-in configuration file can be regenerated from the administrative console by selecting which of the following?

A. Servers->Web servers, select a Web server, and click Generate Plug-in
B. Servers->Application servers->server->Web container, and click Generate Plug-in
C. Environment->Update Web Server Plug-in, and click OK
D. Environment->Virtual Hosts, and click Generate Plug-in

A

37. Before enabling Global security, an administrator must first configure various security settings. All of the following steps are required to be configured before enabling global security, EXCEPT:

A. the default SSL keystore and truststore files.
B. a user registry.
C. the authentication mechanism.
D. the server user ID for the given user registry.

A

38. A system administrator wants to implement the Upstream Queuing model to improve performance. Which of the following adjustments MUST be made?

A. Set the all cluster members to have the same JVM heap size.
B. Tune each Web container to have a smaller queue than the Web server.
C. Tune the queues to decrease in size from the Web server to the backend resource.
D. Tune the queues to increase in size from the Web server to the backend resource.

B

39. In order to set up memory-to-memory replication in a WebSphere Application Server V6 clustered environment, which of the following should be created?

A. Replication Domain and specify cluster members to use this Replication Domain
B. Replication Domain on each cluster member and create partitions for each Replication Domain
C. Replication Domain and specify the cell associates with the Replication Domain
D. Replication partition and attach cluster to the partition

A

40. A system administrator received a message that the Installation Verification (IVT) failed after creating a profile using the profile creation wizard. Which log file(s) should the system administrator review to find out more information about the failure?


A. ivtClient.log under \logs
B. wasprofile_create_profileName.log under \logs\wasprofile directory
C. ivtlog.txt under \logs directory
D. installlog.txt under system temp directory

B

41. Java 2 security must be configured through the console. Which of the following administrative roles is the required minimum?

A. Administrator
B. Security
C. Configurator
D. Operator

C

42. A system administrator is called to suggest how to determine the cause of an application error. The system administrator recommends that the Log Analyzer be used over and above just reading the JVM logs because Log Analyzer can:

A. Show a series of errors as one unit of work.
B. Analyze the logs and pinpoint the root cause of an error and then suggest a fix.
C. Collate all logs from every system component and pinpoint the root cause of the error.
D. Dynamically monitor log files at runtime and send an alert when errors occur.

B

43. A system administrator was asked to develop artifacts specifically for the installation of a WebSphere Application Server V6 Network Deployment package. The system administrator also created an application server profile using silent installation scripts (response files). What approach will enable the system administrator to complete the task without using GUI based tools?

A. Create two response files where the first response file is used to install the product binaries and causes the second response file to be used for creating the application server profile.
B. Create a response file that installs product binaries and creates the application server profile.
C. Create a response file that installs product binaries and use profile creation wizard to create the application server profile.
D. Install product binaries using installation wizard and create a response file to create the application server profile.

A

44. The Servlet 2.4 specification requires that an HTTP session honor session affinity. In a clustered environment, a cluster member could possibly fail. Which of the following mechanisms is used to ensure session affinity?

A. Database session persistence
B. Memory-to-memory replication
C. Web Server plug-in
D. Replication Domain

D

45. Which of the following would have to be configured in order to implement memory-to-memory HTTP Session persistence?

A. The Data Replication Service and Web Container
B. EJB session beans and EJB Container
C. The HTTP Plug-in and Embedded HTTP Server
D. The JMS Server and Queue Manager

A

46. Which of the following statements is valid about the First Failure Data Capture (FFDC) tool?

A. The First Failure Data Capture tool does not affect the performance of the IBM WebSphere Application Server.
B. The First Failure Data Capture tool is only available in application servers that have been federated into a Network Deployment cluster.
C. The First Failure Data Capture tool is not compatible with J2EE 1.4.
D. The First Failure Data Capture tool is not available on all platforms.

A

47. Which of the following are used in order to administer the application server?

A. MBeans and XML files
B. A relational database repository and datasources
C. Security service and LDAP user registry
D. External HTTP server and HTTP server plugin

A

49. A WAR file in an enterprise application has been changed. How can a system administrator update it on the server with a minimal amount of work?

A. Re-package the EAR file using Application Server Toolkit then use the "Update -> Full application" function on the administrative console.
B. Use the "Update -> Single file" function of the Administrative console to replace the WAR file.
C. Use the "Update -> Single module" of the Administrative console to replace the WAR file.
D. Use the "Update -> Partial application" of the Administrative console to replace the WAR file.

C

50. A customer has configured an HTTP session via the Session Manager properties interface. The session is set to timeout in about 30 minutes. However, it typically takes more than 30 minutes and sometimes 35 minutes for a session to timeout. What is the MOST likely cause of the delay?

A. There is a bug in the Session Manager configuration.
B. The Least Recently used algorithm is slow.
C. The session invalidation process is running approximately every 5 minutes.
D. The session timeout is set too high.

C

51. A system administrator is adding a cluster member to an existing cluster. What is the minimum requirement for the cluster member to qualify for immediate addition to the cluster?

A. Any standalone application server qualifies if it is available on the network.
B. Any application server qualifies if it uses the same hardware and operating system as the other servers in the cell qualifies.
C. The new cluster member is part of a node in the cell, and belongs to the same node group and core group as other servers in the cluster.
D. The new cluster member must belong to a node in the same cell where the cluster is defined.

C

52. Assume that a load balancer and a Federated cell have been installed and are functional. All of the following contain built-in failover capabilities EXCEPT:

A. HTTP server
B. Deployment manager
C. Web container
D. EJB container

B

53. The Tivoli Performance Viewer can provide several summary reports to include performance statistics for various application and application server components. Which of the following lists contains the complete set of available summary reports?

A. EJBs, EJB Methods, Connection Pool, Thread Pool, J2C Container
B. Servlets, EJBs, HTTP plug-in, ORB plug-in, JVM
C. Servlets, EJBs, EJB Methods, Connection Pool, Thread Pool
D. Servlets, EJBs, Connection Pool, Thread Pool, Dynamic Cache

B

54. A security role has been mapped to the special group Everyone. What is the result of this action?

A. Every user defined for the group has access to the resource.
B. Everyone will be denied access to the resource.
C. Every user has access to the resource.
D. Anyone logged in has access to the resource.
a