A. 7777
B. 8888
C. 9060
D. 9080
A
2. A system administrator is asked to help explain why a NameNotFoundException is happening while attempting to access an enterprise bean, data source, messaging resource, or other resource. What action would be the LEAST useful to do to explain the problem?
A. Browse the properties of the target object in the administrative console, and verify that the JNDI name it specifies matches the JNDI name the client is using.
B. Browse the properties of the target object in its deployment descriptor, and verify that the JNDI name it specifies matches the JNDI name the client is using.
C. Determine if the object being looked up resides on a server different from the one from which the initial context was obtained since, in this case, the fully qualified name must be used.
D. Use the showNameSpace utility to export the entire JNDI tree to determine if the desired resource is listed.
C
Correct : A
3. A system administrator is asked to configure the JVM log files for log file rollover. Which parameters can be configured to control log file rollover?
A. By file size and/or time
B. By the number or Fatal errors and/or by file size and/or time
C. By file size and/or by time and/or by wsadmin command
D. By file size only
A
4. A systems manager is creating a new virtual host that will be used in a clustered environment. After building the virtual host, the system administrator knows that if the new virtual host is to operate properly in a clustered environment, it is very important to:
A. Set the DNS alias to the TCP/IP host name and port number for servlet requests.
B. Register all host aliases used by servers in the cluster in the virtual host.
C.
map the correct Multi-Purpose Internet Mail Extensions (MIME) to the cluster members in the virtual host.
D.
map Web modules to the new virtual host
B
I think A is correct
5. A system administrator is designing a connection between a Service Integration Bus (SIB) and a WebSphere Message Queue (MQ) manager. The system administrator wants the design to incorporate the following topologies. All of the following are correct EXCEPT:
A. design the WebSphere message queue to coexist on the same machine as the WebSphere default-messaging provider.
B. design the messaging engine to participate in a WebSphere MQ cluster.
C. design the messaging engine to look like another queue manager to WebSphere MQ.
D. design WebSphere applications to send messages directly to WebSphere MQ and destinations on the SIB.
C
6. A system administrator needs to check the state of an enterprise application within a federated cell. The system administrator can connect using either the administrative console or wsadmin to which of the following components?
A. Application server
B. JMS Server
C. Deployment manager
D. Node agent
C
7. After changing the JNDI name of a datasource, what must be changed within an application using this datasource to keep them running correctly?
A. The reference to resource mappings.
B. The EJB references to match the new JNDI name.
C. The name of the JDBC provider to match the new datasorce name.
D. The datasources.xml file for the application.
B
8. What is the significance of the vpd.properties file in the WebSphere Application Server V6 Network Deployment package?
A. It contains information of usernames and passwords that can install, operate and deploy applications on the application server(s).
B. It contains information about previous installations of WebSphere Application Server products and helps installation program to control options for new installations.
C. It contains the port numbers to be assigned by the installation program during the new install.
D. It contains the list of applications including date and time stamps and user that installed the application.
B
9. A system administrator has configured the Web Container thread pool with the "Allow thread allocation beyond maximum thread size" option enabled (checked). What is the MOST significant performance implication of this configuration setting?
A. It will allow the system to scale well and eliminate any bottlenecks
B. It could allow unexpectedly high load into the system possibly rendering the system unusable
C. It can cause timeouts in the plugin
D. It can cause thrashing
B
10. A system administrator requires that an EJB JAR file be part of two Enterprise Application Archive (EAR) files. How can this be BEST accomplished using the Application Server Toolkit (AST)?
A. Use the JDK's JAR utility to include the WAR file in the EAR files.
B. Use the Application Deployment Descriptor editor to add the EJB module to each of the applications.
C. Open the Properties dialog for the EJB project and select the applications in the Project References dialog.
D. Open the Properties dialog for both Enterprise Application projects and select the EJB module in the Project References dialog.
D
11. Application code can write messages to a server's SystemOut and SystemErr log files. All of the following configurations are valid for application code log messages EXCEPT:
A. application log messages can be excluded or included entirely.
B. application log messages can be formatted like WebSphere Application Server system messages.
C. application log messages can be excluded from either SystemErr.log or SystemOut.log individually.
D. application log messages can not be formatted like WebSphere Application Server system messages.
D
12. A system administrator created an application server profile using the profile creation wizard. The system administrator then ran the Installation Verification program (IVT) immediately after creating it to verify the creation. Which of the following will indicate the appropriate behavior of the IVT program after its invocation?
A. IVT will fail as application server (server1) was not started after profile creation.
B. IVT verifies the log files for accuracy and does not need to be connected to the application server (server1).
C. IVT will start the application server (server1) if it was not already started and verifies the installation.
D. IVT will verify by connecting to the application server (server1) that was started by the profile creation wizard after its creation.
C
13. A backup configuration was created using the backupConfig command. The configuration must now be restored. Which of the following commands should be used to avoid stopping the server before restoring the configuration?
A. restoreConfig
B. restoreConfig -nostop
C. restoreConfig -nowait
D. restoreConfig -safeMode
C
14. A system administrator wants to be sure that seven days of SystemOut.log information are available on the local server's disk. What is the easiest way to ensure this will happen using the Log File rotation?
A. Set the "Maximum Size" option to 1 week.
B. Set the "Start Time" option to Sunday and the "Maximum Number of Historical Log Files" to 1.
C. Set the "Maximum Number of Historical Log Files" to 7 and the Time options to Start Time to 1 and Repeat Time to 24.
D. Set the "Maximum Log Files" option to 7.
C
15. A system administrator would like to deploy an enterprise application running on WebSphere that exchanges messages with a WebSphere MQ based application. What J2EE messaging provider would be the BEST fit?
A. The WebSphere V5 messaging provider
B. The Default messaging provider
C. The generic JMS Provider
D. The Embedded JMS Provider
C
16. A system administrator is asked to help diagnose some application problems. The system administrator considers asking for the log messages to be logged in the Advanced Format. Why might this help the system administrator to diagnose the problem?
A. The exact line of code where an exception occurred will be decompiled and shown as part of the message.
B. The JVM heap metrics at the time of the error will be included in the message.
C. Information about an event, when possible, will be added to the message.
D. Information about the distributed transaction will be included.
C
17. A system administrator has federated a node while creating the custom profile with the profile creation wizard. The system administrator does not see the entries for that node using the deployment manager administrative console. Which log file will give more information about the problem?
A. addNode.log under
B. addNode.log under
C. federate.log under
D. federate.log under
A
18. Cluster creation requires the system administrator to specify the weight for a cluster member. This weight is significant because it is used in the WebSphere WLM runtime by the:
A. Random scheduling algorithm
B. Round Robin scheduling algorithm
C. Both Random and Round Robin scheduling algorithm
D. Weighted Random algorithm
B
19. While performing a node federation, the addNode operation failed. From the following list of options, what would MOST likely induce this failure?
A. The cell already exists
B. The cell's deployment manager is running before the addNode command was run
C. The name of the new node is not unique in the cell
D. The addNode did not specify to carry over the applications
C
20. Immediately following federation, the process started by the custom profile is the:
A. Deployment manager
B. Application server
C. Nodeagent
D. Web server
C
20. Which of the following is the MOST accurate description of how the "Single" application class loader policy functions?
A. A single application class loader is used to load all EJBs, utility JARs, and shared libraries within the application server JVM.
B. An application class loader first delegates the loading of classes to its parent class loader before attempting to load the class from its local class path.
C. The class loader attempts to load classes from its local class path before delegating the class loading to its parent.
D. A single application class loader is used to load only the utility JARs and Web modules within the application server JVM.
A
21. After federating a custom node, an examination of the entries in a log file shows an "INSTCONFFAIL" indicator which denotes a complete failure. All of the following can be contributors to the failure EXCEPT:
A. the deployment manager is not running.
B. the node agent failed to start.
C. security was enabled.
D. a reserved name was used for the node name.
C
22. A system administrator has received an EAR file from the development team. The system administrator has been asked to install it into an application server. The system administrator has been told that there are some J2EE security roles defined within the EAR that need to be mapped to users and groups within the defined user registry. All of the following can be used to map users and groups to J2EE security roles EXCEPT:
A. during initial installation of an Enterprise Application using the administrative console.
B. after the Enterprise Application has already been installed through the administrative console.
C. after the Enterprise Application has already been installed through wsadmin.
D. while installing the Enterprise Application by editting the was.policy file.
D
23. An administrator is configuring the Message Driven Bean (MDB) activation specification to service a queue. Which of the following properties is required when setting up a queue?
A. destinationType
B. messageSelector
C. acknowledgeMode
D. subscriptionDurability
B
24. When using local session management, which of the following configuration settings could cause the loss of user session objects?
A. If HTTP Persistence connections are not used
B. If the Allow overflow property setting is not enabled
C. If Memory-to-memory replication is not configured
D. If the datasource used by the session database is not defined
C
25. During a WebSphere V6 Network Deployment installation, the system administrator did not select to install "Application Server Samples". Later, the system administrator decided to install "Application Server Samples". Which of the following steps are required to complete this installation?
A. Connect to the admin console. Navigate to Applications -> Enterprise Applications and click on 'Install' tab. Provide sampleapp.ear under samples directory.
B. Start the installation wizard. Select "Add features to the existing copy of the V6 Application Server product". Choose "Application Server Samples" option during the installation.
C. Start the installation wizard. Select "Add features to the existing copy of the V6 Application Server product". Choose "Application Server Samples" option during the installation. Run "install.bat" under samples\bin directory to deploy sample applications.
D. Start the installation wizard. Select "Upgrade existing copy of the V6 Application Server product" and select "Network Deployment" option during the installation.
B
26. A system administrator has been assigned the task of defining a Custom User Registry for a federated cell. The administrative console will be used. All of the following entries are required in the process of configuring the Custom User Registry EXCEPT:
A. Server user ID
B. Server user password
C. Server host name
D. Custom registry implementation class name
C
27. Which of the following adjustments to the Web module parameter would result in improved response time for servlet clients?
A. Setting the distributable flag.
B. Setting the reload interval to 20 seconds or less.
C. Enabling load on startup.
D. Disabling load on startup.
B
28. A system administrator notices a number of "ConnectionWaitTimeoutException" exceptions associated with a datasource in the SystemOut.log file. Which of the following is the MOST likely cause of this error?
A. The Connection Timeout on the data source has been set to 0.
B. The number of physical connections to the database has reached the number of Maximum Connection as specified in the datasource settings.
C. The number of physical connections to the database has reached the number of Minimum Connection as specified in the Data source settings.
D. The database transaction isolation is set too high.
C
29. A J2EE enterprise application is being assembled to take advantage of J2EE security. During this process, there are a number of configurations and mappings that need to be made. Which of the following items can a method permission be mapped to?
A. Web resources
B. An EJB
C. A login mechanism
D. A security realm
B
30. A system administrator is setting up SSL communications between the plugin and the application server. A new keyring file is being used. Which of the following elements in the plugin-cfg.xml file would need to be defined?
A. The public key and the private key
B. The public key and the password file
C. The keyring file and the password file
D. The keyring file and the stashfile
D
31. A new JDBC provider is being created in a cell in which the servers run different operating systems. Which of the following scopes should be used?
A. Cluster scope
B. Server scope
C. Node scope
D. Cell scope
A
32. A system administrator has installed the Network Deployment Manager package and now wishes to build a clustered server environment using custom profiles. All of the following steps are necessary EXCEPT:
A. create a deployment manager profile.
B. accept default values, create one custom profile on each node on which application servers will be run.
C. federate each custom profile to the deployment manager.
D. create new application servers and clusters on the nodes from the administrative console.
B
33. A Java client is residing in a client container. The Java client needs to make a request to the EJB container of an application server in a distributed cell. Which of the following protocols is MOST appropriate for the client request?
A. JDBC
B. RMI/IIOP
C. SOAP
D. HTTP(S)
B
34. Which of the following sets of Web server plugin properties can be modified by using the administrative console's request routing configuration tab?
A. Caching policy and log level
B. Refresh interval and log file location
C. Enable/disable automatic plug-in propagation
D. Load balancing option and retry interval
D
35. How can a system administrator persist trace output that is written to the memory buffer of a running application server?
A. Configure the time interval and/or the memory buffer max size parameters so that if either is reached the memory buffer will be dumped into a file.
B. In the Admin Console, click "Troubleshooting -> Logs and Trace ->
C. In the Admin Console, click "Troubleshooting -> Logs and Trace ->
D. It is not possible to perform this task in a running application server.
C
36. An HTTP plug-in configuration file can be regenerated from the administrative console by selecting which of the following?
A. Servers->Web servers, select a Web server, and click Generate Plug-in
B. Servers->Application servers->server->Web container, and click Generate Plug-in
C. Environment->Update Web Server Plug-in, and click OK
D. Environment->Virtual Hosts, and click Generate Plug-in
A
37. Before enabling Global security, an administrator must first configure various security settings. All of the following steps are required to be configured before enabling global security, EXCEPT:
A. the default SSL keystore and truststore files.
B. a user registry.
C. the authentication mechanism.
D. the server user ID for the given user registry.
A
38. A system administrator wants to implement the Upstream Queuing model to improve performance. Which of the following adjustments MUST be made?
A. Set the all cluster members to have the same JVM heap size.
B. Tune each Web container to have a smaller queue than the Web server.
C. Tune the queues to decrease in size from the Web server to the backend resource.
D. Tune the queues to increase in size from the Web server to the backend resource.
B
39. In order to set up memory-to-memory replication in a WebSphere Application Server V6 clustered environment, which of the following should be created?
A. Replication Domain and specify cluster members to use this Replication Domain
B. Replication Domain on each cluster member and create partitions for each Replication Domain
C. Replication Domain and specify the cell associates with the Replication Domain
D. Replication partition and attach cluster to the partition
A
40. A system administrator received a message that the Installation Verification (IVT) failed after creating a profile using the profile creation wizard. Which log file(s) should the system administrator review to find out more information about the failure?
A. ivtClient.log under
B. wasprofile_create_profileName.log under
C. ivtlog.txt under
D. installlog.txt under system temp directory
B
41. Java 2 security must be configured through the console. Which of the following administrative roles is the required minimum?
A. Administrator
B. Security
C. Configurator
D. Operator
C
42. A system administrator is called to suggest how to determine the cause of an application error. The system administrator recommends that the Log Analyzer be used over and above just reading the JVM logs because Log Analyzer can:
A. Show a series of errors as one unit of work.
B. Analyze the logs and pinpoint the root cause of an error and then suggest a fix.
C. Collate all logs from every system component and pinpoint the root cause of the error.
D. Dynamically monitor log files at runtime and send an alert when errors occur.
B
43. A system administrator was asked to develop artifacts specifically for the installation of a WebSphere Application Server V6 Network Deployment package. The system administrator also created an application server profile using silent installation scripts (response files). What approach will enable the system administrator to complete the task without using GUI based tools?
A. Create two response files where the first response file is used to install the product binaries and causes the second response file to be used for creating the application server profile.
B. Create a response file that installs product binaries and creates the application server profile.
C. Create a response file that installs product binaries and use profile creation wizard to create the application server profile.
D. Install product binaries using installation wizard and create a response file to create the application server profile.
A
44. The Servlet 2.4 specification requires that an HTTP session honor session affinity. In a clustered environment, a cluster member could possibly fail. Which of the following mechanisms is used to ensure session affinity?
A. Database session persistence
B. Memory-to-memory replication
C. Web Server plug-in
D. Replication Domain
D
45. Which of the following would have to be configured in order to implement memory-to-memory HTTP Session persistence?
A. The Data Replication Service and Web Container
B. EJB session beans and EJB Container
C. The HTTP Plug-in and Embedded HTTP Server
D. The JMS Server and Queue Manager
A
46. Which of the following statements is valid about the First Failure Data Capture (FFDC) tool?
A. The First Failure Data Capture tool does not affect the performance of the IBM WebSphere Application Server.
B. The First Failure Data Capture tool is only available in application servers that have been federated into a Network Deployment cluster.
C. The First Failure Data Capture tool is not compatible with J2EE 1.4.
D. The First Failure Data Capture tool is not available on all platforms.
A
47. Which of the following are used in order to administer the application server?
A. MBeans and XML files
B. A relational database repository and datasources
C. Security service and LDAP user registry
D. External HTTP server and HTTP server plugin
A
49. A WAR file in an enterprise application has been changed. How can a system administrator update it on the server with a minimal amount of work?
A. Re-package the EAR file using Application Server Toolkit then use the "Update -> Full application" function on the administrative console.
B. Use the "Update -> Single file" function of the Administrative console to replace the WAR file.
C. Use the "Update -> Single module" of the Administrative console to replace the WAR file.
D. Use the "Update -> Partial application" of the Administrative console to replace the WAR file.
C
50. A customer has configured an HTTP session via the Session Manager properties interface. The session is set to timeout in about 30 minutes. However, it typically takes more than 30 minutes and sometimes 35 minutes for a session to timeout. What is the MOST likely cause of the delay?
A. There is a bug in the Session Manager configuration.
B. The Least Recently used algorithm is slow.
C. The session invalidation process is running approximately every 5 minutes.
D. The session timeout is set too high.
C
51. A system administrator is adding a cluster member to an existing cluster. What is the minimum requirement for the cluster member to qualify for immediate addition to the cluster?
A. Any standalone application server qualifies if it is available on the network.
B. Any application server qualifies if it uses the same hardware and operating system as the other servers in the cell qualifies.
C. The new cluster member is part of a node in the cell, and belongs to the same node group and core group as other servers in the cluster.
D. The new cluster member must belong to a node in the same cell where the cluster is defined.
C
52. Assume that a load balancer and a Federated cell have been installed and are functional. All of the following contain built-in failover capabilities EXCEPT:
A. HTTP server
B. Deployment manager
C. Web container
D. EJB container
B
53. The Tivoli Performance Viewer can provide several summary reports to include performance statistics for various application and application server components. Which of the following lists contains the complete set of available summary reports?
A. EJBs, EJB Methods, Connection Pool, Thread Pool, J2C Container
B. Servlets, EJBs, HTTP plug-in, ORB plug-in, JVM
C. Servlets, EJBs, EJB Methods, Connection Pool, Thread Pool
D. Servlets, EJBs, Connection Pool, Thread Pool, Dynamic Cache
B
54. A security role has been mapped to the special group Everyone. What is the result of this action?
A. Every user defined for the group has access to the resource.
B. Everyone will be denied access to the resource.
C. Every user has access to the resource.
D. Anyone logged in has access to the resource.
a