Ibm 000 377

Download as pdf or txt
Download as pdf or txt
You are on page 1of 42

s@lm@n

IBM
Exam 000-377
IBM WebSphere Application Server Network Dep v7.0 Core Admin
Version: 5.0

[ Total Questions: 112 ]

IBM 000-377 : Practice Test Topic 0, A A Question No : 1 - (Topic 0) An administrator would like to use the Centralized Installation Manager (CIM) to install WebSphere Application Server Network Deployment V7.0 on a remote Solaris host. The Solaris host has been updated with all the required operating system patches. What is the next step the administrator must perform? A. Configure an installation target for the Solaris host. B. Download Solaris interim fixes to the CIM repository. C. Use the Job manager to create a remote installation job. D. Copy WebSphere Application Server Network Deployment V7.0 software to the Solaris host. Answer: A

Question No : 2 - (Topic 0) Which one of the following profile related tasks can only be performed using the manageprofiles command-line facility? A. Delete a profile B. Secure a profile C. Federate a profile D. Update profile templates Answer: A

Question No : 3 - (Topic 0) Which of the following items best gives a reason to perform an unattended installation of WebSphere Application Server? A. The installation for the particular target platform is being done for the first time. B. The installation for the particular target platform has been done before and will be repeated in the future. C. The installation for WebSphere Application Server would initially not be able to include administrative security. D. The installation for the particular target platform is expected to require a lot of

Exactdumps.com

IBM 000-377 : Practice Test adjustments to be done over several installation attempts. Answer: B

Question No : 4 - (Topic 0) A system administrator has successfully installed WebSphere Application Server V7.0 and has run the Installation Verification Tool (IVT) with a success message. Which additional step can be taken to further verify the installation? A. Check to see if the InstallShield application will run again. B. Check to see if the installation directory specified exists in the file system. C. Use a browser to access the launch page of the IBM HTTP Server. D. Use a browser to access the administrative console and log in successfully. Answer: B,D

Question No : 5 - (Topic 0) A WebSphere Application Server installation finishes and the primary installation log indicates an exit code of INSTCONFSUCCESS. What is the best conclusion that can be resolved from this result? A. The Web server installed successfully. B. The WebSphere Application Server installed successfully. C. The InstallShield Wizard executed successfully to launch WebSphere Application Server installation. D. The target operating system determined that it is compatible with WebSphere Application Server and had configured environment variables for it. Answer: B

Question No : 6 - (Topic 0) In order to verify that a server has started successfully and all of its components have initialized without throwing any exceptions, what steps should an administrator perform? A. Use the Log Analyzer to view the servers activity.log file. B. View the servers startServer.log and native_stdout.log files.

Exactdumps.com

IBM 000-377 : Practice Test C. Examine the SystemOut.log file for the current server process. D. Log in to the administrative console and examine the runtime messages. Answer: C

Question No : 7 - (Topic 0) Refer to the exhibit. A stand-alone application server with hostname HOST and port 1234 is running a Web application which is trying to access EJBs hosted on a cluster. The Web application is throwing a NameNotFoundException when attempting to lookup clusters/cluster01/ejbs/MyHome. The administrator runs the dumpNameSpace command on the stand-alone server and gets the output in the exhibit. What command should the admin run next to find the MyHome entry?

Exactdumps.com

IBM 000-377 : Practice Test A. dumpNameSpace host bptenote35 port 2833 B. dumpNameSpace startAt clusters/cluster01/ejbs C. dumpNameSpace root cluster01 D. dumpNameSpace root ejbs Answer: A

Question No : 8 - (Topic 0) Which statement describes WebSphere V7 FFDC feature? A. The application server needs to be restarted after enabling FFDC B. FFDC information is stored in an optimized relational database C. FFDC logs are mainly intended for application development teams D. FFDC does not affect the performance of the WebSphere Application Server Answer: D

Question No : 9 - (Topic 0) An application server is hung and has to be killed and restarted by the administrator. In order to troubleshoot the server hang problem, the administrator decides to reproduce the hang condition and trigger thread dumps for further analysis. What is the most effective way to collect the thread dump data? A. Trigger one thread dump before and one thread dump after the server restart. B. Take three consecutive thread dumps 10 seconds apart immediately after the server restart. C. After server restart wait for the thread monitor to create the first thread dump, then take two more. D. Wait for the thread monitor to signal a possible hung thread, then take three thread dumps several seconds apart. Answer: D

Question No : 10 - (Topic 0) Data replication service (DRS) is turned on for replicating in-memory data among WebSphere processes. During peak load, the developer found an OutOfMemoryError in Exactdumps.com 5

IBM 000-377 : Practice Test the log. The developer suggests turning off data replication service (DRS). What services would be impacted? A. Stateful session EJB persistence and failover. B. HTTP session persistence and failover. C. JDBC data source failover. D. Dynamic cache replication. E. JVM in memory replication and failover. Answer: A,B,D

Question No : 11 - (Topic 0) An administrator has been asked by IBM Support to gather diagnostic trace data relevant to a problem involving some components of the application server. How should the administrator prepare to gather the data? A. Enable the IBM Service log for the server and set the number of historical logs to 10. B. Enable verbose garbage collection for the server and specify that the data be written to the trace.log file. C. Configure Diagnostic Trace for the server by selecting that the trace output be written to a file. D. Configure the ffdcRun.properties file to trace the specific server components and write the data to a memory buffer. Answer: C

Question No : 12 - (Topic 0) Due to network problems, the IBM Support Assistant (ISA) Agent is not available. Which service will be inoperable? A. Case manager tool B. Guided troubleshooter C. Remote debugging, data collection and file transfer D. WebSphere Application Server Network Deployment V7.0 add-on customization Answer: C

Question No : 13 - (Topic 0) Exactdumps.com 6

IBM 000-377 : Practice Test An administrator has enabled security auditing for the WebSphere Application Server. They wish to view the audit records in order to verify that it is working properly. Which tool would best allow them to view the audit data? A. IBM Support Assistant using the AuditLogReporter tool B. wsadmin, using the AdminTask.binaryAuditLogReader command C. The administrative console - they could invoke the Tivoli Audit Viewer (TAV) D. The LogAnalyzer from within the Rational Application Developer Assembly and Deploy Tool. Answer: B

Question No : 14 - (Topic 0) An administrator manages a cell that is configured to use an LDAP server for its user registry. But, there are several cases where he needs certain application servers to authenticate against a file based registry. How can this be accomplished? A. From the deployment managers administrative console, use the application servers security configuration wizard for each application server to override the cell level registry. B. In the cell level security configuration panel, define LDAP authentication at the cell scope, and file based registry at the application server scope for the desired application servers. C. Configure Global security to use an LDAP registry and create a new security domain with a user realm definition for the file based registry and assign it to the desired application servers. D. Create a global security repertoire that includes a global definition for the LDAP registry as well as entries for each node is the cell. For those nodes that have application servers that require file based registry, include a registry override. Answer: C

Question No : 15 - (Topic 0) What must an administrator do before he can create method permissions for an Enterprise JavaBean (EJB)? A. Map role to groups. B. Define one or more security roles. C. Map logical role name to runtime role. D. Exclude a set of EJB methods from access.

Exactdumps.com

IBM 000-377 : Practice Test Answer: B

Question No : 16 - (Topic 0) A federated cell has two nodes, Node01 and Node02. Global Security is turned on and is using a file based user registry. Node01 has servers A, B, C and D. A developer has deployed a new security check-in application to servers A and D. As a security requirement, this new application is required to use local operating system registry for user authentications. Identify which one of the following is the most direct way to enable this secured application. A. Migrate user information from operating system registry to LDAP registry. B. Create a security domain and scope it to application server A and D. C. Update global security configuration file security.xml with operating system registry definition. D. Merge operating system registry and file based user registry to a new LDAP and assign the new LDAP to the federated cell. Answer: B

Question No : 17 - (Topic 0) In a test cell which has WebSphere global security disabled, an administrator has created a service integration bus (SIBus) with security enabled for testing applications that use messaging resources. Now the administrator needs to enable security on the bus for further testing. Which of the following tasks must be performed to enable security on the bus? A. Enable administrative security for the cell. B. Configure a separate security domain for the bus. C. Delete the bus and recreate it with security enabled. D. Require messaging clients to use SSL protected transports. Answer: A

Question No : 18 - (Topic 0) The application accesses an external resource using a J2C adaptor. The security credential for the external resource authentication has changed. Which one of the following Exactdumps.com 8

IBM 000-377 : Practice Test should be updated? A. J2C authentication data. B. Key stores and certificates. C. Web security trust association. D. JAAS login module in WebSphere. Answer: A

Question No : 19 - (Topic 0) An administrator is troubleshooting a communication problem between two application servers, on different nodes (node-A and node-B), within a cell that has administrative security enabled. Based on prior investigation, they believe that the problem involves a missing signing certificate on node-B. What should be done to verify this theory? A. Manually propagate the key.p12 file for node-B to the plugin directory and restart the application servers. B. Verify that the CellDefaultTrustStore has the appropriate signing certificates in it and run the syncNode script on node-B. C. Get a new certificate for the application server from a Certificate Authority and import it into the application servers ServerDefaultTrustStore. D. Update the NodeDefaultKeyStore for node-B with a new signing certificate, do a Full Resynchronize of the cell, and restart the node agents and application servers. Answer: B

Question No : 20 - (Topic 0) An administrator needs to set up a new employee with administrative access to an existing WebSphere cell. What administrative security roles must the administrator have in order to grant the new employee operator access? A. The operator role is required to assign another administrator operator access. B. The administrator must have administrator role access in order to make the new administrator an operator. C. The administrator must be the primary administrative user in order to grant security roles to new administrators. D. The Admin Security Manager role is required so that the administrator can assign new users to administrative roles. Answer: D Exactdumps.com 9

IBM 000-377 : Practice Test

Question No : 21 - (Topic 0) A company maintains several different LDAP directory servers to contain a registry of user IDs and passwords. How can an administrator make all of the user IDs and passwords in these directories available to WebSphere security? A. Configure the LDAP directory servers as generic servers. B. Configure a federated repository including all of the LDAP directory servers. C. Configure WebSphere security to authenticate against all of the LDAP servers D. Configure a standalone LDAP registry for each directory server and enable multiple realms. Answer: B

Question No : 22 - (Topic 0) In addition to the normal process for assembling an application, which one of the following tasks must be performed if the EAR file contains a Web services-enabled module? A. Generate EJB resource mappings. B. Generate deployment code for the application. C. Redefine the bindings properties. D. Edit the annotations or deployment descriptors. Answer: B

Question No : 23 - (Topic 0) It is determined that a single class loader is needed for all of the modules in all of the enterprise applications on an application server. What action should the administrator take to implement this? A. Set the Classloader policy on the application server to single B. Set the Classloader policy on the application server to Use an isolated class loader C. Set each applications EAR class loader policy to Single class loader for application D. Set each applications WAR class loader policy to Single class loader for application Answer: A

Exactdumps.com

10

IBM 000-377 : Practice Test

Question No : 24 - (Topic 0) Which action below must be performed to ensure that requests routed through the Web server can reach a Web application deployed in WebSphere Application Server Network Deployment V7.0? A. Security is enabled on the administrative console. B. An updated plugin-cfg.xml is generated and propagated to the Web server. C. The Web server and the WebSphere Application Server must be installed on the same physical server. D. The Web server plug-in and the WebSphere Application Server must be installed on the same physical server. Answer: B

Question No : 25 - (Topic 0) What is the correct console command to execute a wsadmin script file in WebSphere Application Server, ND, V7.0? A. wsadmin -f <script_file> B. wsadmin <script_file> C. wsadmin /file: <script_file> D. wsadmin @executeScript (script file will be prompted) Answer: A

Question No : 26 - (Topic 0) To use a message-driven bean (MDB) to communicate with the default messaging provider, the administrator must create which one of the following? A. JDBC provider B. JCA resource adapter C. JMS connection factory D. JMS activation specification Answer: D

Exactdumps.com

11

IBM 000-377 : Practice Test

Question No : 27 - (Topic 0) In a Java EE application, how are EJB resources protected? A. Security constraints B. Method permissions C. Java 2 security policy files D. Administrative permissions Answer: B

Question No : 28 - (Topic 0) An application which uses JMS clients will be deployed to a stand-alone application server. Messages will be produced by a session EJB and consumed by a message-driven bean (MDB) via a queue destination. What JMS resources must be configured by an administrator to support this application? A. Destination, queue point, mediation B. Destination, connection factory, data store C. Message points, destination, connection factory D. Queue, connection factory, activation specification Answer: D

Question No : 29 - (Topic 0) Applications that need to create additional persistent bindings of objects associated with a specific node can bind those objects under which of the following types of namespace partition? A. Server roots B. Cell persistent C. Node persistent D. System namespace Answer: C

Exactdumps.com

12

IBM 000-377 : Practice Test Question No : 30 - (Topic 0) Which one of the following statements is true about scoping resources in WebSphere Application Server? A. When a resource is defined at a more general scope, greater isolation is provided. B. In the administrative console, All scopes can be selected to create a new resource. C. Resources that are defined at more specific scopes override duplicate resources that are defined at more general scopes. D. Resources such as Java Database Connectivity (JDBC) providers, namespace bindings, or shared libraries can only be defined at a single scope. Answer: C

Question No : 31 - (Topic 0) A developer informs an administrator that a servlet in one of the Web modules of a new enterprise application needs to access code in a native library. The administrator creates a shared library and adds the native library to its Native library path. What else does the administrator need to do to ensure that the servlet can access the native library without risk of an UnsatisfiedLinkError? Using the administrative console, select: A. Use an isolated class loader for this shared library on the shared library settings page and associate the shared library with the Web modules class loader. B. Classes loaded with parent class loader first on the settings page for the enterprise applications class loader and associate the shared library with the enterprise applications class loader. C. Use an isolated class loader for this shared library on the shared library settings page and inform the developer of the name of the shared library so the developer can include it in the appropriate Java code. D. Classes loaded with local class loader first on the settings page for the Web modules class loader and associate the shared library with the Web modules class loader. Answer: A

Question No : 32 - (Topic 0) When an administrator creates a service integration bus (SIBus) destination, which one of the following tasks must be performed? A. Scope the bus destination to a specific cluster.

Exactdumps.com

13

IBM 000-377 : Practice Test B. Assign the destination to a specific bus member. C. Select an appropriate mediation for the bus destination. D. Create the appropriate message point for the bus destination. Answer: B

Question No : 33 - (Topic 0) If a deployed application is mapped to a Web server, an updated plug-in configuration file must be generated and propagated. By viewing the plug-in configuration file, how can an administrator determine if the mapping was successful? There will be a: A. Property element under Transport with a Name attribute equal to the path of the mapped application. B. URI element under UriGroup with a Name attribute equal to the context root of the mapped application. C. Server element under ServerCluster with a Name attribute equal to the .ear file of the mapped application. D. VirtualHost element under VirtualHostGroup with a Name attribute equal to the assigned port number of the mapped application. Answer: B

Question No : 34 - (Topic 0) When adding a new member to a cluster, why is it necessary for an administrator to select the option for generating unique HTTP ports? A. To enable encryption over the secure HTTP ports B. To prevent other applications from using these ports C. To avoid port conflicts with other servers on the same node D. To ensure that cluster members on different hosts have unique ports Answer: C

Question No : 35 - (Topic 0) Aside from the administrative console and the addNode command, what other facilities does WebSphere Application Server provide for federating nodes into cells? Exactdumps.com 14

IBM 000-377 : Practice Test A. wsadmin B. The administrative agent C. The Profile Management Tool (PMT) D. Rational Application Developer Assembly and Deploy Module Answer: C

Question No : 36 - (Topic 0) A cluster, Cluster1, is a member of the service integration bus (SIBus) Bus1 and the host of a queue destination Destination1. When Cluster1 was added to Bus1, the High availability messaging engine policy was selected. An administrator will deploy an application containing an MDB, MDB1, onto Cluster1. The MDB will listen to Destination1. In order to allow MDB1 instances on all cluster members to get messages from Destination1, the administrator should: A. enable the option Always activate MDBs in all servers on MDB1s activation specification B. set the option MDB connections to Parallel on Destination1s MDB properties C. disable the option prefer local on MDB1 when installing the application D. set the option Connection proximity to Bus on Bus1s activation specification defaults Answer: A

Question No : 37 - (Topic 0) A cluster, Cluster1, contains application servers Server1 and Server2. Cluster1 is configured as a member of service integration bus (SIBus) Bus1 using the High availability messaging engine policy. A messaging engine (ME) for Bus1 starts up on Server1, then Server1 crashes. An ME for Bus1 will: A. already be running on Server2. When Server1 recovers, an ME for Bus1 will start on Server1. B. start on Server2. When Server1 recovers, a second ME for Bus1 will start on Server1. C. start on Server2 but fail back to Server1 after Server1 has recovered. D. start on Server2 and continue running on Server2 even after Server1 has recovered. Answer: D

Exactdumps.com

15

IBM 000-377 : Practice Test

Question No : 38 - (Topic 0) An administrator has created a cluster, C1, and configured memory-to-memory HTTP session replication. How can the administrator best ensure that every HTTP session is replicated on all members of the cluster? A. In the Replication domain settings for the C1 replication domain, set Number of replicas to entire domain B. In the Replication domain settings for the C1 replication domain, set Number of replicas to 0 C. In the Memory-to-memory replication settings for each member of C1, set Number of replicas to entire domain D. In the Memory-to-memory replication settings for each member of C1, check Replicate to all members Answer: A

Question No : 39 - (Topic 0) A J2EE application maintains information in the HTTP session in memory. This information can be recreated, but there is a performance penalty to restore state if a user session fails over to a different cluster member. Which of the following features maximizes the use of information already stored in a server's session? A. Database persistence B. Session affinity in Web server plugin C. Memory-to-memory replication in Both Mode D. Memory-to-memory replication in Server Mode Answer: B

Question No : 40 - (Topic 0) An administrator wishes to control an Apache Web server on a remote host via the WebSphere Application Server Network Deployment administrative console. What must be done to accomplish this? A. Configure a web server definition in the administrative console. B. Configure the Apache administrative process on the remote node.

Exactdumps.com

16

IBM 000-377 : Practice Test C. Configure an unmanaged node definition in the administrative console. D. Configure a managed node on the remote host. Answer: A,D

Question No : 41 - (Topic 0) A cluster, Cluster1, contains two servers, Server1 and Server2. Server1 has a weight of 20 and Server2 has a weight of 4. A single web server is used to route HTTP requests to Cluster1. The web server is started and receives 4 HTTP requests for an application deployed on Cluster1. If the requests are all part of the same HTTP session, and the first request is routed to Server2, how many requests are routed to Server1? A. 0 B. 1 C. 2 D. 3 Answer: A

Question No : 42 - (Topic 0) What does backupConfig back up? A. Log files B. Profile configuration C. WebSphere binaries D. First failure data capture (FFDC) directory Answer: B

Question No : 43 - (Topic 0) Where can an administrator find binding information for an application? A. In the IBM extension file B. In the activation specification C. In the deployment descriptors D. Executing the wsadmin command AdminApp.viewBindings (-ApplicationName)

Exactdumps.com

17

IBM 000-377 : Practice Test Answer: C

Question No : 44 - (Topic 0) Which of the following statements best describes the type of data collected by request metrics? A. Monitors health indicators such as CPU usage B. Provides data for all transactions, without correlation C. Provides data with respect to pools, queues, and system data D. Tracks individual transactions, recording the processing time for each component Answer: D

Question No : 45 - (Topic 0) Which of the following actions would enable the collection of performance data for an application server, given the Performance monitoring Infrastructure (PMI) is not enabled? A. Using wsadmin, invoke the enablePMICollection operation on the PerfMBean. B. Using wsadmin, invoke the setInstrumentationLevel operation on the PerfMBean. C. In the administrative console, on the Performance tab for the server, select the Enable Performance Monitoring Infrastructure (PMI) checkbox. D. In the administrative console, on the Configuration tab for the server, click Performance Monitoring Infrastructure (PMI) under Performance, and then select the Set instrumentation level checkbox. Answer: B

Question No : 46 - (Topic 0) An application server has runtime provisioning enabled. What is the benefit of it? It: A. allows shared class cache for runtime classes. B. reduces server start time and memory footprint. C. pre-loads all Enterprise Java Beans for the application. D. enables light-weight runtime configuration service to reduce memory compaction frequency.

Exactdumps.com

18

IBM 000-377 : Practice Test Answer: B

Question No : 47 - (Topic 0) An application has poor performance. On examining verbose GC information the administrator notices that 70KB objects frequently cannot be allocated due to heap fragmentation, requiring time-consuming heap compaction. Which of the following is likely to improve performance? A. Configure more operating system paging space. B. Increase the size of the large object area (LOA). C. Increase the size of the thread local heap (TLH). D. Increase the size of the native heap. E. Select the Xnocompaction option. Answer: B

Question No : 48 - (Topic 0) An application spends 90% of its time in a complex servlet and the rest (10%) of time in a short JDBC query. On average, only 10% of the servlets are using database connections at any time. The application starts to perform poorly after a new batch of users are introduced to the system. What measures should the administrator recommend to determine the root cause of the problem? A. Install Tivoli Performance Viewer (TPV) as IBM Support Assistant (ISA) add-on. B. View advice messages in Tivoli Performance Viewer (TPV) by clicking the Advisor link. C. Turn on Performance and Diagnostic Advisor in IBM Support Assistant (ISA) as a collector. D. Install Tivoli Composite Application Manager (ITCAM) as IBM Support Assistant (ISA) add-on. Answer: B

Question No : 49 - (Topic 0) To install fix packs to remote hosts using the Centralized Installation Manager (CIM), the administrator must download the update installer for the appropriate platforms into:

Exactdumps.com

19

IBM 000-377 : Practice Test A. a directory on the class path of a Node Agent on each remote host. B. the WebSphere Application Server Network Deployment cells CIM repository. C. the maintenance sub-directory of the application server install on each remote host. D. the maintenance sub-directory of the profile root of the node hosting the CIM repository. Answer: B

Question No : 50 - (Topic 0) What is the sequence of components which would typically be involved in the flow of a request from a Web browser to a servlet? A. External HTTP Server, HTTP Server Plug-in and EJB Container B. Load Balancer, Embedded HTTP Server, HTTP Server Plug-in and Web Container C. Edge Component, HTTP Server Plug-in, external HTTP Server, and Web Container D. External HTTP Server, HTTP Server Plug-in, embedded HTTP Server and Web Container Answer: D

Question No : 51 - (Topic 0) A system administrator wants to improve response time and system load of a Web application running in a clustered environment. What might the system administrator attempt to decrease the response time of the Web application? A. Configure dynamic caching B. Enable memory-to-memory replication C. Configure session replication to use a database. D. Ensure that all cluster members are in the same node group. Answer: A

Question No : 52 - (Topic 0) How could an administrator manage multiple stand-alone application servers on different hosts in a network? By using: A. a job manager which administers multiple application server nodes through

Exactdumps.com

20

IBM 000-377 : Practice Test administrative agents. B. a deployment manager which administers multiple application server nodes through their node agents. C. a high availability manager which administers multiple application server nodes through their administrative agents. D. an administrative agent which administers multiple application server nodes through their administrative service. Answer: A

Question No : 53 - (Topic 0) What are the three possible replication types for the dynamic caching service? A. Client mode B. Server mode C. Not shared D. Push only E. Both push and pull F. Broadcast mode Answer: C,D,E

Question No : 54 - (Topic 0) When configuring automated transaction peer recovery for recovering in-flight transactions from the transaction log, what is required from the file system? A. RAID disks must be used to host the transaction log B. Exclusive read only file locks and the ability to invalidate them C. File locking must be disabled for Network File System Version 4 (NFSv4) D. Lease-based exclusive locks on files Answer: D

Question No : 55 - (Topic 0) What is the advantage of deploying more than one messaging engine and linking them together in a topology that has multiple interconnected service integration buses (SIBus)? Exactdumps.com 21

IBM 000-377 : Practice Test A. Enable protocol transformation between buses. B. Improve the availability of the persistent storage. C. Spread messaging workload across multiple servers. D. Preserve message ordering through the messaging engines. Answer: C

Question No : 56 - (Topic 0) Which of the following statements most accurately describes the relationship between a flexible management topology and the network deployment cell? A. Flexible management can be an alternative to the network deployment cell model. B. Flexible management eliminates the need for node agents in a network deployment cell. C. The flexible management topology is a replacement for the network deployment cell. D. The flexible management job manager can perform all the tasks of the deployment manager. Answer: A

Topic 1, B B Question No : 57 - (Topic 1) Which one of the following statements is true about WebSphere Application Server HTTP session management support? A. Session management can persist session-related information in several ways. B. Multiple requests from the same browser, each specifying a unique Web application, result in a single session with multiple session IDs. C. When an HTTP client interacts with a servlet, the state information associated with a series of client requests is represented as a SSL ID. D. The high availability (HA) manager is responsible for managing HTTP sessions, providing storage for session data, allocating session IDs, and tracking the session ID associated with each client request. Answer: A

Question No : 58 - (Topic 1) Exactdumps.com 22

IBM 000-377 : Practice Test Peformance of a database is degrading due an intensive database application. The administrator suspects that the JDBC connection pool is not properly tuned. Which performance tools should the administrator use for problem determination? A. Request Metrics B. System core dump viewer C. IBM JVM heap dump analyzer D. Tivoli Performance Viewer (TPV) E. Performance Monitoring Infrastructure (PMI) analyzer Answer: A,D

Question No : 59 - (Topic 1) An administrator wants to update a WebSphere Application Server installation to the latest fix pack. The installation has no feature packs installed. Which fix packs does the administrator need to download and install? The application server fix pack and the: A. SDK fix pack B. Web services fix pack C. EJB container fix pack D. Centralized Installation Manager (CIM) fix pack Answer: A

Question No : 60 - (Topic 1) Which of the following performance monitoring tools is the most appropriate for monitoring the overall health of WebSphere Application Server? A. Request metrics tool B. Tivoli Performance Viewer C. Transaction correlation tool D. Tivoli System Health Viewer Answer: B

Question No : 61 - (Topic 1)

Exactdumps.com

23

IBM 000-377 : Practice Test How would an administrator enable the collection of performance data by using the administrative console? A. On the Performance tab for the server, select the Enable Performance Monitoring Infrastructure (PMI) checkbox. B. Click Monitoring and Tuning > Performance Viewer > Current Activity > server_name > Settings > Enable Performance Monitoring Infrastructure (PMI). C. On the Configuration tab for the server, click Performance Monitoring Infrastructure (PMI) under Performance, and then select the Set instrumentation level checkbox. D. On the Configuration tab for the server, click Performance Monitoring Infrastructure (PMI) under Performance, and then select the Enable Performance Monitoring Infrastructure (PMI) checkbox. Answer: D

Question No : 62 - (Topic 1) Which of the following thread pools are managed by WebSphere Application Server? A. JVM thread pool B. HTTP listener thread pool C. Web container thread pool D. ORB container thread pool E. Dynamic caching thread pool Answer: C,D

Question No : 63 - (Topic 1) When backing up WebSphere Application Server configuration and runtime settings, which of the following commands would be relevant? A. backupConfig -location location B. restoreConfig -profileName profile_name -backupFile backupFile_name. C. manageprofiles -backupProfile - profileName profile_name -backupFile backupFile_name. D. wsadmin -backupConfig -profileName profile_name -backupFile backupFile_name. Answer: C

Exactdumps.com

24

IBM 000-377 : Practice Test Question No : 64 - (Topic 1) How does the administrator enable verbose garbage collection? Use: A. the wsadmin script. B. the -verbose:gc command-line option. C. Rational Application Assembly and Deployment Tool. D. Websphere Application Server environment variables. E. the -Xoptionsfile command-line option with appropriate text file. Answer: A,B,E

Question No : 65 - (Topic 1) A new cluster member has been added to a WebSphere Application Server. What changes will be seen in the plug-in configuration file related to this modification? A. There will be a new Name attribute in ServerCluster with equal to the new cluster members name. B. There will be a Property element under Transport with a Name attribute equal to the new cluster members name. C. There will be a new Server element under ServerCluster with a Name attribute which includes the new cluster members name. D. There will be a VirtualHost element under VirtualHostGroup with a Name attribute equal to the RMI-IIOP port number of the new cluster member. Answer: C

Question No : 66 - (Topic 1) Which administrative object is used to deploy applications in WebSphere Application Server, ND, V7.0? A. Help B. AdminApp C. AdminDeploy D. AdminControl Answer: B

Exactdumps.com

25

IBM 000-377 : Practice Test Question No : 67 - (Topic 1) How is the plug-in configuration file viewed from the WebSphere Application Server administrative console? A. There is no facility to view the plug-in configuration file in the administrative console. B. From the web servers list, select a particular web server. In the properties view, click Plug-in properties. Click View next to the Plug-in configuration file name. C. On the left navigation bar, expand Servers, Server Types, and then Web Servers. Click on a particular web server. The path of the plug-in file is shown here. Use a text file reader to view the file. D. On the left navigation bar, expand System Administration. Click on Server Management and go to Web Servers. Select Plug-in File Management. Clicking on the View link runs Notepad with the plug-in file open. Answer: B

Question No : 68 - (Topic 1) A developer informs an administrator that a servlet in one of the Web modules of a new enterprise application needs to load its own version of some common Java classes provided by WebSphere Application Server. In order to ensure that this version of classes are only visible to the Web module, the administrator should: A. place the jar files containing the classes in the lib/ext subdirectory of the application server install directory and select Classes loaded with parent class loader first on the settings page for the Web modules class loader. B. instruct the developer to place the jar files containing the classes in the Web modules WEB-INF/lib directory and select Classes loaded with local class loader first on the settings page for the Web modules class loader. C. instruct the developer to place the jar files containing the classes in the enterprise applications EAR file and select Classes loaded with parent class loader first on the settings page for the enterprise applications class loader. D. place the jar files containing the classes in a directory on the application servers file system and create a shared library with these jar files in its classpath. Answer: B

Question No : 69 - (Topic 1) When an administrator creates a JMS destination queue or topic, what configuration Exactdumps.com 26

IBM 000-377 : Practice Test information must be provided in order to connect the JMS destination to a specific service integration bus (SIBus)? A. The messaging engines name. B. The JMS provider type, bus name, bus destination. C. The JNDI name of the bus destination and its scope. D. The name of the messaging engine and the buss UUID. Answer: B

Question No : 70 - (Topic 1) In a Java EE application, how are servlets protected? A. Security constraints B. Method permissions C. Java 2 security policy files D. Administrative permissions Answer: A

Question No : 71 - (Topic 1) A Network Deployment cell contains a single cluster of application servers, but no standalone servers. An application which uses JMS clients will be deployed to the cluster. In order for the clients to produce and consume messages using default messaging, which one of the following tasks must an administrator perform? A. Start the messaging engine on each cluster member. B. Scope the service integration bus (SIBus) to the cluster. C. The cluster must be added as a member to a service integration bus (SIBus). D. Create a mediation and messaging point on the service integration bus (SIBus). Answer: C

Question No : 72 - (Topic 1) A developer informs an administrator that a servlet in one of the Web modules of a new enterprise application needs to access code in a native library. The administrator creates a

Exactdumps.com

27

IBM 000-377 : Practice Test shared library and adds the native library to its Native library path. With which class loader should the shared library be associated so that the servlet can access the native library without risk of an UnsatisfiedLinkError? A. The Web modules class loader B. The native librarys class loader C. The application servers class loader D. The enterprise applications class loader Answer: C

Question No : 73 - (Topic 1) What is the most common role that naming plays in WebSphere Application Server? A. Allows applications to obtain references to objects such as EJB homes. B. Allows Java programs (clients and Java EE applications) to create, send, receive, and read asynchronous requests, as messages. C. Provides a runtime environment for enterprise beans within the application server. D. Provides a secure facility to support customer's basic organizational entity management needs. Answer: A

Question No : 74 - (Topic 1) Which one of the following can be used to instantiate resource adapter classes for establishing and maintaining resource connections? A. a data source B. connection factories C. connection pool settings D. a JMS activation specification Answer: B

Question No : 75 - (Topic 1) To create a pool of connections that an application can use to interact with a database, the

Exactdumps.com

28

IBM 000-377 : Practice Test administrator must create which one of the following? A. JDBC provider B. JCA resource adapter C. High availability server D. JMS activation specification Answer: A

Question No : 76 - (Topic 1) Which one of the following actions best describes how to remove application-scoped resources from an enhanced EAR file? A. Edit the ibmconfig/deployment.xml file B. Edit the application deployment descriptor C. Remove the META-INF/application.xml file D. Remove the META-INF/ibmconfig directory Answer: D

Question No : 77 - (Topic 1) Which of the following is an option given in the First Steps application that runs automatically after installation? A. Start the server. B. Execute wsadmin. C. Configure resources. D. Run the Snoop servlet. Answer: A

Question No : 78 - (Topic 1) An administrator has created a deployment manager profile. However, the administrator chose not to create the Centralized Installation Manager (CIM) repository and populate it with the WebSphere Application Server Network Deployment V7.0 product files.

Exactdumps.com

29

IBM 000-377 : Practice Test If, in the future, the administrator wants to use the Centralized Installation Manager to install WebSphere Application Server Network Deployment V7.0 on a remote host, which of the following tasks will be necessary? A. Create the CIM repository using the Installation Factory. B. Create a new deployment manager profile including the CIM repository. C. Use the Centralized Installation Manager to create an installation target. D. Use the Centralized Installation Manager to create an installation package. Answer: A

Question No : 79 - (Topic 1) A system administrator is installing WebSphere Application Server for the first time and was surprised that the Profile Management Tool (PMT) did not have the expected profile type options, as stated in the Information Center. What is the best conclusion for this finding? A. The Java runtime being used by the installation program is not at the required version. B. The system administrator is installing a variant of WebSphere Application Server that is not Network Deployment. C. The target operating system the system administrator is installing on is not compatible with WebSphere Application Server. D. A previous step in the installation has failed. The system administrator should cancel and check the logs before starting over again. Answer: B

Question No : 80 - (Topic 1) Which of the following options is NOT a valid method of running the Profile Management Tool? A. Run the command directly from a system console. B. Select Profile Management Tool from the First Steps application. C. Select System Administration -> Run Profile Management Tool in the administrative console. D. Check the Create a new WebSphere Application Server profile using the Profile Management Tool option at the end of the installation process. Answer: C

Exactdumps.com

30

IBM 000-377 : Practice Test Question No : 81 - (Topic 1) How is the response file specified in a silent installation scenario? A. Specified in the installation.properties file B. Specified as a parameter in the launchpad user interface C. Included as a command-line option on the install command D. Included as a command-line option on the launchpad application Answer: C

Question No : 82 - (Topic 1) Global security is turned on for a federated cell using a file-based federated repository. The administrator created a new security domain called App1Domain using local operating system registry and mapping it to the application server. The administrator also created a new local operating system user ID App1Admin. Which one of the following is true when the new security domain is enabled to secure Application1? A. The administrator can access Application1. B. The administrator can disable Application1 security. C. App1Admin can disable Application1 security. D. App1Admin can access the administrative console. Answer: B

Question No : 83 - (Topic 1) How are Java EE 5 security permissions assigned to actual users in WebSphere Application Server? A. By mapping application roles to users or groups within the WebSphere user registry. B. By generating the users in application.xml which will be created in the registry during deploy time. C. By the WebSphere Application Server itself, automatically, by introspecting the classes in the application. D. By creating the users in the application itself which will be created in the registry during deploy time. Answer: A

Exactdumps.com

31

IBM 000-377 : Practice Test Question No : 84 - (Topic 1) An administrator adds a new node to a cell. They then add a new cluster member to that node. What should the administrator do to best ensure that the Web servers will be able to communicate with the new cluster members securely? A. Ensure that all Web servers have access to the new nodes personal certificate. B. Copy the plugin-cfg.xml files to all of the Web server <web-server_root>/config directories. C. Run the propagateCertificates script on the new node and specify the list of Web server. D. Propagate the new plug-in keystores to the appropriate directories on each of the existing Web server machines. Answer: D

Question No : 85 - (Topic 1) In creating a security plan, an architect needs to consider how to use multiple security domains within a WebSphere cell. Which one of the following would NOT be appropriate to consider? A. Nodes B. Servers C. Clusters D. Enterprise Applications Answer: D

Question No : 86 - (Topic 1) A security specialist for a WebSphere Application Server Network Deployment V7.0 cell is concerned about the data within the audit records. To protect the data, they configure audit record encryption using a keystore called AuditKeyStore which contains a new certificate called AuditCertificate. With that done, what is now needed to view the data? A. The password to the AuditCertificate B. The password to the AuditKeyStore C. The public key for the AuditCertificate D. Access to the console as administrator Answer: B

Exactdumps.com

32

IBM 000-377 : Practice Test

Question No : 87 - (Topic 1) In order to configure auditing within a WebSphere cell, which of the following is required? A. An administrative user account that has auditor role access must be used. B. The primary administrative user must be used to configure any auditing functions. C. The administrator must be defined within the auditor security domain and have cell level monitor access. D. The auditor encryption signer certificate must be added to the cellDefaultTrustStore and synchronized to all nodes within the cell. Answer: A

Question No : 88 - (Topic 1) An administrator would like to use fine-grained administrative security to manage service integration bus (SIBus) resources such as messaging engine. Identify what is required to enable this resource as part of fine-grained administration via the WebSphere Application Server administrative console. A. Define AdministrativeSecurityRole for SIBus resource. B. Scope SIBus messaging engine from server to cell level. C. SIBus messaging engine cannot be managed by fine-grained administration. D. Migrate WebSphere Application Server V6.1 to WebSphere Application Server V7 cell to manage SIBus messaging engine. Answer: C

Question No : 89 - (Topic 1) During installation, administrative security was enabled using the default file-based repository. After installation, the administrator must change the password that was provided during the installation. How can this password be changed? A. Invoke wsadmin and run the updateIdMgrFileRepository command to update the password. B. Manually edit the primary administrative users password in the fileRegistry.xml file. C. Use the Manage Users page in the administrative console and change the primary Exactdumps.com 33

IBM 000-377 : Practice Test administrative users password. D. Configure the Federated repositories realm using the administrative console and change the primary administrative users password. Answer: C

Question No : 90 - (Topic 1) A JMS client needs to access a secured service integration bus (SIBus) using a connection factory. When the administrator configures the connection factory, what must be done to grant the client permission to access the bus? A. Enable Java 2 security in the buss security domain. B. Enable the JMS client and the connection factory to use SSL protected transports. C. Map the connection factorys authentication alias to the bus connector role. D. Create a principal in the user registry for the JMS client to access connection factory. Answer: C

Question No : 91 - (Topic 1) What would have to be configured in order to implement memory-to-memory HTTP Session persistence? A. Dynamic cache service and HTTP plug-in B. Synchronization service and embedded Web server C. Distributed environment settings in the web containers D. Fast Response Cache Accelerator (FRCA) and external Web server Answer: C

Question No : 92 - (Topic 1) What is the Data Replication Service (DRS) used for? Please choose three from the following. A. Node agents B. Web servers C. Caching Proxy

Exactdumps.com

34

IBM 000-377 : Practice Test D. Dynamic cache replication E. HTTP session persistence and failover F. Stateful session EJB persistence and failover Answer: D,E,F

Question No : 93 - (Topic 1) Why does IBM WebSphere Application Server Network Deployment utilize node groups to implement a distributed environment? To: A. segment multiple security domains within a WebSphere cell. B. define the logical grouping of application servers to scale horizontally or vertically. C. enable mixed nodes with different capabilities within the same cell for administration purposes. D. allow application servers having the same applications installed to be grouped logically for workload management. Answer: C

Question No : 94 - (Topic 1) What can the system administrator do to distribute incoming HTTP traffic across a farm of Web servers? A. Enable server affinity for each HTTP server in the cluster B. Implement the Tivoli Access Manager as a load balancer C. Implement the caching proxy server component of the Edge Components D. Use the Load Balancer component of the Edge Components Answer: D

Question No : 95 - (Topic 1) Which type of server is recommended to be placed in the demilitarized zone (DMZ)? A. Generic servers B. Application servers C. Managed HTTP servers

Exactdumps.com

35

IBM 000-377 : Practice Test D. Unmanaged HTTP servers Answer: D

Question No : 96 - (Topic 1) In order for a deployment manager to participate in a flexible management environment, which one of the following steps must be completed? A. Register directly with the job manager. B. Register with the node agent on the job managers host. C. Register with an administrative agent on the job managers host D. First register with a local administrative agent, and then register with the job manager. Answer: A

Question No : 97 - (Topic 1) A system administrator needs to modify the configuration of an enterprise application within a flexible management environment. The system administrator can make the modification using wsadmin scripts by connecting to which of the following components? A. Node agent B. Job manager C. Work manager D. Administrative agent E. Deployment manager Answer: B,E

Question No : 98 - (Topic 1) Username and password are specified as parameters for the addNode command to authenticate with: A. the node agent if its administrative security is enabled. B. the addNode command itself since it is password protected. C. the node to be federated if its administrative security is enabled. D. the deployment manager if its administrative security is enabled.

Exactdumps.com

36

IBM 000-377 : Practice Test Answer: D

Question No : 99 - (Topic 1) An administrator wants to configure HTTP session replication, Stateful Session bean replication, and the Dynamic cache for members of a cluster. Which of these consumers should share a replication domain? A. Stateful Session Bean replication and Dynamic cache B. HTTP Session replication and Dynamic cache C. HTTP Session replication and Stateful Session Bean replication D. HTTP Session replication and messaging engine replication Answer: C

Question No : 100 - (Topic 1) A cluster, Cluster1, contains two servers, Server1 and Server2. Server1 has a weight of 2 and Server2 has a weight of 4. A single web server is used to route HTTP requests to Cluster1. The web server is started and receives 3 HTTP requests for an application deployed on Cluster1. Assuming no session affinity, how many requests will the plug-in route to Server2? A. 0 B. 1 C. 2 D. 3 Answer: C

Question No : 101 - (Topic 1) A cluster with 5 servers is configured as a member of a service integration bus (SIBus) using the Scalability with high availability messaging engine policy. What are the possible numbers of messaging engines that might be running on an individual server in the cluster? A. 1 B. 2 C. 3 Exactdumps.com 37

IBM 000-377 : Practice Test D. 4 E. 5 Answer: A,B

Question No : 102 - (Topic 1) Which one of the following is a true statement? A. A cluster can run multiple messaging engines for a single service integration bus (SIBus). B. A service integration bus (SIBus) destination can only exist on a single messaging engine C. A single service integration bus (SIBus) can span multiple WebSphere Application Server cells. D. A WebSphere Application Server Network Deployment cell can only contain a single service integration bus (SIBus). Answer: A

Question No : 103 - (Topic 1) An administrator wants to run a Web server on an unmanaged node with no administrative process. Which of the following issues result from this configuration? A. The administrative console will not be able to generate a plug-in configuration file for this Web server. B. Applications will not be able to use this Web server as a deployment target. C. The plug-in configuration file must be manually propagated to the Web server host. D. This Web server will not be able to perform workload management of requests to a cluster of application servers. Answer: C

Question No : 104 - (Topic 1) An administrator creates a horizontal cluster and deploys an application that uses several EJBs. How can the administrator ensure that EJB client requests are routed to the same node on which the client resides? Exactdumps.com 38

IBM 000-377 : Practice Test A. Enable the prefer local option for the cluster. B. Set the scope of the data source to node instead of cluster. C. Disable the ORBs workload management plug-in for each cluster member. D. Enable stateful session bean failover using memory-to-memory replication. Answer: A

Question No : 105 - (Topic 1) A user is taken through a series of Web pages in an online store and eventually checks out to complete his purchase. In the event of a server failure, the user should not have to repeat a step that has already been performed. Which session management strategy is best suited if the user cannot tolerate a loss in session information? A. Database persistence to external datastore B. Memory-to-memory replication in Both mode C. Memory-to-memory replication in Client mode D. Memory-to-memory replication in Server mode Answer: A

Question No : 106 - (Topic 1) The administrator ran into a memory leak problem. A .phd file was produced when an OutOfMemoryError occurred. Verbose:gc output indicated the heap was exhausted after running a period of 10 hours. Which tool is recommended for analyzing the memory problem? A. Log analyzer B. ISA Thread Dump Analyzer C. Memory Dump Diagnostic for Java (MDD4J) D. IBM Thread and Monitor Dump Analyzer (TMDA) Answer: C

Question No : 107 - (Topic 1) Which of the following will force a JVM thread dump.

Exactdumps.com

39

IBM 000-377 : Practice Test A. kill -9 <process-id> B. F SERVERNAME,JAVADUMP C. Using the wsadmin command prompt: jvm = AdminControl.completeServerNameList("type=JVM,process=server1,*") AdminControl.invoke(jvm, "dumpAllThreads") D. Using the wsadmin command prompt: jvm = AdminControl.completeServerNameList("type=JVM,process=server1,*") AdminControl.invoke(jvm, "dumpThreads") Answer: D

Question No : 108 - (Topic 1) When configuring a servers diagnostic trace service, in order to have trace level data written to the trace log, which one of the following tasks must be performed? A. Set the log detail level to fatal. B. Set the Trace Output Format to Advanced. C. Set the log detail level to fine, finer, finest or all. D. Use a trace string specification of com.ibm.*=detail. Answer: C

Question No : 109 - (Topic 1) As part of a diagnostic data collection plan, an administrator must gather server JVM logs and archive them every week. How can the administrator configure a server so that the logs are available for weekly archiving? A. Use the Advanced setting for log file formatting and rotation. B. Use the administrative console to set Runtime messages to Info. C. Use appropriate settings for log rotation and number of historical logs. D. Set the archive and log rotation values in the ffdcRun.properties file. Answer: C

Question No : 110 - (Topic 1) An administrator notices that the <profile_root>/logs directory is filling up with heapdump Exactdumps.com 40

IBM 000-377 : Practice Test and javacore files. Before analyzing these files, what should the administrator do to determine which application components might be causing these files to be dumped? A. Examine the application servers SystemErr.log and look for OutOfMemoryError exceptions and stack traces. B. Monitor the application servers JVM using Tivoli Performance Viewer and look for steady growth in the heap size. C. Use the Log Analyzer to view the application servers trace.log file and look for application startup failures. D. Gather the application servers verbose garbage collection data and look for relatively long garbage collection cycles. Answer: A

Question No : 111 - (Topic 1) An application server is producing heap dumps. Which tool in IBM Support Assistant (ISA) is used to perform analysis on the heap dump? A. Log Analyzer B. ThreadAnalyzer C. Trace and Request Analyzer D. Memory Dump Diagnostic for Java Answer: D

Question No : 112 - (Topic 1) An administrator has defined a connection factory, jms/CF, which is required by an application that runs on a cluster. Three of the clusters four members run the application without error. On the fourth member, a NameNotFoundException is thrown attempting to look up jms/CF. The administrator uses the dumpNameSpace command to examine the namespace of the fourth member and verifies that jms/CF is not in the namespace. What is the most likely cause? A. The fourth cluster member is running on a different operating system than the other three. B. The administrator has not defined the jms/CF connection factory at a scope visible to the fourth cluster member. C. The fourth cluster member has not been selected as a deployment target for the application. D. The administrator has specified a maximum of 3 connections on the jms/CF connection Exactdumps.com 41

IBM 000-377 : Practice Test factory. Answer: B

Exactdumps.com

42

You might also like