Pass the IBM IBM Advanced System Administrator-WebSphere Portal 8.5 C9510-401 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

A system administrator suspects that the slow performance of an application might be caused by lock contention.

To debug this further, what can the administrator do using IBM Support Assistant?

Options:

A.

Analyze the running server using IBM Monitoring and Diagnostic Tools for Java – Health Center.


B.

Collect a javacore and analyze it using IBM Monitoring and Diagnostic Tools for Java – Health Center.


C.

Collect three thread dumps at equal time intervals and analyze them using IBM Monitoring and Diagnostic Tools for Java – Dump Analyzer.


D.

Collect three system dumps at equal time intervals and analyze them using IBM Monitoring and Diagnostic Tools for Java – Memory Analyzer.


Expert Solution
Questions # 2:

A system administrator discovers an issue that requires a change to a federated server. In this cell, WebSphere administrative security is enabled, but application security is not enabled.

How should the administrator make this change?

The administrator should use:

Options:

A.

a web browser to connect to the node agent https port.


B.

a web browser to connect to the deployment manager admin_host port.


C.

the job manager to submit a job to update the unmanaged server.


D.

an ssh connection to the node and modify the client_types.xml file.


Expert Solution
Questions # 3:

A developer created an enterprise application which contained data source and security role information. The developer asked a system administrator to install this application to an application server where global security is enabled using the Integrated Solutions Console (ISC). A new data source was configured at the server scope for the use of this application. While load testing the application, the developer noticed that the attributes configured on the new data source were ignored by the application server.

How can the administrator ensure that the attributes configured on the new data source are used by the application server?

Options:

A.

Create the data source under cell scope instead of server scope.


B.

Delete any data source of the same name defined under node, cluster or cell scope.


C.

Reinstall the application and clear the Process embedded configuration check box.


D.

Correct the component-managed and container-managed authentication aliases set on the data source.


Expert Solution
Questions # 4:

A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.

What should the administrator do to implement the required security configuration?

Options:

A.

Install and configure a TAI (Trust Association Interceptor)


B.

Configure a security domain for the stand-alone LDAP server.


C.

Use Federated repositories and configure the supported entity types.


D.

Use Stand-alone custom registry and configure the flat file implementation.


Expert Solution
Questions # 5:

A system administrator needs to deploy a new enterprise application which requires that application security be enabled, but, the existing applications in the cell cannot be executed with application security enabled. The cell has the global security and Java 2 security disabled.

How can the administrator handle this requirement?

Options:

A.

Enable Java 2 security for the cell.

Create a security domain with application security enabled.

Associate the security domain to the new application.


B.

Enable Java 2 security for the cell.

Create a security domain with application security enabled.

Associate the security domain to a new cluster to be used to deploy the new application.


C.

Enable administrative security for the cell.

Create a security domain with application security enabled.

Associate the security domain at the application level for the new application.


D.

Enable administrative security for the cell.

Create a security domain with application security enabled.

Associate the security domain to the new cluster where the new application is deployed.


Expert Solution
Questions # 6:

A system administrator wants to learn some of the Python scripting commands for the administration of the environment.

Which product feature should the administrator use?

Options:

A.

The wsadmin.properties file to load a profile.


B.

The AdminTask object to generate wsadmin scripts.


C.

The guided activities panel from the Integrated Solutions Console (ISC).


D.

The "Log command assistance commands" option in the Integrated Solutions Console (ISC).


Expert Solution
Questions # 7:

A WebSphere system administrator needs to install the Installation Manager (IM) on an unmanaged node on a host named . The deployment manager is running on a host named .

What step must the administrator take before submitting a job from the Integrated Solutions Console (ISC) to install the IM on ?

Options:

A.

Install a node agent on .


B.

Install the job manager on .


C.

Start the job manager on .


D.

Register as a target for job manager.


Expert Solution
Questions # 8:

An application deployed to a multi-node cluster is reported to have slowness and hung threads. A system administrator is asked to review the logs on each node and identify if the hung threads are a false alarm.

How can the administrator determine that the hung threads are a false alarm?

Analyze the:

Options:

A.

ffdc logs


B.

SystemErr.log


C.

SystemOut.log


D.

native_stderr.log


Expert Solution
Questions # 9:

A system administrator needs to install WebSphere Application Server using response files, so that a silent install can be done. The administrator has ensured that all required prerequisites have already been installed and, has downloaded and expanded the required WebSphere Application Server installation files.

What can the administrator run to install the product?

Options:

A.

install –options responsefile.xml -silent


B.

install –acceptLicense –options responsefile.xml -silent


C.

imcl –acceptLicense input responsefile.xml –log logfile.txt


D.

IBMIM –acceptLicense –input responsefile.xml –log logfile.txt


Expert Solution
Questions # 10:

A new cell contains a cluster with members defined in two managed nodes running on two different machines. The cell also contains two unmanaged nodes running on HTTP servers with HTTP plug-in. Session persistence has been enabled.

Which additional component(s) can the system administrator configure to make this environment highly available?

Options:

A.

Enable administrative security.


B.

Configure a DMZ secure proxy.


C.

Configure High Performance Extensible Logging.


D.

Configure primary and backup load balancers for the HTTP servers.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions