000 340
http://www.TwPass.com
000-340
IBM
WebSphere Application Server V5.0, Basic Administration
http://www.twpass.com/twpass.com/exam.aspx?eCode= 000-340
The 000-340 practice exam is written and formatted by Certified Senior IT Professionals working in
today's prospering companies and data centers all over the world! The 000-340 Practice Test covers all
the exam topics and objectives and will prepare you for success quickly and efficiently.
The 000-340 exam is very challenging, but with our 000-340 questions and answers practice exam,
you can feel confident in obtaining your success on the 000-340 exam on your FIRST TRY!
IBM 000-340 Exam Features
- Detailed questions and answers for 000-340 exam
- Try a demo before buying any IBM exam
- 000-340 questions and answers, updated regularly
- Verified 000-340 answers by Experts and bear almost 100% accuracy
- 000-340 tested and verified before publishing
- 000-340 exam questions with exhibits
- 000-340 same questions as real exam with multiple choice options
Acquiring IBM certifications are becoming a huge task in the field of I.T. More over these
exams like 000-340 exam are now continuously updating and accepting this challenge is itself a task.
This 000-340 test is an important part of IBM certifications. We have the resources to
prepare you for this. The 000-340 exam is essential and core part of IBM certifications and
once you clear the exam you will be able to solve the real life problems yourself.Want to take
advantage of the Real 000-340 Test and save time and money while developing your skills to pass
your IBM 000-340 Exam? Let us help you climb that ladder of success and pass your 000-340 now!
000-340
QUESTION: 1
What is the MOST important security task an Administrator will perform after installing the
IBM WebSphere Application Server, V5.0?
A. Assign method groups for EJB methods
B. Enable Java 2 Security
C. Set realm and challenge type
D. Enable security to protect the WebSphere administrative cell
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=1
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 2
Whenever an Entity Bean tries to access a database located on a remote machine, the
administrator receives an error message. What is the MOST likely cause for this error message?
A. Network connectivity has been lost
B. The Web server is not configured to run beans
C. The Administrative Server has quit running
D. The Servlet Redirector is not performing workload management correctly
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=2
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 3
When should an administrator regenerate the plug-in configuration file?
A. After editing other configuration files required by the application server
B. After changing a servlet s package name
C. After manually editing the plug-in configuration file
D. After installing or removing an Enterprise Application
E. The plug-in configuration file never needs to be regenerated.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=3
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 4
The "restoreConfig myBackupConfig nostop" command restores a node s configuration from a
backup called myBackupConfig BUT ___________ .
A. does not stop the restoration process if synchronization errors occur - restoring
everything EXCEPT what caused the error
B. does not stop the restoration process if synchronization errors occur - restoring
everything INCLUDING what caused the error
C. does not stop the servers, which could allow a synchronization during restore
D. does not stop an incoming request to the application being restored if the request can
execute without errors
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=4
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 5
Which of the following properties can be specified when creating a Web module?
A. Security Constraints
B. Web Resource Collections, HTTP methods, and URL patterns
C. Transport Protocols
D. Local & Remote EJB Interfaces
E. Plug-In Routing Options
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=5
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 6
Which of the following services are provided by the application server in IBM WebSphere
Application Server, V5.0?
A. Client Container Service
B. Security Service
C. Transaction Management Service
D. JNDI Naming Service
E. Integral JMS Service
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=6
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 7
At deployment time, security roles can be mapped to users, groups of users, or special subjects
in IBM WebSphere Application Server, V5.0. Which of the following are defined as special
subjects?
A. Everyone
B. Authorized Users
C. EJB Users
D. All Authenticated Users
E. Administrative Users
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=7
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 8
Given a nonNetwork Deployment installation, which of the following statements characterizes
the WebSphere Administrative Console?
A. It runs in its own Java Virtual Machine.
B. It can be downloaded from a remote machine.
C. In the base configuration, it runs on the application server and can manage only that
application server.
D. It connects directly to the Administrative Repository.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=8
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 9
WebSphere application servers interact with each other via which security protocols, assuming
Global Security is enabled?
A. RMI/IIOP
B. IIOP
C. HTTPS
D. CSIv2
E. SAS
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=9
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 10
Which of the following are reasons to separate the Web Container and the EJB Container ?
A. For availability
B. For better performance
C. For security
D. For failover
E. For easy maintenance
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=10
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 11
Which of the following are NOT associated with a WAR file?
A. DD
B. IBM Extensions
C. DTD
D. servlets
E. schema attributes
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=11
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 12
During installation of the IBM WebSphere Application Server, V5.0 Network Deployment
Manager, the user will be prompted to enter _______ .
A. node name, host name, cell name
B. node name, IP address, network administrator password
C. clone name, node name, fully qualified host name
D. domain name, cell name, IP address
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=12
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 13
Which log is written in a binary format that captures events that show a history of the
WebSphere Application Server, V5.0 s actions?
A. JVM log
B. native log
C. event log
D. activity log
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=13
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 14
Which of the following prerequisites must be met before the JNDI dumpNameSpace utility can
be used?
A. The Administrative Console must be used to perform the dumpNameSpace.
B. The PATH environment variable must be set to include the
<as_root>/bin/dumpNameSpace.bat command before invoking.
C. The AdminServer containing the application that the administrator will be
performing the JNDI dump against, must be active.
D. The application server that an administrator will be performing the JNDI dump
against, must be active.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=14
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 15
To provide JNDI Naming Service, the CosNaming Service utilizes which of the following
ports?
A. 2809
B. 900
C. 9000
D. 50000
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=15
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 16
Which of the following statements regarding IBM WebSphere Application Server, V5.0 Log
Analyzer is TRUE?
A. It supports functions for ORB trace formatting and message IDs.
B. It is capable of downloading the latest symptom XML file from the IBM support site.
C. It can be used to view remote log files.
D. It creates an activity.log file that can be viewed with any text editor.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=16
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 17
WebSphere application servers interact with each other via which security protocols, assuming
Global Security is enabled?
A. RMI/IIOP
B. CSIv2
C. IIOP
D. SAS
E. HTTPS
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=17
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 18
An application needs to be redeployed because the quality assurance team has just approved a
bug fix and delivered a new .ear file. Using the WebSphere Administrative Console, what
should be done to redeploy this application?
A. Applications -> Enterprise Applications -> Export, Stop, Update, Export, Start
B. Applications -> Enterprise Applications -> Stop, Uninstall, Install, Start
C. Applications -> Enterprise Applications -> Update
D. Applications -> Enterprise Applications -> Uninstall, Install
E. Applications -> Enterprise Applications -> Stop, Update, Export, Start
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=18
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 19
The security services for the IBM WebSphere Application Server, V5.0 are controlled by
which of the following services?
A. Edge Server
B. Application Server
C. Administrative subsystem
D. Web server plug-in
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=19
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 20
In which circumstances might the LDAP server port have to be specified rather than accept the
default port?
A. When the "Bootstrap port" has been reset to the LDAP default port
B. When multiple IBM WebSphere Application Servers are installed and configured to
run in the same "Single Sign On" (SSO) domain
C. If the IBM WebSphere Application Server, V5.0 will inter-operate with a previous
(e.g. Version 4.x) version IBM WebSphere Application Server, V5.0
D. When the port has been pre empted by IIOP
E. When it is required for the "secure port" and the "LDAP port" to be shared between
two or more IBM WebSphere Application Servers
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=20
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 21
When should an administrator manually regenerate the plug-in configuration file?
A. For any remote application servers that require components or services from another
application server whose plug-in was edited
B. When a plug-in is generated on one operating system and needs to be copied to a
remote operating system
C. When Enterprise Applications are also "manually" removed from the application
server
D. When security roles were edited for components referenced by the plug-in
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=21
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 22
Which of the following tasks can be performed using the Application Assembly Tool (AAT)?
A. Modify the binding information attributes and IBM extension attributes
B. Create/Edit SDK Applications
C. Create the EAR expansion directory
D. Create/Edit J2EE modules
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=22
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 23
The Administrative Console provides multiple methods to help an administrator troubleshoot
the system. Which of the following are examples of these methods?
A. Trace
B. Online help
C. Debug
D. First Failure Data Capture
E. Symptom database
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=23
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 24
Which of the following statements are TRUE with regards to IBM WebSphere Application
Server, V5.0 security?
A. When Global Security is first enabled, only resources of the administrative
application are protected.
B. When Global Security is first enabled, only EJBs are protected.
C. IBM WebSphere Application Server, V5.0 protects URL s served by WebSphere.
D. IBM WebSphere Application Server, V5.0 protects URL s served by an external
Web server.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=24
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 25
A WebSphere V5.0 datasource has been created for an application that needs to be deployed.
The application uses CMP 2.0 beans. What must be done to the datasource in the WebSphere
Administrative Console to successfully deploy and run the application on WebSphere
Application Server, V5.0?
A. Nothing. Simply creating the datasource is enough.
B. Select the Container Managed Persistence checkbox
C. Select the AppServer Managed Persistence checkbox
D. Select the Component Managed Persistence checkbox
E. Select the Bean Managed Persistence checkbox
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=25
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 26
Which of the following statements regarding traces are TRUE?
A. Traces provide detailed solutions to common problems.
B. Traces must be configured from the Administrator s console.
C. Traces show the time and sequence of methods called by WAS base classes.
D. Traces need manual activation.
E. Traces may impact performance severely.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=26
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 27
Two new .jsp files need to be deployed immediately. Given that WebSphere supports hot
deployment of .jsp files, what needs to be done to deploy the file to the desired application
without restarting the application?
A. Package the files into a new .ear file and use the Hot Deploy of EAR file in the
Admin console
B. Place the .jsp files in "<expanded_application_files_directory>/<web_module>.war/"
directory
C. Place the files in the "<was_root>/hotDeploy" directory and run the hotDeploy.bat
(or hotDeploy.sh) script
D. It is impossible to deploy the .jsp files without first repackaging the entire .ear using
the AAT tool.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=27
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 28
How should an administrator install a PTF to IBM WebSphere Application Server, V5.0?
A. Use the install.sh (Unix) or install.bat (Intel) command shipped with the PTF
B. Uninstall any previous PTFs
C. Use the operating system s standard process for applying updates to software
D. Copy the JAR into the <WASROOT>/ AppServer/efix directory, and add the JAR to
the IBM WebSphere Administration Server, V5.0 s classpath
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=28
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 29
Where is the default location of Web server plug-in configuration file?
A. <as_root>/config/cells/plugin-cfg.xml
B. <as_root>/properties/plugin-cfg.xml
C. <as_root>/config/plugin-cfg.xml
D. <as_root>/properties/cells/plugin-cfg.xml
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=29
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 30
The Application Assembly Tool interface includes which of the following?
A. A main window for creating, viewing, and editing modules
B. Wizard to import an LDAP security registry
C. Tooling to create & test basic servlet code
D. Property dialog boxes for creating new objects and for module modification
E. Wizards for creating and installing applications
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=30
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 31
What advantages does Extended Messaging provide to a WebSphere MQ JMS
implementation?
A. Connection Pooling
B. Remote Capability
C. Improved Performance
D. Synchronous Messaging
E. Improved performance of a message listener
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=31
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 32
CPU use is being overloaded and performance on the Web server is down. What action could
be taken to improve performance of handling incoming requests?
A. Lower the KeepAlive directive
B. Increase the KeepAlive directive
C. Increase the StartServers directive to enable more initial processes
D. Increase the MaxServers directive to enable more potential processes
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=32
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 33
Which of the following WebSphere tools can be used to map users to security roles?
A. Tivoli Access Manager
B. EJBDeploy
C. Application Assembly Tool
D. WebSphere Administrative Console
E. WSAdmin tool
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=33
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 34
Given an installation of IBM WebSphere Application Server, V5.0 that has an Enterprise
Application installed named TestApp and the following file: test.jacl
#============================= $AdminApp uninstall TestApp
#========================== At a command prompt you enter the following: (unix)>
wsadmin.sh -f test.jacl or (windows)> wsadmin.bat -f test.jacl What output would be seen
when executing the following command? wsadmin> $AdminApp list
A. A list of Enterprise Applications currently installed excluding TestApp
B. An empty list, $AdminApp uninstall TestApp removed all applications from the
server
C. An error message, $AdminApp list is not valid
D. A list of Enterprise Applications currently installed including TestApp
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=34
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 35
When installing IBM WebSphere Application Server, V5.0 and the Web server plug-in on a
machine that has an existing Web server, the administrator will need to ________ .
A. stop the IBM WebSphere Application Server, V5.0 during the install. The
application server configuration file will be updated as a part of the installation
B. start the IBM WebSphere Application Server, V5.0 during the install. The
application server configuration file will be updated as a part of the installation
C. start the database. The database server configuration file will be updated as a part of
the installation
D. stop the Web server during the install. The Web server configuration file will be
updated as a part of the installation
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=35
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 36
Which output filename conforms to the format created by the Collector Tool?
A. hostname-|Base-WASenv.log
B. servername-|Base-Wasenv.jar
C. hostname-|Base_WASenv.jar
D. servername-|Base_WASenv.log
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=36
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 37
Which authentication method permits a site-specific login through an HTML page or JSP?
A. Client-certificate authentication
B. Basic authentication
C. Digest Authentication
D. Form-based authentication
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=37
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 38
Which of the following are values that can be filtered using the Runtime Events Console
messaging facility?
A. TimeStamp
B. Message
C. Message Originator
D. Severity
E. Component
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=38
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 39
Immediately after installation, to test the correct independent operation of the Web server, open
a browser to the following URL: _________ .
A. http://localhost/testpage.html
B. http://localhost/servlet/testserver
C. http://localhost/servlet/snoop
D. http://localhost/
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=39
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 40
Which of the following OS tasks must be performed when preparing to install IBM WebSphere
Application Server, V5.0?
A. Check network connectivity
B. Alias the network interface card
C. Check disk space (at least the minimum required for the OS)
D. Check ODBC driver levels
E. Install a management tool such as Tivoli GEM
F. Check memory (at least the minimum required for the OS)
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=40
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 41
At which level can session management NOT be configured?
A. Application server
B. Application
C. Web container
D. Web module
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=41
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 42
The server initialization messages will appear in the message box on the "First Steps Window".
If the server fails to initialize, which of the following file(s) should be checked?
A. installDefaultApplication.log
B. startServer.log and systemOut.log
C. log.txt
D. ivt.log and native_stdout.log
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=42
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 43
When multiple Web servers and cloned application servers are configured, Network Dispatcher
supports load balancing between ________ .
A. browsers and Web servers
B. client applications and EJB containers
C. Web containers and EJB containers
D. Web servers and Web containers
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=43
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 44
What best describes setting the Initial Heap Size close to or equal to the Maximum Heap Size ?
A. High performance Web applications waste more processing power on low
performance functions
B. Garbage collection cycles are fewer, but have a longer duration that can affect
performance
C. Low performance Web applications spend more processing power than necessary on
low performance functions
D. Garbage collection cycles are more frequent that can affect performance
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=44
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 45
Which of the following reasons for using persistent session management is FALSE?
A. For keeping the user s state information permanently for consistent interaction
B. For controlling the number of sessions allowed in memory at any given time by
sending cache overflow to a persistent session store
C. When the user s session data is too valuable to lose through unexpected failure at the
WebSphere node
D. For recovering the user s session data by another cluster member after a cluster
member in a cluster failed or is shut down
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=45
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 46
Which of the following statements is TRUE regarding setting a Thread inactivity timeout ?
A. Setting it to 0 does not reclaim threads.
B. Setting it to 1 waits 1 second until a thread is reclaimed.
C. Setting it to -1 does not reclaim threads.
D. It must be set to a positive number.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=46
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 47
Which command line utility shows JNDI directory content?
A. dumpNameSpace
B. XMLConfig
C. Tivoli Performance Viewer
D. clientConfig
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=47
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 48
Which of the following OS tasks must be performed when preparing to install IBM WebSphere
Application Server, V5.0?
A. Install a management tool such as Tivoli GEM
B. Check network connectivity
C. Alias the network interface card
D. Check ODBC driver levels
E. Check disk space (at least the minimum required for the OS)
F. Check memory (at least the minimum required for the OS)
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=48
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 49
A new version of a highly customizable application needs to be deployed on a server but the
administrator sees no need to reinstall the WebSphere JAR files and JRE. The administrator
needs distinct configuration files from the cell level downward. Which of the following
procedures will accomplish this goal?
A. Use the cp or copy command to create a copy of the WebSphere install directories
B. Use the wsinstance command to create a separate set of WebSphere directories
C. Run the setup for IBM WebSphere Application Server, V5.0 from the install C
D. It automatically detects an existing install and creates a secondary shared instance of
WebSphere.
D. Use the clientConfig.bat (or clientConfig.sh) to create a new set of configuration files
and directories
E. Create a second application server from the WebSphere Administrative Console
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=49
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 50
If an administrator has set up a three server cluster that all share a single data source and that
data source has a "maximum connections" setting of 15, how many possible connections to a
database could each server generate?
A. 13 total concurrent connections across all servers because sharing connections locks
1 connection for every additional server
B. Up to 5 connections evenly dispersed over each server even if one or more servers
are not utilizing all 5
C. Up to 15 connections each for as many as 45 total concurrent connections from all
three servers
D. Up to 15 connections BUT the sum of all three servers cannot exceed 15
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=50
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 51
Which components in the IBM WebSphere Application Server, V5.0 make use of Java 2
Connection Authentication data entries?
A. JDBC data source
B. Shared libraries
C. Resource adapters
D. Mail Providers
E. URL Providers
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=51
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 52
How does the Starting Weight affect Enterprise Applications installed in IBM WebSphere
Application Server, V5.0?
A. Specifies the starting order of applications when the server is started or restarted with
lower weighted applications starting first
B. Lower weights get more processing power before applications with higher weights
C. Specifies the starting order of applications when the server is started or restarted with
higher weighted applications starting first
D. Higher weights get more processing power compared to other applications with
lower weights
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=52
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 53
Which of the following tools gathers information about an IBM WebSphere Application
Server, V5.0 installation and packages it to be sent to IBM Customer Support?
A. Log Analyzer
B. Diagnostic Trace Service
C. Collector Tool
D. Application Assembly Tool
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=53
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 54
Which of the following phrases best describe the concept of a cluster and cluster members as it
is used in the IBM WebSphere Application Server Administrative Domain?
A. A set of servers that are managed together
B. A single object for administering all clones
C. A blueprint for designing Enterprise Applications
D. A set of servers that have identical configuration data
E. A set of servers that participate in workload management
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=54
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 55
The level of detail collected in the activity log for use by Log Analyzer can be set by editing
which file?
A. <was_root>/properties/media.properties
B. <was_root>/properties/logbr/ivblogbr.properties
C. <was_root>/properties/TraceSettings.properties
D. <was_root>/properties/encoding.properties
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=55
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 56
After installation, how can an administrator test to see that the Web server is active?
A. Check the stderr.txt file for errors
B. From a remote node, use a browser to access the URL, http://<IP address of Web
server host>
C. Ping the Web server host from a remote node
D. Using a browser on the local machine, access the URL, http://localhost
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=56
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 57
Which of the following is a typical reason for implementing vertical scaling?
A. To eliminate a single point of failure
B. To fully utilize all of available resources of a node
C. To improve the performance of individual application servers
D. To distribute resources over multiple nodes for failover
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=57
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 58
An administrator needs to monitor the percentage of database connections in use for a specific
application server. Which of the following tools could the administrator use?
A. WebSphere Administrative Console
B. Tivoli Performance Viewer
C. First Steps
D. Log Analyzer
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=58
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 59
Which of the following does NOT appear in the IBM WebSphere Application Server, V5.0 log
file?
A. thread id
B. message type
C. timestamp
D. job number or process id
E. component
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=59
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 60
An IBM WebSphere Application Server, V5.0 is running on a 4-CPU machine, with 512M of
RAM, and 4 Gig of page space. Initial heap size is set to 64M and the maximum is set to
256M. Tivoli Performance Viewer shows a staircase-like graph of the memory used. What is
the likely cause of the problem?
A. Incorrect Java SDK is being used
B. There is a memory leak in the application
C. The JVM maximum heap size is not large enough
D. More paging space is needed
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=60
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 61
Which of the following statements are TRUE with respect to administrative security?
A. WebSphere Application Server had to extend the J2EE security role based access
control to include administrative roles.
B. Because the administrative security configuration is at node level, it is not necessary
to restart all of the servers.
C. WebSphere Application Server administrative security is automatically enforced
when global security is enabled.
D. The administrative roles are defined to permit WebSphere Application Server
administrative functions only from the Web-based administrative console.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=61
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 62
Which of the following statements is TRUE?
A. Web applications in different Enterprise Applications can access the same session.
B. Cookie, URL rewriting and SSL session IDs are provided as a session tracking
mechanism.
C. The cookie domain value dictates to the browser whether or not to send a cookie to a
particular node.
D. With session affinity, all cluster members in a cluster can share session information.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=62
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 63
An administrator has been monitoring incoming network traffic to a node and has noted a 25%
increase above design specifications. Analysis shows that most of the requests are for a specific
Web application. What action might help alleviate this problem?
A. Adjust the ping interval between the administrative server and the application server
B. Create a clone of the application server on the same node
C. Increase the TCP/IP stack timeout
D. Edit the application server to handle more user connections
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=63
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 64
A systems expert has been asked to install and configure the IBM WebSphere Application
Server, V5.0 with a high level of security. Given this, which of the following should NOT
reside in the DMZ zone of a firewall configuration?
A. XML Configuration Repository
B. Web server
C. Application Server
D. The Network Dispatcher
E. Caching proxy server
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=64
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 65
The J2EE Specification defines four authentication methods for Web components. Which of
the following methods are supported by IBM WebSphere Application Server, V5.0?
A. HTTP Basic Authentication
B. HTTP Digest Authentication
C. HTTPS Client Certificate Authentication
D. Form Based Authentication
E. HTTP Client Certificate Authentication
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=65
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 66
What is the environment variable that points to the location where the JDK is installed?
A. JAVA_HOME
B. JDK_HOME
C. JAR_HOME
D. JAV_HOME
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=66
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 67
Which of the following statements are TRUE with regards to Workload management?
A. IBM WebSphere Application Server, V5.0 workload management policies can be
applied to existing IBM WebSphere Application Server V4 servers.
B. Clusters and cluster members provide the necessary support for workload
management, failover, and scalability.
C. Horizontal clustering across different platforms and operating systems is not
supported.
D. No limits on number of nodes and application servers that can be used in a single
cell.
E. If a cluster is started or stopped, all members of that cluster are started or stopped at
the same time.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=67
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 68
From the WebSphere Administrative Console, the administrator installs an Enterprise
Application which contains 2 Web modules onto a single application server. Web Module 1
requires that Web Module 2 is started before it is initialized. What can be done to ensure that
Web Module 2 always gets started first?
A. Set the starting weight of the Web modules so that Web Module 2 has a lower
starting weight than Web Module 1
B. Install the Web modules onto different application servers and manually start the
server containing Web Module 2 first
C. Set the starting weight of the Web modules so that Web Module 2 has a higher
starting weight than Web Module 1
D. Inform management that the application must be sent back to development so they
can code for this problem
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=68
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 69
Which authentication method permits a site-specific login through an HTML page or JSP?
A. Client-certificate authentication
B. Basic authentication
C. Form-based authentication
D. Digest Authentication
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=69
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 70
An administrator just deployed a new application to IBM WebSphere Application Server, V5.0
and is getting "404 File not Found" errors when trying to reach the application from a browser.
The administrator realizes that the Web server plug-in needs to be regenerated. What should be
done to get the plug-in regenerated immediately without shutting down the server?
A. Restart the Web server plug-in
B. Send a mass email giving users 10 min to wrap up, then reboot the server
C. Click Environment > Update Web Server Plug-in in the WebSphere Administrative
Console navigation tree
D. Set the reroute options so that the Web server is temporarily unavailable while the
modifications are made
E. Run the GenPluginCfg.sh (or GenPluginCfg.bat)
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=70
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 71
An IBM WebSphere Application Server administrator needs to build and attach a custom
method group to a servlet. Which of the following tasks need to be performed by the
administrator from the Administrative Console?
A. Configure Resource Security
B. Synchronize cell agents
C. Work with Method Groups
D. Configure Application Security
E. Assign Permissions
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=71
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 72
What are the options for specifying the trace output format?
A. Advanced
B. Maximum
C. Log Analyzer
D. Standard
E. Basic
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=72
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 73
When setting up servlet caching, what is the purpose of assigning Caching group members ?
A. A list of servlets and JSPs to cache when used
B. Groups JSP, HTML, and other resources with a particular servlet that uses them and
may need to be cached with the servlet
C. Specifies which users or roles receive cached copies or regenerated servlets and JSPs
D. Specifies whether or not to cache all resources associated with a servlet or JSP
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=73
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 74
Which of the following statements are TRUE with respect to Java 2 Security configuration?
A. It is enabled by default.
B. It is enabled automatically when JAAS is enforced.
C. It is enabled automatically when Global Security is enabled.
D. It can be disabled or enabled independently of Global Security.
E. It can be made more restrictive due to the AccessControlExceptions generated within
the WebSphere Application Server.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=74
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 75
Which of the following are TRUE statements with respect to distributed administration
configuration files?
A. Any changes made at a node level will be pushed up to the Deployment Manager at
the next synchronization.
B. The master configuration file is contained in the Deployment Manager.
C. The File Transfer Service is invoked by node agents to transfer file changes from the
master repository to the node s local copy.
D. The master configuration file includes a serverindex.xml file for each node.
E. Any changes made by a managed server process will be written to the master
configuration file.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=75
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 76
A Web site, that does not make use of certificates, must store information within a given user s
session. What could an administrator do to make sure that session tracking can still take place,
even if the user has disabled cookies? In the Administrative Console, make sure that:
A. "Enable Protocol Switch Rewriting" is enabled
B. "Enable Cookies" is disabled
C. "Enable SSL ID Tracking" is enabled
D. "Enable URL Rewriting" is enabled
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=76
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 77
A systems expert has been asked to design an IBM WebSphere Application Server, V5.0
architecture that will meet very high levels of security. Given that the expert will use
encryption, which of the following direct connection paths need to be encrypted with SSL?
A. Web server plug-in to Web container
B. Web server plug-in to Web server
C. Reverse Proxy Server to Web server plug-in
D. Web server to administrative subsystem
E. Web browser to Web server
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=77
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 78
What is the purpose of resource adapters?
A. Allow Web applications to access Web services
B. Allow J2EE resources to connect to one another
C. Allow EJBs to communicate with one another
D. Connect to an enterprise information system
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=78
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 79
Which of the following does NOT appear in the IBM WebSphere Application Server, V5.0 log
file?
A. thread id
B. timestamp
C. job number or process id
D. message type
E. component
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=79
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 80
A system administrator is creating Ant deployment scripts to automate the deployment process.
The stage is reached when a task definition needs to be created to actually install the
application on WebSphere. What task definition is appropriate to accomplish this?
A. <taskdef name="wsInstallApp"
classname="org.apache.tools.ant.tasks.InstallApplication"/>
B. <taskdef name="wsInstallApp" classname="com.ibm.websphere.ant.*"/>
C. <taskdef name="wsInstallApp"
classname="com.ibm.websphere.ant.InstallApplication"/>
D. <taskdef name="wsInstallApp"
classname="com.ibm.apache.tools.ant.tasks.InstallApplication"/>
E. <taskdef name="wsInstallApp"
classname="com.ibm.websphere.ant.tasks.InstallApplication"/>
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=80
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 81
When a resource is requested by a Web client, which is served by the application server, which
component performs the initial access control?
A. The Administrative Subsystem
B. The EJB container
C. The Web container
D. The EJS Security Collaborator
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=81
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 82
An administrator has successfully completed a default installation of both the application server
and Web server. Which of the following locations contains the configuration files that need to
be backed up for the Web server plug-in?
A. /Program Files/IBM HTTP Server/
B. < as_root >/AppServer/properties/
C. < as_root >/AppServer/config/
D. < as_root >/AppServer/bin/
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=82
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 83
When setting up the LDAP registry, the "Base Distinguished Name" field refers to
____________ .
A. an LDAP directory ID
B. the name used by the IBM WebSphere Application Server, V5.0 client when
authenticating to LDAP for a search
C. where the LDAP server resides
D. the root of the LDAP directory for searches
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=83
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 84
An administrator cannot run a particular node agent because the node configuration does not
match the Deployment Manager s cell configuration. Which command script is necessary to fix
the node s configuration?
A. restoreConfig will restore a node s configuration settings based on the cell
configuration
B. startManager can be used to restart a node as well as the Deployment Manager by
passing start_dmgr as a value for its script parameter
C. cleanupNode overwrites a node s current configuration with the settings of the parent
cell
D. syncNode forces a configuration synchronization between a node and the cell in
which the node is configured
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=84
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 85
Given a DMZ scenario with the application server behind the second firewall, which IBM
WebSphere Application Server, V5.0 component would MOST effectively reside on the
machine in the DMZ?
A. Web Services engine
B. Administrative subsystem
C. Web server plug-in
D. Web server
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=85
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 86
During installation of the IBM WebSphere Application Server, V5.0 Network Deployment
Manager, the user will be prompted to enter _______ .
A. node name, host name, cell name
B. node name, IP address, network administrator password
C. clone name, node name, fully qualified host name
D. domain name, cell name, IP address
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=86
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 87
Given the following JNDI name space: Name Space 1 ------------ Context - nsa EJB Home E nsa/ejba EJB Home F - nsa/ejbb Name Space 2 ------------ Context - nsb EJB Home X nsb/ejba EJB Home Y - nsb/ejbb If a federated binding "nsc" is created to bind "nsb" under
"nsa", what lookup name would correctly reference EJB Home X in Name Space 1?
A. nsa/nsc/nsb/ejba
B. comp-env/ejb/ejba
C. nsa/nsc/ejba
D. nsb/ejba
E. nsc/ejba
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=87
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 88
What does enabling "Security Integration" for the session manager do?
A. Stores role and security configuration settings in the HTTP session
B. Enables the security manager to configure HTTP session configurations on a per user
basis
C. Associates the users with their HTTP session information
D. Stores HTTP session data in a third party security system like Tivoli Access
Manager
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=88
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 89
An application requires that the HTTP session must not time out. What is required to
accomplish this requirement?
A. Preventing a session from reaching the timeout specified in the Session Manager
must be done programmatically
B. The transport node within the server node of the plug-in configuration files specifies
whether or not to use a specific timeout
C. Set the "Session timeout" minutes to a non-positive number
D. Select "No timeout" in the Session Manager
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=89
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 90
Which of the following is NOT an IBM WebSphere Application Server, V5.0 custom
installation feature option?
A. Log Analyzer
B. Web Services Gateway
C. Javadocs
D. Ant
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=90
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 91
Which of the following provides important information regarding configuration problems?
A. Traces
B. Log Files
C. Administrative console messages
D. FFDC
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=91
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 92
Java 2 Security guards access to which of the following system resources?
A. EJB methods
B. sockets
C. JSPs
D. servlets
E. file I/O
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=92
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 93
An administrator is having problems running WSAdmin and is getting messages similar to
"The configuration service is not available". Which of the following is the most probable
cause?
A. The administrative client is not permitted to access that particular application server
B. No network connectivity between the administrative client and the application server
C. The administrator does not have sufficient rights to run administrative utilities
D. An incorrect configuration of the administrative client
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=93
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 94
An administrator is writing a deployment script to configure a JDBC Provider in the script.
Using the WSAdmin tool, how would the administrator determine which parameters are
required to create a new JDBC provider?
A. $AdminApp required JDBCProvider
B. $AdminConfig required JDBCProvider
C. $AdminApp list JDBCProvider required
D. $AdminConfig list JDBCProvider
E. $AdminConfig show JDBCProvider required
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=94
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 95
Which of the following will NOT achieve improved performance when IBM HTTP Server s
Cache Accelerator is enabled?
A. Files that are protected
B. When using multiple Web servers
C. Files with dynamically generated content
D. Web servers with multiple IP addresses
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=95
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 96
Which of the following services are provided by the application server in IBM WebSphere
Application Server, V5.0?
A. Client Container Service
B. Security Service
C. Transaction Management Service
D. JNDI Naming Service
E. Integral JMS Service
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=96
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 97
Which protocol is used to access directly an application server on a node remote from the Web
server?
A. HTTP
B. SNMP
C. OSE
D. IIOP
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=97
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 98
The files and directories that are constructed during the installation of the IBM WebSphere
Application Server, V5.0 _______________ .
A. are accessible only by a privileged user (e.g. Root, Administrator)
B. could be accessible to anyone who logs onto the host where the files and directories
reside
C. may contain user IDs and clear text passwords
D. are stored as hidden files and directories
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=98
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 99
When installing IBM WebSphere Application Server, V5.0 and the Web server plug-in on a
machine that has an existing Web server, the administrator will need to ________ .
A. stop the IBM WebSphere Application Server, V5.0 during the install. The
application server configuration file will be updated as a part of the installation
B. start the database. The database server configuration file will be updated as a part of
the installation
C. stop the Web server during the install. The Web server configuration file will be
updated as a part of the installation
D. start the IBM WebSphere Application Server, V5.0 during the install. The
application server configuration file will be updated as a part of the installation
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=99
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 100
Which of the following methods are supported for sharing session information among the
servers in a clustered environment?
A. Directory persistence
B. Cache-to-Cache session state replication
C. Memory-to-Memory session state replication
D. Database persistence
E. File system persistence
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=100
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 101
What does "restoreConfig" do?
A. It fixes a corrupted node based on the Deployment Manager settings.
B. It fixes a corrupted cell based on the Deployment Manager settings.
C. It returns the state of the server to its initial newly installed settings.
D. It replaces the current configuration settings with a previously backed-up copy.
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=101
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 102
When binding an object to JNDI, it can be relative to which of the following context roots?
A. Application root
B. Server root
C. J2EE module root
D. Cell persistent root
E. Node persistent root
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=102
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 103
The removeNode command line utility, when executed from any node to detach itself from a
cell, does which of the following actions?
A. Stops all running server processes on the node
B. Maintains all configuration changes after joining the cell
C. Runs from the bin directory of the Deployment Manager
D. Restores the backed-up original base configuration
E. Deletes the node s queue manager
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=103
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 104
An IBM WebSphere Application Server, V5.0 log file contains a message type of "E". What
does the "E" signify?
A. Event
B. Error
C. Exception
D. Entry to a method
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=104
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 105
What is the environment variable that points to the location where the JDK is installed?
A. JAR_HOME
B. JDK_HOME
C. JAV_HOME
D. JAVA_HOME
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=105
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 106
Which of the following is NOT a valid property for configuring the WebSphere internal JMS
server?
A. Initial State
B. Queued Port
C. Queue Name
D. Host Name
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=106
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 107
Which of the following is NOT an IBM WebSphere Application Server, V5.0 custom
installation feature option?
A. Ant
B. Web Services Gateway
C. Log Analyzer
D. Javadocs
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=107
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 108
An IBM WebSphere Application Server, V5.0 log file contains a message type of "E". What
does the "E" signify?
A. Error
B. Exception
C. Event
D. Entry to a method
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=108
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 109
Which of the following is the default synchronization interval between nodes and Deployment
Manager?
A. 120 seconds
B. 60 seconds
C. 45 seconds
D. 30 seconds
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=109
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 110
Which of the following are values that can be filtered using the Runtime Events Console
messaging facility?
A. Severity
B. Component
C. Message
D. TimeStamp
E. Message Originator
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=110
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 111
How should an administrator install a PTF to IBM WebSphere Application Server, V5.0?
A. Use the install.sh (Unix) or install.bat (Intel) command shipped with the PTF
B. Use the operating system s standard process for applying updates to software
C. Copy the JAR into the <WASROOT>/ AppServer/efix directory, and add the JAR to
the IBM WebSphere Administration Server, V5.0 s classpath
D. Uninstall any previous PTFs
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=111
-------------------------------------------------------------------------------------------------------------------------------------
QUESTION: 112
What is required to share data source connection pooling?
A. Each ConnectionSpec must have the same user id and password
B. The components sharing the data source must be in the same cell
C. The components sharing the data source must be on the same application server
D. Each getConnection request has the same connection properties
E. The components sharing the data source must be on the same node
F. Each ConnectionSpec used to get the connection must be the same
Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=000-340&qno=112
-------------------------------------------------------------------------------------------------------------------------------------
TwPass Certification Exam Features;
-
TwPass offers over 2500 Certification exams for professionals.
More than 98,800 Satisfied Customers Worldwide.
Average 99.8% Success Rate.
Over 120 Global Certification Vendors Covered.
Services of Professional & Certified Experts available via support.
Free 90 days updates to match real exam scenarios.
Instant Download Access! No Setup required.
Price as low as $19, which is 80% more cost effective than others.
Verified answers researched by industry experts.
Study Material updated on regular basis.
Questions / Answers are downloadable in PDF format.
Mobile Device Supported (Android, iPhone, iPod, iPad)
No authorization code required to open exam.
Portable anywhere.
Guaranteed Success.
Fast, helpful support 24x7.
View list of All Exams (AE);
http://www.twpass.com/twpass.com/vendors.aspx
Download Any Certication Exam DEMO.
http://www.twpass.com/twpass.com/vendors.aspx
To purchase Full version of exam click below;
http://www.TwPass.com/
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising