000-341 IBM WebSphere Application Server V5.0, Multiplatform Administration

Add to my manuals
32 Pages

advertisement

000-341 IBM WebSphere Application Server V5.0, Multiplatform Administration | Manualzz

http://www.TwPass.com

000-341

IBM

WebSphere Application Server V5.0, Multiplatform Administration

http://www.twpass.com/twpass.com/exam.aspx?eCode= 000-341

The 000-341 practice exam is written and formatted by Certified Senior IT Professionals working in today's prospering companies and data centers all over the world! The 000-341 Practice Test covers all the exam topics and objectives and will prepare you for success quickly and efficiently.

The 000-341 exam is very challenging, but with our 000-341 questions and answers practice exam, you can feel confident in obtaining your success on the 000-341 exam on your FIRST TRY!

IBM 000-341 Exam Features

- Detailed questions and answers for 000-341 exam

- Try a demo before buying any IBM exam

- 000-341 questions and answers, updated regularly

- Verified 000-341 answers by Experts and bear almost 100% accuracy

- 000-341 tested and verified before publishing

- 000-341 exam questions with exhibits

- 000-341 same questions as real exam with multiple choice options

Acquiring IBM certifications are becoming a huge task in the field of I.T. More over these exams like 000-341 exam are now continuously updating and accepting this challenge is itself a task.

This 000-341 test is an important part of IBM certifications. We have the resources to prepare you for this. The 000-341 exam is essential and core part of IBM certifications and once you clear the exam you will be able to solve the real life problems yourself.Want to take advantage of the Real 000-341 Test and save time and money while developing your skills to pass your IBM 000-341 Exam? Let us help you climb that ladder of success and pass your 000-341 now!

000-341

QUESTION:

1

Upon monitoring an application it is found that the passivation and activation counters for EJBs are extremely high. What is the BEST change to be made to the server configuration to improve EJB subsystem performance?

A. Increase the JVH heap size

B. Increase the EJB cache size

C. Increase the EJB cache cleanup interval

D. Increase the maximum ORB service connector cache size

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=1

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

2

A Web application is suspected to have a (concurrent access) synchronization problem. Which

PMI modules should be monitored to try and isolate the performance problem?

A. Dynamic cache

B. J2C connectors

C. Web applications

D. JVM runtime

E. Web container thread pools

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=2

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

3

A high volume application in a clustered environment uses only local sessions. Occasionally a request having session affinity is routed to an alternative application server. This happens even when the application server with affinity does not fail. What is the most likely contributing factor?

A. The session time-out value is set too high

B. The session cache size is configured to be too small.

C. The web container thread pool for the application is too small on each server.

D. It is the nature for session affinity with local only sessions.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=3

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

4

What should an administrator guarantee to ensure that the following command performs as

expected when run on the deployment manager node? BackupConfig cellBackup -nonstop

A. All application code must be present on the deployment manager node.

B. No configuration changes should be made while the command executes.

C. The command should be preceded by a syncNode command from the deployment manager node.

D. The file cellBackup does not already exist.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=4

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

5

Concurrent access to HttpSession objects is possible in a certain application. The BEST approach for the system administrator to make this behavior safe involves:

A. Checking the "Allow serial access" session management property for the installed enterprise application.

B. Checking the "Allow serial access" session management property for the application server on witch the application is installed.

C. Checking the "Allow overflow" session management property for the installed enterprise application.

D. Having the developer mark all application methods that access the session as synchronized.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=5

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

6

An enterprise application has an execution profile where 50% of the HTTP requests hit the EJB layer. Which pair of application server setting best fit this application profile? L. Maximum web container thread pool size =25ll. Maximum web container thread pool size = 50 lll.

Maximum ORB service thread pool size = 25 IV. Maximum ORB service thread pool size =

50 v. maximum EJB cache size = 25 VI. Maximum EJB cache size = 50

A. I and IV

B. I and III

C. II and III

D. II and V

E. III and VI

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=6

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

7

Which of the following manual tasks may need to be carried out before distributing plugincfg.xml to web server machines?

A. Edit plugin-cfg.xml Virtual Host names to coinclide with the virtual host name defined within the

B. corresponding web server.

C. Edit plugin-cfg.xml cbsolute file paths to reflect the web server.s local filesystem.

D. Generate the keyring and stashfile if using SSL between the plug-in and application servers.

E. Update the domain suffix for each virtual host in plugin-cfg.xml.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=7

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

8

During a stress test on an application, it was found that there was a large number of prepared statement discards associated with one Datasource. All other metrics were within expected range. The BEST way to increase performance of this application is to make what change to the Data source properties?

A. Increase the statement cache size

B. Increase the minimum connections.

C. Increase the maximum connections.

D. Change the purge policy to "Entire Pool".

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=8

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

9

An application server is closing HTTP connections prematurely. Assuming that

MaxKeepAliveConnections is already set at 90% of the maximum number of threads in the

Web container thread pool, what Web container setting should be modified to improve this situation?

A. Set the MaxKeepAliveRequests property to a sufficient value.

B. Set the MaxKeepAliveConnections property to a sufficient value.

C. Increase the Web container thread pool maximum size.

D. Increase the ORB service thread pool maximum size.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=9

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

10

What would be the practical consideration for creating smaller application servers each running one different web application rather than a single large application server for an application architecture?

A. The aggregated plug-in config file will contain less complex URIs.

B. Multiple smaller servers provide better application isolation.

C. There will be a decrease in response time due to interproces RMI/IIOP salls

D. Multiple smaller servers eliminate single points of failure.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=10

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

11

In which topologies would an administrator configure the use of LTPA (Lightweight Third

Party Authentication) with the Local OS user registry?

A. Single node configured with multiple application servers.

B. A configuration in witch multiple authentication mechanisms are used for a security domain.

C. Distributed environment which shares a domain user registry.

D. Multiple nodes configured with multiple clusters.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=11

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

12

In atypical Web application request/response information flow, which WebSphere Application

Server V5.0 component can initially encrypt the request?

A. Web container s embedded HTTP server

B. Web server plug-in

C. EJS Server

D. Web browser

E. Application server

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=12

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

13

When federating a node into a cell how would an administrator add an application installed on that node into the cell?

A. Use the addNode utility without the -inccludeApps option and install the application on the node.

B. Use the addNode utility without the -syncNode option andcopy the application binaries to the node.

C. Use the addNode utility with the -inccludeApps option andconfigure the synchronization options on Admin Console.

D. Use the addNode utility withthe -syncNode option andcopy the application binaries to the node.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=13

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

14

What is affected in a topology which splits the Web and EJB containers so that they run in separate application servers, each in a different Machine?

A. The elimination of network latency due to JVM optimizations

B. The elimination of a single point of failure

C. Performance improvement due to greater number of inter-process calls

D. Increased maintenance costs due to additional machines

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=14

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

15

In a network Deployment environment, what are the consequences of a node agent failure?

A. Application servers cannot be started, using the admin console, until the node agent is restarted.

B. The local configuration may not broadcast changes to the master configuration.

C. The deployment manager s file transfer service is made unavailable to all node agents in the cell.

D. The administrative console is made unavailable.

E. The local configuration may not reflect the master configuration.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=15

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

16

What should be considered when comparing the horizontal scaling of an application server

(clustering) versus creating multiple stand-alone (Base) servers on multiple machines?

A. File synchronization will occur in the clustered environment.

B. Multiple stand-alone servers on multiple machines provide failover support.

C. The HTTP server plug-in distributes requests in multiple stand-alone server environments.

D. The HTTP server plug-in distributes requests in a clustered environment.

E. Multiple stand-alone servers on multiple machines can be easily combined into the horizontally scaled environment.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=16

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

17

Where can an administrator locate configuration data for a standalone WebSphere Application

Server V5.0 installation?

A. Administrative Repository on the database server

B. Master configuration repository on the cell Configuration repository on the deployment manager

C. Configuration repository on the local machine

D. Cloudscape database on the local machine

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=17

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

18

Which of the following is a reason way a configured binding would be necessary?

A. Allow federation of CORBA name spacec to the node s name space

B. Bind DataStore JNDI name explicitly at the node name server level

C. Configure an alias for a JNDI name in the ayatem s partition of the name space

D. Provide interoperability with IBM WebSphere Application Server V4 clients

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=18

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

19

An administrator has created a Version 5 data source, and has selected the option to use this data source in container managed persistence. Which of the following CANNOT use this data source?

A. JDBC applications and servlet 2.3 components

B. CMP EJB 1.x beans with a J2EE 1.3 deployment descriptor

C. CMP EJB 1.x beans with a J2EE 1.2 deployment descriptor

D. CMP EJB 2.0 beans

E. BMP EJB 2.0 Beans

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=19

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

20

If a CMP bean uses a J2C resource adapter to access a backend data store, which of the following should be configured?

A. CMP Connection Factory

B. Database connection pool

C. CMP Resource Environment Provider

D. User-defined JDBC Provider

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=20

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

21

Development passes an administrator an EAR file to be installed for testing. What steps could be performed with the application Assembly Tool prior to installing the enterprise application that might expose issues within the application code or the application packaging?

A. Use the AAT Varify..." option to validate the enterprise application.

B. Open individual modules and search for broken bindings.

C. Examine JSP s and click Per-compile .

D. Generate EJB code for deployment.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=21

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

22

A new Ejb has been added to a JAR file that is part of an enterprise application. What is the

BEST way to incorporate this new EJB JAR file into the server(s) running the application while minimizing the time the application is unavailable and ensuring configuration control?

A. Copy the JAR file with the new EJB into the Repository directory of the Deployment

Manager node and wait for the next File synchronization interval.

B. Locate the EAR directory in the installedApps directory of all the nodes where the application runs and use the EarExpander tool to overwrite it with the updated EAR file.

C. Add the Jar with the new EJB to the orignal EAR file and use the Update feature in the administrative console or the AdminConfig Mbean.

D. Locate all copies of the JAR file under the installedApps directory of the nodes where the application runs and replace it with the updated JAR

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=22

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

23

In witch of the following instances would an administrator NOT select the Generate Default

Binding checkbox when installing an enterprise application via the administrative console?

A. The administrator wants to explicitly control the global JNDI name of one or more

EJB modules.

B. The administrator has a single data source and needs more then one global data source.

C. The administrator must map resource references to global resource JNDI names that are different from the java :comp/env name.

D. The administrator needs to map a resource authorization of a connection factory to a specific JNDI name.

E. The administrator needs to specify the default virtual host name for the enterprise application.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=23

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

24

The Application Client Resource Configuration Tool is most typically used to:

A. Set user GUI resource preferences.

B. Generate a special application client. EAR file from the source J2E

E. EAR file.

C. Alter various resource provider properties in the J2E

E. EAR file specific to a particular client deployment.

D. Configure the communication protocol to be the J2EE Client application.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=24

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

25

Where can J2EE Security roles be defined?

A. was.policy

B. ibm-web-ext.xmi

C. web .xml

D. ibm-ejb-ext.xmi

E. ejb-ext.xmi

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=25

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

26

Which partition in an IBM WebSphhere Application server V5.0 faderated name space is used to store information about EJB binbings and JNDI names?

A. The Server persistent partition

B. The Node persistent partition

C. The Cell persistent partition

D. The Transient partition

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=26

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

27

An administrator considers turning Diagnostic Tracing on to investigate a problem, but she is concerned about decreased performance. The configuration has several clusters, but the problem application runs in just one cluster. Which of the following approaches can reduce the trace overhead?

A. Turn tracing on in all servers in the application s cluster.

B. Turn tracing on in just one server in the application s cluster.

C. Set a larger trace file size

D. Set trace to output to a memory buffer.

E. Set the trace level to TERSE.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=27

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

28

An administrator of an IBM WebSphere Application Server V5.0 installation needs to examine the activity log file on one of the nodes. She only has telnet connectivity to the computer where the log exists. How can she examine this log file?

A. Use a text editor and then examine the log.

B. Use the log Analyzer tool.

C. Run the showlog script while redirecting the output to a file, then use a text editor.

D. FTP the activity log to a local machine and then use the Log Analyzer tool.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=28

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

29

Most requests to a newly deployed application. One JSP is supposed to display a list of products. Instead, the web browser reports a failure. An administrator suspects that the JSP did not compile. To investigate the problem she should check the:

A. trace.log file for the application server.

B. SystemErr .log file.

C. Native_stadout.log file.

D. http_plugin.log file.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=29

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

30

The purpose of using the Collector Tool is to collect:

A. information for examination by the Log Analyzer tool.

B. Debug information for problem determination by the administrator.

C. Server environment information for problem determination by IBM Support.

D. Information about running applications for performance tuning.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=30

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

31

What is the LOWEST level of granularity of the Trace Service supported in an IBM

WebSphere Application Server V5.0 Network Deployment installation?

A. Server

B. Node

C. Cell

D. Cluster

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=31

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

32

A system administrator needs to examine the JVM logs for several running servers in an IBM

WebSphere Application Server, V5.0 Network Deployment installation. Some of nodes are located off-site. What is the BES way for that administrator to access these logs?

A. Ask the local administrators to email the logs for each node involved.

B. Use the correct URL for each server to open the WebSphere administrative console.

C. View the logs for each running server form the Network Deployment administrative console.

D. telnet to each machine and then open the logs in an editor window.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=32

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

33

An administrator needs to verify that the cell level configured bindings for the name space are set correctly. What dumpnamespace command line parameter will MOST effectively produce output specific only to these changes?

A. -port 2809

B. -startAt persistent

C. -host dmgr

D. -report long

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=33

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

34

Which of the following protocols can be configured to communicate between a Web server and

IBM WebSphhere Application Server V5.0?

A. SOAP

B. HTTP

C. SNMP

D. HTTPS

E. RMI/IIOP

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=34

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

35

Which of the following are reasons for an administrator to elect in-memory over using a database as the session persistence mechanism?

A. Cost of maintaining a production database.

B. Limited memory available on node machines.

C. Differences in processor utilization when serializing for database persistence and memory persistence.

D. Necessity of the persistence store to survive a power outage.

E. Single point of failure at the database.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=35

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

36

In the administrative console, several options may be selected during the created during the creation of a cluster. Which of the following would be selected to make use of in-memory session persistence?

A. Create Replication Domain for this cluster

B. Enable prefer local

C. Generate Unique HTTP ports

D. Create Replication Entry in this Server

E. Select replication form the following domain

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=36

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

37

A cluster has the following topology: * Node "Eight" has eight processors with cluster members (a) and (b); *Node "Four" has four processors with cluster members (c). Assign weights so that the two cluster members on node "Eight" handle close to 60% of the total workload, while the one cluster member on node "Four" handles around 40%.

A. "Eight" a = 6 "Eight" b =6"Fpur" c = 4

B. "Eight" a = 6 "Eight" b =6"Fpur" c = 8

C. "Eight" a = 40 "Eight" b =40"Fpur" c = 60

D. "Eight" a = 60 "Eight" b =60"Fpur" c = 40

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=37

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

38

Which of the following are TRUE of clusters and cluster and cluster members in IBM

WebSphere Appplication Server V5.0 - Network Deployment?

A. Clusters can be created without cluster members

B. A template or an existing application server for the cluster must be selected before cluster members can be created

C. All cluster members have some unchangeable properties, including Weight, Balance, and Clone I

D.

D. Selection of the a template can be deferred members have been created, but must be done before starting the cluster.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=38

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

39

Memory-to-memory session replication can be triggered:

A. At the end of an HTTP Request.

B. By a programmatic call to j2EE HTTIPSession API sessionPersist().

C. At configurable time intervale.

D. By a programmatic call to IBMSession API sync().

E. By clicking on Manual Update in the Session Management Service.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=39

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

40

From a system resource point of the following is the LEAST efficient way to execute of commands using wsadmin?

A. Launch wsadmin with the -f option to specify a script file

B. Launch wsadmin with the -c option from a batch file or shell script

C. Launch wsadmin with no option to run the commands interactively

D. Launch wsadmin with the -profile option

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=40

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

41

Which of the following tasks can be performed by the administrator using the AdminConfig

Scripting object through wsadmin?

A. Create an application server

B. Install an enterprise application

C. Configure a new data source

D. Start an enterprise application

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=41

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

42

In order to perform a silent install, which of the following options would an administrator NOT modify in the response file?

A. -silent

B. -P ihsPluginBean.active="true"

C. -P pluginBean.active="true"

D. -P samplesBean.active="true"

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=42

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

43

An administrator installed IBM WebSphere Application Server V5.0 on a machine with a previous version (3.5,4.x) already installed. The administrator did not select the migration option or the coexistence option. Which of the following statements is TRUE?

A. Only the latest installation can be run successfully, due to port conflicts.

B. The administrator can run either Version 5.0 or the previous version, but not at the same time.

C. Both Version 5.0 and the previous can be run simultaneously.

D. The previous installation must be uninstalled to avoid port conflicts.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=43

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

44

Which of the following statement are TURE with regards to the installation of multiple instances of either the IBM WebSphere Application Server v5.0 or Network Deployment products on the same machine?

A. All port assignments are kept in the operating system registry.

B. Uninstalling the last instance removes any record of the product in the registry.

C. Any instance can be uninstalled independently of the other instances.

D. Each installation of the base IBM WebSphere Application Server V5.0 product can

be federated to any deployment manager cell.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=44

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

45

An administrator has just finished installing a Network Deployment Manager, and is ready to use the addNode command to federate a node into the cell. The administrator will use the following syntax: addnode <hostname> <port> -includeapps which of the following statements are TRUE?

A. <hostname> is the hostname of the server s machine.

B. <hostname> is the hostname of the Network Deployment machine.

C. <port> is the ORB listener port.

D. <port> is the SOAP connector port.

E. <port> is the node agent server port.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=45

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

46

No errors were reported during installation, but errors are encountered when trying to view the administrative console. Which of the following files can be used to troubleshoot the problem?

A. installlVTApp.log

B. log.txt

C. SystemOut.log

D. InstallAdminConsole.log

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=46

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

47

Refer to the exhibit to answer the question. While deploying an EAR on a Windows machine, the WebSphere administrative console indicates that the application has requested the following permissions. Why might this be a concern?

A. By grating the createLoginContext the application can now login as user password

B. By grating the printldentity the application can now print out user password

C. By grating these file Permissions the application can write to any file on the c: drive

D. The user mapped to printidentity would be able to modify WebSphere s security permission settings

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=47

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

48

Which administrative console role has the access rights needed to add a node to a cell?

A. Monitor

B. Operator

C. Administrator

D. Configuration

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=48

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

49

Under what circumstances would it be necessary to update the keyring used by the WebSphere

Web server plug-in?

A. When the encryption strength is changed

B. When the end users certificates expire

C. When the keys user by the Web container are updated

D. When a client receives a new certificate from a Certificate Authority

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=49

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

50

Which of the following would have to be done to enable EJB client certificate authentication?

A. Enable client certificates in SAS

B. In the LDAP directory, place the client create in the user s certificate attribute

C. Configure the Web container s keyring to contain the client s signing certificate

D. Configure inbound CSLv2 client certificate authentication to supported or required

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=50

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

51

While configuring WebSphere Application Server Network Deployment security setting to use

LDAP for the first time, an error occurs. Which of the following would NOT be a good source of troubleshooting information?

A. WebSphere security tracing

B. Deployment Manager log file

C. Console message

D. ServerStatus. Log

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=51

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

52

Three different applications are installed into an application server, server1. one of these applications, App1, needs a session timeout set to 3 hours, while the other two applications required to satisfy this required to satisfy this requirement?

A. On both App2 and App3, select overwrite session management.

B. On App1, select overwrite session management.

C. On App1, set the session timeout value to 180 minutes.

D. On server1, set the session timeout value to 15 minutes.

E. For each web module on App1, set the session timeout value to 180 minutes.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=52

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

53

An enterprise application contains both an EJB 1.1 module and an EJB 2.0 module, each using a different datasource. The EJB 1.1 module fails on load. Which of the following are likely causes?

A. J2EE V1.3 applications must either have all EJB 2.0 modules or all EJB 1.1 modules.

B. The EJB 1.1 module has a J2EE 1.2 deployment descriptor and is associated with a

V5.0 Datasource.

C. A non-XA JDBC driver has associated with the EJB module s Datasource.

D. The Datasource JDBC provider classpath has been improperly configured.

E. The transaction attribute is set to "SUPPORTS"

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=53

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

54

While running a typical client mix on an IBM WebSphere Application Server V5.0 configuration, the number of connections to the application server port in the TIME_WAIT state is consistently in the double digits. What application server parameter can be tuned to reduce this behavior?

A. Increase the Web container Thread pool size.

B. Enable Growable thread pool property for the Web container.

C. Increase the Web container MaxHTTPConnection property value.

D. Increase the Web container MaxKeepAliveConnection property value.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=54

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

55

Which of the following are TRUE about updating the web Server plug-in in a Network

Deployment installation where the web server and application servers are on different machines? The generated plug-in:

A. is written to the Deployment manager s configuration tree.

B. Is written to the Node Manager s configuration tree.

C. Is automatically updated on each web server node at the next refresh interval

D. Must be manually distributed to each web server node.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=55

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

56

After careful analysis it is decided to force the queuing of concurrent requests from the Web server plug-in to the application server in excess of 50. what server settings will support this plan?

A. Set maximum Web container thread pool size to 50.

B. Set the maximum Web container thread pool size to 50.

C. Enable a growable Web container thread pool.

D. disable a growable Web container thread pool.

E. Enable plug-in request queuing.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=56

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

57

A clustered enterprise application has a continuous 24/7 availability requirement. An administrator issue the following backup command: backupConfig cellConfig What is an issue to consider in carrying out this operating in the Network Deployment cell?

A. The resulting backup file may not be a consistent due to network delays.

B. Administration of the cell would not be possible during the backup.

C. The file type must be specified as a zip file.

D. The command needs to indicate fullCell to backup a complete administrative cell.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=57

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

58

An enterprise application uses entity beans for its persistence layer. The Web container layer of the application is currently the only client to the EJB layer. It is suspected that the EJB layer is an application bottleneck. Which PMI modules should be monitored to try and isolate the bottleneck?

A. Database connection pools

B. Dynamic beans

C. Enterprise beans

D. Transaction

E. Servlet session manager

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=58

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

59

An application with a 4KB session object is configured with maximum in-memory session count set to 500. The allow overflow property is enabled. The persistent session management is disabled. Monitor data shows that the average number of live sessions is greater than the session cache size. Assuming that there are enough resources on the machine, which of the following configuration changes would have the greatest positive impact on this application s performance?

A. Enabling persistent sessions

B. Turning off session overflow

C. Increasing the in-memory session count

D. Increasing the secondary session cache size

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=59

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

60

There is a large number of concurrent servlets acing remote EJBs. To accommodate maximum

EJB concurrency, which server property should be matched to the expected maximum concurrency?

A. The maximum size of the ORB Service thread pool

B. The maximum size of the Web container thread pool

C. The maximum size of the ORB Service connector cache

D. The size of the EJB object cache

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=60

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

61

A system expert has been asked to design a solution that ensure that web requests to a cluster of application servers are always delivered. Which of the following configurations should be part of the solution?

A. One Web server without an IP sprayer

B. One IP sprayer and a cluster of web servers

C. Redundant IP sprayers and a cluster of web servers

D. One Web server with a configured backup Web server

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=61

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

62

Considering an architectural design with a high level of security, which of the following should reside in the DMZ?

A. Database server

B. Web server and plug-in

C. Application server

D. Reverse proxy server

E. Web container with embedded HTTP server

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=62

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

63

An enterprise plans to migrate a server running in an IBM WebSphere Application Server V5.0 environment on a single machine to multiple servers running in a Network Deployment environment on a single machine. Which of the following are TRUE statements regarding this migration?

A. The application server, JMS server and Deployment Manager will run in the same

JVM.

B. The application server and JMS server can be configured to run in the same JVM.

C. The application server, JMS server and Node Agent will each run in separate JVMs.

D. The application server, JMS server and Node Agent can be configured to run in the same JVM.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=63

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

64

Which of the following connection paths should be encrypted with SSL when considering the architectural design of an IBM WebSphere Application Server V5.0 installation that supports an online banking application server?

A. Web server plug-in to application server

B. Web container to EJB container

C. Web browser to Web server

D. Embedded HTTP server to Security server

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=64

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

65

An enterprise hosts a site for a high volume, would-wide sporting event. Volume of requests for dynamic content is low, but there are a large number of page views. Which Workload

Management strategy would be MOST appropriate in this scenario?

A. Implementing an edge component to load balance.

B. Partitioning the Web containers and EJB Containers into separate application into separate application servers.

C. Implementing a database cluster.

D. Implementing EJB workload management.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=65

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

66

An enterprise has a requirement that updates are rolled into production only once every 12 hours 12 hours. How would the administrator set up this scenario to ensure that changes are propagated to the running nodes in a cell according to policy? Within 12 hours - select 2 - include A

A. When saving the change to the master configuration, verify the "Synchronize changes with Nodes" checkbox is checked on the Save the Master Configuration windows.

B. In the File Synchronization Service dialog for each node agent, set the

Synchronization Interval and check the checkbox for Automatic synchronization.

C. In the File Transfer Service for each node agent, incremant the Retries count.

D. In the File Synchronization Service for each node agent, set the Synchronization

Interval and uncheck box for Startup.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=66

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

67

Due to an increase in the number of simultaneous users accessing its Web site, an enterprise decides to implement an Edge Component Load Balancer solution. What will be gained by this architectural change once Load Balancer is Configured?

A. Failed Wed servers will be detected and subsequent requests re-routed

B. Requests will be distributed to Web servers in the configuration

C. Failed application servers will be automatically detected

D. Requests will be routed based on client content

E. Requests will be distributed to application servers in the configuration

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=67

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

68

A web server plug-in sends an HTTP request to an application server located behind a firewall.

Corporate security directives require a protocol switch and a corresponding firewall port switch. What solution addresses this problem?

A. Place the plug-in and the application server on different network segments.

B. Use different inbound (browser to web server) and outbound (Web server plug-in application server) port number for the HTTP connections.

C. Configure the application server to use HTTPS for a secure connection between the

Web server plug-in and application server

D. Open an HTTP port in the firewall to allow requests through.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=68

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

69

Which of the following JNDI name binding alternatives are guaranteed to always work with

IBM WebSphere Application Server V5.0 in a Network Deployment configuration?

A. Fully qualified (compound) JNDI names

B. Local references

C. Corbaname URLs

D. Simple JNDI bindings

E. Legacy Persistent Bindings

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=69

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

70

In which of the following tools is it NOT possible to create J2EE security roles for an enterprise application module?

A. WebSphere Administrative Console

B. WebSphere Studio Application Developer

C. Application Assembly Tool

D. WebSphere Deployment Manager

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=70

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

71

An administrator has written a script to install application servers in a Network Deployment topology. Testing the script, the administrator sees the feedback from the script as the applications are being installed. However, the administrative console does not reflect the newly installed application. What should be added to ensure the applications are installed?

A. $AdminApp save

B. $AdminConfig save

C. $AdminConfig reset

D. $AdminApp refresh

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=71

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

72

An administrator has defined a data source, specifying scope to be at the node level, and setting maximum connections to. Which of the following statements is TRUE?

A. There are 10 connections for each server in the node.

B. There are 10 connections shared by all servers in the node

C. There are 10 connections from each node in the cell.

D. There are 10 connections shared by all servers in the cell.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=72

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

73

The connection factory for a J2C resource adapter represents which of the following?

A. A set of connection configuration properties

B. The RAR file with the common client interfaces

C. The DLLs with the implementation code for the resource adapter

D. The library that supplies implementation code for connecting application to an EIS

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=73

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

74

How are IBM Extensions to the J2EE specification identified in the Application Assembly

Tool?

A. In each section, IBM Extensions fields are highlighted with a red asterisk(*).

B. IBM Extensions are placed in a separate module.

C. IBM Extensions are configured on a separate tab for each section as applicable.

D. Field names for IBM Extensions are labeled in bold with a blue typeface.

E. There is no obvious distinction between IBM Extensions and J2EE platform fields.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=74

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

75

An EAR file that was recently installed has one message driven EJB (MDB). What piece of information must be provided to the administrator in order for the MDB to operate properly?

A. The JNDI name of the JMS queue

B. The JNDI name of the queue JMS connection factory

C. The name of the listener port configured for the MDB

D. The JNDI name of the MDB

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=75

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

76

J2EE application clients need to authenticate with Various resources, such as Datasources,

EJBs, JMS Queue Factories, etc. in what ways can this authentication be configured?

A. The authentication data can be configured via the resource properties from .EAR file and supplied by the Client container.

B. The authentication data can be provided programmatically by the application.

C. The authentication data can be prompted for by the ORB services and delivered on to the requesting resource.

D. The authentication data cannot be supplied securely from the application client.

E. The authentication data can be prompted for by an HTTp 401 status code.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=76

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

77

An administrator updates the Web server plug-in from the administrative console. Assume that the default RefreshInterval is in force. What steps should she take so that subsequent requests are directed to new application servers from the Web servers within one minute?

A. Restart all the Web servers

B. Re-start all the application servers in the cell

C. Initiate a "Full Synchronize" to update the nodes

D. Manually copy the Web server plug-in to all the locations where the Web servers access it

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=77

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

78

A cell has multiple clusters that run distinct enterprise applications in each cluster. The cell uses a single internal replication domain. Which of the following is NOT a method an administrator could use to reduce the volume of inter-process session traffic without creating a new replication domain?

A. Use partitions to segregate traffic to specific clusters

B. Create new application servers to on the replication domain

C. Enable the single replica option on the replication domain

D. Enable session compression on the existing replication domain

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=78

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

79

Which of the following are characteristics of cluster members?

A. Log file locations of all cluster members can be changed in one central location.

B. Cluster members can be created from configuration templates.

C. Every cluster member is also an application server.

D. Cluster members may be disassociated from the cluster to become distinct application servers.

E. Enterprise applications can be installed on all members of a cluster in one operation.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=79

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

80

Which of the following will override server-weighted round-robin routing by sending requests to servers not listed next in the routing tables?

A. The IIOP Prefer Local setting overrides weighted routing.

B. If session persistence is turned on, routing will following that configuration.

C. EJB transaction affinity b can override HTTP Session routing tables to maintain transaction context.

D. Requests in an HTTP Session started on one application servers installed on the same physical box without consulting the weirhting configuration.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=80

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

81

An environment has both horizontal and vertical scaling, with multiple cluster members running on multiple machines. Which in-memory replication topology offers the highest reliability with the least impact on performance?

A. Peer-to-peer topology, without partitioning, and tuning levels set to "Low".

B. Peer-to-peer topology with "Single Replica". And tuning levels set to "Very high"

C. Client-server topology with two server designated application server processes, and tuning levels set to "Low"

D. Client-server topology with two server designated application server processes, and tuning levels set to "very high"

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=81

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

82

An administrator adds new nodes into an existing sell containing a cluster. What steps can the administrator take to shift some off the workload from the existing members of the clusters of the cluster without interrupting running application?

A. Add cluster members to the new nodes, regenerate the HTTP Server plug-in, and restart the cluster the cluster.

B. Create a new cluster and place the new cluster members on the new nodes, install the application to new cluster, and ripplestart the new cluster,

C. Create cluster members on the new nodes to be part of the existing cluster, start the new cluster members individually, and regenerate the HTTP server plug-in.

D. Add cluster members to the existing cluster, creating the cluster members on the nodes, and start those cluster members individually.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=82

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

83

Which scripting object does an administrator use to change attributes of an enterprise application?

A. AdminEar

B. ConfigApp

C. AdminConfig

D. AdminApp

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=83

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

84

If the installation program indicates that errors were encountered during installation of IBM

WebSphere Application Server V5.0, which of the following files can used for troubleshooting?

A. install.log

B. log.txt

C. SystemOut.log

D. SystemErr.log

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=84

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

85

An administrator is going to install Network Deployment on a system with an existing base install, and plans to run in a co-existence mode. The node will not be federated into the cell.

Which of the following ports must be changed to avoid a conflict?

A. 9043

B. 9080

C. 9090

D. 9100

E. 9443

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=85

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

86

With regards to the coexistence of IBM WebSphere Application Server Version 4.0.x and version 5, which of the following statements are TRUE?

A. Migration is not optional on the migration and coexistence panel of the installation wizard.

B. Coexistence is optional on the migration and coexistence panel of the installation wizard.

C. The installation wizard will automatically detect the earlier version.

D. The installation wizard will automatically resolve port conflicts.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=86

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

87

An administrator generated a Web server plug-in on a Win32 system. The Web server is on a remote UNIX system. What is the BEST means for the administrator to insure that this is performed correctly?

A. Run the GenPluginCfg script using the output file directive.

B. Run the GenPluginCfgForUnix script using the output file directive.

C. Manually edit the plugin-cfg.xml file to modify the file paths.

D. Manually edit the plugin-cfg.xml file to modify the URI paths.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=87

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

88

While installing IBM WebSphere Application Server V5.0 the installation fails and the installation logs do not contain enough information to diagnose the problem. Which of the following actions should be taken by the administrator at this point?

A. Turn on tracing using the is:trace parameter for the install command.

B. Run the installation verification test (IVT) and check the ivt.log file.

C. Re-run the installation program, capturing stdout and stderr with the is:javaconsole parameter for the install command.

D. Choose "Custom installation" option and select "Additional install Logging"to enable additional logging.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=88

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

89

A webSphere administrator needs to grant access from an EJB client to the application server.

In this situation, which of the following steps would BEST alleviate regarding network security?

A. Use the Apache Struts framework.

B. Use LDAP instead of LocalOS for authentication.

C. Set SSL required on the CSIv2 inbound transport.

D. Ensure that SSL is enabled from the WebSphere plugin to the application server.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=89

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

90

Refer to the exhibit to answer the question. A new application has been installed, but is not running correctly. The application log file has a message indicating the following error. What should be done to correct this problem?

A. Add java securityPermission "printldentity" to the was policy file in the application s ear file

B. Add java securityPermission "printldentity" to the j2ee.policy file in the WebSphere properties directory

C. Use the WebSphere Java 2 Security Manager in the administrative console to assign

"printidentity" to the application

D. Have the application developer change the "printldentity" from a local to a remote interface

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=90

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

91

By default, IBM WebSphere Application Server, V5.0 supports HTTPS from the Web server plug- in to the application server for requests that come into Web server over HTTPS. Why might an administrator choose to force the use of HTTPS to the application server?

A. To ensure the client authentication successfully completes to the Web server

B. To ensure that all access to the Web server and the Web container is secured by

HTTPS

C. By reducing the number of transports, the Web container is more efficient and therefore gives better performance

D. When used in conjunction with SSL client authentication, this provides a guarantee that the traffic the came through a trusted Web server

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=91

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

92

What administrative console role has the minimum access rights needed to view the cell topology?

A. Monitor

B. Operator

C. Administrator

D. Configuration

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=92

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

93

An organization intends to use user, password and group information stored on a database, such as DB2, for authentication. Which of the following needs to be configuration for WebSphere to use that data for WebSphere Security?

A. SSL

B. CSIv2

C. Custom registry

D. Secures Association Service

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=93

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

94

An IBM WebSphere Application Server V5.0 installation has a single node that contains

Server1, Server2, and a node agent. The node belongs to CellB managed through Deployment

Manager from a Separate machine. The administrator could use the Log Analyzer tool to find errors in either server by opening the activity.log file on the:

A. machine running the Deployment Manager.

B. <install_dir>\logs\Server1 and the file on the <install_dir>\logs\Server2 directories.

C. <install_dir>\logs directory

D. <install_dir>\logs\CellB directory on the machine running the Deployment Manager.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=94

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

95

An administrator issues the dumpNameSpace command against the localhost and discovers the following entries: (top)/DeploymentManager Linked to URL: cobaloc::ka0kifr:9809/NameServerRoot. How could the administrator look at the name space local to the machine running the deployment Manager?

A. dumpNameSpace -uri corbaloc::ka0klfr:9809/NameServiceServerRoot

B. dumpNameSpace -host ka0klfr -port 9809 -root NameServiceServerRoot

C. dumpNameSpace -link corbaloc::ka0klfr:9809/NameServiceServerRoot

D. dumpNameSpace -uri corbaloc::ka0klfr:9809 -startFrom DeploymentManager

E. dumpNameSpace -startFrom corbaloc::ka0klfr:9809/NameServiceServ

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=95

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

96

An IBM WebSphere Application server V5.0 installation topology includes a Web server to handle requests for static resources. Static pages are served correctly ,but requests for dynamic connect to app server. The cause of this error is that the:

A. IBMWebSphere Application Server Plug-in module has been loaded by the web server.

B. Cell handling the request has not been started.

C. Application server or cluster handling the request has not been started.

D. Node agent is not running.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=96

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

97

An IBM WebSphere Application Server V5.0 administrator wants to trace a component without interrupting the users. Which of the following statement are TRUE regarding tracing a running server?

A. Tracing can be started on a running system from the Diagnostic Trace runtime console page.

B. Tracing criteria CANNOT be altered without restarting the server.

C. Runtime tracing information CANNOT be changed using the wsadmin tool.

D. When starting Tracing in a running server, tracing output CANNOT be changed in

Log Analyzer format.

E. Runtime trace settings are temporary and CANNOT be saved to the server configuration.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=97

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

98

What step enables tracing in an IBM WebSphere Application Server V5.0?

A. Set the trace output format to Advanced before starting.

B. Select the Enable Trace checkbox in the Diagnostic. Trace Service configuration page before starting.

C. Start the application server with a startServer command reference to an enable-trace specification string.

D. Start the application server JVM in debug mode.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=98

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

99

An administrator configures the following JMS resources for a Message Driven Bean (MDB): a) JMS Connection Queue Factory b) JMS Queue c) MDB Listener Port Afterward, the MDB cannot communicate with any JMS destination. The log shows that listener failed to start. This is MOST likely the cause:

A. the number of JMS server threads is incorrect.

B. The JMS server is not running.

C. The JNDI name for the MDB s queue was not configured on the JMS server.

D. The MDB s EJB JAR module was not mapped to run on the JMS server.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=99

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

100

Which of the following is TRUE regarding the use of the Collector Tool?

A. The deployment manager must be stopped in order to run the Collector Tool.

B. The server measurement target must be running.

C. It must run with administrative privileges in order to collect all available information.

D. Directory <install_directory>\bin the current directory.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=000-341&qno=100

-------------------------------------------------------------------------------------------------------------------------------------

TwPass Certification Exam Features;

- TwPass offers over

2500

Certification exams for professionals.

- More than

98,800

Satisfied Customers Worldwide.

- Average

99.8%

Success Rate.

- Over

120

Global Certification Vendors Covered.

- Services of Professional & Certified Experts available via support.

- Free 90 days updates to match real exam scenarios.

- Instant Download Access!

No Setup required.

- Price as low as $19, which is 80% more cost effective than others.

- Verified answers researched by industry experts.

- Study Material

updated

on regular basis.

- Questions / Answers are downloadable in

PDF

format.

- Mobile Device Supported (Android, iPhone, iPod, iPad)

-

No authorization

code required to open exam.

-

Portable

anywhere.

-

Guaranteed Success

.

- Fast, helpful support 24x7.

View list of All Exams (AE);

http://www.twpass.com/twpass.com/vendors.aspx

Download Any Certication Exam DEMO.

http://www.twpass.com/twpass.com/vendors.aspx

To purchase Full version of exam click below; http://www.TwPass.com/

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Download PDF

advertisement