Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

IBM C9510-401 Exam Made Easy: Step-by-Step Preparation Guide

Questions 1

A system administrator needs to deploy a new enterprise application which requires that application security be enabled, but, the existing applications in the cell cannot be executed with application security enabled. The cell has the global security and Java 2 security disabled.

How can the administrator handle this requirement?

Options:

A.

Enable Java 2 security for the cell.

Create a security domain with application security enabled.

Associate the security domain to the new application.

B.

Enable Java 2 security for the cell.

Create a security domain with application security enabled.

Associate the security domain to a new cluster to be used to deploy the new application.

C.

Enable administrative security for the cell.

Create a security domain with application security enabled.

Associate the security domain at the application level for the new application.

D.

Enable administrative security for the cell.

Create a security domain with application security enabled.

Associate the security domain to the new cluster where the new application is deployed.

Buy Now
Questions 2

A system administrator has installed WebSphere Application Server Network Deployment V8.5.5 using the silent installation process and needs the verify that the installation completed successfully.

What does the administrator need to do to verify a successful installation?

Options:

A.

Launch the Installation Manager GUI, verify the installation by going to File -> View Installed Packages.

B.

Run the command IBMIM listInstalledPackages and check that the appropriate WebSphere Application Server package is listed.

C.

Check for INSTCONFSUCCESS message at the end of the log.txt file.

D.

Use the installver command to compare the checksum of the product file to the correct checksum value in the bill-of-materials file and make sure that the checksums match.

Buy Now
Questions 3

A new cell contains a cluster with members defined in two managed nodes running on two different machines. The cell also contains two unmanaged nodes running on HTTP servers with HTTP plug-in. Session persistence has been enabled.

Which additional component(s) can the system administrator configure to make this environment highly available?

Options:

A.

Enable administrative security.

B.

Configure a DMZ secure proxy.

C.

Configure High Performance Extensible Logging.

D.

Configure primary and backup load balancers for the HTTP servers.

Buy Now
Questions 4

A web application is hosted on an application server that receives HTTP requests from a third party application named myApp. The URIGroup mapping for this application is called default_host_myApp.

The development team asks a system administrator to configure the HTTP plug-in to prevent routing requests to any application server except server1.

The following exhibit shows the parts of the plugin-cfg.xml file that are relevant for myApp. The UriGroups for other applications are not shown in the exhibit.

C9510-401 Question 4

What should the administrator do to the plugin-cfg.xml file to ensure that requests for default_host_myApp URIGroup are routed only to machine1?

Options:

A.

Delete the Server tag for CloneId=”b20000002”

Delete all of the tags within the Server tag

B.

Delete the UriGroup tag for default_host_myApp

Delete all of the tags within the UriGroup tag

C.

Delete the VirtualHostGroup tag for default_host

Delete all of the tags within the VirtualHostGroup tag

D.

Edit the LoadBalanceWeight for server1 to 20

Edit the LoadBalanceWeight for server2 to 2

Buy Now
Questions 5

A system administrator needs to configure a JDBC provider and a data source for an application in a clustered environment. The administrator also needs to copy the JDBC drivers from the database server to the application server machines.

How can the administrator meet these requirements?

Options:

A.

Create a JDBC provider and the data source in the cluster scope.

Copy the driver to all nodes.

Set the environment variable at the node level to the driver’s path.

B.

Create a JDBC provider in the server scope and the data source in the node scope.

Copy the driver to all application servers.

Set the environment variable at the node level to the driver’s path.

C.

Create a JDBC provider in the node scope and the data source in the cell scope.

Copy the driver to the deployment manager.

Set the environment variable at the server level to point to the deployment manager path.

D.

Create a JDBC provider in the application scope and the data source in the server scope.

Copy the driver to all application server directories.

Set the environment variable in each JVM to the driver’s path.

Buy Now
Questions 6

Within a WebSphere Application Server Network Deployment cell, a system administrator needs to write a script to determine if a particular server is stopped. It is important that the wsadmin script explicitly return a status of stopped as opposed to just failing.

What wsadmin object should the administrator use to write this script?

Options:

A.

AdminApp

B.

AdminTask

C.

AdminConfig

D.

AdminControl

Buy Now
Questions 7

A system administrator has been asked to uninstall an application from a cluster running in a WebSphere Application Server Network Deployment cell. This application was installed from the Integrated Solutions Console (ISC). The monitored directory for the cluster is .

What step(s) can the administrator perform to uninstall the application?

Options:

A.

Delete the application file from <cluster1_dir>.

B.

Stop the running cluster.

Delete the application file from <cluster1_dir>.

C.

Stop the running cluster.

Copy the application file to </cluster1_dir>.

Delete the application file from </cluster1_dir>.

D.

Create a properties file to describe the deletion of the application file.

Copy the properties file to </cluster1_dir>.

Buy Now
Questions 8

A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.

How should the administrator accomplish this?

Options:

A.

Enable “Authenticate when any URI is accessed”.

B.

Enable “Authenticate only when the URI is protected”.

Disable “Use available authentication data when an unprotected URI is accessed”.

C.

Enable “Authenticate only when the URI is protected”.

Enable “Use available authentication data when an unprotected URI is accessed”.

D.

Map the application security roles to the configured user registry’s groups.

Buy Now
Questions 9

A system administrator needs to install WebSphere Application Server using response files, so that a silent install can be done. The administrator has ensured that all required prerequisites have already been installed and, has downloaded and expanded the required WebSphere Application Server installation files.

What can the administrator run to install the product?

Options:

A.

install –options responsefile.xml -silent

B.

install –acceptLicense –options responsefile.xml -silent

C.

imcl –acceptLicense input responsefile.xml –log logfile.txt

D.

IBMIM –acceptLicense –input responsefile.xml –log logfile.txt

Buy Now
Questions 10

A system administrator needs to trigger a javacore only when a java,net.SocketTimeoutException is encountered in real time.

What does the administrator have to configure to trigger the javacore dump?

Options:

A.

Configure the JAVA_DUMP_OPTS environment variable to capture javacore for ANYSIGNAL and all exceptions.

B.

Configure an –Xdump:java Generic JVM argument on WebSphere Application Server with the filter for java.net.SocketTimeoutException.

C.

Code wsadmin script to capture javacore and then execute it after the java.net.SocketTimeoutException has been encountered.

D.

Use the log filter in HPEL to monitor for java.net.SocketTimeoutException and then gather a javacore dump from the Integrated Solutions Console (ISC).

Buy Now