image


C9510-401 Dumps

C9510-401 Braindumps C9510-401 Real Questions C9510-401 Practice Test C9510-401 Actual Questions


IBM


C9510-401


IBM WebSphere Application Server Network Deployment V8.5.5 System Administ


https://killexams.com/pass4sure/exam-detail/C9510-401

  1. ffdc logs.

  2. SystemErr.log.

  3. SystemOut.log.

  4. Native_stderr.log.


Answer: C


Explanation:

http://www-01.ibm.com/support/knowledgecenter/ssw_i5_54/rzatz/trbhangdet.htm (See the False Alarm).


QUESTION: 61

The computer where a federated node was running had a failure and cannot be recovered. A system administrator wants to recreate the node with the same configurations in another computer. Which steps should the administrator execute in order to recover the damaged node?


  1. Configure the new computer with a different hostname. Create a custom profile with the same name.

    Federate to the cell using the command addNode with the default options.

  2. Configure the new computer with a different hostname. Create a custom profile with a different name.

    Federate to the cell using the command addNode with the option -asExistingNode.

  3. Configure the new computer with the same hostname. Create a custom profile with the same name.

    Federate to the cell using the command addNode with the option -asExistingNode.

  4. Configure the new computer with the same hostname. Create a custom profile with the same name.

Federate to the cell using the command addNode with the options -includeapps.


Answer: B


Reference:

http://www- 01.ibm.com/support/knowledgecenter/SSD28V_8.5.5/com.ibm.websphere.zseries.doc/ae/t agt_addNode_asExistingNode.html (See the Heading Procedure).


QUESTION: 62

The installation of WebSphere Application Server did not complete successfully, and a system administrator needs to troubleshoot the installation. What can the administrator do to identify the cause of the installation failure?


  1. Run the installer command with the appropriate command line options.

  2. Check the files under the Agent data location of IBM Installation Manager.

  3. Check the files under the logs directory of IBM Installation Manager installation directory.

  4. Check the log.txt under <WebSphere Application Server install directory><log directory>.


Answer: D


QUESTION: 63

There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configuration role access to a developer for a single application deployed in that cluster. How should the administrator meet this requirement and restrict Configuration role access for a single application?


  1. Create a J2C authentication alias for that developer.

  2. Create an Administrative user role and provide Configuration access to the developer.

  3. Create an Administrative group role and provide Configuration access to the developer.

  4. Create an administrative authorization group, scope it only for that application and create an Administrative user or group role to give Configuration access to the developer.


Answer: A


QUESTION: 64

How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the server's file system?


  1. Configure the CSIv2 outbound communications under RMI/IIOP security.

  2. Configure the file-based repository and create the fileRegistry.xml file.

  3. Enable Java 2 security and configure the app.policy and was .policy files.

  4. Use the Admin Task delete Authorization Group to remove application access.


Answer: C


Reference: http://pic.dhe.ibm.com/infocenter/adiehelp/v5r1m1/index.jsp?topic=%2Fcom.ibm.wasee.do c%2Finfo%2Fee%2Fae%2Ftsec_plan.html


QUESTION: 65

A system administrator is required to monitor the application server logs for heap memory issues and determine if the heap memory usage is reaching close to 70% of the maximum heap. The application server is configured with an initial heap of 256 MB and a max heap of

1 GB.

How should the administrator determine if the application server is utilizing 70% of the max allocated heap memory?


  1. Check the System logs for Out Of Memory Errors.

    Trigger a heap dump from the Integrated Solutions Console (ISC). Analyze the heap dump.

  2. Configure WebSphere Application Server to enable verbose garbage collection. Analyze the garbage collection cycles in the native logs.

  3. Configure Initial heap to be equal to the max heap.

    Trigger a heap dump from the Integrated Solutions Console (ISC). Analyze the heap dump.

  4. Configure WebSphere Application Server to increase max heap. Trigger a heap dump from the Integrated Solutions Console (ISC). Analyze the heap dump.


Answer: A


Reference:

http://www.ibm.com/developerworks/bpm/bpmjournal/1312_chan/1312_chan.html


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG