You are on page 1of 16

1.

Given a non-Network Deployment installation, which of the


following characterizes the IBM WebSphere administrative console?

A. It can be downloaded from a remote machine.


B. It runs in its own Java Virtual Machine.
C. In the base configuration, it runs on the application server and
can manage only that application server.
D. It connects directly to the Administrative Repository.

Ans: C

2. Which of the following is the default synchronization interval


between nodes and Deployment Manager?

A. 30 seconds
B. 45 seconds
C. 60 seconds
D. 120 seconds

Ans: C

3. Which protocol is used to access directly an application server


on a node remote from the web server?

A. IIOP
B. SNMP
C. OSE
D. HTTP

Ans: A

4. Which of the following tasks does NOT involve the node agent?

A. File transfer services


B. Workload management
C. Configuration synchronization
D. Performance monitoring

Ans: B

5. A systems expert has been asked to install and configure the IBM
WebSphere Application Server V5 with a high level of security.
Given this, which of the following should NOT reside in the DMZ
(Demilitarized Zone) of a firewall configuration?

(Select 2)
A. XML Configuration Repository
B. Web server
C. Application Server
D. The Network Dispatcher
E. Caching Proxy Server

Ans: A, C

6. Which of the following is NOT a benefit of implementing a


workload management topology?

A. Increased performance
B. Increased maintainability
C. Increased availability
D. Increased scalability

Ans: B

7. Which of the following provides important information about


configuration problems?
(Select 2)

A. FFDC
B. EJB container
C. Log Files
D. Administrative console messages

Ans: C,D

8. Which of the following files can be used to locate the version


information for "base" IBM WebSphere Application Server V5.0 ?
(Select 2)

A. SystemOut.log
B. historyReport.html
C. log.txt
D. BASE.product
E. native_stdout.log

Ans: A, B

9. Which of the following statements are TRUE for IBM WebSphere


Application Server V5.0 "base" installation?

(Select 2)

A. The node agent is installed, but dormant.


B. Only 1 JVM is running in the node.
C. Clustering or workload balancing is configured.
D. The server-cfg.xml file is created.
E. The plug-in configuration file is used by the embedded HTTP
Server.

Ans: A, B

10. Which operating system users and groups are NOT needed to
install the embedded messaging component of the IBM WebSphere
Application Server V5.0 on Unix or Linux platforms?

A. group mqm
B. group mqbrkrs
C. user mqm
D. user mqbrkrs
E. root

11. Which of the following commands can be executed from the IBM
WebSphere Application Server V5.0 Network Deployment Manager bin
directory for cell administration?
A. removeNode
B. syncNode
C. cleanupNode
D. addNode
E. startNode

Ans: B

12. When installing IBM WebSphere Application Server V5.0 and the web
server plug-in on a machine that has an existing web server, the
administrator will need to:

A. start the IBM WebSphere Application Server during the install.


The Application Server configuration file will be updated as a part
of the installation.

B. stop the IBM WebSphere Application Server during the install.


The Application Server configuration file will be updated as a part
of the installation.

C. start the database. The database server configuration file will


be updated as a part of the installation.

D. stop the web server during the install. The web server
configuration file will be updated as a part of the installation.

Ans: D

13. Immediately after installation, to test the correct independent


operation of the web server, open a browser to the following URL:

A. http://localhost/
B. http://localhost/servlet/snoop
C. http://localhost/testpage.html
D. http://localhost/servlet/testserver

Ans: A

14. If there are problems starting or using the administrative console


after IBM WebSphere Application Server V5.0 "base" installation,
which of the following logs can be used to troubleshoot the problem?

(Select 2)

A. startServer.log
B. SystemOut.log
C. ivt.log
D. ihslog.txt
E. http_plugin.log
Ans: A, B

15. Which of the following properties can be specified when creating a


Web module?

A. Security Constraints
B. Web Resource Collections, HTTP methods, and URL patterns
C. Plug-In Routing Options
D. Transport Protocols
E. Local & Remote EJB Interfaces

Ans: B

16. An installation of WebSphere Application Server V5 contains an


enterprise application named "TestApp". The administrator constructed
a jacl file and placed it in the C:\ directory as "TestApp". The file
contents are as follows:

A. An error message, $AdminApp list is not a valid command.


B. A list of enterprise applications currently installed,
including the TestApp enterprise application.
C. A list of enterprise applications currently installed,
excluding the TestApp enterprise application.
D. An empty list, $AdminApp uninstall TestApp removed all
applications from the server

Ans: C

If you go check it on a remote node you will find


the app cuz you didn't save it by giving $AdminConfig -save

17. An administrator just deployed a new application to WebSphere


Application Server and is getting "404 File not Found" errors when
trying to reach the application from a browser. The administrator
realizes that the web server plugin needs to be regenerated. What
should be done to get the plugin regenerated immediately without
shutting down the server?

(Select 2)

A. Restart the web server plugin


B. Run the GenPluginCfg.sh (or GenPluginCfg.bat)
C. Send a mass email giving users 10 min to wrap up, then reboot
the server
D. Click Environment Update Web Server Plugin in the admin
console navigation tree
E. Set the reroute options so that the Web server is temporarily
unavailable while the modifications are made
Ans: B,D

18. What is the default time interval at which the plug-in checks the
configuration file to see if updates or changes have occurred?

A. 60 seconds with a granularity of 1 minute

B. 1 minute with a granularity of 1 second

C. 60 seconds with a granularity of 10 seconds

D. 1 minute with a granularity of 1 minute

Ans: B

19. At deployment time, security roles can be mapped to users, groups


of users, or special subjects in IBM WebSphere Application Server V5.
Which of the following are defined as special subjects?

(Select 2)

A. Administrative Users

B. All Authenticated Users

C. Authorized Users

D. Everyone

E. EJB Users

Ans: B, C

20. Which of the following statements is true for the embedded JMS
provider (WebSphere JMS provider)?

A. The WebSphere JMS provider can be used to provide the


functionality of full WebSphere MQ.

B. One major limitation is that it cannot exchange messages with


queue managers outside WebSphere.

C. There can be multiple embedded JMS providers per node.


D. The WebSphere administration tools access the embedded JMS
server using the http/https protocol.

Ans: B

21. Please refer to the exhibit to answer this question. If a federated


binding "nsc" is created to bind "nsb" under "nsa", what lookup name
would correctly reference EJB Home X in Name Space 1, given the JNDI
namespace in the exhibit?

A. nsb/ejba

B. comp-env/ejb/ejba

C. nsc/ejba

D. nsa/nsc/ejba

E. nsa/nsc/nsb/ejba

Ans: D

22. What is the purpose of resource adapters?

A. Connect to an enterprise information system

B. Allow J2EE resources to connect to one another

C. Allow web applications to access web services

D. Allow EJBs to communicate with one another

Ans: A

23. An application needs to be redeployed because the quality assurance


team has just approved a bug fix and delivered a new .ear file. Using
the admin console, which is the RECOMMENDED way to redeploy this
application?

A. Applications -Enterprise Applications -Export -Update,


Save

B. Applications -Enterprise Applications -Uninstall, Install,


Save
C. Applications -Enterprise Applications -Export, Stop,
Update, Export,Save, Start

D. Applications -Enterprise Applications -Stop, Update,


Export, Save, Start

Ans: A

You always want to back up the existing EAR before you


deploy a new one having the bug fix!

24. An administrator is writing a deployment script to create a JDBC


Provider. Using the wsadmin tool, how would the administrator
determine which parameters are required to create a new JDBC provider?

A. $AdminApp required JDBCProvider

B. $AdminConfig list JDBCProvider

C. $AdminApp list JDBCProvider required

D. $AdminConfig required JDBCProvider

Ans: D

25. Which of the following tasks can be performed using the Application
Assembly Tool (AAT)?

(Select 2)

A. Create/Edit J2EE modules

B. Create/Edit SDK Applications

C. Create the EAR expansion directory

D. Modify the binding information attributes and IBM extension


attributes

Ans: A, C

26. A system administrator is creating Ant deployment scripts to


automate the deployment process. The stage is reached when a task
definition needs to be created to actually install the application on
WebSphere. What task definition is appropriate to accomplish this?

A. <taskdef name="wsInstallApp"
classname="com.ibm.websphere.ant.tasks.InstallApplication"/

B. <taskdef name="wsInstallApp"
classname="org.apache.tools.ant.tasks.InstallApplication"/

C. <taskdef name="wsInstallApp"
classname="com.ibm.websphere.ant.*"/

D. <taskdef name="wsInstallApp"
classname="com.ibm.apache.tools.ant.tasks.InstallApplication"/

E. <taskdef name="wsInstallApp"
classname="com.ibm.websphere.ant.InstallApplication"/

Ans: A

27. Given that Secure Socket Layer (SSL) is configured properly and
working on the IBM HTTP Server. Which of the following need to be
performed on the WebSphere Application Server V5.0 Base so that it
will accept SSL connections from the HTTP Server?

(Select 2)

A. Global Security must be disabled.

B. The Application Server must be restarted after enabling SSL on


the web server.

C. A Virtual Host alias must be added to support SSL

D. The Web Server Plugin configuration file must be updated.

Ans: C and D

29. Java 2 Security guards access to which of the following system


resources?

A. JSPs

B. file I/O

C. servlets

D. sockets
E. EJB methods

Ans: B and D

30. Which of the following processes are capable of running a security


server?

A. Application Server

B. Administrative Server

C. Web server plug-in

D. Node Agent

Ans: A

31. Which of the following statements are TRUE with respect to


administrative security?

(Select 2)

A. The administrative roles are defined to permit WebSphere


Application Server administrative functions only from the Web-based
administrative console.

B. WebSphere Application Server administrative security is


automatically enforced when global security is enabled.

C. WebSphere Application Server extends the J2EE security role


based access control to include administrative roles.

D. Because the administrative security configuration is at node


level, it is not necessary to restart all of the servers.

Ans: B,C

32. To provide JNDI Naming Service, the CosNaming Service utilizes


which of the following ports?

A. 9000

B. 2809
C. 50000

D. 900

Ans: B

33. In which circumstances might the LDAP server port have to be


specified rather than accept the default port?

(Select 3)

A. If the IBM WebSphere Application Server V5 will inter-operate


with a previous (e.g. Version 4.x) version IBM WebSphere Application
Server.

B. When the port has been pre-empted by IIOP.

C. When multiple IBM WebSphere Application Servers are installed


and configured to run in the same "Single Sign On" (SSO) domain.

D. When the "Bootstrap port" has been reset to the LDAP default
port.

Ans: A,B,D

I think.. For C <- you need LTPA configured as well


as LDAP.. so I am not sure

34. Which authentication method permits a site-specific login through


an HTML page or JSP?

A. Basic authentication

B. Digest Authentication

C. Client-certificate authentication

D. Form-based authentication

Ans: D

35. Which of the following is a typical reason for implementing


vertical scaling?

A. To distribute resources over multiple nodes for failover


B. To fully utilize all of available resources of a node

C. To improve the performance of individual application servers

D. To eliminate a single point of failure

Ans: B

36. Where is the default location of web server plugin configuration


file?

A. <as-root>/config/plugin-cfg.xml

B. <as-root>/config/cells/plugin-cfg.xml

C. <as-root>/properties/plugin-cfg.xml

D. <as-root>/properties/cells/plugin-cfg.xml

Ans: B

37. Which of the following reasons for using persistent session


management are TRUE?

(Select 2)

A. For keeping the user's state information permanently for


consistent interaction

B. For recovering the user's session data by another cluster


member after a cluster member in a cluster failed or is shut down

C. When the user's session data is too valuable to lose through


unexpected failure at the WebSphere node

D. For allowing the administrator better control of the session


cache memory footprint

Ans: B, C

38. Which of the following phrases accurately describe the concept of a


cluster and cluster members?

(Select 3)

A. A set of servers with identical applications deployed on them


B. A blueprint for designing Enterprise Applications

C. A set of servers that participate in workload management

D. A set of servers that may be located on a single node

E. A set of servers that have identical configuration data

Ans: A, C, D

39. At which level can HTTP session management NOT be configured?

A. Application Server

B. Application

C. EJB container

D. Web Module

Ans: C

40. When setting up servlet caching, what is the purpose of


assigning 'Caching group members'?

A. Groups JSP, HTML, and other resources with a particular servlet


that uses them and may need to be cached with the servlet.

B. Provides a list of servlets and JSPs to cache when used.

C. Specifies which users or roles receive cached copies or


regenerated servlets and JSPs.

D. Specifies whether or not to cache all resources associated with


a servlet or JSP.

Ans: B

41. A WebSphere Application Server V5.0 Administrator is attempting to


understand WebSphere Connection Pooling. In which of the following
examples should her application use WebSphere Connection Pooling?

(Select 3)

A. Whenever the application cannot tolerate the overhead of


obtaining and releasing a database connection.
B. Whenever the application requires Java Transaction API(JTA)
transactions within the WebSphere Application Server.

C. Whenever the application developers have implemented connection


pooling in the code.

D. Whenever the application needs to share connections among


multiple users.

E. Whenever the application manages the specifics of creating a


connection, such as the database name, username, or password.

Ans: A,B,D

I think D is the correct answer

42. Which of the following are TRUE statements with respect to LDAP
and the IBM HTTP Server?

A. LDAP is an information directory where users and groups can be


defined only once and shared across multiple machines and
applications.

B. LDAP is an Internet protocol for exchanging basic management


information.

C. The IBM HTTP Server "LDAP Plug-in" allows authentication and


delegation to be performed by the directory.

D. LDAP is a proprietary protocol that IBM uses to communicate


between the IBM HTTP Server and the Web container

Ans: A,B,C

43. How does the 'Starting Weight' configuration affect


enterprise applications installed in IBM WebSphere
Application Server V5?
A. Higher weights get more processing power compared
to other applications with lower weights.
B. Lower weights get more processing power before
applications with higher weights.
C. Specifies the starting order of applications when
the server is started or restarted. The application
with the lowest starting weight is started first.
D. Specifies the application weight for plug-in.
Based on that value forwards plug-in the request to
one or other application server.

Ans: C

44. The "restoreConfig myBackupConfig nostop" command


restores a node's configuration from a backup called
myBackupConfig but does NOT:
A. stop the servers, which could allow a
synchronization during restore
B. stop the restoration process if synchronization
errors occur - restoring everything EXCEPT what caused
the error
C. stop the restoration process if synchronization
errors occur - restoring everything INCLUDING what
caused the error
D. stop an incoming request to the application being
restored if the request can execute without errors
Ans: A

45. An administrator has successfully completed a default


installation of both the application server and IBM
HTTP Server. Which of the following locations contains
the plug-in configuration files?
A. /Program Files/IBM HTTP Server/
B. <WASROOT>/AppServer/bin/
C. <WASROOT>/AppServer/config/
D. <WASROOT>/AppServer/properties/
Ans: C

46. A web site, that does not make use of certificates


must store information within a given user's session.
What session tracking mechanism can be used, even if
the user has disabled cookies?
A. SSL ID Tracking
B. Cookies
C. URL Rewriting
D. Protocol Switch Rewriting
Ans: C

47. What BEST describes setting the 'Minimum Heap Size'


close to or equal to the 'Maximum Heap Size'?
A. High performance web applications waste more
processing power on low performance functions.
B. Low performance web applications spend more
processing power than necessary on low performance
functions.
C. Can improve WebSphere Application Server start up.

D. Garbage collection cycles are more frequent that


can affect performance.
Ans: C

48. Which of the following situations would require a


WebSphere administrator to manually edit the plug-in
configuration file?
A. When a plug-in is generated on one operating
system and needs to be copied to a remote operating
system.
B. When enterprise applications are removed from the
application server.
C. For any remote application servers that require
components or services from another application server
whose plug-in was edited.
D. When security roles were edited for components
referenced by the plug-in.
Ans: A

49. An administrator needs to monitor the percentage of


database connections in use for a specific application
server. Which of the following tools could the
administrator use?
A. Tivoli Performance Viewer
B. WebSphere Administrative Console
C. Log Analyzer
D. Resource Analyzer
Ans: A, D

50. CPU use is being overloaded and performance on the Web


server is down. What action could be taken to improve
performance of handling incoming requests?
A. Install an additional network adapter to increase
network throughput.
B. Increase the MaxServers directive to enable more
potential processes.
C. Set up a Caching Proxy to relieve Web Server.
D. Increase the MaxClients directive to minimize
average response time.
Ans: C

51. Which of the following statements regarding IBM


WebSphere Application Server V5 Log Analyzer is TRUE?
A. It is capable of downloading the latest symptom
XML file from the IBM support site.
B. It supports functions for ORB trace formatting and
message IDs.
C. It creates an activity.log file which can be
viewed with any text editor.
D. It can be used to view remote log files.
Ans: A

52. Which WebSphere files can contain application print


statements?
(Select 2)
A. startServer.log
B. SystemOut.log
C. SystemErr.log
D. native_stdout.log
E. native_stderr.log
Ans: B, C

53. Which of the following prerequisites MUST be met


before the JNDI dumpNameSpace utility can be used?
A. The AdminServer containing the application that
the administrator will be performing the JNDI dump
against, must be active.
B. The application server that an administrator will
be performing the JNDI dump against, must be active.
C. The Administrative Console must be used to perform
the dumpNameSpace.
D. The PATH environment variable must be set to
include the <as-root>/bin/dumpNameSpace.bat command
before invoking.
Ans: B

54. For a WebSphere Application Server V5.0 Base


installation, which output filename conforms to the
format created by the Collector Tool?
A. hostname-Base-WASenv.jar
B. hostname-Base_WASenv.log
C. servername-Base_WASenv.log
D. servername-Base-Wasenv.jar
Ans: A

55. The Administrative Console provides multiple methods


to help an administrator troubleshoot the system.
Which of the following are examples of these methods?
A. Console messages
B. Trace
C. Logs
D. Profiling
E. Symptom database
Ans: A, C

56. JVM log files can be rotated based on the following


criteria:
(Select 2)
A. Time
B. Remaining disk space
C. At each app server start-up
D. Maximum file size
E. JVM heap size
Ans: A, D

57. Which of the following statements about the First


Failure Data Capture (FFDC) tool is correct?
A. The captured data is saved automatically in the
<WAS_HOME>/logs/ffdc folder.
B. It is the primary tool to view and analyze log
files.
C. It is an optional component to choose during
install.
D. It needs to be started and stopped manually.
Ans: A

58. If the Admin Console fails to start up, which of the


following files should an Administrator check to see
errors?
(Select 2)
A. startServer.log
B. native_stderr.log
C. SystemOut.log
D. admin_error.log
E. admin_access.log
Ans: A, C

You might also like