Black Friday Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

IBM C9510-401 Application Server Network Deployment V8.5.5 and Liberty Profile System Administration Exam Practice Test

Page: 1 / 7
Total 73 questions

Application Server Network Deployment V8.5.5 and Liberty Profile System Administration Questions and Answers

Question 1

A system administrator needs to view the list of certificates for unmanaged web server located on a remote system.

How should the administrator do this?

Options:

A.

View the plugin-cfg.xml

B.

Look at the SSL configuration in the httpd.conf

C.

Use iKeyman to view the keyring.

D.

Use the administrative console to check the content of the cell default keystore.

Question 2

A system administrator wants to learn some of the Jython scripting commands for the administration of the environment.

Which product feature should the administrator use?

Options:

A.

The wsadmin.properties file to load a profile.

B.

The AdminTask object to generate wsadmin scripts.

C.

The guided activities panel from the Integrated Solutions Console (ISC).

D.

The “Log command assistance commands” option in the Integrated Solutions Console (ISC).

Question 3

A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.

What should the administrator do to implement the required security configuration?

Options:

A.

Install and configure a TAI (Trust Association Interceptor)

B.

Configure a security domain for the stand-alone LDAP server.

C.

Use Federated repositories and configure the supported entity types.

D.

Use Stand-alone custom registry and configure the flat file implementation.

Question 4

A web application is hosted on an application server that receives HTTP requests from a third party application named myApp. The URIGroup mapping for this application is called default_host_myApp.

The development team asks a system administrator to configure the HTTP plug-in to prevent routing requests to any application server except server1.

The following exhibit shows the parts of the plugin-cfg.xml file that are relevant for myApp. The UriGroups for other applications are not shown in the exhibit.

Question # 4

What should the administrator do to the plugin-cfg.xml file to ensure that requests for default_host_myApp URIGroup are routed only to machine1?

Options:

A.

Delete the Server tag for CloneId=”b20000002”

Delete all of the tags within the Server tag

B.

Delete the UriGroup tag for default_host_myApp

Delete all of the tags within the UriGroup tag

C.

Delete the VirtualHostGroup tag for default_host

Delete all of the tags within the VirtualHostGroup tag

D.

Edit the LoadBalanceWeight for server1 to 20

Edit the LoadBalanceWeight for server2 to 2

Question 5

A new cell contains a cluster with members defined in two managed nodes running on two different machines. The cell also contains two unmanaged nodes running on HTTP servers with HTTP plug-in. Session persistence has been enabled.

Which additional component(s) can the system administrator configure to make this environment highly available?

Options:

A.

Enable administrative security.

B.

Configure a DMZ secure proxy.

C.

Configure High Performance Extensible Logging.

D.

Configure primary and backup load balancers for the HTTP servers.

Question 6

A system administrator in a bank was asked by business users to determine the most accessed JSP page in a web application at normal work load for marketing purpose.

Which tool should the administrator use to find the most used JSP page?

Options:

A.

Performance and Diagnostic Advisor

B.

IBM Support Assistant Data Collector

C.

High Performance Extensible Logging Log Viewer

D.

Tivoli Performance Viewer (TPV) summary reports

Question 7

A system administrator needs to set a new Liberty profile environment to support an application.

What should the administrator do to enable this environment for high availability and scalability of the application?

Options:

A.

Define multiple server members in one collective controller.

B.

Define multiple servers in a cluster in one collective controller.

C.

Define multiple collective controllers within a Liberty collective.

D.

Define multiple server members in multiple collective controllers.

Question 8

A system administrator has created a cluster containing two servers in a same node. The administrator did not select the option Generate unique HTTP ports during the creation of the cluster members. After the cluster creation, the administrator changed the HTTP port of the second cluster member to 9081.

Testing the servers using the snoop servlet directly to the server’s HTTP port, the administrator got the following error message for the second server:

Question # 8

How can the administrator fix this problem?

Options:

A.

Regenerate and propagate the HTTP plug-in.

B.

Add the port 9081 to the default_host alias.

C.

Create a new virtual host alias at the cell level for the port 9081.

D.

Edit the server.xml for the second server and add the port 9081.

Question 9

There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configurator role access to a developer for a single application deployed in that cluster.

How should the administrator meet this requirement and restrict Configurator role access for a single application?

Options:

A.

Create a J2C authentication alias for that developer.

B.

Create an Administrative user role and provide Configurator access to the developer.

C.

Create an Administrative group role and provide Configurator access to the developer.

D.

Create an administrative authorization group, scope it only for that application and create an Administrative user or group role to give Configurator access to the developer.

Question 10

A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.

How should the administrator accomplish this?

Options:

A.

Enable “Authenticate when any URI is accessed”.

B.

Enable “Authenticate only when the URI is protected”.

Disable “Use available authentication data when an unprotected URI is accessed”.

C.

Enable “Authenticate only when the URI is protected”.

Enable “Use available authentication data when an unprotected URI is accessed”.

D.

Map the application security roles to the configured user registry’s groups.

Page: 1 / 7
Total 73 questions