The computer where a federated node was running had a failure and cannot be recovered. A system administrator wants to recreate the node with the same configurations in another computer.
Which steps should the administrator execute in order to recover the damaged node?
A. Configure the new computer with a different hostname.Create a custom profile with the same name.Federate to the cell using the command addNode with the default options.
B. Configure the new computer with a different hostname.Create a custom profile with a different name.Federate to the cell using the command addNote with the option 璦sExistingNode.
C. Configure the new computer with the same hostname.Create a custom profile with the same name.Federate to the cell using the command addNote with the option 璦sExistingNode.
D. Configure the new computer with the same hostname.Create a custom profile with the same name.Federate to the cell using the command addNote with the options 璱ncludeapps.
A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization.
How can a system administrator fix the issue ensuring only authorized access?
A. Using the Integrated Solutions Console (ISC), map all security roles to the special subject Everyone.
B. Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped to groups in the correct user registry.
C. Edit the application using an assembly tool to add a security constraint for the servlet and reinstall the application.
D. Edit the application using an assembly tool to remove the security constraint defined for the servlet and reinstall the application.
A system administrator has created a cluster containing two servers in a same node. The administrator did not select the option Generate unique HTTP ports during the creation of the cluster members. After the cluster creation, the administrator changed the HTTP port of the second cluster member to 9081.
Testing the servers using the snoop servlet directly to the server's HTTP port, the administrator got the following error message for the second server:
How can the administrator fix this problem?
A. Regenerate and propagate the HTTP plug-in.
B. Add the port 9081 to the default_host alias.
C. Create a new virtual host alias at the cell level for the port 9081.
D. Edit the server.xml for the second server and add the port 9081.
A system administrator is tasked with monitoring the overall health of the WebSphere environment to be able to tune the environment properly. Specifically, the administrator was asked to:
Which PMI modules can the administrator examine to obtain this data?
A. Number of requests, Java virtual memory, Average response time
B. Number of requests, Average response time, Web server thread pools
C. Average response time, Java virtual memory, Number of Live HTTP Sessions
D. Average response time, Web server thread pools, Number of Live HTTP Sessions
The application placement controller has been configured with elasticity mode enabled. Intermittently, all instances of a dynamic cluster are removed. After further review, the system administrator noticed that it occurs during peak load on another dynamic cluster.
The administrator wants to keep at least one instance available. Which configuration is needed in the dynamic clusters?
A. Enable application lazy start with elasticity mode.
B. Set the proactiveIdleStop custom property to true.
C. Set the Number of instances to a value greater than zero.
D. Disable the option "If other dynamic clusters need resources, stop all instances of this cluster during periods of inactivity".
A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.
What should the administrator do to implement the required security configuration?
A. Install and configure a TAI (Trust Association Interceptor)
B. Configure a security domain for the stand-alone LDAP server.
C. Use Federated repositories and configure the supported entity types.
D. Use Stand-alone custom registry and configure the flat file implementation.
A system administrator has installed WebSphere Application Server Network Deployment V8.5.5 using the silent installation process and needs the verify that the installation completed successfully.
What does the administrator need to do to verify a successful installation?
A. Launch the Installation Manager GUI, verify the installation by going to File -> View Installed Packages.
B. Run the command IBMIM listInstalledPackages and check that the appropriate WebSphere Application Server package is listed.
C. Check for INSTCONFSUCCESS message at the end of the
D. Use the installver command to compare the checksum of the product file to the correct checksum value in the bill-of-materials file and make sure that the checksums match.
A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.
How should the administrator accomplish this?
A. Enable "Authenticate when any URI is accessed".
B. Enable "Authenticate only when the URI is protected".Disable "Use available authentication data when an unprotected URI is accessed".
C. Enable "Authenticate only when the URI is protected".Enable "Use available authentication data when an unprotected URI is accessed".
D. Map the application security roles to the configured user registry's groups.
A system administrator is required to create a star topology for multi-cell performance management for three WebSphere Application Server cells.
How should the administrator configure the Application Placement Controller (APC) in a star topology? Configure the cell custom property CenterCell to:
A. false in all three WebSphere Application Server cells.
B. false in one WebSphere Application Server celltrue in the other two WebSphere Application Server cells.
C. true in all three WebSphere Application Server cells.
D. true in one WebSphere Application Server cellfalse in the other two WebSphere Application Server cells.
A system administrator has added a server cluster as a member of a service integration bus (SIB). The administrator needs to configure one messaging engine for each server in this cluster and to have a failover location for each messaging engine.
What should the administrator do to achieve the required design?
A. Configure a new messaging engine in each server to support failover.
B. Configure the data store for each messaging engine for each server in the cluster.
C. Select scalability with high availability as the messaging engine policy.
D. Create a core group policy to restrict each messaging engine to a particular server.