Which one of the following options describes the runtime flow starting from the client browser in a clustered WebSphere Application Server Network Deployment topology?
A. HTTP server -> job manager -> admin agent -> HTTP server plug-in
B. Load balancer -> HTTP server -> HTTP server plug-in -> application server
C. Application server -> node agent -> deployment manager -> load balancer D. Deployment manager -> node agent -> HTTP server plug-in -> HTTP server
A system administrator is asked by a development team to monitor the performance of a newly deployed EJB application. The administrator noticed that the heap size of the application server is growing.
What should the administrator do to fix the problem using ORB settings?
A. Use J2EE managed object MBeans.
B. Enable the pass by reference option.
C. Disable the application scoped resources in the application deployment descriptor.
D. Ensure that Process embedded configurations is not selected when exporting the EAR.
A system administrator wants to learn some of the Python scripting commands for the administration of the environment.
Which product feature should the administrator use?
A. The wsadmin.properties file to load a profile.
B. The AdminTask object to generate wsadmin scripts.
C. The guided activities panel from the Integrated Solutions Console (ISC).
D. The "Log command assistance commands" option in the Integrated Solutions Console (ISC).
A performance test team was testing the capacity of concurrent users of a web application deployed on a multi-processor server. While testing 250 concurrent users, the administrator discovers connections to the database are failing.
In response, a system administrator increased the connection pool to the maximum limit which the database allows and increased the prepared statement cache size. The test passed, but the application response time was slower.
How should the system administrator tune the data source properties to improve the application response time?
A. Change connection pools purge policy.
B. Decrease connection pool reap time.
C. Decrease number of free pool partitions.
D. Decrease the prepared statement cache size.
After collecting diagnostic trace from a server running under a cell, a system administrator noticed that the trace files contained sensitive information.
To avoid this issue in the future, what can the administrator do?
A. Configure entries in the ras.rawtracelist.properties.
B. Configure suppressSensitiveTrace in the bootstrap.properties file.
C. Clear the "Disable logging and tracing of potentially sensitive data" checkbox.
D. Add the entry com.ibm.websphere.logging.RawTraceList=off to the end of the trace string.
A system administrator is required to monitor the application server logs for heap memory issues and determine if the heap memory usage is reaching close to 70% of the maximum heap. The application server is configured with an initial heap of 256 MB and a max heap of 1 GB.
How should the administrator determine if the application server is utilizing 70% of the max allocated heap memory?
A. Check the System logs for OutOfMemoryErrors.Trigger a heap dump from the Integrated Solutions Console (ISC).Analyze the heap dump.
B. Configure WebSphere Application Server to enable verbose garbage collection.Analyze the garbage collection cycles in the native logs.
C. Configure Initial heap to be equal to the max heap.Trigger a heap dump from the Integrated Solutions Console (ISC).Analyze the heap dump.
D. Configure WebSphere Application Server to increase max heap.Trigger a heap dump from the Integrated Solutions Console (ISC).Analyze the heap dump.
A system administrator needs to deploy a new enterprise application which requires that application security be enabled, but, the existing applications in the cell cannot be executed with application security enabled. The cell has the global security and Java 2 security disabled.
How can the administrator handle this requirement?
A. Enable Java 2 security for the cell.Create a security domain with application security enabled.Associate the security domain to the new application.
B. Enable Java 2 security for the cell.Create a security domain with application security enabled.Associate the security domain to a new cluster to be used to deploy the new application.
C. Enable administrative security for the cell.Create a security domain with application security enabled.Associate the security domain at the application level for the new application.
D. Enable administrative security for the cell.Create a security domain with application security enabled.Associate the security domain to the new cluster where the new application is deployed.
A system administrator ran the backup Config command to backup the configuration using the -nostop option. The administrator changed the properties for the service integration environment by modifying the sib.properties file. During testing the administrator noticed Service Integration Bus related errors and wanted to restore the service integration environment. The administrator used the restore config command, but the tuning properties for the service integration environment were not restored.
How can the administrator prevent this issue?
A. Use full repository checkpoints for both the backup and the restore.
B. Use the restore config command with -nostop for the restore.
C. Use the manage profiles command for both the backup and the restore.
D. Use the backup config command without -nostop for the backup.
E. Use the restore config command without -nostop for the restore.
A JAX-WS EJB stateless session bean web service needs to be accessed by consumers outside the corporate domain.
Which configuration will help a system administrator meet the requirement?
A. Open firewall ports for both bootstrap and orb listener ports within the cell.
B. Configure plug-in in the DMZ to send request to the cluster members.
C. Configure on demand router (ODR) in the DMZ to send requests to the cluster members.
D. Configure HTTP tunneling to send the client-side Object Request Broker (ORB) request to the server-side ORB.
A web application was deployed on a WebSphere Application Server cluster. While users are using the application, one of the cluster servers fails and the users lose their working data.
What can the system administrator configure to ensure users can continue to work if one of the cluster server fails?
A. An increased session timeout.
B. A cluster of external HTTP servers.
C. A load balancer to spread work between existing servers.
D. A WebSphere eXtreme Scale HTTP session management.