What does the 璂com.ibm.webshpere.alarmthreadmonitor.generate.javacore JVM argument do?
A. Creates a javacore dump when a thread is hung
B. Generates a Trace message that a javacore should be generated
C. Generates a SystemOut message that a javacore should be generated
D. Allows the administrator to choose whether or not to generate a javacore when a hang is detected
When installing a new application to IBM WebSphere Application Server, which location is valid for the application file?
A. Client Machine
B. Managed Node
C. Unmanaged Node
D. Remote Web Server
Which of the following statements is true regarding the relationship of nodes and node groups?
A. Nodes can belong to only one node group.
B. Nodes managed by a node group cannot be deleted.
C. All nodes are initially not associated with a node group.
D. All nodes are initially associated with a default node group.
What must be modified to configure the authentication settings for IIOP requests?
A. Bus security settings
B. J2C authentication settings
C. Session Initiation Protocol (SIP) authentication settings
D. Common Secure Interoperability Version 2 (CSIV2) settings
In an IBM WebSphere Application Server cluster, an administrator notices EJB requests are not evenly distributed on the cluster members during the load test.
What two things can the administrator verify in order to identify and resolve the issue? (Choose two.)
A. Ensure Dynamic Workload Management is enabled.
B. Ensure host scoped routing optimization is enabled.
C. Ensure PMI Workload Management counters are enabled.
D. Ensure each server in the cluster has an equal weighted value.
E. Ensure the Web server plug-in is using the round robin algorithm.
Which of the following is true about creating multiple security domains?
A. A new security domain can be created only using the administrative console.
B. Global security must be enabled before creating new multiple security domains.
C. Only users assigned to the security-admin role can create new multiple security domains.
D. If a unique name for the domain is not specified, the system will automatically create one.
Which is true when installing interim fixes silently?
A. No response file is needed.
B. A password file is required.
C. Greater permissions are needed.
D. An online repository must be used.
An administrator has removed a node, but all the resources associated with the deleted node still exist.
What can the administrator do to ensure the node configuration is removed from the cell repository?
A. Run the command syncNoode.
B. Refederate and remove the node.
C. Run the command cleanupNode.
D. Perform node synchronization via the Integrated Solutions Console.
Which statement is true when synchronizing a web server in a cell topology?
A. Web server are managed servers and can be synchronized.
B. Web server are unmanaged nodes and can be synchronized.
C. Web server are managed nodes and cannot be synchronized.
D. Web server are unmanaged servers and cannot be synchronized.
Which of the following describes how communication occurs when a Web Services client sends a request to an application server?
A. Through SOAP over HTTP and passing through the web services engine
B. Through SOAP over JMS and passing through the embedded HTTP server
C. Through RMI over IIOP communication directly to the messaging engine within the application server
D. Through SOAP over JMS communications directly to the messaging engine within the application server