IBM c9510-401 practice test

IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile Exam


Question 1

An application contains a web services client and the application is deployed and running. A system
administrator has to add a response timeout to the deployed web services client, so the call fails in a
timely fashion.
Which artifact should the administrator use?

  • A. web.xml
  • B. was-webservices-sca.xml
  • C. ibm-webservices-bnd.xml
  • D. ibm-webservicesclient-bnd.xml
Answer:

D

Explanation:
The ibm-webservicesclient-bnd.xmi deployment descriptor file contains information for the web
services run time that is WebSphere product-specific. This deployment descriptor file is used with
Java API for XML-based web services.
References:
https://www.ibm.com/support/knowledgecenter/SSEQTJ_8.5.5/com.ibm.websphere.base.doc/ae/rwbs_assembpropclient.html

Discussions

Question 2

A system administrator has started a Liberty profile server using the default values. Later, the
administrator modified the server.xml file for the server to include
<applicationMonitor updateTrigger=polled pollingRate=100ms
dropins=${server.config.dir}/applications dropinsEnabled=true/>
The administrator placed the application ServletApp.war in the apps directory under
${server.config.dir}. While accessing the correct URL for the home page of the application, the error
Context Root Not Found occurs in the browser.
How can the administrator resolve this error?

  • A. Restart the Liberty profile server.
  • B. Install the ServletApp.war file using the Integrated Solutions Console (ISC).
  • C. Place the ServletApp.war file in the directory named dropins under ${server.config.dir}.
  • D. Place the ServletApp.war file in the directory named applications under ${server.config.dir}.
Answer:

D

Discussions

Question 3

A developer created an enterprise application which contained data source and security role
information. The developer asked a system administrator to install this application to an application
server where global security is enabled using the Integrated Solutions Console (ISC). A new data
source was configured at the server scope for the use of this application. While load testing the
application, the developer noticed that the attributes configured on the new data source were
ignored by the application server.
How can the administrator ensure that the attributes configured on the new data source are used by
the application server?

  • A. Create the data source under cell scope instead of server scope.
  • B. Delete any data source of the same name defined under node, cluster or cell scope.
  • C. Reinstall the application and clear the Process embedded configuration check box.
  • D. Correct the component-managed and container-managed authentication aliases set on the data source.
Answer:

C

Explanation:
Process embedded configuration
Specifies whether the embedded configuration should be processed. An embedded configuration
consists of files such as resource.xml, variables.xml, and deployment.xml. You can collect WebSphere
Application Server-specific deployment information and store it in the application EAR file. Such an
EAR file can then be installed into a WebSphere Application Server configuration, using application
management interfaces that are described in the topic, Installing an application through
programming.
One such application EAR file is an enhanced EAR file, which is created when you export an already
installed application. The embedded configuration check box identifies such an enhanced EAR file. By
default, the check box for "process embedded configuration" is checked if the application is detected
to be an enhanced EAR. The application install options are prepopulated with the information from
the embedded configuration whether the check box for "process embedded configuration" is
checked or not. Users can overwrite these values during the deployment process.
References:
https://www.ibm.com/support/knowledgecenter/SSAW57_8.0.0/com.ibm.websphere.nd.doc/info/ae/ae/urun_rapp_installoptions.html

Discussions

Question 4

After installing an enhanced EAR in a WebSphere Application Server environment, a system
administrator with Configurator privileges is able to see a JDBC provider and a data source in the
Integrated Solution Console (ISC) but is not able to delete these resources.
How can the administrator resolve this issue?

  • A. Use the AdminTask object to delete the resources.
  • B. Stop all application server instances and then delete the resources.
  • C. Ask another administrator with iscadmin privilege to delete the resource.
  • D. Edit the EAR to remove the application scoped resources and reinstall the application.
Answer:

A

Explanation:
The JDBCProviderManagement command group for the AdminTask object includes the following
commands:
References:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/rxml_atjdbcprovider.html

Discussions

Question 5

The administrator needs to identify any security role references and security constraints in a web
application.
How can the administrator identify these roles and constraints?

  • A. ibm-application-ext.xml file using a text editor.
  • B. ibmconfig folder in the application after using the EARExpander command.
  • C. Web deployment descriptor using IBM Assembly and Deploy Tools.
  • D. Security role to user/group mapping by using the Integrated Solutions Console (ISC).
Answer:

C

Explanation:
Securing web applications using an assembly tool.
You can use three types of web login authentication mechanisms to configure a web application:
basic authentication, form-based authentication and client certificate-based authentication. Protect
web resources in a web application by assigning security roles to those resources.
References:
https://www.ibm.com/support/knowledgecenter/SS7JFU_8.5.5/com.ibm.websphere.nd.doc/ae/tsec_secweb_atk.html

Discussions

Question 6

A system administrator needs to configure a JDBC provider and a data source for an application in a
clustered environment. The administrator also needs to copy the JDBC drivers from the database
server to the application server machines.
How can the administrator meet these requirements?

  • A. Create a JDBC provider and the data source in the cluster scope.Copy the driver to all nodes.Set the environment variable at the node level to the drivers path.
  • B. Create a JDBC provider in the server scope and the data source in the node scope.Copy the driver to all application servers.Set the environment variable at the node level to the drivers path.
  • C. Create a JDBC provider in the node scope and the data source in the cell scope.Copy the driver to the deployment manager.Set the environment variable at the server level to point to the deployment manager path.
  • D. Create a JDBC provider in the application scope and the data source in the server scope.Copy the driver to all application server directories.Set the environment variable in each JVM to the drivers path.
Answer:

A

Discussions

Question 7

A system administrator has configured a cluster containing 40 servers. The cluster members all
belong to one core group. While examining the log files, the administrator notices that the core
group coordinator is consuming abnormally high amounts of memory and CPU resources.
How can the system administrator reduce the memory and CPU resource usage of the core group
coordinator?

  • A. Configure a core group bridge.
  • B. Configure a second active coordinator.
  • C. Decrease the memory on the machine.
  • D. Move the coordinator to another machine.
Answer:

B

Explanation:
Remember that coordinator election occurs whenever the view changes. Electing a new coordinator
uses a lot of resources because this process causes increased network traffic and CPU consumption.
Specifying a preferred coordinator server, whenever practical, helps eliminate the need to make
frequent coordinator changes.
References:
https://www.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/crun_ha_coordinator.html

Discussions

Question 8

A system administrator has created a cluster containing two servers in a same node. The
administrator did not select the option Generate unique HTTP ports during the creation of the cluster
members. After the cluster creation, the administrator changed the HTTP port of the second cluster
member to 9081.
Testing the servers using the snoop servlet directly to the servers HTTP port, the administrator got
the following error message for the second server:

How can the administrator fix this problem?

  • A. Regenerate and propagate the HTTP plug-in.
  • B. Add the port 9081 to the default_host alias.
  • C. Create a new virtual host alias at the cell level for the port 9081.
  • D. Edit the server.xml for the second server and add the port 9081.
Answer:

B

Explanation:
Problem(Abstract)
When setting up IBM Cognos within IBM WebSphere, the URI is not accessible. The error message
when trying the Error! Hyperlink reference not valid. port>/p2pd/servlet/dispatch is
SRVE0255E: A WebGroup/Virtual Host to handle /p2pd/servlet/dispatch has not been defined.
Symptom
Unable to start IBM Cognos Business Intelligence
Cause
The virtual host does not contain IBM WebSphere Port that the Application server is listening on. This
may be one of several reasons.
References: http://www-01.ibm.com/support/docview.wss?uid=swg21438842

Discussions

Question 9

A web application is hosted on an application server that receives HTTP requests from a third party
application named myApp. The URIGroup mapping for this application is called default_host_myApp.
The development team asks a system administrator to configure the HTTP plug-in to prevent routing
requests to any application server except server1.
The following exhibit shows the parts of the plugin-cfg.xml file that are relevant for myApp. The
UriGroups for other applications are not shown in the exhibit.

What should the administrator do to the plugin-cfg.xml file to ensure that requests for
default_host_myApp URIGroup are routed only to machine1?

  • A. Delete the Server tag for CloneId=”b20000002”Delete all of the tags within the Server tag
  • B. Delete the UriGroup tag for default_host_myAppDelete all of the tags within the UriGroup tag
  • C. Delete the VirtualHostGroup tag for default_hostDelete all of the tags within the VirtualHostGroup tag
  • D. Edit the LoadBalanceWeight for server1 to 20Edit the LoadBalanceWeight for server2 to 2
Answer:

A

Discussions

Question 10

A system administrator needs to set a new Liberty profile environment to support an application.
What should the administrator do to enable this environment for high availability and scalability of
the application?

  • A. Define multiple server members in one collective controller.
  • B. Define multiple servers in a cluster in one collective controller.
  • C. Define multiple collective controllers within a Liberty collective.
  • D. Define multiple server members in multiple collective controllers.
Answer:

B

Explanation:
Setting up Liberty server clusters
A Liberty can be configured into a server cluster for application high availability and scale.
The collectiveController-1.0 feature and its capabilities are available only in multiple-server products
such as WebSphere Application Server Liberty Network Deployment and WebSphere Application
Server Liberty for z/OS. The feature is not available in single-server products such as WebSphere
Application Server Liberty, WebSphere Application Server Liberty - Express, or WebSphere
Application Server Liberty Core. If you have a multiple-server product installation, you can use its
collectiveController-1.0 feature to work with collective members from single-server products.
References:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.wlp.nd.doc/ae/cwlp_server_clusters.html

Discussions
To page 2