Monday, May 20, 2013

ibm websphere 000-317 exam dumps free(56-61)


QUESTION NO: 56
A system administrator needs to enable security auditing. What additional configuration steps are
required before auditing becomes effective?
A. Configure the types of events that are recorded.
B. Configure the types of events that are recorded, and configure failure notifications.
C. Create a set of users or groups mapped to the Admin Security Manager role.
D. Create a set of users or groups mapped to the Auditor role, and define the notification
mechanism.
Answer: D

QUESTION NO: 57
A system administrator must deploy a new application that uses Java 2 security. There are several
applications installed in the cell that use application security but not Java 2 security. How can the
administrator enable support for Java 2 security without affecting the other applications?
A. Enable Java 2 security at the cell level and grant permissions only to the new application.
B. Configure a security domain with Java 2 security enabled for the application server that will host
the new application.
C. Configure a security domain for the other applications in the cell with both Java 2 security
enabled and application security.
D. Disable global security and configure a security domain with Java 2 security enabled for the
application server that will host the new application.
Answer: B

QUESTION NO: 58
In a network deployment cell, web users are prompted several times to authenticate. What should
the administrator do so that the users only need to authenticate once during a session?
A. Configure an authentication proxy server in the DMZ.
B. Enable the "Set security cookies to HTTPOnly" property for the global single sign-on
configuration.
C. Enable single sign-on for the global security configuration and provide the necessary DNS
domain names.
D. Increase the default LTPA timeout and the cache timeout values for forwarded credentials
between servers.
Answer: C

QUESTION NO: 59
A system administrator creates a profile and selects the option to allow WebSphere Application
Server to create the default certificate. After the certificate is created, what attributes can the
administrator customize, if needed?
A. location and lifespan of the certificate
B. location, type, and password of the keystore
C. Distinguished name (DN) and lifespan of the certificate
D. Distinguished name (DN) and password of the keystore
Answer: C

QUESTION NO: 60
A system administrator must configure IBM WebSphere Application Server Network Deployment
V8.0 to authenticate users with a Windows domain. The administrator should configure a registry
that is:
A. a local operating system (OS).
B. a Virtual Member Manager (VMM).
C. a registry that implements WebSphere Common Configuration Model (WCCM).
D. an Active Directory (AD) domain controller.
Answer: A

QUESTION NO: 61
A system administrator needs to backup a WebSphere Application Server profile without
disrupting normal operations.
How can the administrator accomplish this?
A. Execute backupConfig.sh -nostop -profileName <profile>
B. Execute prnt.sh -nostop -backupProfile -profileName <profile>
C. Execute rnanageprofiles.sh -nostop -backupProfile -profileName <profile>
D. Use the administrative agent to configure a backup job without stopping the server.
Answer: A

ibm websphere 000-317 exam dumps free(46-55)


QUESTION NO: 46
An administrator needs to monitor the frequency of garbage collection (GC) cycles that are
triggered when a typical client load is run against the server. How should the administrator monitor
the frequency of garbage collections?
A. Use the Log Analyzer to view the verbose GC logs.
B. Use the HPEL Log Viewer and look for System.gc() calls.
C. Use the Tivoli Performance Viewer (TPV) and select the JVM Runtime.
D. Run the performance servlet to gather the verbose GC data.
Answer: C

QUESTION NO: 47
A system administrator needs to improve performance of a WebSphere Application Server
runtime. The computations of JavaServer Pages (JSP), servlets, portlets, Web services and
WebSphere commands should be performed once and served from memory. What should the
administrator configure?
A. Caching Proxy
B. Edge Components
C. Dynamic cache service
D. WebSphere eXtreme Scale
Answer: C

QUESTION NO: 48
A system administrator is tuning a WebSphere Application Server system for optimal performance,
based on advice obtained from the Performance and Diagnostic advisor. What setting should the
administrator configure to ensure accurate advice for the specific configuration of the system?
A. Specify the process ID of the server
B. Specify the number of processors on the server
C. Enable tracing on the server
D. Enable High Performance Extensible Logging (HPEL) logging
Answer: B

QUESTION NO: 49
While monitoring a JDBC data source's performance during a test load, a system administrator
notices that there are a large number of prepared statements discarded from the cache. In order to
improve application throughput, how should the administrator tune the data source?
A. Increase the size of the prepared statement cache until there are no statement discards under
load.
B. Increase the maximum connection pool size and keep the prepared statement cache at its
default size.
C. Set the connection pool purge policy to "EntirePool" and increase the maximum connection
pool size.
D. Set the minimum connection pool size equal to the maximum connection pool size and keep
the prepared statement cache at its default size.
Answer: A

QUESTION NO: 50
A system administrator needs to identify the performance of a database application and JDBC
connection pool, CPU usage time and response time. Which tools should the administrator use to
get this data?
A. Client program
B. Request metrics
C. Custom Java code
D. Heap dump analyzer
E. Performance Monitoring Infrastructure (PMI)
Answer: B,E

 
QUESTION NO: 51
System administrator needs to identify the most time-intensive web components of a running
application, and determine which components are the slowest. The administrator does this from
the Tivoli Performance Viewer (TPV) by
A. viewing diagnostic trace output.
B. viewing Servlets Summary Report.
C. viewing the log file for the web server.
D. opening Reports tab, Runtime operations, reports.
Answer: B

QUESTION NO: 52
An application server is configured with the default garbage collection (GC) policy. An
administrator needs to load test different GC policies. How can the administrator change the
server's GC policy?
A. Start the node agent from the command line using the -Xgcpolicy option, and specify the server
name.
B. Start the administrative agent from the command line using the -Xgcpolicy option and specify
the server name.
C. Use Integrated Solutions Console (ISC) to navigate to the server's JVM configuration and add
an appropriate -Xgcpolicy setting.
D. Use Integrated Solutions Console (ISC) to navigate to the deployment manager's JVM
configuration and add an appropriate -Xgcpolicy setting.
Answer: C

QUESTION NO: 53
A system administrator needs to modify the Java 2 security permissions for applications running
on a server. How should the administrator perform this task?
A. Use the PolicyTool.
B. Use the iKeyman tool.
C. Edit the was.policy file.
D. Edit the security.xml file.
Answer: A

QUESTION NO: 54
The lead administrator needs to limit access to the Integrated Solutions Console (ISC) by a group
of administrators who only need to: view the configuration of the WebSphere Application Server.
monitor its status. stop and start the server. To what administrative role should the lead
administrator assign this group?
A. Auditor
B. Monitor
C. Operator
D. Configurator
Answer: C

QUESTION NO: 55
A system administrator needs to enable Single Sign On (SSO) using LTPA between WebSphere
cells. What must the administrator do to accomplish this?
A. Configure both cells to share LDAP keys.
B. Configure both cells to use the same user registry.
C. Ensure URL requests use only host names or IP addresses.
D. Ensure each cell is in a unique Domain Name System (DNS)
Answer: B


ibm websphere 000-317 exam dumps free(36-45)


QUESTION NO: 36
A system administrator needs to modify the plug-in configuration file. Which utility should the
administrator use?
A. GenPluginCfg script
B. IBM Installation Manager
C. WebSphere Customization Toolbox (WCT)
D. Embedded WebSphere Customization Toolbox (WCT)
Answer: C

QUESTION NO: 37
A Java EE application is deployed to a horizontal cluster and makes use of HTTP session objects.
The administrator is required to ensure failover of these session objects, and chooses to
implement memory-to-memory replication. To maximize chances of successful failover, how
should the administrator configure the replication?
A. Select Entire domain for the number of replicas.
B. Select Single replica and select the default tuning parameter.
C. Select Single replica and select "Very high" for the tuning parameter.
D. Specify at least 3 replicas and select "Very high" for the tuning parameter.
Answer: A
QUESTION NO: 38
An application developer needs to know the SOAP_CONNECTOR_ADDRESS for their
development application server. The Integrated Solutions Console (ISC) is unavailable because
the Deployment Manager server is down for maintenance. How can the system administrator
determine the proper port number for the developer? Search for
SOAP_CONNECTOR_ADDRESS in the:
A. server.xml
B. serverindex.xml
C. resources.xml
D. virtualhosts.xml
Answer: B
QUESTION NO: 39
Consider the Exhibit
a report generated by the IBM Support Assistant (ISA) that reveals a prevailing problem within a
WebSphere Application Server environment. What should the administrator do?
A. Increase the amount of physical memory for the server.
B. Ensure that all connections taken from the data source are returned to the pool.
C. Determine why the collection class increases in size and consumes memory.
D. Modify the application so it uses stateless instead of stateful session beans to conserve the
heap.
Answer: C
QUESTION NO: 40
A system administrator has enabled the HPEL mode on an application server, but has disabled
the HPEL text log to improve performance. How can the administrator view only the messages
that were streamed to System.out and System.err by a single server thread?
A. Use a text editor to open a log file in the server's logdata directory, and search for the thread
ID.
B. Use the Log Analyzer to import the SystemOut.log file for the server and search on the thread
ID.
C. Use the Integration Solutions Console (ISC) Log Viewer to select a thread and then click the
"Show Only Selected Threads" button.
D. Use the Integration Solutions Console (ISC) Log Viewer's filtering section to search for the
string "Thread ID*" in the message content field.
Answer: C
QUESTION NO: 41
A WebSphere Application Server has been set up to receive requests from an IBM HTTP Server
(IHS). A system administrator has been asked to examine the environment for problems (if any)
and has been given several log files to check. This is an excerpt from the IHS's access.log:
<host_ip> - - [26/Jan/2012:14:17:19 +0800] "GET /Login.jsp HTTP/1.1" 500 620 What should the
administrator do next?
A. No action needed. The access.log does not indicate any problems.
B. Determine what could be causing the HTTP status code 620.
C. Verify Login.jsp can be found in the document root directory of the IHS.
D. Check the server's SystemOut.log file to see what errors occurred around the same time.
Answer: D
QUESTION NO: 42
Customers are complaining that a particular web site is "hanging". To troubleshoot the problem, a
system administrator decides to trigger several thread dumps to determine which threads might be
hung. How can the administrator trigger the thread dumps?
A. Use wsadmin to execute the dumpThreads command for the application server.
B. Run the collector command line script with the -Summary option set to "yes".
C. Set the node agent's custom property "com.ibm.websphere.threadmonitor.dump.java" to true.
D. From the Integrated Solutions Console (ISC), click the System dump button for the application
server.
Answer: A
QUESTION NO: 43
An application server needs to be diagnosed for out-of-memory issues. The system administrator
will use a tool that performs the analysis of the heap dump. Which tool should the administrator
use?
A. IBM Support Assistant (ISA)
B. IBM Solutions Console (ISC)
C. IBM Assembly and Deploy Tools (IADT)
D. Tivoli Performance Viewer (TPV)
Answer: A
QUESTION NO: 44
Performance issues have caused several high profile outages in a WebSphere Application Server
Network Deployment V8.0 environment. The application developer has isolated the problem to
one specific application. To assist with the problem diagnosis a system administrator has been
asked to enable the highest level of WebSphere tracing available. How should the system
administrator accomplish this? Enable tracing and set the level to:
A. *
B. all
C. finest
D. debug
Answer: B
QUESTION NO: 45
A system administrator needs to monitor a transaction and determine how much time it spends in
the web container, EJB container, and backend database. Which tool should the administrator use
to gather response times for each component?
A. Request metrics
B. Performance servlet
C. Thread Pool Summary Report
D. Runtime Performance and Diagnostic Advisor
Answer: A