A system administrator has completed a WebSphere installation using the IBM Installation Manager. Which tool, using the default settings, can the administrator use to generate an HTML file verifying the version of WebSphere installed? Execute the:
A. postinstall command.
B. versionInfo command.
C. genVersionReport command.
D. Installation Verification Tool (IVT).
A system administrator configures the intelligent runtime provisioning feature included with WebSphere Application Server Network Deployment V8.0. The default WebSphere settings are in place. At what level will the administrator enable runtime provisioning?
A. node agent
B. web container
C. application server
D. deployment manager
A system administrator has made changes at the cell scope in the Integrated Solutions Console (ISC) of the deployment manager and needs to trace the propagation of the configuration change. Where should the administrator expect these changes to be persisted?
A. master repository, node repository
B. master repository, node agent, node repository
C. deployment manager, node agent, server repository
D. deployment manager, node agent, configuration database
The system administrator needs to generate a report of data sources for a WebSphere cell. To do so, the administrator should:
A. parse the genVersionReport to list data sources.
B. configure a monitored directory to capture this data.
C. create a script by using the JDBC query scripts as examples.
D. use the Integrated Solutions Console (ISC) to generate a data source report.
A system administrator needs to increase messaging throughput across multiple servers. What should the administrator do?
A. Enable protocol transformation between buses.
B. Add a cluster to the bus and create multiple messaging engines.
C. Use a proxy server to route messages to multiple messaging engines.
D. Create a mediation to manage the messaging work load across servers.
A WebSphere Application Server has been set up to receive requests from an IBM HTTP Server (IHS). A system administrator has been asked to examine the environment for problems (if any) and has been given several log files to check.
This is an excerpt from the IHS's access.log:
What should the administrator do next?
A. No action needed. The access.log does not indicate any problems.
B. Determine what could be causing the HTTP status code 620.
C. Verify Login.jsp can be found in the document root directory of the IHS.
D. Check the server's SystemOut.log file to see what errors occurred around the same time.
An application server is configured with the default garbage collection (GC) policy. An administrator needs to load test different GC policies. How can the administrator change the server's GC policy?
A. Start the node agent from the command line using the -Xgcpolicy option, and specify the server name.
B. Start the administrative agent from the command line using the -Xgcpolicy option and specify the server name.
C. Use Integrated Solutions Console (ISC) to navigate to the server's JVM configuration and add an appropriate -Xgcpolicy setting.
D. Use Integrated Solutions Console (ISC) to navigate to the deployment manager's JVM configuration and add an appropriate -Xgcpolicy setting.
The lead administrator needs to limit access to the Integrated Solutions Console (ISC) by a group of administrators who only need to: ?view the configuration of the WebSphere Application Server. ?monitor its status. ?stop and start the server.
To what administrative role should the lead administrator assign this group?
A. Auditor
B. Monitor
C. Operator
D. Configurator
A system administrator must deploy a new application that uses Java 2 security. There are several applications installed in the cell that use application security but not Java 2 security. How can the administrator enable support for Java 2 security without affecting the other applications?
A. Enable Java 2 security at the cell level and grant permissions only to the new application.
B. Configure a security domain with Java 2 security enabled for the application server that will host the new application.
C. Configure a security domain for the other applications in the cell with both Java 2 security enabled and application security.
D. Disable global security and configure a security domain with Java 2 security enabled for the application server that will host the new application.
In a network deployment cell, web users are prompted several times to authenticate.
What should the administrator do so that the users only need to authenticate once during a session?
A. Configure an authentication proxy server in the DMZ.
B. Enable the "Set security cookies to HTTPOnly" property for the global single sign-on configuration.
C. Enable single sign-on for the global security configuration and provide the necessary DNS domain names.
D. Increase the default LTPA timeout and the cache timeout values for forwarded credentials between servers.