New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

C9510-401 Exam Dumps - D Application Server Network Deployment V8.5.5 and Liberty Profile System Administration

Go to page:
Question # 9

While monitoring a cluster in the cell, the administrator notices that one server in the cluster periodically loses connections to the database. When this happens, requests to the server have a significantly decreased response time and various error conditions are listed in the log files for the server. Since the error codes are returned quickly, the server starts returning responses faster than the average service times for the application. Due to this, the weight for the server is increased and a large percentage of incoming requests are being routed to the erroneous server and the server is getting overloaded with requests.

How can the administrator detect these conditions in the future and take action to prevent this problem?

A.

Configure the storm drain health policy.

B.

Configure the on demand router (ODR) transport chain to tune inbound connections.

C.

Monitor the JVM heap usage to determine a new server weight.

D.

Enable the PMI Extended statistic set and use the Connection Pool summary report.

Full Access
Question # 10

A system administrator needs to deploy a new enterprise application which requires that application security be enabled, but, the existing applications in the cell cannot be executed with application security enabled. The cell has the global security and Java 2 security disabled.

How can the administrator handle this requirement?

A.

Enable Java 2 security for the cell.

Create a security domain with application security enabled.

Associate the security domain to the new application.

B.

Enable Java 2 security for the cell.

Create a security domain with application security enabled.

Associate the security domain to a new cluster to be used to deploy the new application.

C.

Enable administrative security for the cell.

Create a security domain with application security enabled.

Associate the security domain at the application level for the new application.

D.

Enable administrative security for the cell.

Create a security domain with application security enabled.

Associate the security domain to the new cluster where the new application is deployed.

Full Access
Go to page: