Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

C9510-401 Exam Dumps - D Application Server Network Deployment V8.5.5 and Liberty Profile System Administration

Question # 4

A WebSphere system administrator needs to install the Installation Manager (IM) on an unmanaged node on a host named . The deployment manager is running on a host named .

What step must the administrator take before submitting a job from the Integrated Solutions Console (ISC) to install the IM on ?

A.

Install a node agent on .

B.

Install the job manager on .

C.

Start the job manager on .

D.

Register as a target for job manager.

Full Access
Question # 5

The administrator needs to identify any security role references and security constraints in a web application.

How can the administrator identify these roles and constraints?

A.

ibm-application-ext.xml file using a text editor.

B.

ibmconfig folder in the application after using the EARExpander command.

C.

Web deployment descriptor using IBM Assembly and Deploy Tools.

D.

Security role to user/group mapping by using the Integrated Solutions Console (ISC).

Full Access
Question # 6

A system administrator completed a WebSphere Application Server installation by using the Installation Manager. During installation, all defaults were selected for the installation root directories and the shared resources directory. Over time, the administrator has updated the installation with various interim fixes and fix packs. The administrator notices that the shared resources directory is very large in size and grows larger each time the Installation Manager is run.

How can the administrator decrease the size and remove some of the content from the shared resources directory?

A.

Manually delete content from the directory.

B.

During an update, create a new shared resources directory.

C.

Clear the Delete Saved Files option for the Installation Manager.

D.

Set the preserveDownloadedArtifacts preference to false.

Full Access
Question # 7

A system administrator has deployed an application. The development team has updated a new version of this application. The administrator needs to immediately deploy this updated application and guarantee that only this new edition is used by clients and that any service requests for the application are queued during the deployment of the new application.

How can the administrator achieve this task without any downtime to the application?

A.

Perform a soft rollout.

B.

Perform a hard rollout.

C.

Perform an atomic rollout.

D.

Perform a concurrent activation rollout.

Full Access
Question # 8

While coordinating a flexible management topology, the job manager can send commands to which components?

A.

Application server and name server.

B.

On demand router and load balancer.

C.

Deployment manager and admin agent.

D.

Node agent and web administration server.

Full Access
Question # 9

While monitoring a cluster in the cell, the administrator notices that one server in the cluster periodically loses connections to the database. When this happens, requests to the server have a significantly decreased response time and various error conditions are listed in the log files for the server. Since the error codes are returned quickly, the server starts returning responses faster than the average service times for the application. Due to this, the weight for the server is increased and a large percentage of incoming requests are being routed to the erroneous server and the server is getting overloaded with requests.

How can the administrator detect these conditions in the future and take action to prevent this problem?

A.

Configure the storm drain health policy.

B.

Configure the on demand router (ODR) transport chain to tune inbound connections.

C.

Monitor the JVM heap usage to determine a new server weight.

D.

Enable the PMI Extended statistic set and use the Connection Pool summary report.

Full Access
Question # 10

A system administrator needs to deploy a new enterprise application which requires that application security be enabled, but, the existing applications in the cell cannot be executed with application security enabled. The cell has the global security and Java 2 security disabled.

How can the administrator handle this requirement?

A.

Enable Java 2 security for the cell.

Create a security domain with application security enabled.

Associate the security domain to the new application.

B.

Enable Java 2 security for the cell.

Create a security domain with application security enabled.

Associate the security domain to a new cluster to be used to deploy the new application.

C.

Enable administrative security for the cell.

Create a security domain with application security enabled.

Associate the security domain at the application level for the new application.

D.

Enable administrative security for the cell.

Create a security domain with application security enabled.

Associate the security domain to the new cluster where the new application is deployed.

Full Access