Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

C9510-401 D Application Server Network Deployment V8.5.5 and Liberty Profile System Administration Questions and Answers

Questions 4

There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configurator role access to a developer for a single application deployed in that cluster.

How should the administrator meet this requirement and restrict Configurator role access for a single application?

Options:

A.

Create a J2C authentication alias for that developer.

B.

Create an Administrative user role and provide Configurator access to the developer.

C.

Create an Administrative group role and provide Configurator access to the developer.

D.

Create an administrative authorization group, scope it only for that application and create an Administrative user or group role to give Configurator access to the developer.

Buy Now
Questions 5

A system administrator, Admin1, with Administrator privileges has archived full repository checkpoints. Another administrator, Configurator1, with Configurator privileges has copied the checkpoint contents directory from one of the archived check points to its original location. Configurator1 tries to restore the configuration using the copied archived checkpoint contents and the restore fails.

How can Configurator1 restore the configuration using the copied archived full repository checkpoint?

Options:

A.

Copy the archived checkpoint metadata directory to its original location.

B.

Increase the Automatic checkpoint depth to keep all the delta checkpoint.

C.

Delete the delta checkpoint taken after the full repository checkpoint was taken.

D.

Ask an administrator to update the privileges for Configurator1 to match Admin1.

Buy Now
Questions 6

A system administrator wants to learn some of the Jython scripting commands for the administration of the environment.

Which product feature should the administrator use?

Options:

A.

The wsadmin.properties file to load a profile.

B.

The AdminTask object to generate wsadmin scripts.

C.

The guided activities panel from the Integrated Solutions Console (ISC).

D.

The “Log command assistance commands” option in the Integrated Solutions Console (ISC).

Buy Now
Questions 7

A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changed so users only have to log in once, while keeping the above mentioned timeouts the same. The authentication mechanism available is Kerberos.

How should the administrator do this?

Options:

A.

Configure the SIP digest authentication.

B.

Configure the SPNEGO Web or SPNEGO TAI.

C.

Enable Session Management Security Integration.

D.

Ensure Web Inbound security attribute propagation is enabled.

Buy Now
Questions 8

A system administrator in a bank was asked by business users to determine the most accessed JSP page in a web application at normal work load for marketing purpose.

Which tool should the administrator use to find the most used JSP page?

Options:

A.

Performance and Diagnostic Advisor

B.

IBM Support Assistant Data Collector

C.

High Performance Extensible Logging Log Viewer

D.

Tivoli Performance Viewer (TPV) summary reports

Buy Now
Questions 9

A system administrator has created a wsadmin script with several steps to install and configure an application and some resources in a WebSphere Application Server process. The script executed but the application was not installed successfully. The administrator suspects that the script has problems.

How can the administrator test and debug the script?

Options:

A.

In WebSphere Application Server Developer Tools for Eclipse, right click on the script file and select Validate from context menu.

B.

Execute the script using the wsadmin with the option –conntype NONE and monitor the commandAssistanceJythonCommands.log file.

C.

Use WebSphere Application Server Developer Tools for Eclipse in the debug perspective connected to the server and execute the script step by step.

D.

Run the script using wsadmin with these parameters: -lang jython –javaoption “-Xdebug” and then execute the logViewer command with the option -listInstances

Buy Now
Questions 10

An organization updated their LDAP directories and modified user roles. The roles that were configured to have access to a highly secured enterprise application were deleted and new roles with new names were created. The application then had security related exceptions.

How can a system administrator resolve the exceptions and restore security for the application?

Options:

A.

Modify the mapping of security roles of the application to the new LDAP roles.

B.

Modify the application and remove all security constraints and redeploy the application.

C.

Modify the application to have a runAs role for each new LDAP role and redeploy the application.

D.

Create an administrative authorization group with administrator privileges scoped for the application with an administrative group role for the new LDAP roles.

Buy Now
Exam Code: C9510-401
Exam Name: D Application Server Network Deployment V8.5.5 and Liberty Profile System Administration
Last Update: Dec 4, 2024
Questions: 73

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99