There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configurator role access to a developer for a single application deployed in that cluster.
How should the administrator meet this requirement and restrict Configurator role access for a single application?
A system administrator, Admin1, with Administrator privileges has archived full repository checkpoints. Another administrator, Configurator1, with Configurator privileges has copied the checkpoint contents directory from one of the archived check points to its original location. Configurator1 tries to restore the configuration using the copied archived checkpoint contents and the restore fails.
How can Configurator1 restore the configuration using the copied archived full repository checkpoint?
A system administrator wants to learn some of the Jython scripting commands for the administration of the environment.
Which product feature should the administrator use?
A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changed so users only have to log in once, while keeping the above mentioned timeouts the same. The authentication mechanism available is Kerberos.
How should the administrator do this?
A system administrator in a bank was asked by business users to determine the most accessed JSP page in a web application at normal work load for marketing purpose.
Which tool should the administrator use to find the most used JSP page?
A system administrator has created a wsadmin script with several steps to install and configure an application and some resources in a WebSphere Application Server process. The script executed but the application was not installed successfully. The administrator suspects that the script has problems.
How can the administrator test and debug the script?
An organization updated their LDAP directories and modified user roles. The roles that were configured to have access to a highly secured enterprise application were deleted and new roles with new names were created. The application then had security related exceptions.
How can a system administrator resolve the exceptions and restore security for the application?