Rebirth C9510-401 Practice Exam For IBM WebSphere Application Server Network Deployment V8.5.5 And Liberty Profile, System Administration Certification

Master the C9510-401 IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile, System Administration content and be ready for exam day success quickly with this Exambible C9510-401 testing engine. We guarantee it!We make it a reality and give you real C9510-401 questions in our IBM C9510-401 braindumps.Latest 100% VALID IBM C9510-401 Exam Questions Dumps at below page. You can use our IBM C9510-401 braindumps and pass your exam.

Online C9510-401 free questions and answers of New Version:

Page: 1 / 6
Total 73 questions Full Exam Access
Question 1
A system administrator needs to trigger a javacore only when a java,net.SocketTimeoutException is encountered in real time.
What does the administrator have to configure to trigger the javacore dump?
My answer: -
Reference answer: B
Reference analysis:

Dump agents are set up during JVM initialization. They enable you to use events occurring within the JVM, such as Garbage Collection, thread start, or JVM termination, to initiate one of four types of dump or to launch an external tool. Default dump agents are set up at JVM initialization They are sufficient for most cases, but the use of the -Xdump option on the command line allows more detailed configuration of dump agents. The total set of options and sub-options available under -Xdump is very flexible and there are many examples presented in this chapter to show this flexibility.
Example: To generate system cores:
-Xdump:system:events=user
References: http://www-01.ibm.com/support/docview.wss?uid=swg21242497

Question 2
Which one of the following options describes the runtime flow starting from the client browser in a clustered WebSphere Application Server Network Deployment topology?
My answer: -
Reference answer: B
Reference analysis:

None

Question 3
A system administrator needs to set a new Liberty profile environment to support an application.
What should the administrator do to enable this environment for high availability and scalability of the application?
My answer: -
Reference answer: B
Reference analysis:

Setting up Liberty server clusters
A Liberty can be configured into a server cluster for application high availability and scale. The collectiveController-1.0 feature and its capabilities are available only in multiple-server products such as WebSphere® Application Server Liberty Network Deployment and WebSphere Application Server Liberty for z/OS. The feature is not available in single- server products such as WebSphere Application Server Liberty, WebSphere Application Server Liberty - Express, or WebSphere Application Server Liberty Core. If you have a multiple-server product installation, you can use its collectiveController-1.0 feature to work with collective members from single-server products.
References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.wlp
.nd.doc/ae/cwlp_server_clusters.html

Question 4
A system administrator has added a server cluster as a member of a service integration bus (SIB). The administrator needs to configure one messaging engine for each server in this cluster and to have a failover location for each messaging engine.
What should the administrator do to achieve the required design?
My answer: -
Reference answer: C
Reference analysis:

The scalability with high availability configuration ensures that there is a messaging engine for each server in a cluster, and that each messaging engine has a failover location.

Question 5
Which of the following comprises an initial Liberty profile server process?
My answer: -
Reference answer: A
Reference analysis:

The server process comprises a single JVM, the Liberty kernel, and any number of optional features.
References: https://www.ibm.com/support/knowledgecenter/SSEQTP_8.5.5/com.ibm.websphere.wlp.do c/ae/cwlp_about.html

Question 6
The application placement controller has been configured with elasticity mode enabled. Intermittently, all instances of a dynamic cluster are removed. After further review, the system administrator noticed that it occurs during peak load on another dynamic cluster.
The administrator wants to keep at least one instance available. Which configuration is needed in the dynamic clusters?
My answer: -
Reference answer: D
Reference analysis:

It is not recommended to enable elasticity mode when the following option is set in the administrative console for one or more dynamic clusters:
If other dynamic clusters need resources, stop all instances of this cluster during periods of inactivity.
If you have elasticity mode enabled and the option set, the application placement controller can remove all of the custom nodes in the cell.
References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd. doc/ae/twve_cfgelastic.html

Question 7
A system administrator has configured a network deployment cell containing multiple nodes and global security enabled with an LDAP repository. To increase capacity, the administrator needs to add additional nodes to the cell. After adding the nodes by using both scripts and the Integrated Solutions Console (ISC), the administrator examines the System.out log for the deployment manager and notices the following message:
C9510-401 dumps exhibit
How can the administrator resolve this problem?
My answer: -
Reference answer: B
Reference analysis:

When nodes are added while LDAP security is enabled, the following exception is generated in the deployment manager System.out log under certain circumstances. If this happens, restart the deployment manager to resolve the problem.
0000004d ORBRas E com.ibm.ws.security.orbssl.WSSSLClientSocketFactoryImpl createSSLSocket ProcessDiscovery : 0 JSSL0080E: javax.net.ssl.SSLHandshakeException -
The client and server could not negotiate the desired level of security. Reason?com.ibm.jsse2.util.h: No trusted certificate found
References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.0.0/com.ibm.websphere.nd. doc/info/ae/ae/tagt_svr_conf_nodes.html

Question 8
A system administrator has created a Jython script that will run in WebSphere Network cell where administrative security is enabled. This script is named doUpdate.py and will be run by using the following:
wsadmin –connType RMI –f doUpdate.py
How can the administrator suppress a user/password prompt from appearing when this script is run?
Set the user and password in the:
My answer: -
Reference answer: A
Reference analysis:

The user Id and password needed for wsadmin to connect to a secured server can be
supplied as command line options and in properties files. If used together, command line options take precedence over what is in the properties files. The properties files are located at Profile_root/properties.
If you use a Remote Method Invocation (RMI) connector or a JSR160RMI connector, set the following properties in the sas.client.props file with the appropriate values: com.ibm.CORBA.loginUserid=
com.ibm.CORBA.loginPassword=
References: https://www.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc
/ae/txml_security.html

Question 9
A system administrator wants to learn some of the Python scripting commands for the administration of the environment.
Which product feature should the administrator use?
My answer: -
Reference answer: D
Reference analysis:

None

Question 10
A system administrator decides to use the advice from the Performance and Diagnostic Advisor to identify the optimum connection pool settings for data sources. In a cell, the data source db2datasource is defined under node scope and used by two servers from that node. The administrator receives two different sets of advice for db2datasource.
How should the administrator configure the data sources before reusing the Performance and Diagnostic Advisor?
My answer: -
Reference answer: B
Reference analysis:

References: https://www.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc
/ae/cprf_rpa.html

Question 11
A system administrator needs to create a cell for a test environment. The administrator uses the Profile Management Tool (PMT) to create the deployment manager profile using the advanced profile creation option and creates a custom profile using the typical profile creation option. The administrator examines the log files for the custom profile creation and sees an INSTCONFFAIL message indicating the deployment manager was not running during the custom profile creation.
How should the administrator fix this?
My answer: -
Reference answer: A
Reference analysis:

Deleting profiles. You can delete a profile using the manageprofiles command. If the command fails, you can delete the profile using operating system commands.
Before you begin: If a node within a profile is federated to a deployment manager, before you delete the profile, stop the node and remove the node from the deployment manager.
Otherwise, an orphan node remains in the deployment manager.
References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd. doc/ae/tpro_removeprofile.html

Question 12
A system administrator has added a server cluster as a member of a service integration bus (SIB). The administrator needs to configure one messaging engine for each server in this cluster and to have a failover location for each messaging engine.
What should the administrator do to achieve the required design?
My answer: -
Reference answer: C
Reference analysis:

The scalability with high availability configuration ensures that there is a messaging engine for each server in a cluster, and that each messaging engine has a failover location.
http://www- 01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5/com.ibm.websphere.nd.doc/ae/cjt10 04_.html (second paragraph)

Question 13
The computer where a federated node was running had a failure and cannot be recovered. A system administrator wants to recreate the node with the same configurations in another computer.
Which steps should the administrator execute in order to recover the damaged node?
My answer: -
Reference answer: C
Reference analysis:

You can use the -asExistingNode option of the addNode command to recover and move nodes of a deployment manager. Using the -asExistingNode option, federate a new custom node to a deployment manager as an existing node. During federation, the product uses information in the deployment manager master configuration to transform the custom node into the existing node.
References: https://www.ibm.com/support/knowledgecenter/SSD28V_8.5.5/com.ibm.websphere.zseries
.doc/ae/tagt_addNode_asExistingNode.html

Question 14
A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.
What should the administrator do to implement the required security configuration?
My answer: -
Reference answer: C
Reference analysis:

None

Question 15
A system administrator has installed WebSphere Application Server Network Deployment V8.5.5 using the silent installation process and needs the verify that the installation completed successfully.
What does the administrator need to do to verify a successful installation?
My answer: -
Reference answer: A
Reference analysis:

You can verify successful installation of the product using the capabilities of IBM Installation Manager.
To verify installation of the product, you can use Installation Manager to find the product in the list of installed packages.
Perform one of the following actions:
* Launch the Installation Manager GUI, and verify the installation by going to File -> View Installed Packages.
Or
* Change the directory to the eclipse/tools subdirectory of the Installation Manager binaries location and run this command:
[AIX][HP-UX][Linux][Solaris]: ./imcl listInstalledPackages [Windows] imcl.exe listInstalledPackages
This will display a list indicating which packages this Installation Manager has installed. For example:
com.ibm.websphere.ND.v85_8.5.0.20110203_0234

Question 16
How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the server’s file system?
My answer: -
Reference answer: C
Reference analysis:

When Java 2 security is enabled for a WebSphere Application Server, all the applications that run on WebSphere Application Server undergo a security check before accessing system resources. An application might need a was.policy file if it accesses resources that require more permissions than those granted in the default app.policy file
References: http://www.aiotestking.com/ibm/how-can-a-system-administrator-secure-a- websphere-application-server-environment-to-ensure-that-an-application-code-will-not-be- allowed-to-access-any-files-in-the-servers-file-system/

Question 17
The administrator needs to identify any security role references and security constraints in a web application.
How can the administrator identify these roles and constraints?
My answer: -
Reference answer: C
Reference analysis:

Securing web applications using an assembly tool.
You can use three types of web login authentication mechanisms to configure a web application: basic authentication, form-based authentication and client certificate-based authentication. Protect web resources in a web application by assigning security roles to those resources.
References: https://www.ibm.com/support/knowledgecenter/SS7JFU_8.5.5/com.ibm.websphere.nd.doc/ ae/tsec_secweb_atk.html

Question 18
A system administrator has created a Python script that will run in WebSphere Network cell where administrative security is enabled. This script is named doUpdate.py and will be run by using the following:
wsadmin -connType RMI -f doUpdate.py
How can the administrator suppress a user/password prompt from appearing when this script is run?
Set the user and password in the:
My answer: -
Reference answer: D
Reference analysis:

None

Question 19
A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization.
How can a system administrator fix the issue ensuring only authorized access?
My answer: -
Reference answer: B
Reference analysis:

None

Question 20
A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.
How should the administrator accomplish this?
My answer: -
Reference answer: A
Reference analysis:

Authenticate only when the URI is protected
The application server challenges the web client to provide authentication data when the web client accesses a Uniform Resource Identifier (URI) that is protected by a Java Platform, Enterprise Edition (Java EE) role. The authenticated identity is available only when the web client accesses a protected URI.
This option is the default Java EE web authentication behavior that is also available in previous releases of WebSphere® Application Server.
References: https://www.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.base.d oc/ae/usec_webauth.html

Question 21
A JAX-WS EJB stateless session bean web service needs to be accessed by consumers outside the corporate domain.
Which configuration will help a system administrator meet the requirement?
My answer: -
Reference answer: A
Reference analysis:

None

Question 22
A system administrator ran the backup Config command to backup the configuration using the -nostop option. The administrator changed the properties for the service integration environment by modifying the sib.properties file. During testing the administrator noticed Service Integration Bus related errors and wanted to restore the service integration environment. The administrator used the restore config command, but the tuning properties for the service integration environment were not restored.
How can the administrator prevent this issue?
My answer: -
Reference answer: B
Reference analysis:

None

Question 23
The installation of WebSphere Application Server did not complete successfully, and a system administrator needs to troubleshoot the installation.
What can the administrator do to identify the cause of the installation failure?
My answer: -
Reference answer: C
Reference analysis:

Installation Manager creates log files that you can use to troubleshoot any installation problems. Consider verifying the log files after any installation to ensure that everything in that process went successfully.
To examine the logs manually, locate the Installation Manager logs directory. The default location for this directory varies according to the operating system:
Windows: C:\\ProgramData\\IBM\\Installation Manager\\logs UNIX: /var/ibm/InstallationManager/logs

Question 24
A system administrator has created a cluster containing two servers in a same node. The administrator did not select the option Generate unique HTTP ports during the creation of the cluster members. After the cluster creation, the administrator changed the HTTP port of the second cluster member to 9081.
Testing the servers using the snoop servlet directly to the server’s HTTP port, the administrator got the following error message for the second server:
C9510-401 dumps exhibit
How can the administrator fix this problem?
My answer: -
Reference answer: B
Reference analysis:

Problem(Abstract)
When setting up IBM Cognos within IBM WebSphere, the URI is not accessible. The error message when trying the http://<server>:<was port>/p2pd/servlet/dispatch is
SRVE0255E: A WebGroup/Virtual Host to handle /p2pd/servlet/dispatch has not been defined.
Symptom
Unable to start IBM Cognos Business Intelligence
Cause
The virtual host does not contain IBM WebSphere Port that the Application server is listening on. This may be one of several reasons.
References: http://www-01.ibm.com/support/docview.wss?uid=swg21438842

Page: 1 / 6
Total 73 questions Full Exam Access