Summer Sale - Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 5763r953

Welcome To DumpsPedia

C9510-401 Sample Questions Answers

Questions 4

A system administrator has deployed an application. The development team has updated a new version of this application. The administrator needs to immediately deploy this updated application and guarantee that only this new edition is used by clients and that any service requests for the application are queued during the deployment of the new application.

How can the administrator achieve this task without any downtime to the application?

Options:

A.

Perform a soft rollout.

B.

Perform a hard rollout.

C.

Perform an atomic rollout.

D.

Perform a concurrent activation rollout.

Buy Now
Questions 5

A developer created an enterprise application which contained data source and security role information. The developer asked a system administrator to install this application to an application server where global security is enabled using the Integrated Solutions Console (ISC). A new data source was configured at the server scope for the use of this application. While load testing the application, the developer noticed that the attributes configured on the new data source were ignored by the application server.

How can the administrator ensure that the attributes configured on the new data source are used by the application server?

Options:

A.

Create the data source under cell scope instead of server scope.

B.

Delete any data source of the same name defined under node, cluster or cell scope.

C.

Reinstall the application and clear the Process embedded configuration check box.

D.

Correct the component-managed and container-managed authentication aliases set on the data source.

Buy Now
Questions 6

A system administrator discovers an issue that requires a change to a federated server. In this cell, WebSphere administrative security is enabled, but application security is not enabled.

How should the administrator make this change?

The administrator should use:

Options:

A.

a web browser to connect to the node agent https port.

B.

a web browser to connect to the deployment manager admin_host port.

C.

the job manager to submit a job to update the unmanaged server.

D.

an ssh connection to the node and modify the client_types.xml file.

Buy Now
Questions 7

A system administrator has to design a new production environment to host a web application. The workload of this web application is expected to increase during special marketing campaigns.

Which one of the following topologies should the administrator configure to address the requirements for this new environment?

Options:

A.

A Liberty collective environment with autonomic managers and on demand router (ODR).

B.

A flexible management environment supported by one admin agent running in each node of the cell.

C.

A dynamic cluster with autonomic managers, application placement controller and intelligent routers.

D.

A heterogeneous cell with enough server to support the peak load spread across multiple nodes on the same machine.

Buy Now
Questions 8

A system administrator suspects that the slow performance of an application might be caused by lock contention.

To debug this further, what can the administrator do using IBM Support Assistant?

Options:

A.

Analyze the running server using IBM Monitoring and Diagnostic Tools for Java – Health Center.

B.

Collect a javacore and analyze it using IBM Monitoring and Diagnostic Tools for Java – Health Center.

C.

Collect three thread dumps at equal time intervals and analyze them using IBM Monitoring and Diagnostic Tools for Java – Dump Analyzer.

D.

Collect three system dumps at equal time intervals and analyze them using IBM Monitoring and Diagnostic Tools for Java – Memory Analyzer.

Buy Now
Questions 9

An application deployed to a multi-node cluster is reported to have slowness and hung threads. A system administrator is asked to review the logs on each node and identify if the hung threads are a false alarm.

How can the administrator determine that the hung threads are a false alarm?

Analyze the:

Options:

A.

ffdc logs

B.

SystemErr.log

C.

SystemOut.log

D.

native_stderr.log

Buy Now
Questions 10

A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization.

How can a system administrator fix the issue ensuring only authorized access?

Options:

A.

Using the Integrated Solutions Console (ISC), map all security roles to the special subject Everyone.

B.

Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped to groups in the correct user registry.

C.

Edit the application using an assembly tool to add a security constraint for the servlet and reinstall the application.

D.

Edit the application using an assembly tool to remove the security constraint defined for the servlet and reinstall the application.

Buy Now
Exam Code: C9510-401
Exam Name: D Application Server Network Deployment V8.5.5 and Liberty Profile System Administration
Last Update: Apr 15, 2024
Questions: 73
$72  $159.99
$54  $119.99
$45  $99.99
buy now C9510-401