Limited Time Discount Offer
30% Off - Ends in 02:00:00


IBM C9510-318 Dumps

IBM WebSphere Application Server Network Deployment V8.5 Core Administration
IBM WebSphere Application Server Network Deployment V8.5 Core Administration

Questions & Answers for IBM C9510-318

Showing 1-15 of 56 Questions

Question #1

An administrator needs to move an application from a Liberty profile development
environment to a production Network Deployment cell. What steps should the administrator
take to deploy the application in the production cell?

A. Deploy the application EAR file through the deployment manager and define the resources defined in the server.xml.

B. Use the migration tool to generate the customized and automated wsadmin script.

C. Use the "Release" functionality in the administrative console and point it to the server.xml file of the development Liberty profile.

D. Use the enhanced EAR generated by the Liberty profile ensuring that the resources used by the Liberty profile are used by the deployment manager.

Question #2

A system administrator is seeing data source naming exceptions during runtime and needs
to check the JNDI name of the Java Transaction API (JTA) data source used within an
Enterprise Java Beans (EJB) module. Which file should the administrator examine?

A. web.xml

B. persistence.xml

C. ibm-web-bnd.xmi

D. ibm-ejb-jar-bnd.xmi

Question #3

Which statement is accurate regarding business-level applications?

A. A business-level application contains application binary files.

B. Only WebSphere artifacts are contained in a business-level application.

C. The business-level application function introduces new application programming interfaces (APIs).

D. Make a Java EE application a business-level application and add it to another business- level application.

Question #4

A system administrator needs to control which staff members have access to manage
certain application servers. They choose to use fine grained control and map the staff
members to only those specific application servers to which they need access. What does
the system administrator need to do to accomplish this?

A. Add custom properties to each of the application servers with role mappings for each staff member

B. Use an Administrative Authorization Group to map the staff members and roles to the application servers.

C. Create a security domain and add the application servers with the staff members in the role definitions.

D. Create a custom user registry which prevents authorization requests to the application servers not in the desired list.

Question #5

A Messaging Engine that persists data inside the message store has crashed and the
backup of the configuration data is also not available. What should the system
administrator do to restore the configuration data of the queues and topics?

A. Use recoverMEConf ±g command from wsadmin.

B. Use the Integration Solutions Console (ISC) to restore the configuration.

C. Create a new Messaging Engine using the same message store.

D. Create a new Messaging Engine and create queue and topic destinations with same names.

Question #6

A system administrator has deployed web applications to a clustered environment where
database session persistence is configured. The administrator needs to improve both the
response time and the system load with the application servers. How can the system
administrator do this?

A. Enable server affinity.

B. Configure dynamic caching.

C. Tune the database session persistence to optimize for failover.

D. Configure a load balancer to spread work between existing web servers.

Question #7

Jython scripts have to be created for common administrative tasks using the IBM Assembly
and Deploy Tool (IADT). For each task performed through the administrative console, a
system administrator needs to redirect the Jython commands into the IADT to quickly
create these scripts. How should the system administrator do this?

A. Disable the help portlet

B. Disable workspace automatic refresh

C. Log Command assistance commands

D. Enable Command assistance notifications

Question #8

A system administrator needs to deploy an enterprise application to a WebSphere
Application Server environment. Before starting the deployment process, the administrator
uses the IBM Assembly and Deploy Tool (IADT) to inspect the EAR and notices that it is
enhanced. Since enhanced EARs are not allowed in their runtime environment, the system
administrator needs to unenhance the EAR. How can the system administrator successfully
remove the enhancements?

A. Use WebSphere Customization Toolbox (WCT) to unenhance the EAR.

B. Disable the application scoped resources in the application deployment descriptor.

C. Remove the META-INF/ibmconfig folder from the project before exporting the EAR.

D. Make sure that Process embedded configurations is not selected when exporting the EAR.

Question #9

A system administrator needs to view the list of certificates for unmanaged web server
located on a remote system. How should the system administrator do this?

A. View the plugin-cfg.xml

B. Look at the SSL configuration in the httpd.conf

C. Use iKeyman to view the keyring.

D. Use the administrative console to check the content of the cell default keystore.

Question #10

A system administrator needs to tune the connection pool size parameters for a data
source based on the current pool usage and the application server CPU utilization. Which
of the following will provide the system administrator a recommendation on the efficient
values for pool size?

A. Request Metrics for connection pool size

B. Performance advisor for connection pool size

C. Performance Monitoring Infrastructure counter for current pool usage

D. Performance Monitoring Infrastructure counter for connection pool size

Question #11

A system administrator wishes to use Cross Component Trace (XCT) to follow the end-to-
end flow requests in a cluster. The administrator enables log and trace correlation, but
cross component trace appears to lack the necessary request IDs. What additional step
needs to be taken by the system administrator to have Cross Component Trace function as

A. Enable the replication domain on the cluster.

B. Enable High Performance Extensible Logging (HPEL).

C. Add all cluster members to the same core group.

D. Verify all components are part of the same service integration bus.

Question #12

A system administrator created multiple production cells for a company. Each cell contains
multiple clustered application servers. The administrator needs to configure an external
HTTP server to route requests to the multiple cells. How can the system administrator
configure a web server to route traffic to multiple unrelated cells?

A. Run the pluginMerge script.

B. Configure the plugin to use multiple plugin configuration files.

C. Generate a plugin configuration file using the deployment manager.

D. Use the WebSphere Customization Toolkit to create a customized plugin configuration.

Question #13

A system administrator is concerned about the stability of a new application deployment.
The administrator wishes to utilize Intelligent Management to ensure at least two
application servers are running at all times. How should the system administrator do this?

A. Create a static cluster of two WebSphere Application Servers instances.

B. Create a dynamic cluster with a minimum number of three cluster instances.

C. Create a health management policy to restart the application server in the event of excessive memory usage.

D. Configure an On-demand Router (ODR) to route requests to a static cluster of two WebSphere Application Server instances.

Question #14

A system administrator needs to configure Single Sign-on (SSO) using LTPA for an
application which will run in two cells. What is one of the key steps in configuring cross cell

A. Enable the "Interoperability mode" in SSO configuration screen.

B. Enable the "Requires SSL" feature in SSO configuration screen.

C. Export the LTPA keys from one cell and import them into the other.

D. Put the name of the second cell in the "Domain name" field of the first cell.

Question #15

An e-commerce application has been deployed on a WebSphere Application Server cluster
with four cluster members. While a customer is shopping on the website, one of the
application servers within the cluster fails. How does the system administrator need to
configure the cluster so that the application's users do not get logged out of the application
if the server fails?

A. Enable session affinity

B. Enable failover of transaction log recovery

C. Increase the session timeout

D. Configure memory-to-memory session replication