IBM C9510-418 Exam Practice Questions (P. 5)
- Full Access (128 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
A system administrator has just enabled HPEL in the environment.
How can the administrator examine the logged data?
How can the administrator examine the logged data?
- AUse the ViewLog command.
- BUse the administrative console.
- CUse a text editor to open the systemOut.log file.
- DUse the IBM Support Assistant to analyze the text log.
Correct Answer:
B
High Performance Extensible Logging (HPEL) is a log and trace facility that is provided as a part of WebSphere® Application Server. HPEL provides a log data repository, a trace data repository, and a text log file.
The HPEL LogViewer is an easy-to-use, command-line tool provided for HPEL users to work with the log data and trace data repositories.
Use the following command to view the full contents of your log and trace repositories:
[Windows] (Windows) logViewer.bat
[AIX HP-UX Solaris] (Unix- full profile) logViewer.sh
[AIX HP-UX Solaris] (Unix- Liberty profile) logViewer
Reference:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/rtrb_logviewer.html
B
High Performance Extensible Logging (HPEL) is a log and trace facility that is provided as a part of WebSphere® Application Server. HPEL provides a log data repository, a trace data repository, and a text log file.
The HPEL LogViewer is an easy-to-use, command-line tool provided for HPEL users to work with the log data and trace data repositories.
Use the following command to view the full contents of your log and trace repositories:
[Windows] (Windows) logViewer.bat
[AIX HP-UX Solaris] (Unix- full profile) logViewer.sh
[AIX HP-UX Solaris] (Unix- Liberty profile) logViewer
Reference:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/rtrb_logviewer.html
send
light_mode
delete
Question #22
How can an administrator configure Web services security?
- ACustomize WS-Security policy set and bindings and attach to Web services.
- BConfigure global security with LDAP authentication and map the configuration to Web services.
- CRequest application developer to use Web Services Security API to achieve Web services security.
- DEnable the Web Services Metadata Exchange (WS-MetadataExchange) protocol to enable message-level security.
Correct Answer:
C
The Web Services Security specification provides a flexible framework for building secure web services to implement message content integrity and confidentiality.
The Web Services Security service programming model supports this flexible framework by providing extension points to integrate new token formats, and methods to obtains keys needed for message protection. The application server programming model provides Web Services Security programming application programming interfaces (WSS API) for securing SOAP messages.
Note: WS-Security is a message-level standard that is based on securing SOAP messages through XML digital signature, confidentiality through XML encryption, and credential propagation through security tokens. The Web services security specification defines the facilities for protecting the integrity and confidentiality of a message and provides mechanisms for associating security-related claims with the message.
Reference:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/container_wssec_top.html
C
The Web Services Security specification provides a flexible framework for building secure web services to implement message content integrity and confidentiality.
The Web Services Security service programming model supports this flexible framework by providing extension points to integrate new token formats, and methods to obtains keys needed for message protection. The application server programming model provides Web Services Security programming application programming interfaces (WSS API) for securing SOAP messages.
Note: WS-Security is a message-level standard that is based on securing SOAP messages through XML digital signature, confidentiality through XML encryption, and credential propagation through security tokens. The Web services security specification defines the facilities for protecting the integrity and confidentiality of a message and provides mechanisms for associating security-related claims with the message.
Reference:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/container_wssec_top.html
send
light_mode
delete
Question #23
When installing a new application to IBM WebSphere Application Server, which location is valid for the application file?
- AClient Machine
- BManaged Node
- CUnmanaged Node
- DRemote Web Server
Correct Answer:
B
Configuration file location during application installation
Several things occur upon installation of an application onto WebSphere Application Server:
✑ The application binaries and deployment descriptors are stored within the master repository.
✑ The application binaries and deployment descriptors are published to each node that will host the application. These files are stored in the local copy of the repository on each node.
✑ Each node then installs the applications that are ready for execution by exploding the EARs under profile_root/installedApps/cell_name/, as follows:
- profile_root/installedApps/cell_name/
This directory contains a subdirectory for each application deployed to the local node.
- profile_root/installedApps/cell_name/app_name.ear/
Each application-specific directory contains the contents of the original EAR used to install the application.
Note: A node is a logical grouping of managed servers. Nodes can be managed or unmanaged. An unmanaged node does not have a node agent or administrative agent to manage its servers, whereas a managed node does. Both application servers and supported web servers can be on unmanaged or managed nodes.
Reference: WebSphere Application Server V8.5, July 2013, page 17
B
Configuration file location during application installation
Several things occur upon installation of an application onto WebSphere Application Server:
✑ The application binaries and deployment descriptors are stored within the master repository.
✑ The application binaries and deployment descriptors are published to each node that will host the application. These files are stored in the local copy of the repository on each node.
✑ Each node then installs the applications that are ready for execution by exploding the EARs under profile_root/installedApps/cell_name/, as follows:
- profile_root/installedApps/cell_name/
This directory contains a subdirectory for each application deployed to the local node.
- profile_root/installedApps/cell_name/app_name.ear/
Each application-specific directory contains the contents of the original EAR used to install the application.
Note: A node is a logical grouping of managed servers. Nodes can be managed or unmanaged. An unmanaged node does not have a node agent or administrative agent to manage its servers, whereas a managed node does. Both application servers and supported web servers can be on unmanaged or managed nodes.
Reference: WebSphere Application Server V8.5, July 2013, page 17
send
light_mode
delete
Question #24
An administrator is using the Guided Troubleshooter in the IBM Support Assistant to troubleshoot IBM WebSphere Application Server issues. After going through data collection and analysis, no reliable solution is found.
What is the administrator's best next step?
What is the administrator's best next step?
- ACall in a new PMR with IBM and upload Troubleshooter data to ECuREP.
- BOpen a new PMR with IBM and upload SystemOut.log from the IBM WebSphere Application Server.
- CSubmit results to the IBM WebSphere Application Server forum for a quick response from other forum users.
- DUse the Guided Troubleshooter to open a service request with IBM, so all the troubleshooting data analyzed so far is uploaded automatically.
Correct Answer:
D
D
send
light_mode
delete
Question #25
When installing IBM WebSphere Application Server on a network file system, IBM Installation Manager fails with an insufficient disk space error.
How could this be resolved?
How could this be resolved?
- AIncrease disk space and try again.
- BDelete temporary files and try again.
- CReboot operating system and try again.
- DDisable disk space checking in the config.ini and try again.
Correct Answer:
D
On some network file systems, disk space might not be reported correctly at times; and you might need to bypass disk-space checking and proceed with your installation.
To disable disk-space checking, specify the following system property in the config.ini file in IM_install_root/eclipse/configuration and restart Installation Manager.
Reference:
https://www.ibm.com/support/knowledgecenter/SSEQTP_9.0.0/com.ibm.websphere.installation.base.doc/ae/tins_troubleshoot.html
D
On some network file systems, disk space might not be reported correctly at times; and you might need to bypass disk-space checking and proceed with your installation.
To disable disk-space checking, specify the following system property in the config.ini file in IM_install_root/eclipse/configuration and restart Installation Manager.
Reference:
https://www.ibm.com/support/knowledgecenter/SSEQTP_9.0.0/com.ibm.websphere.installation.base.doc/ae/tins_troubleshoot.html
send
light_mode
delete
All Pages