[Free] 2018(Jan) Dumps4cert Braindumps IBM C2180-401 Dumps with VCE and PDF 31-40

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan IBM Official New Released C2180-401
100% Free Download! 100% Pass Guaranteed!

IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile, System Administration

Question No: 31

A system administrator has added a server cluster as a member of a service integration bus (SIB). The administrator needs to configure one messaging engine for each server in this cluster and to have a failover location for each messaging engine.

What should the administrator do to achieve the required design?

  1. Configure a new messaging engine in each server to support failover.

  2. Configure the data store for each messaging engine for each server in the cluster.

  3. Select scalability with high availability as the messaging engine policy.

  4. Create a core group policy to restrict each messaging engine to a particular server.

Answer: C

Explanation: The scalability with high availability configuration ensures that there is a messaging engine for each server in a cluster, and that each messaging engine has a failover location.


01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5/com.ibm.websphere.nd.doc/ae/cjt10 04_.html(second paragraph)

Question No: 32

A system administrator was asked by the development team to inform them of any warning message which contains a string quot;Connectionquot; on a WebSphere Application Server with High Performance Extensible Logging (HPEL) enabled.

What should the administrator do to continuously monitor logs for the required message?

  1. Configure log detail levels to include filter on quot;Connectionquot; string.

  2. Use the Log Viewer in the administrative console with filter on quot;Connectionquot; string.

  3. Use the logviewer.sh or logviewer.bat command with appropriate options.

  4. Use the Log Viewer in the administrative console with filter on quot;Connectionquot; string and enable the #39;Refresh automatically#39; feature.

Answer: C

Reference:http://www- 01.ibm.com/support/knowledgecenter/SSD28V_8.5.5/com.ibm.websphere.base.doc/ae/rtrb


Question No: 33

A system administrator has created a Python script called globalScript. py.

What should the administrator do to ensure globalScript. py is loaded when the wsadmin shell is used?

  1. Compile globalScript.py to a Java class in the bin directory.

  2. Invoke wsadmin with the argument-profileName globalScript.py.

  3. Modify the configureCustomProperty script to import globalScript. py.

  4. D. Set the script profiles in the wsadmin.properties file to load globalScript .py.

Answer: D

Question No: 34

An organization updated their LDAP directories and modified user roles. The roles that were configured to have access to a highly secured enterprise application were deleted and new roles with new names were created. The application then had security related exceptions.

How can a system administrator resolve the exceptions and restore security for the application?

  1. Modify the mapping of security roles of the application to the new LDAP roles.

  2. Modify the application and remove all security constraints and redeploy the application.

  3. Modify the application to have a run as role for each new LDAP role and redeploy the application.

  4. Create an administrative authorization group with administrator privileges scoped for the application with an administrative group role for the new LDAP roles.

Answer: D Reference:http://www.novell.com/documentation/idmrbpm36/install/data/bb1zmw0.html(Se e the Role of Administrator).

Question No: 35

A system administrator,Admin1, with Administrator privileges has archived full repository checkpoints. Another administrator,Configurator1,with Configurator privileges has copied the checkpoint contents directory from one of the archived check points to its original location.Configurator1tries to restore the configuration using the copied archived checkpoint contents and the restore fails.

How canConfigurator1restore the configuration using the copied archived full repository checkpoint?

  1. Copy the archived checkpoint metadata directory to its original location.

  2. Increase the Automatic checkpoint depth to keep all the delta checkpoints.

  3. Delete the delta checkpoints taken after the full repository checkpoint was taken.

  4. Ask an administrator to update the privileges for Configurator1 to matchAdmin1.

Answer: A

Reference:http://www- 01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5///com.ibm.websphere.zseries.doc/ae/ twve_xdappedcfg.html

Question No: 36

In a test environment, a system administrator has configured an external HTTP server in the DMZ that is routing to a cluster of application servers. The administrator wants to achieve higher performance when routing and prioritizing incoming requests to the back-

end cluster.

How can the system administrator achieve this task?

  1. Configure a cluster of external HTTP servers.

  2. Enable the prefer local option on the cluster members.

  3. Set up a Caching Proxy server between the external web server and the application server.

  4. Place an On Demand Router (ODR) between the external web server and the application servers.

Answer: D

Question No: 37

A system administrator needs to install WebSphere Application Server Network Deployment V8.5.5 multiple times and would like to automate the task of installing the product. The administrator wants to create a response file based on an initial installation and use this for future installations.

How can the administrator accomplish this task?

  1. Use the IBM Packaging Utility.

  2. Use the Installation Manager Console mode.

  3. Complete a silent installation with the -log option.

  4. Start the Installation Manager GUI with the -record option.

Answer: D


Question No: 38

There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configuration role access to a developer for a single application deployed in that cluster.

How should the administrator meet this requirement and restrict Configuration role access for a single application?

  1. Create a J2C authentication alias for that developer.

  2. Create an Administrative user role and provide Configuration access to the developer.

  3. Create an Administrative group role and provide Configuration access to the developer.

  4. Create an administrative authorization group, scope it only for that application and create an Administrative user or group role to give Configuration access to the developer.

Answer: A

Question No: 39

An EJB application posts a request message into a JMS destination and waits for a response message on a different JMS destination. To correlate the response message to the request message, the application uses the JMS correlation ld of the message. The application waits up to five seconds for a response before timing out the request.

A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the request message, process it and post a response message.

The destinations are defined in a Service Integration Bus (SIB) within the cell.

Intermittent timeout exceptions have occurred for the requester application. How can a system administrator correlate and analyze the debug information from both requester and consumer applications?

  1. Enable High Performance Extensible Logging (HPEL). Use HPEL logViewer command to see debug information.

  2. Enable a diagnostic trace in both requester and consumer servers.

    Use the Integrated Solutions Console (ISC) to set the admin=all trace. Analyze the trace.

  3. Enable High Performance Extensible Logging (HPEL).

    Enable Cross Component Trace (XCT) to include request IDs in log and trace records. Use HPEL logViewer command with appropriate filters to see debug information.

  4. Using the Integrated Solutions Console (ISC), browse the request message that has timed out and look for any key application data.

Search for exceptions using the key application data in both requester and consumer in native_stderr.log and native_stdout.log.

Answer: C

Question No: 40

Which of the following comprises an initial Liberty profile server process?

  1. A single JVM, the Liberty kernel, and feature manager.

  2. A single JVM, an OSGI framework and an object request broker.

  3. An OSGI framework, a web container and an EJB container.

  4. An administrative agent, the Liberty kernel and shared libraries.

Answer: C

Reference:https://www- 01.ibm.com/support/knowledgecenter/was_beta_liberty/com.ibm.websphere.wlp.nd.multipl atform.doc/ae/cwlp_about.html(See the Liberty Profile Overview).

100% Dumps4cert Free Download!
Download Free Demo:C2180-401 Demo PDF
100% Dumps4cert Free Guaranteed!
C2180-401 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.