Proper study guides for Improve IBM IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile, System Administration certified begins with IBM C9510-401 preparation products which designed to deliver the 100% Correct C9510-401 questions by making you pass the C9510-401 test at your first time. Try the free C9510-401 demo right now.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for IBM C9510-401 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW C9510-401 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/C9510-401-exam-dumps.html
Q1. A system administrator needs to trigger a javacore only when a Java. net. Socket Timeout Exception is encountered in real time.
What does the administrator have to configure to trigger the javacore dump?
A. Configure the JAVA_DUMP_OPTS environment variable to capture javacore for ANYSIGNAL and all exceptions.
B. Configure an -Xdump:java Generic JVM argument on WebSphere Application Server with the filter for java.net.SocketTimeoutException.
C. Code wsadmin script to capture javacore and then execute it after the Java.net.SocketTimeoutException has been encountered.
D. Use the log filter in HPEL to monitor for java.net. SocketTimeoutException and then gather a javacore dump from the Integrated Solutions Console (ISC).
Answer: A
Explanation: Reference: http://publib.boulder.ibm.com/infocenter/javasdk/tools/index.jsp?topic=%2Fcom.ibm.java.doc.igaa%2F_1vg00014884d287-11c3fb28dae-7ffc_1001.html
Q2. A system administrator in a bank was asked by business users to determine the most accessed JSP page in a web application at normal work load for marketing purpose.
Which tool should the administrator use to find the most used JSP page?
A. Performance and Diagnostic Advisor
B. IBM Support Assistant Data Collector
C. High Performance Extensible Logging Log Viewer
D. Tivoli Performance Viewer (TPV) summary reports
Answer: C
Q3. A system administrator has added a server cluster as a member of a service integration bus (SIB). The administrator needs to configure one messaging engine for each server in this cluster and to have a failover location for each messaging engine.
What should the administrator do to achieve the required design?
A. Configure a new messaging engine in each server to support failover.
B. Configure the data store for each messaging engine for each server in the cluster.
C. Select scalability with high availability as the messaging engine policy.
D. Create a core group policy to restrict each messaging engine to a particular server.
Answer: C
Explanation: The scalability with high availability configuration ensures that there is a messaging engine for each server in a cluster, and that each messaging engine has a failover location.
Reference: http://www-
01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5/com.ibm.websphere.nd.doc/ae/cjt1004_.html (second paragraph)
Q4. Which of the following comprises an initial Liberty profile server process?
A. A single JVM, the Liberty kernel, and feature manager.
B. A single JVM, an OSGI framework and an object request broker.
C. An OSGI framework, a web container and an EJB container.
D. An administrative agent, the Liberty kernel and shared libraries.
Answer: C
Explanation: Reference: https://www-01.ibm.com/support/knowledgecenter/was_beta_liberty/com.ibm.websphere.wlp.nd.multiplatform.doc/ae/cwlp_about.html (See the Liberty Profile Overview).
Q5. The computer where a federated node was running had a failure and cannot be recovered. A system administrator wants to recreate the node with the same configurations in another computer.
Which steps should the administrator execute in order to recover the damaged node?
A. Configure the new computer with a different hostname. Create a custom profile with the same name.
Federate to the cell using the command addNode with the default options.
B. Configure the new computer with a different hostname. Create a custom profile with a different name.
Federate to the cell using the command addNode with the option -asExistingNode.
C. Configure the new computer with the same hostname. Create a custom profile with the same name.
Federate to the cell using the command addNode with the option -asExistingNode.
D. Configure the new computer with the same hostname. Create a custom profile with the same name.
Federate to the cell using the command addNode with the options -includeapps.
Answer: B
Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSD28V_8.5.5/com.ibm.websphere.zseries.doc/ae/tagt_addNode_asExistingNode.html (See the Heading Procedure).
Q6. A system administrator, Admin1, with Administrator privileges has archived full repository checkpoints. Another administrator, Configurator1, with Configurator privileges has copied
the checkpoint contents directory from one of the archived check points to its original location. Configurator1 tries to restore the configuration using the copied archived checkpoint contents and the restore fails.
How can Configurator1 restore the configuration using the copied archived full repository checkpoint?
A. Copy the archived checkpoint metadata directory to its original location.
B. Increase the Automatic checkpoint depth to keep all the delta checkpoints.
C. Delete the delta checkpoints taken after the full repository checkpoint was taken.
D. Ask an administrator to update the privileges for Configurator1 to match Admin1.
Answer: A
Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5///com.ibm.websphere.zseries.doc/ae/twve_xdappedcfg.html
Q7. A system administrator has been asked to uninstall an application from a cluster running in a WebSphere Application Server Network Deployment cell. This application was installed from the Integrated Solutions Console (ISC). The monitored directory for the cluster is
<cluster1_dir>.
What step(s) can the administrator perform to uninstall the application?
A. Delete the application file from <cluster1_dir>.
B. Stop the running cluster.
Delete the application file from <cluster1_dir>.
C. Stop the running cluster.
Copy the application file to <cluster1_dir>. Delete the application file from <cluster1_dir>.
D. Create a properties file to describe the deletion of the application file Copy the properties file to <cluster1_dir>.
Answer: A
Q8. A web application is hosted on an application server that receives HTTP requests from a third party application named myApp. The URlGroup mapping for this application is called default_host_myApp.
The development team asks a system administrator to configure the HTTP plug-in to prevent routing requests to any application server except serverl.
The following exhibit shows the parts of the plugin-cfg.xml file that are relevant for myApp. The UriGroups for other applications are not shown in the exhibit.
What should the administrator do to the plugin-cfg.xml file to ensure that requests for default_host_myApp URIGroup are routed only to machine1?
A. Delete the server tag for Cloneld="b20000002" Delete all of the tags within the Server tag
B. Delete the UriGroup tag for default_host_myApp Delete all of the tags within this UriGroup tag
C. Delete the VirtualHostGroup tag for default_host Delete all of the tags within the VirtualHostGroup tag
D. Edit the LoadBalanceWeight forserverl to 20 Edit the LoadBalanceWeight for server2 to 2
Answer: C
Q9. A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.
How should the administrator accomplish this?
A. Enable "Authenticate when any URI is accessed".
B. Enable "Authenticate only when the URI is protected".
C. Enable "Authenticate only when the URI is protected".
D. Map the application security roles to the configured user registry's groups.
Answer: B
Q10. A system administrator has created a Python script called globalScript. py.
What should the administrator do to ensure globalScript. py is loaded when the wsadmin shell is used?
A. Compile globalScript.py to a Java class in the bin directory.
B. Invoke wsadmin with the argument-profileName globalScript.py.
C. Modify the configureCustomProperty script to import globalScript. py.
D. Set the script profiles in the wsadmin.properties file to load globalScript .py.
Answer: D
