|
Question 1. Which statement describes the relationship between WebSphere MQ and Web Sphere default messaging as a JMS provider? A. Default messaging relies on WebSphere MQ as the JMS Provider B. Default messaging is a version of WebSphere MQ C. WebSphere MQ and default messaging are separate and do not share any modules or configuration data D. WebSphere MQ and default messaging must share the same Cloudscape database Answer: C Question 2. When attempting to install WebSphere Application Server v6.1 using the silent install, the installation fails early in the process and no log files appear to be created in the logs directory. Which two steps can the administrator perform to troubleshoot the issue? A. Restart the installation after an OS restart B. Restart the installation with the log parameter C. Look for the log files in the system temporary area D. Run the installation verification test (IVT) E. Start over by creating a new responsefile.txt using the responsefile.base.txt Answer: B, C Question 3. What is the name of the WebSphere scripting tool? A. wasadmin B. ws_ant C. wsadmin D. wsdeploy Answer: C Question 4. An administrator is configuring JDBC database connections. Where is the file system path to the DB2 or Oracle driver .zip files specified? A. On the Connection manager J2C configuration panel B. From the Environment -> WebSphere Variables panel of the administration Console C. Within the .ear file of the deployed application D. Within the connection pool parameters for the cell Answer: B Question 5. When installing WebSphere Application Server v6.1 along with IBM HTTP server and related plug-ins, an administrator notices the following message in the/logs/install/log.txt Plug.install, com.ibm.ws.install.ni.ismp.actions. ISMPComponentizedFileRepositoryDeployAction, Err, Component not found: prereq.jdk Which two additional entries should the administrator verify? A. The PLUGIN_JDK_ROOT value in log.txt B. The JAV_HOME system environment variable C. The CURRENT_WORKING_DIRECTORY value in log.txt D. The CLASSPATH system environment variable E. The JAVA_INSTALL_PATH value in log.txt Answer: C, E Question 6. While an administrator is using the Tivoli Performance Viewer to analyze a performance problem with a production application server, the administrator notes that the database connection pools have a much lower percentage of utilization than the other pools. Which statement explains this observation? A. The Tivoli Performance Viewer percentages are only useful for performing performance analysis on a server that is executing in a controlled load test scenario B. the database server is constrained, causing calls to the database to consume more resources than are available for processing C. The connection pools have not been defined to account for parallel application server calls to the database, causing this particular server to show low utilization D. This Condition indicates there is a bottleneck in one of the processes upstream in the pipeline of process flows within the application server Answer: D Question 7. It has been decided to use database session persistence for a particular J2EE application. Which two steps must be performed to implement this feature? A. Create session database B. Select a multi row schema C. Configure the JDBC provider and data source D. Create session database tables E. Configure row size to match session size Answer: A, C Question 8. Which statement is true for a managed application server process to startup? A. Starting a managed server is not dependent on the presence of a running deployment manager B. The node agent should not be started before any managed servers on that node C. A node agent and deployment manager must be running before starting a managed server D. The deployment manager needs to be started before the managed server Answer: A Question 9. When adding a new member to a cluster, why might it be necessary for an administrator to select the option for generating unique HTTP ports? A. To prevent other applications from using these ports B. To avoid port conflicts with other servers on the same node C. To enable encryption over the secure HTTP ports D. To ensure that cluster members on different nodes have unique ports Answer: B Question 10. What are the three possible modes that the replication service instance can be set up to run in? A. Server mode B. Broadcast mode C. Client mode D. Both Mode E. Publish/Subscribe mode F. Event Listener mode Answer: A, C, D
|
Question 1. Which of the following can help assure customers that the information they provide to you will remain private? A. Implement and post a privacy policy. B. Provide an opt-out link for all e-mail sent to customers. C. Post the company security policy. D. Create a data backup policy. Answer: A Question 2. Which of the following pieces of information will best help you determine the number of transactions your database server can accommodate? A. The number of concurrent user connections B. Maximum uptime requirements C. The number of database tables required D. Minimum installation requirements Answer: A Question 3. To perform at the maximum level of security, digital certificates must be: A. issued by a trusted third party. B. issued 30 days before the site goes live. C. verified digitally by a notary public. D. guaranteed by VeriSign. Answer: A Question 4. The purpose of a stress test is to determine: A. whether more system RAM is necessary. B. whether a more powerful CPU is necessary. C. whether a performance bottleneck is present. D. whether visitors can reach the site. Answer: C Question 5. Which of the following is the most effective option for detecting a site attack by someone who wants to modify your customer database? A. Using an intrusion detection system B. Limiting the open ports on the system C. Using antivirus software D. Implementing a firewall Answer: A Question 6. The main purpose of monitoring e-commerce Web server resources and performance (including bandwidth, uptime, downtime and network usage) is to ensure: A. visitor satisfaction. B. cost-effectiveness. C. site availability. D. increased profitability. Answer: C Question 7. A hash encryption function: A. is encrypted with a public key and decrypted with a private key. B. is not used because today's computers can easily hack it. C. is relatively easy to encrypt but difficult to decrypt. D. contains a secret key that is used to encrypt and decrypt. Answer: C Question 8. You need to enable SSL/TLS on a Web server for a virtual directory. You have just installed a signed digital certificate from a certificate authority. What is the next step you should take? A. Place a copy of the certificate in the virtual directory as a hidden file. B. Place the digital certificate in the Trusted Root Certification Authorities store. C. Specify that you want to use SSL/TLS for the Web server's virtual directory. D. Specify that you want to use the certificate to sign the virtual directory. Answer: C Question 9. Which of the following site creation models would be most appropriate for a site needing customer relationship management (CRM) and personalization? A. Online instant storefront B. Mid-level offline instant storefront C. Mid-level online instant storefront D. High-level offline instant storefront Answer: D Question 10. Tomas receives multiple e-mail notices after he successfully places an online order with a book retailer. What is the customary sequence of order e-mail notices? A. Order address verified, order shipped, order charged to the credit card B. Order processed, order status confirmed, order shipped with tracking number C. Order fulfilled, order processed, order shipped with tracking number assigned D. Order shipped, order processed, order charged to the credit card Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.