Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

C9510-418 Questions and Answers

Note! Following C9510-418 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

C9510-418 Questions and Answers

Question # 6

Heapdumps, javacores, and system cores are recommended to be generated for which kind of IBM WebSphere Application Server problems?

A.

Slow page rendering

B.

High CPU and disk I/O

C.

Slow File uploads and downloads

D.

System hangs and out of memory

Full Access
Question # 7

A single JMS activation specification can apply to which of the following?

A.

One Single Bus

B.

Only EJB 3.0 beans

C.

Only one Message Driven Bean

D.

One or more Message Driven Beans

Full Access
Question # 8

Which tool can be used to analyze and tune performance for memory leak detection?

A.

Thread monitor

B.

Configuration validation

C.

Performance and Diagnostic Advisor

D.

IBM Tivoli Performance Viewer advisor

Full Access
Question # 9

Which of the following is required for Secure Sockets Layer (SSL) enablement within an HTTP server?

A.

A JDK

B.

A valid, issued certificate

C.

IPv6 (Internet Protocol Version 6)

D.

Updating the https.conf file and not the httpd.conf file

Full Access
Question # 10

Which statement is true when an administrator issues the following command?

addNode localhost 8879 –includeapps

A.

The running application server is stopped and the application is overwritten in the new environment.

B.

The running application server continues to run and the application is overwritten in the new environment.

C.

The running application server is stopped and the same version of the application starts in the new environment.

D.

The running application server continues to run and the same version of the application starts in the new environment.

Full Access
Question # 11

Which statement describes a cell in a Network Deployment configuration?

A.

A cell can consist of multiple nodes and node groups.

B.

A cell only contains one node that contains one server.

C.

Nodes and node groups in the cell are administered from the node agent.

D.

Nodes and node groups in the cell are administered from the job manager.

Full Access
Question # 12

If an administrator dynamically generates a plugin-cfg file after setting up high availability automatic generation, what will be the results?

A.

The dynamic generation issues a propagation request.

B.

The dynamic generation creates a second plugin-cfg file.

C.

The dynamic generation overwrites the intelligent management settings.

D.

An error message is shown that cannot be dynamically generated.

Full Access
Question # 13

Which is a true statement regarding flexible management and the Job Manager?

A.

Flexible management requires a secure proxy server.

B.

A deployment manager can be registered with a Job Manager.

C.

Flexible management is a replacement for a Network Deployment cell.

D.

The Job Manager also maintains a master repository for the environment.

Full Access
Question # 14

Which type of profile provides management capabilities for multiple stand-alone application servers?

A.

Custom

B.

Secure Proxy

C.

Administrative agent

D.

Deployment manager

Full Access
Question # 15

Which of the following statements is true regarding the relationship of nodes and node groups?

A.

Nodes can belong to only one node group.

B.

Nodes managed by a node group cannot be deleted.

C.

All nodes are initially not associated with a node group.

D.

All nodes are initially associated with a default node group.

Full Access
Question # 16

What does the following JVM argument do?

-Xverbosegclog:${SERVER_LOG_ROOT}/verbose.m%d.7/18/16M%S.%pid.txt,20,10000

A.

It changes the default values for verbosegc logging.

B.

It changes the default location of the verbosegc logging.

C.

It configured verbosegc logging once it has already been enabled.

D.

It sets the default value for enabling and configuring verbosegc logging.

Full Access
Question # 17

What must be done to uninstall an application using the monitored directory functionality?

A.

Put a file named ApplicationName_delete in the monitored directory.

B.

Add a version of the application with no files inside of it to the monitored directory.

C.

Add a tag to the web.xml of the application, and add the file to the monitored directory.

D.

Add a properties file that has DELETE=true in the header of the properties sections, and add it to the monitored directory.

Full Access
Question # 18

An administrator is using the Guided Troubleshooter in the IBM Support Assistant to troubleshoot IBM WebSphere Application Server issues. After going through data collection and analysis, no reliable solution is found.

What is the administrator’s best next step?

A.

Call in a new PMR with IBM and upload Troubleshooter data to ECuREP.

B.

Open a new PMR with IBM and upload SystemOut.log from the IBM WebSphere Application Server.

C.

Submit results to the IBM WebSphere Application Server forum for a quick response from other forum users.

D.

Use the Guided Troubleshooter to open a service request with IBM, so all the troubleshooting data analyzed so far is uploaded automatically.

Full Access
Question # 19

An administrator installed an enterprise application in fast mode and noticed that the application is failing because J2EE roles have not been mapped.

How can this issue be resolved?

A.

Re-deploy the application.

B.

Request that the application developer create an enhanced .ear file which has roles mapped, and deploy the enhanced .ear file.

C.

Map a security role to the user/group for the application using the Integrated Solutions Console, save changes, and restart the application.

D.

Map a security role to the user runAs roles for the application using the Integrated Solutions Console, save changes, and restart the application.

Full Access