A system administrator needs to submit a wsadmin job to change the configuration of an enterprise application within a flexible management environment. What should the administrator do? Connect to:
A. Node Agent
B. Administrative Agent
C. Job Manager
D. Work Manager
E. Deployment Manager
The system administrator needs to generate a report of data sources for a WebSphere cell. To do so, the administrator should:
A. parse the genVersionReport to list data sources.
B. configure a monitored directory to capture this data.
C. create a script by using the JDBC query scripts as examples.
D. use the Integrated Solutions Console (ISC) to generate a data source report.
Consider the Exhibit,
a report generated by the IBM Support Assistant (ISA) that reveals a prevailing problem within a WebSphere Application Server environment. What should the administrator do?
A. Increase the amount of physical memory for the server.
B. Ensure that all connections taken from the data source are returned to the pool.
C. Determine why the collection class increases in size and consumes memory.
D. Modify the application so it uses stateless instead of stateful session beans to conserve the heap.
Customers are complaining that a particular web site is "hanging". To troubleshoot the problem, a system administrator decides to trigger several thread dumps to determine which threads might be hung. How can the administrator trigger the thread dumps?
A. Use wsadmin to execute the dumpThreads command for the application server.
B. Run the collector command line script with the -Summary option set to "yes".
C. Set the node agent's custom property "com.ibm.websphere.threadmonitor.dump.java" to true.
D. From the Integrated Solutions Console (ISC), click the System dump button for the application server.
A system administrator is tuning a WebSphere Application Server system for optimal performance, based on advice obtained from the Performance and Diagnostic advisor. What setting should the administrator configure to ensure accurate advice for the specific configuration of the system?
A. Specify the process ID of the server
B. Specify the number of processors on the server
C. Enable tracing on the server
D. Enable High Performance Extensible Logging (HPEL) logging
While monitoring a JDBC data source's performance during a test load, a system administrator notices that there are a large number of prepared statements discarded from the cache. In order to improve application throughput, how should the administrator tune the data source?
A. Increase the size of the prepared statement cache until there are no statement discards under load.
B. Increase the maximum connection pool size and keep the prepared statement cache at its default size.
C. Set the connection pool purge policy to "EntirePool" and increase the maximum connection pool size.
D. Set the minimum connection pool size equal to the maximum connection pool size and keep the prepared statement cache at its default size.
A system administrator needs to identify the most time-intensive web components of a running application, and determine which components are the slowest. The administrator does this from the Tivoli Performance Viewer (TPV) by:
A. viewing diagnostic trace output.
B. viewing Servlets Summary Report.
C. viewing the log file for the web server.
D. opening Reports tab, Runtime operations, reports.
A system administrator needs to modify the Java 2 security permissions for applications running on a server. How should the administrator perform this task?
A. Use the PolicyTool.
B. Use the iKeyman tool.
C. Edit the was.policy file.
D. Edit the security.xml file.
The lead administrator needs to limit access to the Integrated Solutions Console (ISC) by a group of administrators who only need to: ?view the configuration of the WebSphere Application Server. ?monitor its status. ?stop and start the server.
To what administrative role should the lead administrator assign this group?
A. Auditor
B. Monitor
C. Operator
D. Configurator
A system administrator must configure IBM WebSphere Application Server Network Deployment V8.0 to authenticate users with a Windows domain. The administrator should configure a registry that is:
A. a local operating system (OS).
B. a Virtual Member Manager (VMM).
C. a registry that implements WebSphere Common Configuration Model (WCCM).
D. an Active Directory (AD) domain controller.