EnsurePass
2017 Nov IBM Official New Released C2180-401
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/C2180-401.html

IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile, System Administration

Question No: 11

A system administrator has to design a new production environment to host a web application. The workload of this web application is expected to increase during special marketing campaigns.

Which one of the following topologies should the administrator configure to address the requirements for this new environment?

  1. A Liberty collective environment with autonomic managers and on demand router (ODR).

  2. A flexible management environment supported by one admin agent running in each node of thecell.

  3. A dynamic cluster with autonomic managers, application placement controller and intelligent routers.

  4. A heterogeneous cell with enough servers to support the peak load spread across multiple nodes on the same machine.

Answer: C

Question No: 12

A system administrator needs to create a cell for a test environment. The administrator uses the Profile Management Tool (PMT) to create the deployment manager profile using the advanced profile creation option and creates a custom profile using the typical profile creation option. The administrator examines the log files for the custom profile creation and sees an INSTCONFFAIL message indicating the deployment manager was not running during the custom profile creation.

How should the administrator fix this?

  1. Delete the custom profile. Start the deployment manager. Create the custom profile again.

  2. Start the deployment manager.

    Use PMT to re-create the custom profile.

  3. Use the syncNode command to synchronize the node.

  4. Run the addNode command to federate the custom profile.

Answer: A

Question No: 13

A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.

How should the administrator accomplish this?

  1. Enable quot;Authenticate when any URI is accessedquot;.

  2. Enable quot;Authenticate only when the URI is protectedquot;.

  3. Enable quot;Authenticate only when the URI is protectedquot;.

  4. Map the application security roles to the configured user registry#39;s groups.

Answer: B

Question No: 14

After installing an enhanced EAR in a WebSphere Application Server environment, a system administrator with Configurator privileges is able to see a JDBC provider and a data source in the Integrated Solution Console (ISC) but is not able to delete these resources.

How can the administrator resolve this issue?

  1. Use the AdminTask object to delete the resources.

  2. Stop all application server instances and then delete the resources.

  3. Ask another administrator with iscadmin privilege to delete the resource.

  4. Edit the EAR to remove the application scoped resources and reinstall the application.

Answer: A

Question No: 15

A system administrator has configured a network deployment cell containing multiple nodes and global security enabled with an LDAP repository. To increase capacity, the administrator needs to add additional nodes to the cell. After adding the nodes by using both scripts and the Integrated Solutions Console (ISC), the administrator examines the System.out log for the deployment manager and notices the following message:

0000004d ORBRas E com.ibm.ws.security.orbssl.WSSSLClientSocketFactoryImpl Create SSL Socket Process Discovery : 0 JSSL0080E:

javax.net.ssl.SSL Handshake Exception –

The client and server could not negotiate the desired level of security. Reason? com.ibm.jsse2.util.h: No trusted certificate found

How can the administrator resolve this problem?

  1. Disable Java 2 security.

  2. Restart the deployment manager.

  3. Increase the RSA token timeout value.

  4. Change the number of active LTPA keys.

Answer: B Reference:ftp://public.dhe.ibm.com/software/webserver/appserv/library/v70/BOS7B100.pdf( page 20, see the note)

Question No: 16

A WebSphere Application Server cell was configured with a deployment manager node and a custom node. An operator manually changed some configuration files in the custom node, and the node became out of synch with the master repository.

The system administrator used the Synchronize button in the system administration session of the Integrated Solutions Console (ISC) to try to resynchronize the node, but the node remained out of sync.

What should the administrator do to fix it?

  1. Use the Full Resynchronize button.

  2. Invoke quot;syncquot; operation on NodeSync MBean.

  3. Recreate the custom profile with the same name without deleting the node.

  4. Manually copy all the deployment manager configuration files to the custom node.

Answer: A Reference:https://books.google.com.pk/books?id=oLq6AgAAQBAJamp;pg=PA30amp;lpg=PA30amp; dq=Use the Full Resynchronize buttonamp;source=blamp;ots=rdUMDel7n0amp;sig=YeWe8vnPO UZtxtD7DZP8IZdMF1Yamp;hl=enamp;sa=Xamp;ei=manTVK- 2KIXVau6lgrgGamp;ved=0CCEQ6AEwAQ#v=onepageamp;q=Use the Full Resynchro nize buttonamp;f=false

Question No: 17

A system administrator needs to configure a JDBC provider and a data source for an application in a clustered environment. The administrator also needs to copy the JDBC drivers from the database server to the application server machines.

How can the administrator meet these requirements?

  1. Create a JDBC provider and the data source in the cluster scope. Copy the driver to all nodes.

    Set the environment variable at the node level to the driver#39;s path.

  2. Create a JDBC provider in the server scope and the data source in the node scope. Copy the driver to all application servers.

    Set the environment variable at the node level to the driver#39;s path.

  3. Create a JDBC provider in the node scope and the data source in the cell scope. Copy the driver to the deployment manager.

    Set the environment variable at the server level to point to the deployment manager path.

  4. Create a JDBC provider in the application scope and the data source in the server scope. Copy the driver to all application server directories.

Set the environment variable in each JVM to the driver#39;s path.

Answer: B

Question No: 18

After collecting diagnostic trace from a server running under a cell, a system administrator

noticed that the trace files contained sensitive information.

To avoid this issue in the future, what can the administrator do?

  1. Configure entries in the ras.rawtracelist.properties.

  2. Configure suppress Sensitive Trace in the boots trap.properties file.

  3. Clear the quot;Disable logging and tracing of potentially sensitive dataquot; checkbox.

  4. Add the entry com.ibm.websphere.logging.RawTraceList=Off to the end of the trace string.

Answer: C

Reference:http://www- 01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5/com.ibm.websphere.nd.multiplatform

.doc/ae/utrb_loglevel.html

Question No: 19

Which one of the following options describes the runtime flow starting from the client browser in a clustered WebSphere Application Server Network Deployment topology?

  1. HTTP server -gt; job manager -gt; admin agent -gt; HTTP server plug-in

  2. Load balancer -gt; HTTP server -gt; HTTP server plug-in -gt; application server

  3. Application server -gt; node agent -gt; deployment manager -gt; load balancer

  4. Deployment manager -gt; node agent -gt; HTTP server plug-in -gt; HTTP server

Answer: A

Question No: 20

The administrator needs to identify any security role references and security constraints in a web application.

How can the administrator identify these roles and constraints?

  1. ibm-application-ext.xml file using a text editor.

  2. ibmconfig folder in the application after using the EARExpander command.

  3. Web deployment descriptor using IBM Assembly and Deploy Tools.

  4. Security role to user/group mapping by using the Integrated Solutions Console (ISC).

Answer: A

100% Free Download!
Download Free Demo:C2180-401 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass C2180-401 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE