A system administrator needs to use wsadmin to execute commands interactively. The WebSphere cell has global security enabled. To avoid the security login dialog when executing wsadmin, the administrator should:
A. use the argument -user
B. edit the sas.client.props file.
C. login in to the local operating system (local OS) with an administrator user id.
D. edit the wsadmin.properties file.
正解:B
質問 2:
A system administrator has successfully installed the WebSphere Application Server Network Deployment core product. The administrator then attempts to start server1, and it fails to start. On initial inspection, the administrator finds that the profiles directory is empty. What should the administrator do next?
A. Start the node agent for server1.
B. Run the Installation Verification Tool (IVT).
C. Run the WebSphere Customization Toolbox.
D. Inspect the SystemOut.log file of server1.
正解:C
質問 3:
Performance issues have caused several high profile outages in a WebSphere Application Server Network Deployment V8.0 environment. The application developer has isolated the problem to one specific application. To assist with the problem diagnosis a system administrator has been asked to enable the highest level of WebSphere tracing available. How should the system administrator accomplish this? Enable tracing and set the level to:
A. finest
B. debug
C. all
D. *
正解:C
質問 4:
A system administrator is using the debug features of the IBM Assembly and Deploy Tools (IADT) to resolve an error in a wsadmin Jython script. Which control on the Debug view can the administrator use to progress through the statements without redirecting to any encountered functions?
A. Step Over
B. Step Return
C. Step Into
D. Resume
正解:A
質問 5:
An administrator needs to monitor the frequency of garbage collection (GC) cycles that are triggered when a typical client load is run against the server. How should the administrator monitor the frequency of garbage collections?
A. Run the performance servlet to gather the verbose GC data.
B. Use the HPEL Log Viewer and look for System.gc() calls.
C. Use the Tivoli Performance Viewer (TPV) and select the JVM Runtime.
D. Use the Log Analyzer to view the verbose GC logs.
正解:C
質問 6:
A system administrator needs to create a resource that can be used exclusively by applications running on a specific node. What configuration setting can be used to limit the visibility of this resource to users on that node?
A. JNDI name
B. scope
C. authorization group
D. node group
正解:B