A company has severe problems with two SCA modules being deployed on a production environment. The cluster consists of multiple nodes and many other applications are deployed already. After a first investigation of the problem, the root cause seems to be related to inter-module SCA invocations. The problem must be solved as soon as possible with a minimal effect on other applications. Which approach should a deployment professional recommend to troubleshoot the problem on a production environment?
A. Enable a cross-component trace for both SCA modules on all application servers. Capture a snapshot data to correlate the problem with the application workflow.
B. Enable a SCA component-related trace on all application servers and analyze the data using the Log Analyzer in the IBM Support Assistant (ISA).
C. Enable a SCA component-related trace on all application servers in the clustered environment.
Analyze the traces for the problem by comparing the data for all servers.
D. Enable a SCA component-related performance metric using the Tivoli Performance Viewer (TPV) in the administrative console. Monitor the number of failing SCA invocations for both modules.
正解:A
質問 2:
A scalable and highly available WebSphere Process Server environment is built using a Remote Messaging deployment environment pattern. When Common Event Infrastructure (CEI) is enabled which leverages the default messaging provider, the runtime performance degraded significantly. What are the actions a deployment professional could take to reconfigure the messaging infrastructure and modify the settings to account for the extra load caused by CEI processing?
A. Disable the Persist events to the data store property of the corresponding event groups of the events that belong to your application.
B. Configure the event service on a separate cluster and add this cluster as the bus member.
C. Modify the configuration settings of the event emitter factory profile for the CEI processing to enable the support for JMS transmission.
D. Use deployEventServiceMdb administrative command to set up more than one JMS queue to route events to the event service using the default embedded messaging configuration for event transmission.
E. Using the default messaging configuration, set up multiple JMS queues to route events to the service integration bus queue destination cluster.CommonEventInfrastructureQueueDestination.
正解:A,B
質問 3:
A deployment professional is given the task of installing WebSphere Process Server in multiple Linux environments and decides to automate the process using silent install. During the installation process, several issues were encountered. What is the cause of the issues?
A. The response file read by the Installation Manager program has the correct case for property names and values but were enclosed with double quotation marks.
B. The version of the operating system used is Red Hat Enterprise Linux (RHEL) 4.0 which is no longer supported.
C. The install_image/wbi/run_templates script did not have the correct parameters.
D. The response file used by the Installation Manager program was created based on the install_image/wbi/template_response.xml file.
正解:C
質問 4:
During the design of a large-scale high-volume topology, a deployment professional is consulting with a client on the planned design and configuration of the databases required for the messaging resources. During this discussion the deployment professional notes that it would be preferable to configure a separate database for the Business Process Choreographer (BPC) messaging engine. What is a reason for making such a suggestion?
A. Database logging could become a performance bottleneck.
B. The separate database is created automatically in a network deployment environment.
C. Shared databases between the BPC and the SCA bus are not supported in production environments.
D. All of the components require the database schema to be named MEDBPM00.
正解:A
質問 5:
A company wants to provide a new application prototype to any client to process their data. The intention is to start with a simple management system that provides a service to handle electronic contact requests. After a first evaluation of the solution, it is decided to use a WebSphere JCA adapter for e-Mail. The data will be processed by secured downstream SCA components once the data is sent to the adapter. What should be done to integrate the adapter solution in a secured WebSphere Process Server environment?
A. Consult the e-Mail service provider regarding the communication protocol. Secure the connection between the adapter and the service provider using SSL or similar protocols.
B. Advise the development team to configure the security identity on all components connected with the adapter. Deploy the application and map the security identity.
C. No action is required. WebSphere JCA adapters do not provide any authentication or authorization mechanism for inbound and outbound operations.
D. Advise the development team to enhance the service interface to retrieve customer specific information (e.g. user name and password). Each request sent to the adapter must be authorized for processing first.
正解:B
質問 6:
A company has a complex server infrastructure. All servers are allowed to communicate with each other due to the shared network infrastructure. A development team implemented new applications working with confidential business data and deployed them on a dedicated test server. A specific service provider application on a different business server exposes the data using the Business Process Choreographer (BPC) EJB interface to many other applications. The client application will query the data using synchronous requests on the remote EJB API. A special approval from the management was needed to test the new applications with realtime data. What should a deployment professional do to efficiently secure the environment and prepare the test environment?
A. Configure the Representational State Transfer (REST) services for the BPC. Create a secured
proxy server exposing the service endpoints
and provide the exposed URL and login credentials to the development team.
B. Configure the Common Secure Interoperability Version 2 (CSIv2) inbound and outbound
authentication for the test and business server.
Register the test server as trusted identity on the business server.
C. Enable Java 2 security on the business server. Request a list of necessary permissions for the
client application from the development team
and add them to the business servers policy file.
D. Enable the development server for Single sign on (SSO). Configure identity assertion for
Common Secure Interoperability Version 2 (CSIv2)
outbound authentication on the development server and disable identity assertion on the business
server.
正解:B
Jingu -
IBM会社はC2180-608試験問題を提供し、信頼できるプラットフォームだと言えます。 先週、私はC2180-608試験に合格しました。 ありがとう。