A system administrator needs to view the list of certificates for unmanaged web server located on a remote system. How should the system administrator do this?
A. Look at the SSL configuration in the httpd.conf
B. Use iKeyman to view the keyring.
C. View the plugin-cfg.xml
D. Use the administrative console to check the content of the cell default keystore.
正解:B
質問 2:
A system administrator is creating data source for a configured JDBC provider using administrative console. The system administrator needs to write a wsadmin Jython script to create data source in anautomated way in the future. Which feature in administrative console will help the system administrator to view wsadmin commands during creation of the data source?
A. Help portlet after creating the data source.
B. Command assistance feature after creating the JDBC provider.
C. Command assistance feature after creating the data source.
D. Help portlet after creating the JDBC provider.
正解:C
質問 3:
Jython scripts have to be created for common administrative tasks using the IBM Assembly and Deploy Tool (IADT). For each task performed through the administrative console, a
system administrator needs to redirect the Jython commands into the IADT to quickly create these scripts. How should the system administrator do this?
A. Disable workspace automatic refresh
B. Log Command assistance commands
C. Disable the help portlet
D. Enable Command assistance notifications
正解:D
質問 4:
A system administrator has configured a clustered environment where session persistence
is configured. While tuning the environment, the administrator enables verbose garbage collection. Now the administrator is seeing a high CPU usage for the servers in the cluster and begins seeing out-of-memory exceptions in the log files. How can the system administrator diagnose what is accumulating in the memory and causing the out-of-memory exceptions?
A. Enable High Performance Extensible Logging (HPEL).
B. Examine the verbose garbage collection statistics in the SystemOut.log files.
C. Disable verbose garbagecollection and compare the before and after verbose garbage collection statistics.
D. Use the Garbage Collection and Memory Visualizer tool in the IBM Support Assistant.
正解:D
質問 5:
A system administrator needs to deploy an enterprise application to a WebSphere Application Server environment. Before starting the deployment process, the administrator uses the IBM Assembly and Deploy Tool (IADT) to inspect the EAR and notices that it is enhanced. Since enhanced EARs are not allowed in their runtime environment, the system administrator needs to unenhance the EAR. How can the system administrator successfully remove the enhancements?
A. Disable the applicationscoped resources in the application deployment descriptor.
B. Make sure that Process embedded configurations is not selected when exporting the EAR.
C. Remove the META-INF/ibmconfig folder from the project before exporting the EAR.
D. Use WebSphere Customization Toolbox (WCT) to unenhance the EAR.
正解:C
質問 6:
A system administrator needs to create a deployment manager and afederated node in one iteration through the Profile Management Tool. Which profile type should the system administrator select?
A. Custom profile
B. Cell profile
C. Management profile with a job manager server
D. Management profile with a deployment manager server
正解:B
宫崎** -
この参考書と過去問を解けば合格できると思います!PDFファイルでダウンロードすることもできるところが大好きです。Pass4Testさんだいちゅき