How should the administrator configure the data sources before reusing the Performance and Diagnostic Advisor?
A system administrator decides to use the advice from the Performance and Diagnostic Advisor to
identify the optimum connection pool settings for data sources. In a cell, the data source
db2datasource is defined under node scope and used by two servers from that node. The
administrator receives two different sets of advice for db2datasource.
. One set of advice suggests to increase the maximum connection pool size for
db2datasource.
. The other suggests reducing the maximum connection pool size for db2datasource.
How should the administrator configure the data sources before reusing the Performance and
Diagnostic Advisor?
Which tool should the administrator use to find the most used JSP page?
A system administrator in a bank was asked by business users to determine the most accessed
JSP page in a web application at normal work load for marketing purpose.
Which tool should the administrator use to find the most used JSP page?
What should the administrator do to fix the problem using ORB settings?
A system administrator is asked by a development team to monitor the performance of a newly
deployed EJB application. The administrator noticed that the heap size of the application server is
growing.
What should the administrator do to fix the problem using ORB settings?
How can the system administrator do this?
A system administrator has deployed web applications to a clustered environment where database
session persistence is configured. The administrator needs to improve the response time and the
throughput.
How can the system administrator do this?
How should the administrator configure the Application Placement Controller (APC) in a star topology?
A system administrator is required to create a star topology for multi-cell performance
management for three WebSphere Application Server cells.
How should the administrator configure the Application Placement Controller (APC) in a star
topology?
Configure the cell custom property CenterCell to:
How should the system administrator tune the data source properties to improve the application response time?
A performance test team was testing the capacity of concurrent users of a web application
deployed on a multi-processor server. While testing 250 concurrent users, the administrator
discovers connections to the database are failing.
In response, a system administrator increased the connection pool to the maximum limit which the
database allows and increased the prepared statement cache size. The test passed, but the
application response time was slower.
How should the system administrator tune the data source properties to improve the application
response time?
How can a system administrator resolve the exceptions and restore security for the application?
An organization updated their LDAP directories and modified user roles. The roles that were
configured to have access to a highly secured enterprise application were deleted and new roles
with new names were created. The application then had security related exceptions.
How can a system administrator resolve the exceptions and restore security for the application?
How should the administrator meet this requirement and restrict Configurator role access for a single applicat
There are many applications deployed in a large WebSphere Application Server cluster. A system
administrator is required to give Configurator role access to a developer for a single application
deployed in that cluster.
How should the administrator meet this requirement and restrict Configurator role access for a
single application?
How should the administrator do this?
A web application has a configured session timeout of eight hours and a default LTPA token
timeout of two hours. After every two hours, the users have to log in again from their HTTP
browser. The system administrator is required to make configuration changes so users only have
to log in once, while keeping the above mentioned timeouts the same. The authentication
mechanism available is Kerberos.
How should the administrator do this?
How should the administrator accomplish this?
A customer has enabled LTPA as their authentication mechanism and has web resources that are
not secured by proper security constraints. A system administrator is required to ensure that all
web resources are secured.
How should the administrator accomplish this?