How can the administrator meet these requirements?
A system administrator needs to configure a JDBC provider and a data source for an application in
a clustered environment. The administrator also needs to copy the JDBC drivers from the
database server to the application server machines.
How can the administrator meet these requirements?
How can the administrator identify these roles and constraints?
The administrator needs to identify any security role references and security constraints in a web
application.
How can the administrator identify these roles and constraints?
How can the administrator ensure that the attributes configured on the new data source are used by the applica
A developer created an enterprise application which contained data source and security role
information. The developer asked a system administrator to install this application to an application
server where global security is enabled using the Integrated Solutions Console (ISC). A new data
source was configured at the server scope for the use of this application. While load testing the
application, the developer noticed that the attributes configured on the new data source were
ignored by the application server.
How can the administrator ensure that the attributes configured on the new data source are used
by the application server?
How can the system administrator achieve this task?
In a test environment, a system administrator has configured an external HTTP server in the DMZ
that is routing to a cluster of application servers. The administrator wants to achieve higher
performance when routing and prioritizing incoming requests to the back-end cluster.
How can the system administrator achieve this task?
How can the administrator detect these conditions in the future and take action to prevent this problem?
While monitoring a cluster in the cell, the administrator notices that one server in the cluster
periodically loses connections to the database. When this happens, requests to the server have a
significantly decreased response time and various error conditions are listed in the log files for the
server. Since the error codes are returned quickly, the server starts returning responses faster
than the average service times for the application. Due to this, the weight for the server is
increased and a large percentage of incoming requests are being routed to the erroneous server
and the server is getting overloaded with requests.
How can the administrator detect these conditions in the future and take action to prevent this
problem?
Which configuration is needed in the dynamic clusters?
The application placement controller has been configured with elasticity mode enabled.
Intermittently, all instances of a dynamic cluster are removed. After further review, the system
administrator noticed that it occurs during peak load on another dynamic cluster.
The administrator wants to keep at least one instance available. Which configuration is needed in
the dynamic clusters?
How can the administrator achieve this task without any downtime to the application?
A system administrator has deployed an application. The development team has updated a new
version of this application. The administrator needs to immediately deploy this updated application
and guarantee that only this new edition is used by clients and that any service requests for the
application are queued during the deployment of the new application.
How can the administrator achieve this task without any downtime to the application?
What is the next step the administrator must perform?
An administrator would like to use the Centralized Installation Manager (CIM) to install WebSphere
Application
Server Network Deployment V7.0 on a remote Solaris host. The Solaris host has been updated
with all the required operating system patches.
What is the next step the administrator must perform?
Which one of the following profile related tasks can only be performed using the manage profiles command line
Which one of the following profile related tasks can only be performed using the manage profiles
command line facility?
Which of the following items best gives a reason to perform an unattended installation of WebSphere Applicatio
Which of the following items best gives a reason to perform an unattended installation of
WebSphere Application Server?