Which one of the following can be used to instantiate resource adapter classes for establishing and maintainin
Which one of the following can be used to instantiate resource adapter classes for establishing
and maintaining resource connections?
which one of the following?
To create a pool of connections that an application can use to interact with a database, the
administrator must create which one of the following?
Which one of the following actions best describes how to remove application-scoped resources from an enhanced
Which one of the following actions best describes how to remove application-scoped resources
from an enhanced EAR file?
Which of the following is an option given in the First Steps application that runs automatically after install
Which of the following is an option given in the First Steps application that runs automatically after
installation?
which of the following tasks will be necessary?
An administrator has created a deployment manager profile. However, the administrator chose not
to create the Centralized Installation Manager (CIM) repository and populate it with the
WebSphere Application Server Network Deployment V7.0 product files. If, in the future, the
administrator wants to use the Centralized Installation Manager to install WebSphere Application
Server Network Deployment V7.0 on a remote host, which of the following tasks will be
necessary?
What is the best conclusion for this finding?
A system administrator is installing WebSphere Application Server for the first time and was
surprised that the Profile Management Tool (PMT) did not have the expected profile type options,
as stated in the Information Center. What is the best conclusion for this finding?
Which of the following options is NOT a valid method of running the Profile Management Tool?
Which of the following options is NOT a valid method of running the Profile Management Tool?
How is the response file specified in a silent installation scenario?
How is the response file specified in a silent installation scenario?
Which one of the following is true when the new security domain is enabled to secure Application1?
Global security is turned on for a federated cell using a file-based federated repository. The
administrator created a new security domain called App1Domain using local operating system
registry and mapping it to the application server. The administrator also created a new local
operating system user ID App1Admin. Which one of the following is true when the new security
domain is enabled to secure Application1?
How are Java EE 5 security permissions assigned to actual users in WebSphere Application Server?
How are Java EE 5 security permissions assigned to actual users in WebSphere Application
Server?