PrepAway - Latest Free Exam Questions & Answers

Category: C2180-401

Exam C2180-401: IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile, System Administration

How should the system administrator tune the data source properties to improve the application response time?

A performance test team was testing the capacity of concurrent users of a web application
deployed on a multi-processor server. While testing 250 concurrent users, the administrator
discovers connections to the database are failing.
In response, a system administrator increased the connection pool to the maximum limit which the
database allows and increased the prepared statement cache size. The test passed, but the
application response time was slower.
How should the system administrator tune the data source properties to improve the application
response time?

How can a system administrator resolve the exceptions and restore security for the application?

An organization updated their LDAP directories and modified user roles. The roles that were
configured to have access to a highly secured enterprise application were deleted and new roles

with new names were created. The application then had security related exceptions.
How can a system administrator resolve the exceptions and restore security for the application?

How should the administrator meet this requirement and restrict Configurator role access for a single applicat

There are many applications deployed in a large WebSphere Application Server cluster. A system
administrator is required to give Configurator role access to a developer for a single application
deployed in that cluster.
How should the administrator meet this requirement and restrict Configurator role access for a
single application?

How should the administrator do this?

A web application has a configured session timeout of eight hours and a default LTPA token
timeout of two hours. After every two hours, the users have to log in again from their HTTP
browser. The system administrator is required to make configuration changes so users only have
to log in once, while keeping the above mentioned timeouts the same. The authentication
mechanism available is Kerberos.
How should the administrator do this?


Page 3 of 712345...Last »