Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

C9510-401 D Application Server Network Deployment V8.5.5 and Liberty Profile System Administration Questions and Answers

Questions 4

An organization updated their LDAP directories and modified user roles. The roles that were configured to have access to a highly secured enterprise application were deleted and new roles with new names were created. The application then had security related exceptions.

How can a system administrator resolve the exceptions and restore security for the application?

Options:

A.

Modify the mapping of security roles of the application to the new LDAP roles.

B.

Modify the application and remove all security constraints and redeploy the application.

C.

Modify the application to have a runAs role for each new LDAP role and redeploy the application.

D.

Create an administrative authorization group with administrator privileges scoped for the application with an administrative group role for the new LDAP roles.

Buy Now
Questions 5

A system administrator is required to monitor the application server logs for heap memory issues and determine if the heap memory usage is reaching close to 70% of the maximum heap. The application server is configured with an initial heap of 256 MB and a max heap of 1 GB.

How should the administrator determine if the application server is utilizing 70% of the max allocated heap memory?

Options:

A.

Check the System logs for OutOfMemoryErrors.

Trigger a heap dump from the Integrated Solutions Console (ISC).

Analyze the heap dump.

B.

Configure WebSphere Application Server to enable verbose garbage collection.

Analyze the garbage collection cycles in the native logs.

C.

Configure Initial heap to be equal to the max heap.

Trigger a heap dump from the Integrated Solutions Console (ISC).

Analyze the heap dump.

D.

Configure WebSphere Application Server to increase max heap.

Trigger a heap dump from the Integrated Solutions Console (ISC).

Analyze the heap dump.

Buy Now
Questions 6

A system administrator is tasked with monitoring the overall health of the WebSphere environment to be able to tune the environment properly. Specifically, the administrator was asked to:

    Monitor how much time is spent in the various parts of the environment.

    Determine the concurrent usage of the site.

    Identify potential memory leaks.

Which PMI modules can the administrator examine to obtain this data?

Options:

A.

Number of requests, Java virtual memory, Average response time

B.

Number of requests, Average response time, Web server thread pools

C.

Average response time, Java virtual memory, Number of Live HTTP Sessions

D.

Average response time, Web server thread pools, Number of Live HTTP Sessions

Buy Now
Questions 7

An EJB application posts a request message into a JMS destination and waits for a response message on a different JMS destination. To correlate the response message to the request message, the application uses the JMS correlationId of the message. The application waits up to five seconds for a response before timing out the request.

A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the request message, process it and post a response message.

The destinations are defined in a Service Integration Bus (SIB) within the cell.

Intermittent timeout exceptions have occurred for the requester application. How can a system administrator correlate and analyze the debug information from both requester and consumer applications?

Options:

A.

Enable High Performance Extensible Logging (HPEL).

Use HPEL logViewer command to see debug information.

B.

Enable a diagnostic trace in both requester and consumer servers.

Use the Integrated Solutions Console (ISC) to set the admin=all trace.

Analyze the trace.

C.

Enable High Performance Extensible Logging (HPEL).

Enable Cross Component Trace (XCT) to include request IDs in log and trace records.

Use HPEL logViewer command with appropriate filters to see debug information.

D.

Using the Integrated Solutions Console (ISC), browse the request message that has timed out and look for any key application data.

Search for exceptions using the key application data in both requester and consumer in native_stderr.log and native_stdout.log .

Buy Now
Questions 8

An application contains a web services client and the application is deployed and running. A system administrator has to add a response timeout to the deployed web services client, so the call fails in a timely fashion.

Which artifact should the administrator use?

Options:

A.

web.xml

B.

was-webservices-sca.xml

C.

ibm-webservices-bnd.xml

D.

ibm-webservicesclient-bnd.xml

Buy Now
Questions 9

Within a WebSphere Application Server Network Deployment cell, a system administrator needs to write a script to determine if a particular server is stopped. It is important that the wsadmin script explicitly return a status of stopped as opposed to just failing.

What wsadmin object should the administrator use to write this script?

Options:

A.

AdminApp

B.

AdminTask

C.

AdminConfig

D.

AdminControl

Buy Now
Questions 10

A system administrator wants to learn some of the Jython scripting commands for the administration of the environment.

Which product feature should the administrator use?

Options:

A.

The wsadmin.properties file to load a profile.

B.

The AdminTask object to generate wsadmin scripts.

C.

The guided activities panel from the Integrated Solutions Console (ISC).

D.

The “Log command assistance commands” option in the Integrated Solutions Console (ISC).

Buy Now
Questions 11

A system administrator discovers an issue that requires a change to a federated server. In this cell, WebSphere administrative security is enabled, but application security is not enabled.

How should the administrator make this change?

The administrator should use:

Options:

A.

a web browser to connect to the node agent https port.

B.

a web browser to connect to the deployment manager admin_host port.

C.

the job manager to submit a job to update the unmanaged server.

D.

an ssh connection to the node and modify the client_types.xml file.

Buy Now
Questions 12

A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changed so users only have to log in once, while keeping the above mentioned timeouts the same. The authentication mechanism available is Kerberos.

How should the administrator do this?

Options:

A.

Configure the SIP digest authentication.

B.

Configure the SPNEGO Web or SPNEGO TAI.

C.

Enable Session Management Security Integration.

D.

Ensure Web Inbound security attribute propagation is enabled.

Buy Now
Questions 13

There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configurator role access to a developer for a single application deployed in that cluster.

How should the administrator meet this requirement and restrict Configurator role access for a single application?

Options:

A.

Create a J2C authentication alias for that developer.

B.

Create an Administrative user role and provide Configurator access to the developer.

C.

Create an Administrative group role and provide Configurator access to the developer.

D.

Create an administrative authorization group, scope it only for that application and create an Administrative user or group role to give Configurator access to the developer.

Buy Now
Questions 14

The administrator needs to identify any security role references and security constraints in a web application.

How can the administrator identify these roles and constraints?

Options:

A.

ibm-application-ext.xml file using a text editor.

B.

ibmconfig folder in the application after using the EARExpander command.

C.

Web deployment descriptor using IBM Assembly and Deploy Tools.

D.

Security role to user/group mapping by using the Integrated Solutions Console (ISC).

Buy Now
Questions 15

A customer has enabled LTPA as their authentication mechanism and has web resources that are not secured by proper security constraints. A system administrator is required to ensure that all web resources are secured.

How should the administrator accomplish this?

Options:

A.

Enable “Authenticate when any URI is accessed”.

B.

Enable “Authenticate only when the URI is protected”.

Disable “Use available authentication data when an unprotected URI is accessed”.

C.

Enable “Authenticate only when the URI is protected”.

Enable “Use available authentication data when an unprotected URI is accessed”.

D.

Map the application security roles to the configured user registry’s groups.

Buy Now
Questions 16

A system administrator needs to install WebSphere Application Server Network Deployment V8.5.5 multiple times and would like to automate the task of installing the product. The administrator wants to create a response file based on an initial installation and use this for future installations.

How can the administrator accomplish this task?

Options:

A.

Use the IBM Packaging Utility.

B.

Use the Installation Manager console mode.

C.

Complete a silent installation with the –log option.

D.

Start the Installation Manager GUI with the –record option.

Buy Now
Questions 17

Which of the following comprises an initial Liberty profile server process?

Options:

A.

A single JVM, the Liberty kernel, and feature manager.

B.

A single JVM, and OSGI framework and an object request broker.

C.

an OSGI framework, a web container and an EJB container.

D.

AN administrative agent, the Liberty kernel and shared libraries.

Buy Now
Questions 18

How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the server’s file system?

Options:

A.

Configure the CSIv2 outbound communications under RMI/IIOP security.

B.

Configure the file-based repository and create the fileRegistry.xml file.

C.

Enable Java 2 security and configure the app.policy and was.policy files.

D.

Use the AdminTask deleteAuthorizationGroup to remove application access.

Buy Now
Questions 19

A JAX-WS EJB stateless session bean web service needs to be accessed by consumers outside the corporate domain.

Which configuration will help a system administrator meet the requirement?

Options:

A.

Open firewall ports for both bootstrap and orb listener ports within the cell.

B.

Configure plug-in in the DMZ to send request to the cluster members.

C.

Configure on demand router (ODR) in the DMZ to send requests to the cluster members.

D.

Configure HTTP tunneling to send the client-side Object Request Broker (ORB) request to the server-side ORB.

Buy Now
Questions 20

An application deployed to a multi-node cluster is reported to have slowness and hung threads. A system administrator is asked to review the logs on each node and identify if the hung threads are a false alarm.

How can the administrator determine that the hung threads are a false alarm?

Analyze the:

Options:

A.

ffdc logs

B.

SystemErr.log

C.

SystemOut.log

D.

native_stderr.log

Buy Now
Questions 21

A system administrator runs a Jython script that creates and configures several servers and realize that the script fails before completing. Although many tasks succeeded, they are rolled back when the script fails.

Before running the script again, what can the administrator add to the script after each task so the completed tasks are committed even if other tasks fail?

Options:

A.

AdminApp.update()

B.

AdminConfig.save()

C.

AdminControl.invoke(server, ‘sync’)

D.

AdminTask.backupJobManager(‘server’)

Buy Now
Exam Code: C9510-401
Exam Name: D Application Server Network Deployment V8.5.5 and Liberty Profile System Administration
Last Update: Apr 30, 2026
Questions: 73

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now C9510-401 testing engine

PDF (Q&A)

$43.57  $124.49
buy now C9510-401 pdf