Lotus Notes / Domino Sonstiges > Aus- und Weiterbildung
IBM.340 Long post
Marinero Atlántico:
Objectives:
Section 1 - Architecture (10%)
1. Discuss the relationships between IBM WebSphere Application Server, v5.0 and the application components (browser, HTTP server, plug-in, firewall, database servers, MQSeries, etc.)
2. Evaluate the design considerations of IBM WebSphere Application Server, v5.0 installations in an enterprise application environment (LDAP, database servers, JMS, etc.)
3. Integrate the WebSphere architecture with the local topology (effects of adding nodes to cells (e.g. application and configuration synchronization issues) )
4. Describe workload management strategies
----------------------------------------------------------------------------------------------------
7. Which of the following are TRUE statements with respect to LDAP and the IBM HTTP Server?
A. LDAP is an information directory where users and groups can be defined only once and shared across multiple machines and applications.
B. LDAP is an Internet protocol for exchanging basic management information.
C. The IBM HTTP Server "LDAP Plug-in" allows authentication and delegation to be performed by the directory.
D. LDAP is a proprietary protocol that IBM uses to communicate between the IBM HTTP Server and the Web container
(select 1)
-------------------------------------------------------------------------
B. (http://www.gracion.com/server/whatldap.html)
falsch:
A: LDAP selbst ist ein Protokoll.
C: bin ziemlich sicher das das nonsens ist.
D: sicher falsch, weil LDAP nicht proprietär ist.
------------------
11When SSL ID tracking is used as the session affinity mechanism, the lifetime of an SSL session ID is controlled by configuration options in ___________ .
A. Edge Server
B. Web server
C. Application Server
D. Enterprise application
(select 1)
-----------------------------------------------
18Which of the following statements are FALSE with respect to an SSL connection?
A. SSL can be used between an "Applet Container" and the embedded HTTP server.
B. SSL can be used between an "Applet Container" and an "EJB Container".
C. SSL can be used between an "Applet Container" and a "Web Container".
D. SSL can be used between an "Applet Container" and a "Web server".
E. SSL can be used between an "Applet Container" and a "Client Container".
(select 2)
------------------------------------------------
20. What is the first IBM WebSphere Application Server, V5.0 component that receives a servlet request from a browser?
A. Web server
B. Web server plug-in
C. Application server
D. Servlet redirector
(select 1)
--------------------------------------------------
(select 1)
B. Web Server Plug-in Bestandteil des Webservers entscheidet, ob request durch Webserver (statischer Inhalt) oder durch Application Server (dynamischer Inhalt) verarbeitet wird (SysManConfig, S. 69f).
Der Webserver ist keine WAS Komponente. Das Webserver plugin schon. Das entsprichende config File wird in WAS generiert und in den Webserver kopiert.
Ansonsten kann auch A richtig sein. C auch eventuell.
Dies ist eine typische IBM Sch...-Frage
------------------------------------------------
33. Which of the following statements best describe the characteristics of the Web server plug-in?
A. It provides communication between the Web server and the Application Server.
B. It is configured while installing the Web server.
C. It handles workload management between multiple application servers.
D. It communicates via the HTTP protocol.
E. It communicates via the OSE protocol.
(select 3)
-------------------------------------------------
(SysManConfig, S. 69f)
A ja.
B nicht, weil es in einen installierten Webserver kopiert wird und bei der WAS Installation konfiguriert wird.
C. Ja.
D. ja.
E. glaub ziemlich sicher, OSE ist deprecated. Frühere Versionen von WAS
--------------------------------------------------
42. In a multi-node configuration where each node has an application server, which of the following protocols is used for direct communication between the two application servers?
A. HTTP
B. IIOP
C. OSE
D. LDAP
(select 1)
--------------------------------------------------
B. bin ich mir ziemlich sicher. Zumindest kann man damit auch in einen Cluster einen Server genau adressieren.
----------------------------------------------------
45. Which of the following are TRUE with respect to distributed administration?
A. A managed process is an individual server process, like a JMS Server.
B. A node consists of a set of 'managed processes' managed via a cell agent.
C. A managed process on machine "Y" can communicate directly with a managed process on machine "X".
D. Only one active Network Deployment may be installed in the environment.
E. The Deployment Manager AdminService passes object requests directly to a node agent.
(select 2)
A, C
B-- gibt keinen Cell agent
D -- geht wohl. etwa für eine parallele Testinstallation
E -- Kommunikation node agent -- Admin Service läuft immer pull vom node agent aus
Marinero Atlántico:
1. Determine the prerequisite hardware/software
2. Identify installation options and determine the desired configuration (silent install, type of web server, required/desired plug-ins)
3. Install WebSphere Application Server
4. Install Network Deployment
5. Verify the installation (ivt, verification using sample (snoop and/or hitcount))
6. Troubleshoot the installation (e.g. identify and analyze log files)
------------------------------------------------------------------------------------------------------
6. Once IBM WebSphere Application Server, V5.0 is installed, what additional task needs to be completed so that the Application Server can be started?
A. Edit the plug-in file
B. Install an administrative database
C. Reboot the machine
D. No action is required
(select 1)
--------------------------------------
32. Which IBM WebSphere Application Server, V5.0 servlet is useful for validating system configuration?
A. Snoop
B. ShowCfg
C. HitCount
D. BeenThere
(select 1)
------------------------------------------------------
47. Which utility gathers information about the Application Server installation and packages it in an output JAR file?
A. Collector tool
B. Thread Analyzer
C. Log Analyzer
D. FFDC
(select 1)
------------------------------------------------
48. An administrator installed an Enterprise Application into WebSphere Application Server, V5.0 and upon invoking it for the first time noticed that a required EJB JAR file was missing. Which tool can be used?
A. ejbdeploy
B. EARExpander
C. earconvert
D. Application Assembly Tool
(select 1)
----------------------------------
ziemlich sicher B.
-------------------------------------------------------
50. In which of the following scenarios can the administrator choose NOT to install the Java 1.3.1 SDK from the IBM WebSphere Application Server, V5.0 installation program?
A. When using a "Silent Installation" on a Windows system
B. When using a "Custom Installation", and selecting "Other JDK" on a UNIX system
C. When using a "Typical Installation"
D. When migrating from a previous version
(select 1)
Marinero Atlántico:
(21%) 10.71
1. Bind JNDI names
2. Use Administrative interfaces for systems management (Administrative browser, wsadmin)
3. Use application assembly tool for admin-related tasks
4. Perform application maintenance (e.g., adding artifacts to an existing application (hot deployment), making changes to an existing application (dynamic reload))
5. Define and map security roles (J2EE security)
6. Define data sources
7. Configure J2C resource adapters and connection factories
8. Configure JMS server or service
9. Maintain plug-in configuration files
---------------------------------------------------------------------------------------------------
3. An application is ready to be deployed. The team developing the application has worked within corporate guidelines and reused common functionality that other development teams have used before. Upon review, it appears that the development team used the same version of several JAR files that are currently being used by other production teams. Which of the following actions should be taken or suggested?
A. Repackage the EAR using the AAT tool, excluding the duplicated JAR files. Ensure that the duplicated .jar files are in an appropriately defined shared library and deploy the application
B. Combine the EAR with all other EAR files, thus combining all applications into one, so no JAR files are duplicated.
C. Use the AAT tool to combine all the duplicate JAR files into a master shared EAR, then deploy the application, and have set all of the applications using the duplicated JAR files to reference the master shared .ear from the IBM WebSphere Administrative Console.
D. Shared JAR files are not supported
(select 1)
------
A. ziemlich sicher. Es gibt shared libraries. Master EAR klingt sinnlos.
----------------------------------------------------
4. Defining the "Scope" of resources such as JDBC Providers, Namespace bindings, or shared libraries can be defined for which levels?
A. Module
B. Application
C. Node
D. Cell
E. Server
(select 3)
------------------
C, D, E
Ressourcen sind Server und nicht Anwendungsbezogen (A, B wäre anwendungsbezogen)
-----------------------------------------------
12A database administrator needs the DDL to create tables for an application that was recently deployed. What does the IBM WebSphere Application Server, V5.0 administrator need to do to export the DDL for the database administrator to use?
A. Environment -> DDL Generator -> <select application checkbox>, Export DDL
B. Enterprise Applications -> <select application checkbox>, Export DDL
C. Enterprise Applications -> <application_name> -> Export DDL
D. Environment -> DDL Generator -> <application_name> -> Export DDL
(select 1)
------------------------------------
14. What are CMP Connection Factories used for?
A. Allows CMP beans to interact with Web services and EJBs
B. Allows CMP beans to interact with other EJBs
C. Allows CMP beans to access the HTTP stream
D. Allows CMP beans to access a backend data store
(select 1)
---------------------------------------
17. When making changes to an application server datasource configuration in the administrative console, when do changes become effective?
A. Immediately upon clicking apply
B. When the application server configuration is saved
C. When the application server is restarted
D. As soon as the form is submitte
(select 1)
---------------------------------------------------------
19. What options are available when binding EJB and resource references to the IBM WebSphere Application Server, V5.0 name space?
A. Simple name
B. Node defined name
C. Corbaname
D. Compound / fully qualified name
E. Generated base name
(select 2)
--------------------------------------------------------------
21. The WSAdmin tool provides access to all the functionality found in the administrative console via four management objects. What are they?
A. AdminApp, AdminConfig, AdminControl, and AdminSecure
B. AdminConfig, AdminControl, AdminSecure, and Help
C. AdminApp, AdminControl, AdminServer, and Help
D. AdminConfig, AdminControl, AdminApp, and Help
E. AdminControl, AdminConfig, AdminServer, and Help
(select 1)
-----------------------------------------------
22. Which of the following statements is TRUE with respect to the Application Assembly Tool (AAT)?
A. The AAT can be started from the Administrative Console.
B. Scripts to run the AAT are located in the directory where IBM WebSphere Application Server V5.0 is installed, under the "bin" directory.
C. The administrative server needs to be running to launch or use the AAT.
D. The AAT can be used to install an application onto the IBM WebSphere Application Server, V5.0.
(select 1)
---------------------------------------------
23. A datasource needs to be configured for all application servers on a single machine. What is the best way to handle creating this datasource so the datasource is always available to all application servers no matter how many application servers are added to the current machine?
A. Create a datasource at the Server level
B. Create a datasource at the Node level
C. Create a datasource at the Cell levelv
D. Send the application back to the developers and have them create their own datasource within the application
(select 1)
-----------------------------------------------------
25. Which one of the following files contains security role mapping information?
A. application.xml
B. ibm-application-bnd.xmi
C. ibm-application-ext.xmi
D. ibm-mapping-bnd.xmi
(select 1)
------------------------------------------
26. A new Enterprise Application is installed in IBM WebSphere Application Server, V5.0. What script will identify the new application to the Web server?
A. assembly
B. clientConfig
C. GenPluginCfg
D. EARExpander
(select 1)
----------------------------
C. Ziemlich sicher
Help center:Regenerating Web server plug-in configurations
“Why and when to perform this task
At times, you might need to instruct the WebSphere Web server plug-in to regenerate its configuration. You should regenerate the plug-in configuration after, for example, installing or removing an enterprise application, adding or removing servlets and mappings from a particular application, or changing the configuration for the plug-in, a virtual host or a transport. Failure to regenerate the plug-in after introducing a new application likely results in a 404 File Not Found error when a user tries to access the new Web application.”
------------------------------------------
35. Which of the following are valid ways to invoke the name space dump utility?
A. Execute the "JNDIDumpNameSpace" command from the command prompt
B. Invoke the com.ibm.websphere.naming.JNIDDumpNameSpace utility from a Java program
C. Execute the "dumpNameSpace" command from the command prompt
D. Invoke the com.ibm.websphere.naming.DumpNameSpace utility from a Java program
E. The JNDIDumpNameSpace command can only be executed from the command line
(select 2)
------------------------------------------
39. An administrator needs to add several .class files and .jsp files to an existing .ear file. The .ear file is really large and crashes the application assembly tool (AAT) every time the administrator tries to open it. What should be done?
A. Install WebSphere and the AAT tool on a machine with more memory and open the .ear on it
B. Ship the .ear, class, and .jsp files off to the development team that developed the .ear file originally
C. Increase the AAT maximum heap size
D. Force the garbage collector to run more frequently
(select 1)
.........................#
C sehr wahrscheinlich
------------------------------------------
40. Which of the following administrative roles allow a user to change the run time state by using either the administrative console or the system management scripting interface.
A. Administrator
B. Configurator
C. Operator
D. Monitor
E. Admin
(select 2)
----------
A, C.
A darf alles, B nur Änderung der persistenten Konfiguration, C. nur Änderung der runtime Konfiguration, D. Nur lesen, E. Nonsense
---------------------------------
46.When configuring WebSphere to use a JMS Provider, which of the following must be configured?
A. The scope
B. A Generic JMS Provider
C. A WebSphere JMS Provider
D. A Resource Environment Provider
(select 1)
Marinero Atlántico:
Section 4 - Security (14%)
1. Implement security policies (authentication, authorization, etc.)
2. Protect WebSphere resources
3. Define and implement WebSphere administrative security
4. Configure web server and WebSphere to use SSL
5. Configure Java2 Security
6. Configure WebSphere to use different security registries (LDAP, localOS, custom registry)
----------------------------------------------------------------------------
1. Which one of the following is NOT a supported type of authentication according to the IBM WebSphere Application Server, V5.0 authentication model?
A. Basic
B. Client-certificate
C. Digest
D. Form-based
(select 1)
-----------------------------------
C Digest nicht, Sec. 64 f.
---------------------------------
16A permission violation occurs for a client application within IBM WebSphere Application Server, V5.0. Java 2 security has been enabled, and the JVM com.ibm.websphere.java2secman.norethrow property is set and has a value of true. The Security Manager component will ________ .
A. throw an AccessControl exception and log the exception
B. log the exception to the WebSphere SystemOut.log
C. throw a PermissionViolation exception and log the exception
D. log the exception to both the activity and native log files
(select 1)
------------------------------------
36. Secure Sockets Layer (SSL) provides connection security through ______ .
A. encryption
B. Lightweight Third-Party Authentication (LTPA)
C. communication integrity
D. digital certificate authentication
E. Lightweight Directory Access Protocol (LDAP)
(select 3)
------------------
a,c,d
-----------------------------------------------
37. With regard to security, which of the following protocols should be used to transport requests from the Web server plug-in to the Application Server?
A. OSE
B. HTTP
C. HTTPS
D. IIOP
(select 1)
---------------------------------------------
41. A constraint consists of which of the following?
A. Web resource collection
B. Authorization constraint
C. User data constraint
D. Web resource constraint
E. Administrative constraint
(select 3)
---------------------------------------
49. A user navigates a Web site that uses SSL (Secure Sockets Layer) for some but not all of its pages. If the user’s HTTP session is required to be accessed from both secured and non-secured pages, which of the following Session Manager options must be enabled?
A. Enable SSL ID Tracking
B. Enable Cookies
C. Enable URL Rewriting
D. Enable Protocol Switch Rewriting
(select 1)
Marinero Atlántico:
1. Create clusters and cluster members
2. Evaluate session state failover options (in memory, database persistence, messaging, partitioning)
3. Describe WebSphere ip spraying environment
----------------------------------------------------------------------------------------------------
28. Which of the following components are NOT used for Workload management?
A. Load balancer
B. Web server plug-in
C. Node Agent
D. ORB WLM plug-in
(select 1)
-------------------------
38. What are the advantages of using memory replication method instead of database persistence as a session persistence mechanism?
A. Lower network traffic
B. Eliminates the single point of failure
C. Failover from server crash
D. Better performance
E. High scalability
(select 2)
--------------------------
43. A systems expert has been asked to design an IBM WebSphere Application Server, V5.0 architecture that provides workload management (WLM) support. Which of the following provides for WLM?
A. Load Balancer.
B. Web server plug-in
C. Caching proxy
D. WebSEAL
E. PMI Interface
(select 2)
--------------------------
51. When creating cluster members on machines with different WebSphere installation directories or operating systems, the directory structures of which of the following cluster member properties must be changed to match the directory structure of the product installation root directory on the machine where the cluster member is running?
A. The Standard Output field of clustered application servers
B. The Standard Input field of clustered servlet engines
C. The Standard Output field of clustered servlet engines
D. The JAR File field of clustered enterprise beans
E. The Working Directory field of clustered Web applications
(select 2)
Navigation
[0] Themen-Index
[#] Nächste Seite
[*] Vorherige Sete
Zur normalen Ansicht wechseln