Free C9510-418 Exam Braindumps (page: 7)

Page 6 of 33

A system administrator has just enabled HPEL in the environment. How can the administrator examine the logged data?

  1. Use the ViewLog command.
  2. Use the administrative console.
  3. Use a text editor to open the systemOut.log file.
  4. Use the IBM Support Assistant to analyze the text log.

Answer(s): B

Explanation:

High Performance Extensible Logging (HPEL) is a log and trace facility that is provided as a part of WebSphere® Application Server. HPEL provides a log data repository, a trace data repository, and a text log file.

The HPEL LogViewer is an easy-to-use, command-line tool provided for HPEL users to work with the log data and trace data repositories.
Use the following command to view the full contents of your log and trace repositories: [Windows] (Windows) logViewer.bat
[AIX HP-UX Solaris] (Unix- full profile) logViewer.sh [AIX HP-UX Solaris] (Unix- Liberty profile) logViewer


Reference:

https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/rtrb_logviewer.html



How can an administrator configure Web services security?

  1. Customize WS-Security policy set and bindings and attach to Web services.
  2. Configure global security with LDAP authentication and map the configuration to Web services.
  3. Request application developer to use Web Services Security API to achieve Web services security.
  4. Enable the Web Services Metadata Exchange (WS-MetadataExchange) protocol to enable message-level security.

Answer(s): C

Explanation:

The Web Services Security specification provides a flexible framework for building secure web services to implement message content integrity and confidentiality. The Web Services Security service programming model supports this flexible framework by providing extension points to integrate new token formats, and methods to obtains keys needed for message protection. The application server programming model provides

Web Services Security programming application programming interfaces (WSS API) for securing SOAP messages.

Note: WS-Security is a message-level standard that is based on securing SOAP messages through XML digital signature, confidentiality through XML encryption, and credential propagation through security tokens. The Web services security specification defines the facilities for protecting the integrity and confidentiality of a message and provides mechanisms for associating security-related claims with the message.


Reference:

https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/container_wssec_top.html



When installing a new application to IBM WebSphere Application Server, which location is valid for the application file?

  1. Client Machine
  2. Managed Node
  3. Unmanaged Node
  4. Remote Web Server

Answer(s): B

Explanation:

Configuration file location during application installation
Several things occur upon installation of an application onto WebSphere Application Server: The application binaries and deployment descriptors are stored within the master repository.
-The application binaries and deployment descriptors are published to each node that will host the application. These files are stored in the local copy of the repository on each node.
-Each node then installs the applications that are ready for execution by exploding the EARs under profile_root/installedApps/cell_name/, as follows:
-profile_root/installedApps/cell_name/
-This directory contains a subdirectory for each application deployed to the local node.
-profile_root/installedApps/cell_name/app_name.ear/
Each application-specific directory contains the contents of the original EAR used to install the application.

Note: A node is a logical grouping of managed servers. Nodes can be managed or unmanaged. An unmanaged node does not have a node agent or administrative agent to manage its servers, whereas a managed node does. Both application servers and supported web servers can be on unmanaged or managed nodes.


Reference:

WebSphere Application Server V8.5, July 2013, page 17



An administrator is using the Guided Troubleshooter in the IBM Support Assistant to troubleshoot IBM WebSphere Application Server issues. After going through data collection and analysis, no reliable solution is found.

What is the administrator’s best next step?

  1. Call in a new PMR with IBM and upload Troubleshooter data to ECuREP.
  2. Open a new PMR with IBM and upload SystemOut.log from the IBM WebSphere Application Server.
  3. Submit results to the IBM WebSphere Application Server forum for a quick response from other forum users.
  4. Use the Guided Troubleshooter to open a service request with IBM, so all the troubleshooting data analyzed so far is uploaded automatically.

Answer(s): D






Post your Comments and Discuss IBM C9510-418 exam with other Community members:

C9510-418 Discussions & Posts