A system administrator needs to submit a wsadmin job to change the configuration of an enterprise application within a flexible management environment. What should the administrator do? Connect to:
A. Node Agent
B. Administrative Agent
C. Job Manager
D. Work Manager
E. Deployment Manager
A system administrator configures the intelligent runtime provisioning feature included with WebSphere Application Server Network Deployment V8.0. The default WebSphere settings are in place. At what level will the administrator enable runtime provisioning?
A. node agent
B. web container
C. application server
D. deployment manager
A system administrator has made changes at the cell scope in the Integrated Solutions Console (ISC) of the deployment manager and needs to trace the propagation of the configuration change. Where should the administrator expect these changes to be persisted?
A. master repository, node repository
B. master repository, node agent, node repository
C. deployment manager, node agent, server repository
D. deployment manager, node agent, configuration database
A system administrator notices that a new cluster member is running but not receiving HTTP requests.
Which script from the command line should the administrator execute for the new cluster member to receive HTTP requests?
A. pmt
B. startManager
C. GenPluginCfg
D. wsadmin -f startApplicationOnCluster
A system administrator needs to modify the context root of a web application. The Web Context root can be changed using the IBM Assembly and Deploy Tools (IADT) by editing:
A. web.xml file
B. Web project settings
C. web deployment descriptor
D. Enterprise Application project settings
A system administrator needs to create a resource that can be used exclusively by applications running on a specific node.
What configuration setting can be used to limit the visibility of this resource to users on that node?
A. scope
B. JNDI name
C. node group
D. authorization group
A system administrator has enabled the HPEL mode on an application server, but has disabled the HPEL text log to improve performance.
How can the administrator view only the messages that were streamed to System.out and System.err by a single server thread?
A. Use a text editor to open a log file in the server's logdata directory, and search for the thread ID.
B. Use the Log Analyzer to import the SystemOut.log file for the server and search on the thread ID.
C. Use the Integration Solutions Console (ISC) Log Viewer to select a thread and then click the "Show Only Selected Threads" button.
D. Use the Integration Solutions Console (ISC) Log Viewer's filtering section to search for the string "Thread ID*" in the message content field.
A system administrator needs to modify the Java 2 security permissions for applications running on a server. How should the administrator perform this task?
A. Use the PolicyTool.
B. Use the iKeyman tool.
C. Edit the was.policy file.
D. Edit the security.xml file.
The lead administrator needs to limit access to the Integrated Solutions Console (ISC) by a group of administrators who only need to: ?view the configuration of the WebSphere Application Server. ?monitor its status. ?stop and start the server.
To what administrative role should the lead administrator assign this group?
A. Auditor
B. Monitor
C. Operator
D. Configurator
A system administrator needs to enable security auditing.
What additional configuration steps are required before auditing becomes effective?
A. Configure the types of events that are recorded.
B. Configure the types of events that are recorded, and configure failure notifications.
C. Create a set of users or groups mapped to the Admin Security Manager role.
D. Create a set of users or groups mapped to the Auditor role, and define the notification mechanism.