getcertified4sure.com

C9510-401 Exam

Replace C9510-401 Q&A 2021




Testking C9510-401 Questions are updated and all C9510-401 answers are verified by experts. Once you have completely prepared with our C9510-401 exam prep kits you will be ready for the real C9510-401 exam without a problem. We have Renewal IBM C9510-401 dumps study guide. PASSED C9510-401 First attempt! Here What I Did.

NEW QUESTION 1
After installing an enhanced EAR in a WebSphere Application Server environment, a system administrator with Configurator privileges is able to see a JDBC provider and a data source in the Integrated Solution Console (ISC) but is not able to delete these resources.
How can the administrator resolve this issue?

  • A. Use the AdminTask object to delete the resources.
  • B. Stop all application server instances and then delete the resources.
  • C. Ask another administrator with iscadmin privilege to delete the resource.
  • D. Edit the EAR to remove the application scoped resources and reinstall the application.

Answer: A

Explanation:
The JDBCProviderManagement command group for the AdminTask object includes the following commands:
References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd. doc/ae/rxml_atjdbcprovider.html

NEW QUESTION 2
A system administrator wants to learn some of the Jython scripting commands for the administration of the environment.
Which product feature should the administrator use?

  • A. The wsadmin.properties file to load a profile.
  • B. The AdminTask object to generate wsadmin scripts.
  • C. The guided activities panel from the Integrated Solutions Console (ISC).
  • D. The “Log command assistance commands” option in the Integrated Solutions Console (ISC).

Answer: D

NEW QUESTION 3
A performance test team was testing the capacity of concurrent users of a web application deployed on a multi-processor server. While testing 250 concurrent users, the administrator discovers connections to the database are failing.
In response, a system administrator increased the connection pool to the maximum limit which the database allows and increased the prepared statement cache size. The test passed, but the application response time was slower.
How should the system administrator tune the data source properties to improve the application response time?

  • A. Change connection pools purge policy.
  • B. Decrease connection pool reap time.
  • C. Decrease number of free pool partitions.
  • D. Decrease the prepared statement cache size.

Answer: D

Explanation:
The higher the statement cache, the more system resources are delayed. Therefore, if you set the number too high, you might lack resources because your system cannot open multiple prepared statements.
References: http://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.d oc/ae/udat_jdbcdatasorprops.html

NEW QUESTION 4
A system administrator has to design a new production environment to host a web application. The workload of this web application is expected to increase during special marketing campaigns.
Which one of the following topologies should the administrator configure to address the requirements for this new environment?

  • A. A Liberty collective environment with autonomic managers and on demand router (ODR).
  • B. A flexible management environment supported by one admin agent running in each node of the cell.
  • C. A dynamic cluster with autonomic managers, application placement controller and intelligent routers.
  • D. A heterogeneous cell with enough server to support the peak load spread across multiple nodes on the same machine.

Answer: C

Explanation:
A dynamic cluster is a server cluster that uses weights and workload management to balance the workloads of its cluster members dynamically, based on performance information that is collected from the cluster members. Dynamic clusters enable application
server virtualization.
A dynamic cluster is an application deployment target that can expand and contract depending on the workload in your environment. Dynamic clusters work with autonomic managers, including the application placement controller and the dynamic workload manager to maximize the use of your computing resources. Dynamic clusters are required for many of the Intelligent Management autonomic functions, including high availability and service policies.
References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd. doc/ae/cwve_odrdynamiccluster.html

NEW QUESTION 5
A system administrator decides to use the advice from the Performance and Diagnostic Advisor to identify the optimum connection pool settings for data sources. In a cell, the data source db2datasource is defined under node scope and used by two servers from that node. The administrator receives two different sets of advice for db2datasource.
How should the administrator configure the data sources before reusing the Performance and Diagnostic Advisor?

  • A. Create a data source of the same name under cell scope.
  • B. Create a data source of the same name under server scope for each server.
  • C. Increase the minimum connection pool size for the data source.
  • D. Decrease the maximum connection pool size for the data source.

Answer: B

Explanation:
References: https://www.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc
/ae/cprf_rpa.html

NEW QUESTION 6
A system administrator needs to create a cell for a test environment. The administrator uses the Profile Management Tool (PMT) to create the deployment manager profile using the advanced profile creation option and creates a custom profile using the typical profile creation option. The administrator examines the log files for the custom profile creation and sees an INSTCONFFAIL message indicating the deployment manager was not running during the custom profile creation.
How should the administrator fix this?

  • A. Delete the custom profile.Start the deployment manager.Create the custom profile again.
  • B. Start the deployment manager.Use PMT to re-create the custom profile.
  • C. Use the syncNode command to synchronize the node.
  • D. Run the addNode command to federate the custom profile.

Answer: A

Explanation:
Deleting profiles. You can delete a profile using the manageprofiles command. If the command fails, you can delete the profile using operating system commands.
Before you begin: If a node within a profile is federated to a deployment manager, before you delete the profile, stop the node and remove the node from the deployment manager.
Otherwise, an orphan node remains in the deployment manager.
References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd. doc/ae/tpro_removeprofile.html

NEW QUESTION 7
A WebSphere system administrator needs to install the Installation Manager (IM) on an unmanaged node on a host named <machine2>. The deployment manager is running on a host named <machine1>.
What step must the administrator take before submitting a job from the Integrated Solutions Console (ISC) to install the IM on <machine2>?

  • A. Install a node agent on <machine2>.
  • B. Install the job manager on <machine1>.
  • C. Start the job manager on <machine1>.
  • D. Register <machine2> as a target for job manager.

Answer: D

Explanation:
Submitting jobs to install Installation Manager on remote hosts
In a flexible management environment, you can submit the Install IBM Installation Manager job to install the Installation Manager on registered hosts of the job manager.
References: https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.inst allation.zseries.doc/ae/tagt_jobmgr_install_im.html

NEW QUESTION 8
An EJB application posts a request message into a JMS destination and waits for a response message on a different JMS destination. To correlate the response message to the request message, the application uses the JMS correlationId of the message. The application waits up to five seconds for a response before timing out the request.
A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the request message, process it and post a response message.
The destinations are defined in a Service Integration Bus (SIB) within the cell.
Intermittent timeout exceptions have occurred for the requester application. How can a system administrator correlate and analyze the debug information from both requester and consumer applications?

  • A. Enable High Performance Extensible Logging (HPEL).Use HPEL logViewer command to see debug information.
  • B. Enable a diagnostic trace in both requester and consumer servers.Use the Integrated Solutions Console (ISC) to set the admin=all trace.Analyze the trace.
  • C. Enable High Performance Extensible Logging (HPEL).Enable Cross Component Trace (XCT) to include request IDs in log and trace records.Use HPEL logViewer command with appropriate filters to see debug information.
  • D. Using the Integrated Solutions Console (ISC), browse the request message that has timed out and look for any key application data.Search for exceptions using the key application data in both requester and consumer in native_stderr.log and native_stdout.log.

Answer: C

Explanation:
Cross Component Trace (XCT) annotates the logs so that log entries that are related to a request that is serviced by more than one thread, process, or even server are identified as
belonging to the same unit of work. XCT helps identify the root cause of problems across components.
References: WebSphere Application Server V8.5 Administration and Configuration Guide for the Full Profile (July 2013), page 1091

NEW QUESTION 9
A system administrator has created a Jython script that will run in WebSphere Network cell where administrative security is enabled. This script is named doUpdate.py and will be run by using the following:
wsadmin –connType RMI –f doUpdate.py
How can the administrator suppress a user/password prompt from appearing when this script is run?
Set the user and password in the:

  • A. sas.client.props file.
  • B. ssl.client.props file.
  • C. soap.client.props file.
  • D. wsadmin.properties file.

Answer: A

Explanation:
The user Id and password needed for wsadmin to connect to a secured server can be
supplied as command line options and in properties files. If used together, command line options take precedence over what is in the properties files. The properties files are located at Profile_root/properties.
If you use a Remote Method Invocation (RMI) connector or a JSR160RMI connector, set the following properties in the sas.client.props file with the appropriate values: com.ibm.CORBA.loginUserid=
com.ibm.CORBA.loginPassword=
References: https://www.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc
/ae/txml_security.html

NEW QUESTION 10
An application contains a web services client and the application is deployed and running. A system administrator has to add a response timeout to the deployed web services client, so the call fails in a timely fashion.
Which artifact should the administrator use?

  • A. web.xml
  • B. was-webservices-sca.xml
  • C. ibm-webservices-bnd.xml
  • D. ibm-webservicesclient-bnd.xml

Answer: D

Explanation:
The ibm-webservicesclient-bnd.xmi deployment descriptor file contains information for the web services run time that is WebSphere® product-specific. This deployment descriptor file is used with Java API for XML-based web services.
References: https://www.ibm.com/support/knowledgecenter/SSEQTJ_8.5.5/com.ibm.websphere.base.d oc/ae/rwbs_assembpropclient.html

NEW QUESTION 11
While monitoring a cluster in the cell, the administrator notices that one server in the cluster periodically loses connections to the database. When this happens, requests to the server have a significantly decreased response time and various error conditions are listed in the log files for the server. Since the error codes are returned quickly, the server starts returning responses faster than the average service times for the application. Due to this, the weight for the server is increased and a large percentage of incoming requests are being routed to the erroneous server and the server is getting overloaded with requests.
How can the administrator detect these conditions in the future and take action to prevent this problem?

  • A. Configure the storm drain health policy.
  • B. Configure the on demand router (ODR) transport chain to tune inbound connections.
  • C. Monitor the JVM heap usage to determine a new server weight.
  • D. Enable the PMI Extended statistic set and use the Connection Pool summary report.

Answer: A

Explanation:
Storm drain condition tracks requests that have a significantly decreased response time. This policy relies on change point detection on given time series data.
References: https://www.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc
/ae/cwve_odhealth.html

NEW QUESTION 12
A system administrator, Admin1, with Administrator privileges has archived full repository checkpoints. Another administrator, Configurator1, with Configurator privileges has copied the checkpoint contents directory from one of the archived check points to its original location. Configurator1 tries to restore the configuration using the copied archived checkpoint contents and the restore fails.
How can Configurator1 restore the configuration using the copied archived full repository checkpoint?

  • A. Copy the archived checkpoint metadata directory to its original location.
  • B. Increase the Automatic checkpoint depth to keep all the delta checkpoint.
  • C. Delete the delta checkpoint taken after the full repository checkpoint was taken.
  • D. Ask an administrator to update the privileges for Configurator1 to match Admin1.

Answer: A

Explanation:
You must archive both the checkpoint metadata and content directories to store a checkpoint for later restoration.
References: http://www- 01.ibm.com/support/knowledgecenter/SSD28V_8.5.5/com.ibm.websphere.nd.doc/ae/twve_archive_checkpoint.html

NEW QUESTION 13
A system administrator ran the backupConfig command to backup the configuration using the –nostop option. The administrator changed the properties for the service integration environment by modifying the sib.properties file. During testing the administrator noticed Service Integration Bus related errors and wanted to restore the service integration environment. The administrator used the restoreConfig command, but the tuning properties for the service integration environment were not restore.
How can the administrator prevent this issue?

  • A. Use full repository checkpoint for both the backup and the restore.
  • B. Use the restoreConfig command with –nostop for the restore.
  • C. Use the manageprofiles command for both the backup and the restore.
  • D. Use the backupConfig command without –nostop for the backup
  • E. Use the restoreConfig command without –nostop for the restore.

Answer: A

Explanation:
With the repository checkpoint and restore function, you can back up copies of files from the master configuration repository. You can use the backups to restore the configuration to a previous state if future configuration changes cause operational problems. By using this function, you can reduce recovery time for problems that are caused by configuration
changes. Studies of unplanned outages have shown that as much as 36 percent of unplanned outages are due to operator errors. A common source of operator error is a bad configuration change. The ability to quickly undo a bad configuration change is critical to minimizing the outage window.
References: https://www.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc
/ae/cwve_xdsochckpt.html

NEW QUESTION 14
A system administrator runs a Jython script that creates and configures several servers and realize that the script fails before completing. Although many tasks succeeded, they are rolled back when the script fails.
Before running the script again, what can the administrator add to the script after each task so the completed tasks are committed even if other tasks fail?

  • A. AdminApp.update()
  • B. AdminConfig.save()
  • C. AdminControl.invoke(server, ‘sync’)
  • D. AdminTask.backupJobManager(‘server’)

Answer: B

Explanation:
AdminConfig.save()to save changes after script execution.

NEW QUESTION 15
A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.
What should the administrator do to implement the required security configuration?

  • A. Install and configure a TAI (Trust Association Interceptor)
  • B. Configure a security domain for the stand-alone LDAP server.
  • C. Use Federated repositories and configure the supported entity types.
  • D. Use Stand-alone custom registry and configure the flat file implementation.

Answer: C

Explanation:
select the type of user registry that you need for your environment:
References: WebSphere Application Server V8.5 Administration and Configuration Guide for the Full Profile (July 2013), page 212

NEW QUESTION 16
While coordinating a flexible management topology, the job manager can send commands to which components?

  • A. Application server and name server.
  • B. On demand router and load balancer.
  • C. Deployment manager and admin agent.
  • D. Node agent and web administration server.

Answer: C

Explanation:
To manage multiple cells, register deployment managers with job manager directly Use administrative agent to register base server profiles with a job manager
References: http://194.196.36.29/support/docview.wss?uid=swg27017353&aid=1, page 10

NEW QUESTION 17
A system administrator has added a server cluster as a member of a service integration bus (SIB). The administrator needs to configure one messaging engine for each server in this cluster and to have a failover location for each messaging engine.
What should the administrator do to achieve the required design?

  • A. Configure a new messaging engine in each server to support failover.
  • B. Configure the data store for each messaging engine for each server in the cluster.
  • C. Select scalability with high availability as the messaging engine policy.
  • D. Create a core group policy to restrict each messaging engine to a particular server.

Answer: C

Explanation:
The scalability with high availability configuration ensures that there is a messaging engine for each server in a cluster, and that each messaging engine has a failover location.
http://www- 01.ibm.com/support/knowledgecenter/SSCKBL_8.5.5/com.ibm.websphere.nd.doc/ae/cjt10 04_.html (second paragraph)

NEW QUESTION 18
A system administrator needs to deploy a new enterprise application which requires that application security be enabled, but, the existing applications in the cell cannot be executed with application security enabled. The cell has the global security and Java 2 security disabled.
How can the administrator handle this requirement?

  • A. Enable Java 2 security for the cell.Create a security domain with application security enabled.Associate the security domain to the new application.
  • B. Enable Java 2 security for the cell.Create a security domain with application security enabled.Associate the security domain to a new cluster to be used to deploy the new application.
  • C. Enable administrative security for the cell.Create a security domain with application security enabled.Associate the security domain at the application level for the new application.
  • D. Enable administrative security for the cell.Create a security domain with application security enabled.Associate the security domain to the new cluster where the new application is deployed.

Answer: C

Explanation:
When Java 2 security is enabled for a WebSphere Application Server, all the applications that run on WebSphere Application Server undergo a security check before accessing system resources. An application might need a was.policy file if it accesses resources that require more permissions than those granted in the default app.policy file
References: https://www-01.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/tsec_ waspolicy.html

NEW QUESTION 19
In a test environment, a system administrator has configured an external HTTP server in the DMZ that is routing to a cluster of application servers. The administrator wants to achieve higher performance when routing and prioritizing incoming requests to the back- end cluster.
How can the system administrator achieve this task?

  • A. Configure a cluster of external HTTP servers.
  • B. Enable the prefer local option on the cluster members.
  • C. Set up a Caching Proxy server between the external web server and the application server.
  • D. Place an On Demand Router (ODR) between the external web server and the application servers.

Answer: D

Explanation:
References: https://www.ibm.com/developerworks/websphere/techjournal/1206_alcott/1206_alcott.html

NEW QUESTION 20
A system administrator has added a server cluster as a member of a service integration bus (SIB). The administrator needs to configure one messaging engine for each server in this cluster and to have a failover location for each messaging engine.
What should the administrator do to achieve the required design?

  • A. Configure a new messaging engine in each server to support failover.
  • B. Configure the data store for each messaging engine for each server in the cluster.
  • C. Select scalability with high availability as the messaging engine policy.
  • D. Create a core group policy to restrict each messaging engine to a particular server.

Answer: C

Explanation:
The scalability with high availability configuration ensures that there is a messaging engine for each server in a cluster, and that each messaging engine has a failover location.

NEW QUESTION 21
A system administrator needs to install WebSphere Application Server Network Deployment V8.5.5 multiple times and would like to automate the task of installing the product. The administrator wants to create a response file based on an initial installation and use this for future installations.
How can the administrator accomplish this task?

  • A. Use the IBM Packaging Utility.
  • B. Use the Installation Manager console mode.
  • C. Complete a silent installation with the –log option.
  • D. Start the Installation Manager GUI with the –record option.

Answer: D

Explanation:
Run the command to record a response file for the package installation. This command
uses the -skipInstall <agentDataLocation> argument, which records the installation commands without installing the Tivoli Monitoring packages. Substitute your own file name and location for the response file. Verify that the file paths that you enter exist. Installation Manager does not create directories for the response file:
Windows: IBMIM -record <responseFile> -skipInstall <agentDataLocation> Unix/Linux: ./IBMIM -record <responseFile> -skipInstall <agentDataLocation>
References: https://www.ibm.com/support/knowledgecenter/SS4EKN_7.2.0/com.ibm.itm.doc_6.3/install/ record_resp_file.htm

NEW QUESTION 22
......

P.S. DumpSolutions now are offering 100% pass ensure C9510-401 dumps! All C9510-401 exam questions have been updated with correct answers: https://www.dumpsolutions.com/C9510-401-dumps/ (73 New Questions)