山东大学IBMWebsphere复习题
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1 What is the main difference between the Express and base WebSphere Application Server editions? B、D
A.The Express edition license only covers one CPU
B.The Express edition license only covers two CPUs
C.The license for the base edition covers limited CPUs
D.The license fot the base edition covers unlimited CPUs
2 Which WebSphere Application Server edition do you need if you want to deploy a single application with low transaction volume? E
A.The Community edition
B.The Express edition
C.The Base edition
D.The ND edition
E.All above
3 You cannot use the assembly tools within Rational Application Deveolper with the trial license. False
4 Which of the following provides an environment for running servlets? B
A.Client nodule
B.Web container
C.EJB module
D.Webserver Server
5 Which type of JDBC driver is considered a “thick”driver? A
A.Type 2
B.Type 3
C.Type 4
D.Type 5
6 Which of the following are components contained within the application Server’s JVM? C
A.HTTP Server plug-in
B.DB2 database
C.Embedded HTTP Server
D.WebServer
7 During What process does the node agent check for changes to the master configuration? D
A.File Transfer
B.Deploy Manager
C.Node agent
D.File synchronization
8 What defines the runtime environment for either the deployment manager or the application server? A
A.Profiles
B.Deploy Manager
C.Node agent
D.WebSphere Application Server
9 What are the types of profiles that can be configured for the applicaton Server? C
A.deployment manager profile
B.custom profile
C.application server profile
D.eoll profile
E.All above
10 What is IVT? D
A.IVT is a deploy tool
B.IVT is an installation view tool
C.IVT is an assembly tool
D.IVT is an installation verification tool
11 The AdminApp application can be configured using the administrative console
False
12 The J2EE platform role of application assembler is assigned to a person who does what? C
A.Installs and runs EJBs and Web applications
B.Configures and administers the infrastructure
C.Configures components into a complete application
D.Manage the WAS Console
13 Which of the following are possible Components of Web modules? A
A.ServLets,JSP pages,HTML files
B.Session beans,entity beans
C.Serviets,Jar files,RAR files
D.Serviets,JSP pages,Session beans
14 The result of packaging an enterprise application is D
A.An EAP file
B.An WAR file
C.An JAR file
D.An EAR file
E.An ZIP file
F.An RAR file
15 Enhanced enterprise applications are the recommended way to deploy application in a production environment
False
16 You can not update a single module or part of an anpplication in the console
False
17 The default startup behavior for an application is to automatically start when the server starts True
18 What is the default directory for the installed EAR files? C
A.<was_root>\<profile>\installableApps
B. <was_root>\<profile>\installedApps
C. <profile_root>\<profile>\installedApps
D. <profile_root>\<profile>\installableApps
19 What are the two approaches for problem determination? A、D
A.Analysis
B.View logs
C.RAD
D.Isolation
20 What are the three levels of diagnostic trace detail? C、D、E
A.basic
B.advanced
C.Fine
D.Finer
E.Finest
F.Log analyzer
21 What are some JVM-related problems that a server can experience? B、C、E
A.WAS console can not start
B.Hung threds
C.OutOfMemory conditions
D.HTTP server can not start
E.Connect leaks
22 What is the default protocol type for wsadmin A
A.SOPA
B.HTTP
C.RMI
D.None
23 All application servers have a corresponding node agent
False
24 A WebSphere cluster member is what type of process? A
A.An application server
B. A Web server
C.Anedge server
D. A proxy server
25 The creation of a cluster can be based on which of the following? D
A.An application
B.An application manager
C.An enterprise application
D.An application server
26 What can be added as a member of an SIBus? A、D
A.Application servers
B.Clones
C.Dep;oyment Manager
D.Clusters
27 An application server always has not at least one message engine running
True
28 What must you configure in order to connect an SIBus to a WebSphere MQ network C
A.WebSphere MQ
B.WebSphere MQ queues
C.An MQ link
D.SiBus
29 Which of type of security restricts access to the operation system? C
A.Administrative security
B.Application security
C.Java 2 Security
D.File system security
30 Which type of security restricts access to console A
A.administrative security
B.Application security
C.Java 2 security
D.File system security
31 What are the two performance data collection technologies in WebSphere B、D
A.The Tivoli Performance Viewer allows you to monitor overall system health
B.Request metrics provide the data collection mechanisms in WebSphere
C.Rhe Tivoll Performance Viewer Advisor tool
D.The per formance Monitoring Infrastructure(PMI)
32 The performance Monitoring Infrastructure is not enabled by default
False
33 A system administrator notices that web requests are failing on a particular application server which has already started. Which log file(s) should be reviewed for application server errors? A
A.SystemErr.log,SystemOut.log
B.StartServer.log,stopServer.log,SystemErr.log,SystemOUt.log
C.SystemOyt.log,trace.log
D.SystemErr.log,log.txt
34 Which of the following descriptioNs BEST defines the role of Collectors? B
A.Provides step-by –step guidance to perform various problem determination tasks
B.Facilitate Gathering the log files and other artifacts needed oft analysis of a problem,and
sending them to IBM Support
C.Captures and analyzes statistical performance data form a running WebSphere Application
Server system
D.Checks for errors in a WebSphere Application Server configuratuion
E.Analyzes and correlates logs form multiple serversProblem
35 A system administrator is creating a new cluster. The servers in the application s.Which of the following ways is MOST efficient to create and configure the cluster members? A
A.Create and properly configure a server then add this server as the first member of the
cluster
B.Create and properly configure a standalone server then add this server as the last member of
the cluster.
C.Create the cluster and add all the cluster member,then make configuration changes at the
cluster scope
D.Create the cluster and add all the cluster members,then set the configuration in any of the
clustered servers.
36 A system administrator wans to ensure that nodes with differen hardware resourecs participate in a cluster as efficiently as possible,which of the following should be used to BEST meet this goal C
A.A load balancer to evenly distribute requests to cluster
B.A fine grain application update with capabilities to tune cluster member applications to the
hardware
C.Weighted definitions for cluster members.
D.Identical application components for all cluster members.
37 A system administrator is comparing two plugin-cfg.xml files.He notices that the main difference between the two file is ans shown below.
File #1 : plugin-cfg.xml
<ServerCluster Name=”abcCluster”>
<Server ColoneID=”abcdefgh” LoadBalanceWeight=”2” Name=”ServerA”>
File #2 : plugin-cfg.xml
<ServerCluster Nam=”abcCluster”>
<Server LoadBalanceWeight=”2” Name=”ServerA”>
What would be the expected behaviorial defferences between the above two versions of the WebSphere plugin configturation file in terms of honoring HTTP session affinity A
A.File #1 supports HTTP Session affinity
B.File #1 and File #2 both support session affinity
C.File #2 supports HTTP session affinity
D.File #1 and File #2 do not support HTTP session affinity
38 Which of the following components are supported by Express/Base WebSphere Application Server V7 through the WebSphere administrative console D、E
A.Application server clustering
B.External webserver
C.External generic server
D.WebSphere MQ messaging provider
E.Generic JMS provider
39 Which of the following are services implemented by the WeBVSphere Application Server? D
A.Session management,Naming,Messaging engine,and the user registry
B.Security,Messaging engine,Naming,HTTP Plug-in
C.The user registry,Transaction service,Naming,and HTTPplug-in
D.Security,Naming,messaging engine,and Dynamic Cache
40 Using the Profile Creation tool,a system administrator created and federated a custom profile to the deployment.Next,using the administrator console the system administrator created a new application server on the newly federated node. What is the BEST way for the system administrator to start the new application server and verify that it is functioning correctly? C
A.Start the application server from the command line and connect to the snoop serviet
B.Run the installation Verfication Test utillty to start the new application server and check the
IVT output window fot the server status.
C.Start the application server through the Deployment Managers administrative console and
check the application server’ status.
D.Star the node agent and check for the “Ready fot e-business” message it the SystemOut.log
file of the node agent.
41 Deployment package. IN addition, the system administrator cannot see andy log files under the temp direcory. What is the Most probable cause? C
A.The JDK is not installed yet
B.There is not enough Disk Space.
C.There is not enough CPU power
D.The installation Database Repository (IDR) is not
42 Which of the following is the correct way to delete aprofile in WebSphere Application Server V7? C
e the “Profile creation wizard”
e the administrative console and select “Remove Profile”
e wasprofile command line utility
D.Delete the profile directory after using wsadmin to delete the profile from the repository
43 A system administrator wants to build a cell starting with only an application server profile. Which of the following is an INVALID set of actions. D
A.Install the product on each machine if this is a multiple machine install
B.Create an application server profile on an application server machine and start that
application server.
C.Add the node defined by the application server profile to the cell,which will delete the cell
and federate the node to the deployment manager cell
D.Monitor the node agent and application server which will start automatically during the
federation process
44 When working with a cluster ,a system adminstrator needs to stop and restart all servers in the cluster, but ensure that applications running in the cluster remain available at all times. Using the administrative console, which action(s) will Most efficiently accomplish this task D
A.From the Application Servers page,select each server,click Stio,then select the server again
and click Start.
B.Form the Application Server page,select all servers in the cluster,click Stop,then select all the
servers again and click Start
C.From the Clusters page,select the cluster,click Stop,then select cluster again and click Start.
D.From the Clusters page,select the cluster and click
45 A system administrator is receiving an error while trying to connerc to the administrative console of application server profile using a Web browser.What is the MOST probable cause of this error? B
A.The adminconsole application was stopped previously form the administrative console
B.The Application Server is not started.
C.The WebSphere configuration database is not running
D. The adminconsole application was uninstalled from the administrative console.S
46 When using the installation wizard to install the Websphere Application Server V7 Network Deployment,the product binaries are copied to the installation directory.Which of the following will also occur as a result of the installation? D
A.A profile for deployment manager will be created by default
B.A profile for application server will be created by default
C.A custom profile will be created by default
D.The installer is given the option to create a profile using the Create profile wizard
47. A system administrator is concerned about disk usage. Although the system administrator
wants to be sure the IBM Service Logs (named activity log by default) does not grow too large, the system administrator also wants to ensure that important messages are not lost.
Which of the following strategies would control the size of the logs and yield the maximum
amount of log information?(Select 1) D
A. Using the administrative console, set the IBM Service Log Maximum File Size to 3MB
B. In the Log Analyzer, setting IBM Service Log Maximum File Size to 3MB
C. Using wasadmin set Maximum Number of Historical Log File to 2 with a File Size of 2 MB
D. Using the administrative console, set the Maximum Number of Historical Files to 3 and
the Maximum File Size to 2MB
48. In order to safely and completely backup a Application Server’s configuration, which of the
following commands would be MOST appropriate?(Select 1) A
A. backupConfig
B. backupConfig-safeMode
C. backupConfig-stop
D. backupConfig-nostop
49. Which the following changes to an application server’s configuration will cause the HTTP
plugin configuration file to be regenerated?(Select 1) C
A. The Web container’s classloader policy has been modified
B. The web server’s log file name has been changed
C. A new application has been installed on the server
D. The server’s PMI monitoring level has been modified
50. While updating an enterprise application on a production cluster running across multiple
machines, a system administrator must ensure that the application remains available at all times to the users. After updating the application components, what step(s) can be used to accomplished this requirement? (Select 1) D
A. One the best page of the Enterprise Application->Update wizard, click Rollout Update
B. Select System Administration->Nodes, select node names and click Full Resynchronize
C. Select Enterprise Application->[application name]->Stop and then Enterprise
Application->[application name]->Start
D. Select Server->Cluster->[Clustername]->RippleStart
51. A proposed WebSphere cell contains about 25 nodes. The environment will be horizontally
and vertically scaled and can potentially grow over time. What strategy for HTTP Session persistence would BEST for the situation? (Select 1) A
A. Database session persistence
B. Memory-to-Memory replication in a peer-to-peer topology
C. Local sessions
D. Peer-to-Peer session persistence
52. According to the so-called Upstream Queuing model for performance tuning, which of the
following would reflect the correct application of recommended settings for maximum concurrent clients?(Select 1) A
A. Web server = 75, Web container = 50, Datasource = 25
B. Web server = 50, Web container = 50, Datasource = 50
C. Web server = 25, Web container = 50, Datasource = 75
D. Web server = 75, Datasource = 50, Web container = 25
53. Which of the following events will cause the HTTP plug-in configuration file to be
regenerated?(Select 1) C
A. Whenever an application server is restarted
B. Whenever the configuration of the Web server is modified
C. When a new virtual host is created or an existing virtual host is modified
D. When a new datasource is created or an existing datasource is modified
54. A system administrator is managing a WebSphere Application Server and wants to ensure that
JVM SystemOut.log does not take up too much disk space. Which of the following approaches would assure the least amount of disk space is used?(Select 1) D
A. Using the Log Analyzer, set the Maximum File Size to 3 MB
B. Using the LogRotation tool, set the Log File Count to 2 and the File Size to 2MB
C. Using wasadmin, set the Maximum Number of Historical Log Files to 3 with a File Size of 1
MB
D. Using the administrative console, set the Log File Rotation, Maximum File Size to 5MB
55. While setting up global security in WebSphere Application Server, system administrators need
to be assigned various console accesses roles. In order to configure SSL(Secure Socket Layer) through the administrative console, what is the minimum administrative role required?(Select 1) C
A. Operator
B. Monitor
C. Configurator
D. Administrator
56. The log files naming exceptions after a system administrator has just created a new
datasource. What tool would the system administrator use to verify that the datasource is correctly registered in the JNDI namespace?(Select 1) B
A. dumpJNDINameSpace
B. dumpNameSpace
C. dumpJNDICache
D. showNameSpace
57. Given the following JSESSIONID=0000A2ABM4ljozU_VMSIffsMNfdR:v54d0o0, what cluster
member(clone ID) would this HTTP request be routed to, if any?(Select 1) C
A. 000A2
B. 0000A2AB
C. v544d0o0
D. Route cannot be determined from the above information
58. A customer must enable High Availability and failover for a cluster of external HTTP servers.
Which of the following actions should the system administrator recommend to accomplish the task?(Select 1) A
A. Use the load balancing component of the WebSphere Edge Components
B. Configure a proxy server such as Tivoli Access Manager
C. Enable server affinity for each HTTP server in the cluster
D. Implement the caching proxy server component of the WebSphere Edge Components
59. Which of the following install programs from IBM WebSphere Application Server v7.0, would
allow a user to resolve port conflicts for co-existence installation, when it detects a previous version of IBM WebSphere Application Server already installed? A B
A. LaunchPad
B. silent installation
C. launchClient
D. wsinstance
E. firststeps
60. Which of the following does NOT appear in IBM WebSphere Application Server V7.0 log
files?(Select 1) B
A. timestamp
B. password
C. thread id
D. message type
E. component
61. What components are the WebSphere files split into?(Select 2) A C
A. Product files
B. Node files
C. Profiles
D. Cell files
E. Ordinary files
62. What types are the WebSphere Profiles split into?(Select 1) D
A. Application Server
B. Deployment Manager
C. Custom
D. All above
63. During creating an application server profile by Profile Creation Wizard, the user will be
prompted to enter____.(Select 1) A
A. node name, host name
B. domain name, cell name, IP address
C. node name, IP address, network administrator password
D. node name, host name, cell name
64. Where is default location of System Application installation for WAS V7?(Select 1) C
A. <Profile_root>\<Profile_name>\installedApps
B. <Profile_root>\<Profile_name>\installableApps
C. <was_root>\systemApps
D. <was_root>\installedApps
E. <was_root>\installableApps
65. Which of the following statements are correct for WAS v7?(Select 1) C
A. Server Integration Bus(SIB) provides only the synchronous messaging service
B. Server Integration Bus(SIB) provides only the asynchronous messaging service
C. Server Integration Bus(SIB) provides only the synchronous and asynchronous messaging
service
D. Server Integration Bus(SIB) does not provide the synchronous messaging service。