A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization.
How can a system administrator fix the issue ensuring only authorized access?
A. Using the Integrated Solutions Console (ISC), map all security roles to the special subject Everyone.
B. Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped to groups in the correct user registry.
C. Edit the application using an assembly tool to add a security constraint for the servlet and reinstall the application.
D. Edit the application using an assembly tool to remove the security constraint defined for the servlet and reinstall the application.
A system administrator discovers an issue that requires a change to a federated server. In this cell,
WebSphere administrative security is enabled, but application security is not enabled.
How should the administrator make this change?
The administrator should use:
A. a web browser to connect to the node agent https port.
B. a web browser to connect to the deployment manager admin_host port.
C. the job manager to submit a job to update the unmanaged server.
D. an ssh connection to the node and modify the client_types.xml file.
A system administrator is tasked with monitoring the overall health of the WebSphere environment to be able to tune the environment properly. Specifically, the administrator was asked to:
Which PMI modules can the administrator examine to obtain this data?
A. Number of requests, Java virtual memory, Average response time
B. Number of requests, Average response time, Web server thread pools
C. Average response time, Java virtual memory, Number of Live HTTP Sessions
D. Average response time, Web server thread pools, Number of Live HTTP Sessions
A system administrator is asked by a development team to monitor the performance of a newly deployed EJB application. The administrator noticed that the heap size of the application server is growing.
What should the administrator do to fix the problem using ORB settings?
A. Use J2EE managed object MBeans.
B. Enable the pass by reference option.
C. Disable the application scoped resources in the application deployment descriptor.
D. Ensure that Process embedded configurations is not selected when exporting the EAR.
A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.
What should the administrator do to implement the required security configuration?
A. Install and configure a TAI (Trust Association Interceptor)
B. Configure a security domain for the stand-alone LDAP server.
C. Use Federated repositories and configure the supported entity types.
D. Use Stand-alone custom registry and configure the flat file implementation.
A performance test team was testing the capacity of concurrent users of a web application deployed on a multi-processor server. While testing 250 concurrent users, the administrator discovers connections to the database are failing.
In response, a system administrator increased the connection pool to the maximum limit which the database allows and increased the prepared statement cache size. The test passed, but the application response time was slower.
How should the system administrator tune the data source properties to improve the application response time?
A. Change connection pools purge policy.
B. Decrease connection pool reap time.
C. Decrease number of free pool partitions.
D. Decrease the prepared statement cache size.
A system administrator has deployed web applications to a clustered environment where database session persistence is configured. The administrator needs to improve the response time and the throughput.
How can the system administrator do this?
A. Disable server affinity.
B. Configure dynamic caching.
C. Configure a load balancer to spread work between existing web servers.
D. Tune the database session persistence to optimize for failover.
A system administrator is required to monitor the application server logs for heap memory issues and determine if the heap memory usage is reaching close to 70% of the maximum heap. The application server is configured with an initial heap of 256 MB and a max heap of 1 GB.
How should the administrator determine if the application server is utilizing 70% of the max allocated heap memory?
A. Check the System logs for OutOfMemoryErrors.Trigger a heap dump from the Integrated Solutions Console (ISC).Analyze the heap dump.
B. Configure WebSphere Application Server to enable verbose garbage collection.Analyze the garbage collection cycles in the native logs.
C. Configure Initial heap to be equal to the max heap.Trigger a heap dump from the Integrated Solutions Console (ISC).Analyze the heap dump.
D. Configure WebSphere Application Server to increase max heap.Trigger a heap dump from the Integrated Solutions Console (ISC).Analyze the heap dump.
After installing an enhanced EAR in a WebSphere Application Server environment, a system administrator with Configurator privileges is able to see a JDBC provider and a data source in the Integrated Solution Console (ISC) but is not able to delete these resources.
How can the administrator resolve this issue?
A. Use the AdminTask object to delete the resources.
B. Stop all application server instances and then delete the resources.
C. Ask another administrator with iscadmin privilege to delete the resource.
D. Edit the EAR to remove the application scoped resources and reinstall the application.
A web application is hosted on an application server that receives HTTP requests from a third party application named myApp. The URIGroup mapping for this application is called default_host_myApp.
The development team asks a system administrator to configure the HTTP plug-in to prevent routing requests to any application server except server1.
The following exhibit shows the parts of the plugin-cfg.xml file that are relevant for myApp. The UriGroups for other applications are not shown in the exhibit.
What should the administrator do to the plugin-cfg.xml file to ensure that requests for default_host_myApp URIGroup are routed only to machine1?
A. Delete the Server tag for CloneId="b20000002"Delete all of the tags within the Server tag
B. Delete the UriGroup tag for default_host_myAppDelete all of the tags within the UriGroup tag
C. Delete the VirtualHostGroup tag for default_hostDelete all of the tags within the VirtualHostGroup tag
D. Edit the LoadBalanceWeight for server1 to 20Edit the LoadBalanceWeight for server2 to