Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM 000-252 Exam - Cheat-Test.com

Free 000-252 Sample Questions:

1. A proposed WebSphere cell contains about 25 nodes. The environment will be horizontally and vertically scaled and can potentially grow over time. What strategy for HTTP Session persistence would work BEST for this situation?
A. Database session persistence
B. Memory-to-Memory replication in a peer-to-peer topology
C. Local sessions
D. Peer-to-Peer session persistence
Answer: A

2. When using the addNode command to federate a node to a cell, it may be necessary to know the Deployment Manager's SOAP connection port. What is the BEST way to locate this port?
A. Navigate to the profiles directory of the WebSphere Application Server installation root directory, and issuing the wsadmin $AdminConfig getPort command.
B. Navigate to the bin directory of the node to be federated and issuing the following command ivt.bat server1 <node>.
C. Examine the serverindex.xml file corresponding to the Deployment Manager's node.
D. Examine the responsefile.pct file in the WebSphere Application Server installation root directory.
Answer: C

3. A system administrator is configuring application servers for using the Data Replication Service in a WebSphere Application Server V6 cluster environment. Which of the following replication modes are available?
A. Client Only, Server Only, Both Client and Server
B. Cluster Only, Both Client and Cluster
C. Cluster Only, Both Cluster and Server
D. Cluster Only, Node Only, Both Cluster and Node
Answer: A

4. A customer has an application running on WebSphere Application Server. When a user logs on, the application retrieves the relevant Product code information from the database and stores it in a HashMap. A reference to the HashMap is then stored in the HTTP Session object. Which of the following should be recommended as a means for improving HTTP Session persistence performance?
A. Use memory-to-memory replication
B. Use peer-to-peer topology
C. Use database persistence
D. Declare the reference to the HashMap as transient
Answer: D

5. A system administrator wants to ensure that nodes with different hardware resources participate in a cluster as efficiently as possible. Which of the following should be used to BEST meet this goal?
A. A load balancer to evenly distribute requests to cluster members
B. A fine grain application update with capabilities to tune cluster member applications to the hardware
C. Weighted definitions for cluster members
D. Identical application components for all cluster members
Answer: C

6. A system administrator wants to share system information like Workload Management among core groups. Which of the following statements is valid in this context?
A. Core groups in same or different cells use the service integration bus to share Workload Management information.
B. Core groups can overlap by including common servers and the common servers are used to share Workload Management information.
C. Core groups in different cells can only use the core group bridge service to share Workload Management information.
D. Core groups use the core group bridge service to share Workload Management information.
Answer: D

7. A system administrator is creating a new cluster. The servers in the cluster will need several configuration steps to support the applications. Which of the following ways is MOST efficient to create and configure the cluster members?
A. Create and properly configure a server then add this server as the first member of the cluster.
B. Create and properly configure a standalone server then add this server as the last member of the cluster.
C. Create the cluster and add all the cluster members, then make configuration changes at the cluster scope.
D. Create the cluster and add all the cluster members, then set the configuration in any of the clustered servers.
Answer: A

8. There are multiple property files which control the behavior of the FFDC filter. All of the following are FFDC property files EXCEPT:
A. ffdcStart.properties - used while the server is starting
B. ffdcRun.properties - used after the server is ready
C. ffdcException.properties - used whenever an exception occurs
D. ffdcStop.properties - used while the server is in the process of stopping
Answer: C

9. A system administrator is asked how best to suppress System.out or System.err messages from the customer's application. Which of the following actions should the system administrator recommend to the customer?
A. Convert their logging to use Log4J.
B. Use the Common Base Event API and the Java Logging API.
C. Use JRas to log messages.
D. Click Troubleshooting > Logs and Trace >server name > JVM Logs and change the Installed Application Output parameter from the Admin Console.
Answer: D

10. A system administrator is asked to diagnose a problem on a remote node using the Log Analyzer. In order to accomplish this task, what is the name of the Log Analyzer source log file that the system administrator will have to access?
A. service.log
B. activity.log
C. loganalyzer.log
D. trace.log
Answer: B

11. The log files reveal naming exceptions after a system administrator has just created a new datasource. What tool would the system administrator use to verify that the datasource is correctly registered in the JNDI namespace?
A. dumpJNDINameSpace
B. dumpNameSpace
C. dumpJNDICache
D. showNameSpace
Answer: B

12. A system administrator has been requested to package an enterprise application so that all of its required resource definitions are contained in the Enterprise Archive (EAR) File. How can this task be accomplished by using the Application Server Toolkit (AST)?
A. While running in AST, configure the application resources using the administrative console, then export an Enhanced EAR file.
B. While using AST, import the EAR file into the workspace on the Resources perspective, import a previously configured resource.xml file and export an Enhanced EAR file.
C. While using AST, open the application's deployment descriptor editor. Switch to the Deployment page, define the needed resources and export the nhanced EAR file.
D. Using AST, open each module of the application and define the required resources. Include the configured modules in an enterprise application project and export an Enhanced EAR file.
Answer: C

13. In WebSphere Application Server V6, a logging infrastructure that extends Java Logging is used. Which of the following contains the BEST subset of logging levels that a system administrator can use to log only errors?
A. Severe, fatal
B. All, finest, finer, fine, severe, fatal
C. All, debug, entryExit, info, warning, fatal
D. All, debug, entryExit, info, warning, error, fatal
Answer: A

14. Where in the administrative console can the log detail levels be changed?
A. Troubleshooting -> Logs and Trace
B. System administration -> Console settings -> Preferences
C. Environment -> WebSphere Variables
D. System administration -> Console settings -> Logging
Answer: A

15. A system administrator notices that an application server (with servlets and EJBs) is receiving IIOP requests, but not any HTTP requests. Which of the following log file(s) should be checked?
A. SystemOut.log and SystemErr.log
B. startServer.log
C. activity.log
D. HTTP_plugin.log and native_stdout.log
Answer: D

16. While testing the HTTP Session affinity behavior of a WebSphere cluster, the system administrator noticed that there were two versions of the plugin-cfg.xml file used: Version#1: plugin-cfg.xml <ServerCluster Name="abcCluster"> <Server CloneID="abcdefgh" LoadBalanceWeight="2" Name="ServerA"> Version
#2: plugin-cfg.xml <ServerCluster Name="abcCluster"> <Server LoadBalanceWeight="2" Name="ServerA"> What would be the expected behavioral differences between the two versions of the WebSphere plugin configuration file in terms of honoring HTTP session affinity?
A. Version #1 supports HTTP Session affinity
B. Version #1 and Version #2 both support session affinity
C. Version #2 supports HTTP session affinity
D. Version #1 and Version #2 do not support HTTP session affinity
Answer: A

17. On receipt of a JMS message on a queue (Q), a message-driven bean (MDB) processes the message by invoking a stateless session bean that does a data base update. Both enterprise beans execute within the same transaction context. The queue type destination in the underlying Service Integration Bus corresponding to Q is defined with the "Maximum failed deliveries" attribute set to 0, and the "Exception destination" specified as
'None'. What happens when the processing of a particular message results in a transaction rollback?
A. The application server hosting the MDB is shutdown.
B. The JMS runtime stops the delivery of the message to the application.
C. The JMS runtime keeps delivering the message to the application.
D. The message gets stranded on the queue (Q).
Answer: C

18. A system administrator is deploying an application to a 2-node cluster. One of the nodes is a powerful AIX-based machine and the other is a smaller Windows-based machine with less processing capability. How would the cluster BEST be configured to ensure more work gets routed to the more powerful server?
A. Use the Random algorithm and assign a smaller weight to the Windows box.
B. Use the First-Come-First-Served algorithm.
C. Use the Round Robin and assign a larger weight to the AIX machine.
D. Use the Least Recently Used algorithm with weights.
Answer: C

19. A system administrator is creating a wsadmin script. Within the script, it is necessary to list the running applications on a server. Which of the following wsadmin scripting objects should be used?
A. AdminMBeans
B. AdminConfig
C. AdminOperations
D. AdminControl
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved