Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM 000-340 Exam -

Free 000-340 Sample Questions:

1.When installing IBM WebSphere Application Server, V5.0 and the Web server plug­in on a machine that has an existing Web server, the administrator will need to ________ .
A.start the IBM WebSphere Application Server, V5.0 during the install. The application server configuration file will be updated as a part of the installation
B.stop the IBM WebSphere Application Server, V5.0 during the install. The application server configuration file will be updated as a part of the installation
C.start the database. The database server configuration file will be updated as a part of the installation
D.stop the Web server during the install. The Web server configuration file will be updated as a part of the installation
Answer: D

2.Immediately after installation, to test the correct independent operation of the Web server, open a browser to the following URL: _________ .
Answer: A

3.What is the environment variable that points to the location where the JDK is installed?
Answer: C

4.Which of the following OS tasks must be performed when preparing to install IBM WebSphere Application Server, V5.0?
A.Check memory (at least the minimum required for the OS)
B.Check ODBC driver levels
C.Alias the network interface card
D.Install a management tool such as Tivoli GEM
E.Check disk space (at least the minimum required for the OS)
F.Check network connectivity
Answer: A, E, F

5.What are the options for specifying the trace output format?
A.Log Analyzer
Answer: A, B, C

6.Which of the following provides important information regarding configuration problems?
C.Log Files
D.Administrative console messages
Answer: D
7.Which of the following is NOT an IBM WebSphere Application Server, V5.0 custom installation feature option?
C.Log Analyzer
D.Web Services Gateway
Answer: D

8.During installation of the IBM WebSphere Application Server, V5.0 Network Deployment Manager, the user will be prompted to enter .
A.clone name, node name, fully qualified host name
B.domain name, cell name, IP address
C.node name, IP address, network administrator password
D.node name, host name, cell name
Answer: D

9.Given a DMZ scenario with the application server behind the second firewall, which IBM WebSphere Application Server, V5.0 component would MOST effectively reside on the machine in the DMZ?
A.Web server
B.Web server plug­in
C.Web Services engine
D.Administrative subsystem
Answer: B

10.WebSphere application servers interact with each other via which security protocols, assuming
Global Security is enabled?
Answer: A, C, D

11.Which of the following statements are TRUE with respect to administrative security?
A.The administrative roles are defined to permit WebSphere Application Server administrative functions only from the Web­based administrative console.
B.WebSphere Application Server administrative security is automatically enforced when global security is enabled.
C.WebSphere Application Server had to extend the J2EE security role based access control to include administrative roles.
D.Because the administrative security configuration is at node level, it is not necessary to restart all of the servers.
Answer: B, C

12.The J2EE Specification defines four authentication methods for Web components. Which of the following methods are supported by IBM WebSphere Application Server, V5.0?
A.HTTP Basic Authentication
B.HTTP Client Certificate Authentication
C.HTTPS Client Certificate Authentication
D.Form Based Authentication
E.HTTP Digest Authentication
Answer: A, C, D

13.Java 2 Security guards access to which of the following system resources?
B.file I/O
E.EJB methods
Answer: B, D

14.In which circumstances might the LDAP server port have to be specified rather than accept the default port?
A.If the IBM WebSphere Application Server, V5.0 will inter­operate with a previous (e.g. Version 4.x)
version IBM WebSphere Application Server, V5.0
B.When it is required for the "secure port" and the "LDAP port" to be shared between two or more IBM WebSphere Application Servers
C.When multiple IBM WebSphere Application Servers are installed and configured to run in the same "Single Sign On" (SSO) domain
D.When the "Bootstrap port" has been reset to the LDAP default port
E.When the port has been pre empted by IIOP
Answer: A, C, D

15.The security services for the IBM WebSphere Application Server, V5.0 are controlled by which of the following services?
A.Application Server
B.Administrative subsystem
C.Web server plug­in
D.Edge Server
Answer: B

16.To provide JNDI Naming Service, the CosNaming Service utilizes which of the following ports?
Answer: B

17.Which of the following does NOT appear in the IBM WebSphere Application Server, V5.0 log file?
B.job number or process id
C.thread id
D.message type
Answer: B

18.Which of the following statements regarding traces are TRUE?
A.Traces may impact performance severely.
B.Traces provide detailed solutions to common problems.
C.Traces must be configured from the Administrator's console.
D.Traces need manual activation.
E.Traces show the time and sequence of methods called by WAS base classes.
Answer: A, D, E

19.An IBM WebSphere Application Server, V5.0 log file contains a message type of "E". What does the "E" signify?
D.Entry to a method
Answer: B

20.Which of the following statements regarding IBM WebSphere Application Server, V5.0 Log
Analyzer is TRUE?
A.It is capable of downloading the latest symptom XML file from the IBM support site.
B.It supports functions for ORB trace formatting and message IDs.
C.It creates an activity.log file that can be viewed with any text editor.
D.It can be used to view remote log files.
Answer: A

21.Which of the following prerequisites must be met before the JNDI dumpNameSpace utility can be used?
A.The AdminServer containing the application that the administrator will be performing the JNDI dump against, must be active.
B.The application server that an administrator will be performing the JNDI dump against, must be active.
C.The Administrative Console must be used to perform the dumpNameSpace.
D.The PATH environment variable must be set to include the /bin/dumpNameSpace.bat command before invoking.
Answer: B

22.Which of the following are values that can be filtered using the Runtime Events Console messaging facility?
D.Message Originator
Answer: A, C, D

23.Which output filename conforms to the format created by the Collector Tool?
Answer: A

24.Which of the following is a typical reason for implementing vertical scaling?
A.To distribute resources over multiple nodes for failover
B.To fully utilize all of available resources of a node
C.To improve the performance of individual application servers
D.To eliminate a single point of failure
Answer: B

25.Which of the following phrases best describe the concept of a cluster and cluster members as
it is used in the IBM WebSphere Application Server Administrative Domain?
A.A set of servers that are managed together
B.A set of servers that participate in workload management
C.A set of servers that have identical configuration data
D.A blueprint for designing Enterprise Applications
E.A single object for administering all clones
Answer: A, B, E

26.Which of the following reasons for using persistent session management is FALSE?
A.For keeping the user's state information permanently for consistent interaction
B.For recovering the user's session data by another cluster member after a cluster member in a cluster failed or is shut down
C.When the user's session data is too valuable to lose through unexpected failure at the WebSphere node
D.For controlling the number of sessions allowed in memory at any given time by sending cache overflow to a persistent session store
Answer: A

27.Where is the default location of Web server plug­in configuration file?
Answer: B

28.At which level can session management NOT be configured?
A.Application server
C.Web container
D.Web module
Answer: C

29.What is required to share data source connection pooling?
A.Each getConnection request has the same connection properties
B.Each ConnectionSpec used to get the connection must be the same
C.The components sharing the data source must be on the same application server
D.The components sharing the data source must be in the same cell
E.Each ConnectionSpec must have the same user id and password
F.The components sharing the data source must be on the same node
Answer: A, B

30.A Web site, that does not make use of certificates, must store information within a given user's session. What could an administrator do to make sure that session tracking can still take place, even if the user has disabled cookies? In the Administrative Console, make sure that:
A."Enable SSL ID Tracking" is enabled
B."Enable Cookies" is disabled
C."Enable URL Rewriting" is enabled
D."Enable Protocol Switch Rewriting" is enabled
Answer: C

© 2014, All Rights Reserved