Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Sun 310-540 Exam - Cheat-Test.com

Free 310-540 Sample Questions:

1. What is the primary feature of an iAS cluster?
A. failover
B. replication
C. RAID array
D. disk mirroring
E. load balancing
Answer: A

2. In which two ways does sticky load balancing improve performance? (Choose two.)
A. reduces DSync overhead
B. simplifies thread management
C. reduces the size of the queue
D. increases cache hits for JSP caching
E. allows more processes to run simultaneously
Answer: AD

3. Which is a characteristic of a well-tuned iAS system?
A. Under load, memory utilization is stable.
B. The ratio of kjs processors to kxs processors is 2 to 1.
C. The ratio of kxs processors to kjs processors is 2 to 1.
D. kjs processes are using about 80% of their processors and kxs processes are using 100% of their processors.
E. kxs processes are using about 80% of their processors and kjs processes are using 100% of their processors.
Answer: A

4. Which two port numbers must be assigned when creating a new cxs process? (Choose two.)
A. the port number for client communication
B. the port number for cgi client communication
C. the port number for kcs to kjs communication
D. the port number for cxs to kjs communication
E. the port number for kas to kxs communication
Answer: AD

5. Which command launches the iAS Registry Editor from a terminal window?
A. kregedit
B. regstart
C. register
D. ksvradmin
E. startconsole
Answer: A

6. After an application (a.ear containing b.war and c.jar) is deployed to iAS, the WAR and JAR files are extracted from the EAR file. Assuming iAS is installed in the iASInstall directory, which directory holds the extracted WAR components?
A. iASInstall/ias/EAR
B. iASInstall/ias/JAR
C. iASInstall/ias/WAR/a
D. iASInstall/ias/APPS/b
E. iASInstall/ias/APPS/a/b
Answer: E

7. Which two features are available in Forte for Java Enterprise Edition that are not available in other Forte for Java versions? (Choose two.)
A. create HTML
B. create JavaBeans
C. create servlets and JSPs
D. create and deploy EAR files
Answer: CD

8. What are two primary purposes of J2EE? (Choose two.)
A. to provide servlet, JSP and EJB support to Rich Client applications
B. to assure developers and enterprises that APIs work in a uniform way
C. to provide JSP and EJB the services available to small-scale or standalone applications
D. to provide a GUI interface from which you can easily assemble and deploy enterprise applications
E. to simplify the development of enterprise-class applications through a component-based application model
Answer: BE

9. Which J2EE architectural element(s) provide(s) an execution environment, life-cycle management, security, deployment, and runtime services to components?
A. J2EE IDEs
B. J2EE tiers
C. J2EE containers
D. J2EE platform roles
E. J2EE application packaging
Answer: C

10. Which Java technology allows J2EE components to access transactions in an implementation independent manner?
A. Java Transaction API (JTA)
B. Java Message Service (JMS)
C. Java Transaction Service (JTS)
D. Remote Method Invocation (RMI)
E. Java Naming and Directory Interface (JNDI)
Answer: A

11. Which two roles for the J2EE platform involve vendors who provide tools or containers? (Choose two.)
A. deployer
B. tool provider
C. application assembler
D. J2EE product provider
E. container administrator
F. application component provider
Answer: BD

12. A ping response sent from the KXS process uses which source port by default?
A. 80
B. 443
C. 9610
D. 10817
E. 10818
F. any ephemeral port
Answer: F

13. You are configuring weighted round robin load balancing with the following server weights:
• iAS1 weight value is 150
• iAS2 weight value is 300
• iAS3 weight value is 450
• iAS4 weight value is 150
How many requests will iAS1 receive in relation to iAS2?
A. iAS1 receives 1 request for every 1 request received by iAS2.
B. iAS1 receives 1 request for every 2 requests received by iAS2.
C. iAS1 receives 15 requests for every 30 requests received by iAS2.
D. iAS1 receives 150 requests for every 300 requests received by iAS2.
Answer: D

14. You are assigned the task of changing the default application URL from NASApp to one that corresponds to your company's naming convention. What must be done to make this modification?
A. use iASDT to register the new name as a datasource
B. use iASAT to modify the database to reflect the new name
C. use kregedit to change two registry keys from NASApp to the new name
D. use the Administration Server for iWS to modify the shell script from NASApp to the new name
E. use the iPlanet Console to change the occurrences of NASApp in local.conf to the new name
Answer: C

15. Which tool(s) do you use to change the IP address used by iAS?
A. iASAT
B. iASDT
C. kregedit
D. iPlanet Console
E. db2ldif and ldif2db
Answer: C

16. Which value should be assigned to the EnableEncryption entry in the registry to enable 128-bit encryption between the kxs and the iAS web connector plugin?
A. D
B. 0
C. ON
D. 128-bit
Answer: A

17. You just updated the IP address for the iPlanet Application Server using the Registry Editor. How do you implement this change?
A. restart iAS
B. restart iAS and iWS
C. reboot the operating system
D. restart iAS, iWS, and RDBMS
Answer: B

18. Which scenario meets the definition of an iAS cluster?
A. at least two iAS machines load balancing requests from a single web server
B. at least three iAS machines, separated by a firewall, that are configured to share and synchronize state and session data
C. at least two iAS machines, residing in the same LAN, that are configured to share and synchronize state and session data
D. at least three iAS machines, residing in the same LAN, that are configured to share and synchronize state and session data
Answer: C

19. What can be determined from the following excerpt from ias-web.xml? (Choose two.)
<session-info>
<impl>lite</impl>
<dsync-type> </dsync-type>
<timeout-type>last-access</timeout-type>
<secure>false</secure>
<domain>iplanet.com</domain>
<path>/phoenix</path>
<scope>myscope</scope>
</session-info>
A. The session data are stored in a kxs.
B. The session data are stored in the kjs.
C. Failover is provided if the session crashes.
D. The session data are stored in the local kxs.
E. The session will run in the JVM of a single machine.
Answer: BE

20. What can be determined from the following excerpt from ias-web.xml?
<session-info>
<impl>distributed</impl>
<dsync-type>dsync-local</dsync-type>
<timeout-type>last-access</timeout-type>
<secure>false</secure>
<domain>iplanet.com</domain>
<path>/phoenix</path>
<scope>myscope</scope>
</session-info>
A. The session data are stored in the local kxs.
B. It provides poor failover if the session crashes.
C. The session data are stored in the primary kxs.
D. The session will run in the JVM of a single machine.
Answer: A

21. To how many clusters can an iAS server belong at any given time? (Type a number.)
Answer: 1

22. In a cluster of three iAS instances, how many Sync Backup instances are required?
A. one
B. two
C. zero
D. three
Answer: C

23. You need to obtain additional information from DSync using the debugging mode. What do you do to enable this?
A. modify the iAS registry to enable the debug keys
B. click the Dump Node Info button on the iASAT DSync tab
C. modify the Module logging option in the iASAT DSync tab
D. click the Dump Cluster Info button on the iASAT DSync tab
E. check the Messenger logging option in the iASAT DSync tab
Answer: A

24. You are configuring iDS failover. Which three values on the backup machine need to be the same as the master? (Choose three.)
A. bind DN
B. suffixes
C. password
D. IP address
E. encryption type
F. time-out setting
Answer: ABC

25. Which tool is used to configure the iDS supplier/consumer contract?
A. iASAT
B. iASDT
C. ksvradmin
D. iPlanet Console
Answer: D

26. Which load balancing method relies on each participating application server to calculate and broadcast its own load?
A. iAS-based
B. round robin
C. weighted round robin
D. server response time
E. component response time
Answer: A

27. Which statement is true regarding server response time load balancing?
A. It accounts for network delays and differences in the response time for individual components on the iAS machine.
B. It is the most difficult load balancing method to configure, but provides the finest possible load balancing control.
C. It requires the iAS machines to calculate their own server load and share the load statistics with other iAS machines.
D. It dynamically updates its balancing table to ensure that requests are sent to the iAS machine with the lowest average response time.
Answer: D

28. Which load balancing method utilizes hop counts to restrict the number of times a request can be declined by the application servers?
A. iAS-based
B. round robin
C. weighted round robin
D. server response time
E. component response time
Answer: A

29. Which component mode value load balances a component request to a specified set of application servers?
A. lite
B. local
C. sticky
D. distributed
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved