Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM C2180-401 Exam - Cheat-Test.com

Free C2180-401 Sample Questions:

Q: 1
While monitoring a cluster in the cell, the administrator notices that one server in the cluster periodically loses connections to the database. When this happens, requests to the server have a significantly decreased response time and various error conditions are listed in the log files for the server. Since the error codes are returned quickly, the server starts returning responses faster than the average service times for the application. Due to this, the weight for the server is increased and a large percentage of incoming requests are being routed to the erroneous server and the server is getting overloaded with requests.
How can the administrator detect these conditions in the future and take action to prevent this problem?
A. Configure the storm drain health policy.
B. Configure the on demand router (ODR) transport chain to tune inbound connections.
C. Monitor the JVM heap usage to determine a new server weight.
D. Enable the PMI Extended statistic set and use the Connection Pool summary report.
Answer: D

Q: 2
The application placement controller has been configured with elasticity mode enabled. Intermittently, all instances of a dynamic cluster are removed. After further review, the system administrator noticed that it occurs during peak load on another dynamic cluster.
The administrator wants to keep at least one instance available. Which configuration is needed in the dynamic clusters?
A. Enable application lazy start with elasticity mode.
B. Set theproactiveldleStopcustom property to true
C. Set the Number of instances to a value greater than zero.
D. Disable the option"If other dynamic clusters need resources, stop all instances of this cluster during periods of inactivity".
Answer: D

Q: 3
An application contains a web services client and the application is deployed and running. A system administrator has to add a response timeout to the deployed web services client, so the call fails in a timely fashion.
Which artifact should the administrator use?
A. web.xml
B. was-webservices-sca.xml
C. ibm-webservices-bnd.xmi
D. ibm-webservicesclient-bnd.xmi
Answer: C

Q: 4
After installing an enhanced EAR in a WebSphere Application Server environment, a system administrator with Configurator privileges is able to see a JDBC provider and a data source in the Integrated Solution Console (ISC) but is not able to delete these resources.
How can the administrator resolve this issue?
A. Use the AdminTask object to delete the resources.
B. Stop all application server instances and then delete the resources.
C. Ask another administrator with iscadmin privilege to delete the resource.
D. Edit the EAR to remove the application scoped resources and reinstall the application.
Answer: A

Q: 5
A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.
What should the administrator do to implement the required security configuration?
A. Install and configure a TAI (Trust Association Interceptor)
B. Configure a security domain for the stand-alone LDAP server.
C. Use Federated repositories and configure the supported entity types.
D. Use Stand-alone custom registry and configure the flat file implementation.
Answer: C

Q: 6
A web application was deployed on a WebSphere Application Server cluster. While users are using the application, one of the cluster servers fails and the users lose their working data.
What can the system administrator configure to ensure users can continue to work if one of the cluster server fails?
A. An increased session timeout.
B. A cluster of external HTTP servers.
C. A load balancer to spread work between existing servers.
D. A WebSphere eXtreme Scale HTTP session management.
Answer: D

Q: 7
A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changes so users only have to log in once, while keeping the above mentioned timeouts the same. The authentication mechanism available is Kerberos.
How should the administrator do this?
A. Configure the SIP digest authentication.
B. Configure the SPNEGO Web or SPNEGO TAI.
C. Enable Session Management Security Integration.
D. Ensure Web Inbound security attribute propagation is enabled.
Answer: A

Q: 8
How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the server's file system?
A. Configure the CSIv2 outbound communications under RMI/IIOP security.
B. Configure the file-based repository and create the fileRegistry.xml file.
C. Enable Java 2 security and configure the app.policy and was .policy files.
D. Use the AdminTask deleteAuthorizationGroup to remove application access.
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved