What Do You Know About IBM Websphere Application Server? Trivia Quiz

42 Questions | Total Attempts: 1588

SettingsSettingsSettings
Please wait...
What Do You Know About IBM Websphere Application Server? Trivia Quiz

What Do You Know About IBM Websphere Application Server? This application is one that gives developers the opportunity to create other applications within an already existing application. The sever uses the java programming language. By taking this quiz you will get to not only test yourself regarding WAS but you will also get to learn more about the sever. How about you give it a shot!


Related Topics
Questions and Answers
  • 1. 
    What is the profile?
    • A. 

      Directory for deployment manager

    • B. 

      Profiles are a set of user files that represent a WAS configuration

    • C. 

      It’s a home directory for Application Server

    • D. 

      Profile and node are the same thing

  • 2. 
    What is node?
    • A. 

      Logical group of WAS instances or JVM’s

    • B. 

      Logical group of physical servers having WAS installed

    • C. 

      It’s a cell with servers

    • D. 

      It’s a deployment manager with servers.

  • 3. 
    Which of the following events will cause the HTTP plug-in configuration file to be regenerated?
    • A. 

      Whenever an application server is restarted.

    • B. 

      When a new datasource is created or an exiting datasource is modified

    • C. 

      Whenever a Web server is restarted.

    • D. 

      When a new virtual host is created or an existing virtual host is modified.

  • 4. 
    • A. 

      Through bootstrap port number

    • B. 

      Default host port on application server

    • C. 

      Through 9060 port no.

    • D. 

      Creating a virtual host on app server and accessing using the defined port

  • 5. 
    What is a managed node?
    • A. 

      It’s a deployment manager node.

    • B. 

      Node with Node Agent.

    • C. 

      It’s an application server which manages configuration

    • D. 

      A node that is part of a cell

  • 6. 
    When can you enable global security?
    • A. 

      Global security can be set up while installing the application server.

    • B. 

      After installation by making changes in deployment manager.

    • C. 

      Both the above

    • D. 

      None of the above.

  • 7. 
    To enable administrative security, its is necessary to:
    • A. 

      Enable java 2 security

    • B. 

      Creating a security repository.

    • C. 

      Both the above

    • D. 

      None of the above

  • 8. 
    You have added a new virtual host to the WAS, but still, you are not able to access the new application from a web server, what can be the issue?
    • A. 

      You did not restart the application server machine.

    • B. 

      You did not generate plug-in.

    • C. 

      You did not generate and propagate plug-in.

    • D. 

      You did not restart Web Server after propagating new plug-in.

  • 9. 
    How do you federate a node to cell?
    • A. 

      Using the add node command from dmgr machine

    • B. 

      Using the federate node command from node machine

    • C. 

      Using federate node command from dmgr machine

    • D. 

      Using the add node command from node machine

  • 10. 
    What is the default user registry, if you enable Global Security at the time of installation?
    • A. 

      LDAP Repository

    • B. 

      Local OS

    • C. 

      Custom

    • D. 

      Federated

  • 11. 
    Which log did files give runtime information on WebSphere JVM?
    • A. 

      Console.log, activity.log

    • B. 

      SystemOut.log, SystemError.log.

    • C. 

      Trace.log

    • D. 

      StartServer.log, stopServer.log, serverstatus.log

  • 12. 
    Which one of the following is true about the WebSphere Application server cluster?
    • A. 

      Two application servers in a cluster can have different applications.

    • B. 

      Two application servers in a cluster should necessarily be a part of one node group.

    • C. 

      Two application servers in a cluster can be a part of multiple node groups.

    • D. 

      A cluster can be created by using two or more existing servers in a cell.

  • 13. 
     What is master repository?
    • A. 

      It is the master server process which controls the configuration of all the nodes

    • B. 

      These are the configuration files stored on Dmgr and synced to nodes on regular intervals

    • C. 

      It’s a configuration file contained in a standalone application server

    • D. 

      None of the above

  • 14. 
     Which among the below is not a type of profile in WAS 6?
    • A. 

      Deployment manager profile

    • B. 

      Application server profile

    • C. 

      Custom profile

    • D. 

      Cell profile

  • 15. 
    What is not true about WebSphere V6 Packages?
    • A. 

      WebSphere V6 comes in three packages.

    • B. 

      Only WebSphere ND package can be used for clustering.

    • C. 

      Only WebSphere ND package comes with a WebServer and built in plug-in.

    • D. 

      WebSphere Express v6 comes with a Rational Developer suite.

  • 16. 
    How do you administer a WebServer from WebSphere Admin Console?
    • A. 

      Write a script to monitor WebServer activities on remote system.

    • B. 

      Create a WebServer Definition and add node as managed/unmanaged node

    • C. 

      Deployment manager automatically manages WebServer

    • D. 

      There is no feature like this available

  • 17. 
    What is the name of the configuration file responsible for communication between WAS and WebServer?
    • A. 

      A. Webserver.xml

    • B. 

      B. Plugin-cfg.xml

    • C. 

      C. repository.xml

    • D. 

      D. none of the above.

  • 18. 
    What is web container?
    • A. 

      A Web container, processes HTTP requests, servlets, and JSPs

    • B. 

      A Web Container, processes HTTP, Servlet, JSPs and EJB beans

    • C. 

      A web container can be used to serve standalone application clients

    • D. 

      None of the above.

  • 19. 
    Which one of the following profile related tasks can only be performed using the manage profiles command-line facility?
    • A. 

      Delete a profile

    • B. 

      Secure a profile

    • C. 

      Federate a profile

    • D. 

      Update profile templates

  • 20. 
    A WebSphere Application Server installation finishes and the primary installation log indicates an exit code of INSTCONFSUCCESS. What is the best conclusion that can be resolved from this result?
    • A. 

      The Web server installed successfully

    • B. 

      The WebSphere Application Server installed successfully

    • C. 

      The InstallShield Wizard executed successfully to launch WebSphere Application Server installation.

    • D. 

      The target operating system determined that it is compatible with WebSphere Application Server and had configured environment variables for it.

  • 21. 
    • A. 

      Use the Log Analyzer to view the servers activity.log file

    • B. 

      View the servers startServer.log and native_stdout.log files.

    • C. 

      Examine the SystemOut.log file for the current server process.

    • D. 

      Log in to the administrative console and examine the runtime messages.

  • 22. 
    A federated cell has two nodes, Node01 and NodeO2.Node01 has servers A, B, C and D. A developer has deployed two versions of the same application, one on server A and Server D and another on server B and C. The developer wants to use different databases for each version of the application. Identify which one of the following is the most direct way to achieve this
    • A. 

      Create an XML file for each database configurations and ask developer use this XML to connect to DB.

    • B. 

      This kind of configuration is not possible

    • C. 

      Create two datasources and JNDI with same name but different scope one for each application

    • D. 

      Create two datasources and JNDi names with different name and direct application code to use respective resource.

  • 23. 
    The application accesses an external resource using a J2C adaptor. The security credential for external resource authentication has changed. Which one of the following should be updated?
    • A. 

      J2C authentication data

    • B. 

      Key stores and certificates

    • C. 

      Web security trust association.

    • D. 

      JAAS login module in WebSphere.

  • 24. 
    A company maintains several different LDAP directory servers to contain a registry of user IDs and passwords. How can an administrator make all of the user IDs and passwords in these directories available to WebSphere security?
    • A. 

      Configure the LDAP directory servers as generic servers.

    • B. 

      Configure a federated repository including all of the LDAP directory servers.

    • C. 

      Configure WebSphere security to authenticate against all of the LDAP servers

    • D. 

      Configure a standalone LDAP registry for each directory server and enable multiple realms.

  • 25. 
    Which action below must be performed to ensure that requests routed through the Web server can reach a Web application deployed in WebSphere Application Server Network Deployment V7.0?
    • A. 

      Security is enabled on the administrative console.

    • B. 

      An updated plugin-cfg.xml is generated and propagated to the Web server.

    • C. 

      The Web server and the WebSphere Application Server must be installed on the same physical server.

    • D. 

      The Web server plug-in and the WebSphere Application Server must be installed on the same physical server.

  • 26. 
    Which one of the following statements is true about scoping resources in WebSphere Application Server?
    • A. 

      When a resource is defined at a more general scope, greater isolation is provided.

    • B. 

      In the administrative console, All scopes can be selected to create a new resource.

    • C. 

      Resources that are defined at more specific scopes override duplicate resources that are defined at more general scopes.

    • D. 

      Resources such as Java Database Connectivity (JDBC) providers, namespace bindings, or shared libraries can only be defined at a single scope.

  • 27. 
    When adding a new member to a cluster, why is it necessary for an administrator to select the option for generating unique HTTP ports?
    • A. 

      To enable encryption over the secure HTTP ports

    • B. 

      To prevent other applications from using these ports

    • C. 

      To avoid port conflicts with other servers on the same node

    • D. 

      To ensure that cluster members on different hosts have unique ports

  • 28. 
    A J2EE application maintains information in the HTTP session in memory. This information can be recreated, but there is a performance penalty to restore the state if a user session fails over to a different cluster member. Which of the following features maximizes the use of information already stored in a server's session?
    • A. 

      Database persistence

    • B. 

      Session affinity in Web server plug-in

    • C. 

      Memory--to-memory replication in Both Mode

    • D. 

      Memory--to-memory replication in Server Mode

  • 29. 
    What is the sequence of components which would typically be involved in the flow of a request from a Web browser to a servlet?
    • A. 

      External HTTP Server, HTTP Server Plug-in and EJB Container

    • B. 

      Load Balancer, Embedded HTTP Server, HTTP Server Plug-in and Web Container

    • C. 

      Edge Component, HTTP Server Plug-in, external HTTP Server, and Web Container

    • D. 

      External HTTP Server, HTTP Server Plug-in, embedded HTTP Server and Web container

  • 30. 
    How is the plug-in configuration file viewed from the WebSphere Application Server administrative console?
    • A. 

      There is no facility to view the plug-in configuration file in the administrative console.

    • B. 

      From the web servers list, select a particular web server. In the properties view, click Plug-in properties and then click View next to the Plug-in configuration file name

    • C. 

      On the left navigation bar, expand Servers, Server Types, and then Web Servers. Click on a particular web server. The path of the plug-in file is shown here. Use a text file reader to view the file.

    • D. 

      On the left navigation bar, expand System Administration. Click on Server Management and go to Web Servers. Select Plug-in File Management. Clicking on the View link runs Notepad with the plug-in file open

  • 31. 
    What is the most common role that naming plays in WebSphere Application Server?
    • A. 

      Allows applications to obtain references to objects such as datasources.

    • B. 

      Allows Java programs (clients and Java EE applications) to create, send, receive, and read asynchronous requests, as messages.

    • C. 

      Provides a runtime environment for enterprise beans within the application server.

    • D. 

      Provides a secure facility to support Customer's basic organizational entity management needs.

  • 32. 
    • A. 

      JDBC provider

    • B. 

      JCA resource adapter

    • C. 

      High availability server

    • D. 

      JMS activation specification

  • 33. 
    How is the response file specified in a silent installation scenario?
    • A. 

      Specified in the installation.properties file

    • B. 

      Specified as a parameter in the launchpad user interface

    • C. 

      Included as a command-line option on the install command

    • D. 

      Included as a command-line option on the launchpad application

  • 34. 
    During installation, administrative security was enabled using the default file-based repository. After installation, the administrator must change the password that was provided during the installation. How can this password be changed?
    • A. 

      Invokewsadmin and run the updateDMgrFileRepository command to update the password.

    • B. 

      Manually edit the primary administrative users password in the fileRegistry.xml file.

    • C. 

      Use the Manage Users page in the administrative console and change the primary administrative users password.

    • D. 

      Configure the Federated repositories realm using the administrative console and change the primary administrative users password.

  • 35. 
    Why does IBM WebSphere Application Server Network Deployment utilize node groups to implement a distributed environment? To:
    • A. 

      Segment multiple security domains within a WebSphere cell.

    • B. 

      Define the logical grouping of application servers to scale horizontally or vertically.

    • C. 

      Enable mixed nodes with different capabilities within the same cell for administration purposes.

    • D. 

      Allow application servers having the same applications installed to be grouped logically for workload management.

  • 36. 
    What can the system administrator do to distribute incoming HTTP traffic across a farm of Web servers?
    • A. 

      Enable sewer affinity for each HTTP server in the cluster

    • B. 

      Implement the Tivoli Access Manager as a load balancer

    • C. 

      Implement the caching proxy server component of the Edge Components

    • D. 

      Use the Load Balancer component of the Edge Components

  • 37. 
    Which type of server is recommended to be placed in the demilitarized zone (DMZ)?
    • A. 

      Generic servers

    • B. 

      Application servers

    • C. 

      Managed HTTP servers

    • D. 

      Unmanaged HTTP servers

  • 38. 
    Username and password are specified as parameters for the addNode command to authenticate with:
    • A. 

      The node agent if its administrative security is enabled

    • B. 

      The add Node command itself since it is password protected

    • C. 

      The node to be federated if its administrative security is enabled

    • D. 

      The deployment manager if its administrative security is enabled

  • 39. 
    An administrator wants to run a Web server on an unmanaged node with no administrative process. Which of the following issues result from this configuration?
    • A. 

      The administrative console will not be able to generate a plug-in configuration file for this Web server.

    • B. 

      Applications will not be able to use this Web sewer as a deployment target.

    • C. 

      The plug-in configuration file must be manually propagated to the Web server host.

    • D. 

      This Web server will not be able to perform workload management of requests to a cluster of application servers

  • 40. 
    What is the name of the WebSphere scripting tool?
    • A. 

      Wasadmin

    • B. 

      Wsadmin

    • C. 

      Ws_ant

    • D. 

      Wsdeploy

  • 41. 
    Which components provide workload management capabilities?
    • A. 

      Node agent

    • B. 

      Web server plug-in, Load balancer

    • C. 

      Caching proxy, Deployment manager

    • D. 

      Load balancer, Deployment manager

  • 42. 
    • A. 

      Federate nodes and create multiple clusters

    • B. 

      Load balance multiple HTTP servers using Edge Components

    • C. 

      Deploy multiple database servers using a high availability software product

    • D. 

      Federate nodes and create cluster members across multiple machines.