Tuesday, September 22, 2009

Chanakya providing Latest Certification dumps for IBM 000-377

1. Which of the following is an option given in the First Steps application that runs automatically after installation?


A.Start the server.

B.Execute wsadmin.

C.Configure resources.

D.Run the Snoop servlet.

ANSWER: A

2. Which one of the following can be used to instantiate resource adapter classes for establishing and maintaining resource

connections?

A.a data source

B.connection factories

C.connection pool settings

D.a JMS activation specification

ANSWER: B

3. Global security is turned on for a federated cell using a file-based federated repository. The administrator created a new

security domain called App1Domain using local operating system registry and mapping it to the application server. The

administrator also created a new local operating system user ID App1Admin.

Which one of the following is true when the new security domain is enabled to secure Application1?

A.The administrator can access Application1.

B.The administrator can disable Application1 security.

C.App1Admin can disable Application1 security.

D.App1Admin can access the administrative console.

ANSWER: B

4. Aside from the administrative console and the addNode command, what other facilities does WebSphere Application Server

provide for federating nodes into cells?

A.wsadmin

B.The administrative agent

C.The Profile Management Tool (PMT)

D.Rational Application Developer Assembly and Deploy Module

ANSWER: C

5. When backing up WebSphere Application Server configuration and runtime settings, which of the following commands

would be relevant?

A.backupConfig -location location

B.restoreConfig -profileName profile_name -backupFile backupFile_name

C.manageprofiles -backupProfile -profileName profile_name -backupFile backupFile_name

D.wsadmin -backupConfig -profileName profile_name -backupFile backupFile_name

ANSWER: C

6. What can the system administrator do to distribute incoming HTTP traffic across a farm of Web servers?

A.Enable server affinity for each HTTP server in the cluster

B.Implement the Tivoli Access Manager as a load balancer

C.Implement the caching proxy server component of the Edge Components

D.Use the Load Balancer component of the Edge Components

ANSWER: D

7. What is the sequence of components which would typically be involved in the flow of a request from a Web browser to a

servlet?

A.External HTTP Server, HTTP Server Plug-in and EJB Container

B.Load Balancer, Embedded HTTP Server, HTTP Server Plug-in and Web Container

C.Edge Component, HTTP Server Plug-in, external HTTP Server, and Web Container

D.External HTTP Server, HTTP Server Plug-in, embedded HTTP Server and Web Container

ANSWER: D

8. How could an administrator manage multiple stand-alone application servers on different hosts in a network?

By using:

A.a job manager which administers multiple application server nodes through administrative agents.

B.a deployment manager which administers multiple application server nodes through their node agents.

C.a high availability manager which administers multiple application server nodes through their administrative agents.

D.an administrative agent which administers multiple application server nodes through their administrative service.

ANSWER: A

9. Which type of server is recommended to be placed in the demilitarized zone (DMZ)?

A.Generic servers

B.Application servers

C.Managed HTTP servers

D.Unmanaged HTTP servers

ANSWER: D

10. What is the advantage of deploying more than one messaging engine and linking them together in a topology that has multiple

interconnected service integration buses (SIBus)?

A.Enable protocol transformation between buses.

B.Improve the availability of the persistent storage.

C.Spread messaging workload across multiple servers.

D.Preserve message ordering through the messaging engines.

ANSWER: C

11. Why does IBM WebSphere Application Server Network Deployment utilize node groups to implement a distributed

environment? To:

A.segment multiple security domains within a WebSphere cell.

B.define the logical grouping of application servers to scale horizontally or vertically.

C.enable mixed nodes with different capabilities within the same cell for administration purposes.

D.allow application servers having the same applications installed to be grouped logically for workload management.

ANSWER: C

12. A system administrator wants to improve response time and system load of a Web application running in a clustered

environment.

What might the system administrator attempt to decrease the response time of the Web application?

A.Configure dynamic caching

B.Enable memory-to-memory replication

C.Configure session replication to use a database.

D.Ensure that all cluster members are in the same node group.

ANSWER: A

13. A system administrator needs to modify the configuration of an enterprise application within a flexible management

environment. The system administrator can make the modification using wsadmin scripts by connecting to which of the

following components?

A.Node agent

B.Job manager

C.Work manager

D.Administrative agent

E.Deployment manager

ANSWER: BE

14. What would have to be configured in order to implement memory-to-memory HTTP Session persistence?

A.Dynamic cache service and HTTP plug-in

B.Synchronization service and embedded Web server

C.Distributed environment settings in the web containers

D.Fast Response Cache Accelerator (FRCA) and external Web server

ANSWER: C

15. When configuring automated transaction peer recovery for recovering in-flight transactions from the transaction log, what is

required from the file system?

A.RAID disks must be used to host the transaction log

B.Exclusive read only file locks and the ability to invalidate them

C.File locking must be disabled for Network File System Version 4 (NFSv4)

D.Lease-based exclusive locks on files

ANSWER: D

16. What are the three possible replication types for the dynamic caching service?

A.Client mode

B.Server mode

C.Not shared

D.Push only

E.Both push and pull

F.Broadcast mode

ANSWER: CDE
 
 
To get the full access pdf 000-377 IBM WebSphere Application Server
Network Deployment V7.0 Core Administration contact directly to itcertification39@gmail.com /itchanakya@ymail.com

Regards
Chanakya

Chanakya providing 310-105 157QA pdf latest certification dumps

Q. 1 Click the Exhibit button. The exhibit shows information about data in

Jane's home directory. Which answer describes where the directory named dir1 is stored within the file

system.

A. In the inode associated with directory dir1

B. In the directory file called dir1

C. In the ACL associated with dir1

D. In the directory file called widgets

E. In the inode associated with directory widgets

F. In the ACL associated with widgets

Answer: D

Q. 2 Jane is trying to configure the swat utility. The software and man pages

are located in the /usr/sfw directory. When Jane attempts to use the man command the following message

appears:

$ man swat

No manual entry for swat.

Choose the command that Jane can execute to display the man page.

A. man /usr/sfw/swat

B. man -f /usr/sfw/swat

C. man -M /usr/sfw/man swat

D. man -s 1M swat

Answer: C

Q. 3 Click the Exhibit button. Examine the exhibit. Choose the answer the best

describes the 8 th field of the output of an ls command.

A. file creation time

B. inode change time

C. last access time

D. last modify time

Answer: D



Q. 4 Consider the following command:

$ cal 9 1752

The cal command is followed by which one of the following choices?

A. arguments

B. options

C. variables

D. preferences

Answer: A

Q. 5 Click the Exhibit button. Jane has listed the contents of her home

directory as shown in the exhibit. Choose which command she would have entered to produce this

output.



A. ls -lR

B. ls -lLR

C. ls -lr

D. ls -LR *

E. ls -lr *

Answer: A

Q. 6 Your logging into the system as user Val, you are notified upon login that

you must change your user password on the system. Your current password is 2co0lu! Choose the

password that meets the

requirements for a user changing the password on a Solaris 10 system.

A. 2co0l4u

B. valiscol

C. 2C00L4u2

D. 321 123!

Answer: C

Q. 7 Click the Exhibit button. The exhibit is a listing of your current directory.

Based on the information shown, choose the file from the listing that is a regular file.

A. acme

B. instance

C. screen

D. door_pipe

Answer: D

Q. 8 Tina has executed the following command:

$ affiliate.sh 2>>/var/log/worklog

Choose the statement that is true concerning this command.

A. stdin is redirected to a file.

B. stderr is redirected to a file.

C. stdout is redirected to a file.

D. all output from the script is redirected to a file.

Answer: B

Q. 9 Click the Exhibit button. The exhibit shows a listing of Jane's directory.

Consider the entry repair. Choose the commands that might have been used to create this file.



A. cp /export/home/jane/things/fixit /export/home/jane/repair

B. ln /export/home/jane/repair /export/home/jane/things/fixit

C. ln /export/home/jane/things/fixit /export/home/jane/repair

D. mkfile 32b /export/home/jane/repair

E. ln -s /export/home/jane/things/fixit /export/home/jane/repair

F. ln -s /export/home/jane/repair /export/home/jane/things/fixit

Answer: E

Q. 10 Jane is about to edit a file with the vi editor. She executes the following

command:

$ vi ./customer_sat.txt

Choose the vi editor mode that Jane will be using when the file is opened.

A. command mode

B. edit mode

C. last line mode

D. ex mode

Answer: A

Q. 11 Val has gathered information about the data stored in her home

directory using the following command line.

$ du -sk *
sort -n
tail > file2

Which answer correctly describes what happens when the command is invoked?

A. The tail command redirects stdin to file2

B. The sort command redirects stdout to the du command

C. The stdout from the du command is sent to the sort command

D. The stderr from the tail command will be sent to file2

Answer: C



Q. 12 Click the Exhibit button. The exhibit shows a listing of Jane's home

directory. Jane wants to delete the directory dir1. Choose the command that would remove only the dir1

directory.

A. rm ./widgets/*

B. rm ./widgets/dir1

C. rm -r ./widgets

D. rmdir ./widgets/dir1

Answer: D

Q. 13 Click the Exhibit button. The exhibit shows the first few lines of a system

run control script. In which shell is this script executed?



A. Bourne Shell

B. Z Shell

C. C Shell

D. Korn Shell

E. Bash Shell

Answer: A

Q. 14 Click the Exhibit button. Frank needs to add write access for the sales

group, so he uses the following command:

$ chmod g+w project543.dat

Choose which answer reflects the result of this command.



A. Only the sales group will be given write access to the file.

B. Only the sales group and market group will have write access to the file.

C. The sales group and market group and user jane will have write access to the file.

D. The sales group and market group and user jane and others will have write access to the file.

Answer: C

Q. 15 You have a default install of Solaris 10 on your desktop system. You are

user tim. Examine the following command and output.

$ ls -l project465.odt

-rw-r--r-- 1 tim tim 394 Apr 9 15:29 project465.odt

You need to allow another user access to write the file. You do not have access to the root account.

Which command can be used to grant write access to the file?

A. chown command

B. chgrp command

C. setfacl command

D. nischown command

Answer: C

Q. 16 Click the Exhibit button. Examine the exhibit. Based on the information

in this exhibit, which files can user Jane delete?

A. file1 file2 log

B. file2 log

C. file1 file3 log

D. file1 file2 file3 log

Answer: D



Q. 17 Frank executes the following single command line:

$ ln /export/home/frank/audio_books/enders_game /export/home/frank/bookdata

Choose the files that would result from executing this command.

A. -rw-r--r-- 2 frank frank 1699 Oct 29 00:51 enders_game

B. lrwxrwxrwx 1 frank frank 27 May 17 00:54 /export/home/frank/audio_books/enders_game ->

/export/home/frank/bookdata

C. -rw-r--r-- 2 frank frank 1699 Oct 29 00:51 bookdata

D. lrwxrwxrwx 1 frank frank 42 May 17 00:54 /export/home/frank/bookdata ->

/export/home/frank/audio_books/enders_game

Answer: C

Q. 18 You have a file that contains a list of parts in a single column. You need

to append the text string .ex2009 to each entry. You will use the vi editor and the last line mode to

append this text to each

entry. Which command will add the text correctly?

A. :%s/*/.ex2009/

B. :%s/.$/.ex2009/

C. :%s/$/.ex2009/

D. :%s/*$/.ex2009/

Answer: C

Q. 19 Click the Exhibit button. The exhibit shows a listing of Jane's directory.

Consider the first entry buttons. Choose the commands that might have been used to create this file.



A. cp snippets buttons

B. ln gadget buttons

C. ln snippets buttons

D. ln search buttons

E. cp gadget buttons

F. ln -s snippets buttons

Answer: B

Q. 20 Click the Exhibit button. Jane has listed the files in her home directory

as shown in the exhibit. Choose the answers that correctly describes the files in this directory. (Choose

three.)



A. The file fixit is a symbolic link to the file repair

B. The file buttons can be executed by a user in the sales group

C. The file gadget could be a hard link to the file buttons

D. The file search can be modified by users in the sales group

E. The file repair is a symbolic link to the file fixit

F. Users in the sales group can enter the widgets directory

Answer: C, E, F

Q. 21 Click the Exhibit button. This user is using the Korn shell. Which

command did the user execute to display the list shown in the exhibit?

A. fc -l 122-137

B. fc -l 122

C. fc -l 122 137

D. history



Answer: D


To get full 157 QA pdf contact directly to chanakya at itcertification39@gmail.com or itchanakya@ymail.com directly.

regards
Chanakya