A system administrator was asked by the development team to inform them of any warning message
which contains a string Connection on a WebSphere Application Server with High Performance
Extensible Logging (HPEL) enabled.
C
Explanation:
The High Performance Extensible Logging (HPEL) facility writes to the log and trace repositories in a
binary format. You can view, query and filter the repository using the LogViewer command.
logviewer.sh -monitor -includeLoggers Connection
-monitor [integer]Specifies that you want the logViewer to continuously monitor the repository and
output new log record entries as they are created. You can provide an optional integer argument
after this parameter to specify how often you want the LogViewer tool to query the repository for
new records. By default the logViewer queries the repository for new records every 5 seconds. When
used with other filtering options, only those new records that match the filter criteria are displayed.
References:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/rtrb_logviewer.html
A system administrator is required to monitor the application server logs for heap memory issues
and determine if the heap memory usage is reaching close to 70% of the maximum heap. The
application server is configured with an initial heap of 256 MB and a max heap of 1 GB.
How should the administrator determine if the application server is utilizing 70% of the max
allocated heap memory?
B
Explanation:
Enabling verboseGC (Garbage Collection) output is often required when diagnosing issues with
WebSphere Application Server. Because verboseGC data is critical to troubleshooting memory and
performance problems and the overhead is generally very low, you may want to consider proactively
enabling it in your environment.
References: http://www-01.ibm.com/support/docview.wss?uid=swg21114927
After collecting diagnostic trace from a server running under a cell, a system administrator noticed
that the trace files contained sensitive information.
To avoid this issue in the future, what can the administrator do?
C
Explanation:
You can either enable or disable the sensitive log and trace guard to help control whether loggers
write sensitive information in your log and trace files.
Use the administrative console to enable or disable the sensitive log and trace guard.
Procedure
References:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/ttrb_enablesensitivelogtrace.html
A system administrator needs to trigger a javacore only when a java,net.SocketTimeoutException is
encountered in real time.
What does the administrator have to configure to trigger the javacore dump?
B
Explanation:
Dump agents are set up during JVM initialization. They enable you to use events occurring within the
JVM, such as Garbage Collection, thread start, or JVM termination, to initiate one of four types of
dump or to launch an external tool. Default dump agents are set up at JVM initialization They are
sufficient for most cases, but the use of the -Xdump option on the command line allows more
detailed configuration of dump agents. The total set of options and sub-options available under -
Xdump is very flexible and there are many examples presented in this chapter to show this flexibility.
Example: To generate system cores:
-Xdump:system:events=user
References: http://www-01.ibm.com/support/docview.wss?uid=swg21242497
An EJB application posts a request message into a JMS destination and waits for a response message
on a different JMS destination. To correlate the response message to the request message, the
application uses the JMS correlationId of the message. The application waits up to five seconds for a
response before timing out the request.
A Message Driven Bean (MDB) running on a different cluster is responsible for consuming the
request message, process it and post a response message.
The destinations are defined in a Service Integration Bus (SIB) within the cell.
Intermittent timeout exceptions have occurred for the requester application. How can a system
administrator correlate and analyze the debug information from both requester and consumer
applications?
C
Explanation:
Cross Component Trace (XCT) annotates the logs so that log entries that are related to a request that
is serviced by more than one thread, process, or even server are identified as belonging to the same
unit of work. XCT helps identify the root cause of problems across components.
References: WebSphere Application Server V8.5 Administration and Configuration Guide for the Full
Profile (July 2013), page 1091
A WebSphere system administrator needs to install the Installation Manager (IM) on an unmanaged
node on a host named <machine2>. The deployment manager is running on a host named
<machine1>.
What step must the administrator take before submitting a job from the Integrated Solutions Console
(ISC) to install the IM on <machine2>?
D
Explanation:
Submitting jobs to install Installation Manager on remote hosts
In a flexible management environment, you can submit the Install IBM Installation Manager job to
install the Installation Manager on registered hosts of the job manager.
References:
https://www.ibm.com/support/knowledgecenter/en/SSAW57_8.5.5/com.ibm.websphere.installation.zseries.doc/ae/tagt_jobmgr_install_im.html
A system administrator has created a wsadmin script with several steps to install and configure an
application and some resources in a WebSphere Application Server process. The script executed but
the application was not installed successfully. The administrator suspects that the script has
problems.
How can the administrator test and debug the script?
C
A system administrator has been asked to uninstall an application from a cluster running in a
WebSphere Application Server Network Deployment cell. This application was installed from the
Integrated Solutions Console (ISC). The monitored directory for the cluster is <cluster1_dir>.
What step(s) can the administrator perform to uninstall the application?
D
Explanation:
You can use application properties files to install enterprise application files on a server or cluster,
update deployed applications or modules, or uninstall deployed applications or modules. Drag or
copy a properties file to a monitored directory and the product performs the deployment action
described in the properties file. The enterprise application files that you can install, update, or
uninstall using properties files include enterprise archive (EAR), web archive (WAR), Java archive
(JAR), and Session Initiation Protocol (SIP) archive (SAR) files.
References:
https://www.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.multiplatform.doc/ae/trun_app_install_dragdrop_prop.html
A system administrator runs a Jython script that creates and configures several servers and realize
that the script fails before completing. Although many tasks succeeded, they are rolled back when
the script fails.
Before running the script again, what can the administrator add to the script after each task so the
completed tasks are committed even if other tasks fail?
B
Explanation:
AdminConfig.save()to save changes after script execution.
A system administrator has created a Jython script called globalScript.py.
What should the administrator do to ensure globalScript.py is loaded when the wsadmin shell is
used?
D
Explanation:
wsadmin.properties has this entry com.ibm.ws.scripting.profiles where we can add the scripting files
to be loaded.
References:
https://www-01.ibm.com/support/knowledgecenter/SSAW57_8.5.5/com.ibm.websphere.nd.doc/ae/rxml_propscript.html