1.
Which one of the following profile related tasks can only be performed using the manageprofiles commandline facility?
2.
Which of the following items best gives a reason to perform an unattended installation of WebSphere Application Server?
3.
A WebSphere Application Server installation finishes and the primary installation log indicates an exit code of INSTCONFSUCCESS. What is the best conclusion that can be resolved from this result?
4.
In order to verify that a server has started successfully and all of its components have initialized without throwing any exceptions, what steps should an administrator perform?
5.
A stand-alone application server with hostname HOST and port 1234 is running a Web application which is trying to access EJBs hosted on a cluster. The Web application is throwing a NameNotFoundException when attempting to lookup clusters/cluster01/ejbs/MyHome. The administrator runs the dumpNameSpace command on the standalone server and gets the following output: Linked to URL Corbaloc::bptenote35:2833,BPTENOTE35:2831/NameServiceServerRoot What command should the admin run next to find the MyHome entry?

 
6.
Which statement describes WebSphere V7 FFDC feature?
7.
Data replication service (DRS) is turned on for replicating in-memory data among WebSphere processes. During peak load, the developer found an OutOfMemoryError in the log. The developer suggests turning off data replication service (DRS). What services would be impacted?
8.
Due to network problems, the IBM Support Assistant (ISA) Agent is not available. Which service will be inoperable?
9.
An administrator has enabled security auditing for the WebSphere Application Server. They wish to view the audit records in order to verify that it is working properly. Which tool would best allow them to view the audit data?
10.
A federated cell has two nodes, Node01 and NodeO2. Global Security is turned on and is using a file based user registry. Node01 has servers A, B, C and D. A developer has deployed a new security check-in application to servers A and D. As a security requirement, this new application is required to use local operating system registry for user authentications. Identify which one of the following is the most direct way to enable this secured application.