1.
An application contains a web services client and the application is deployed and running. A system administrator has to add a response timeout to the deployed web services client, so the call fails in a timely fashion. Which artifact should the administrator use?
2.
After installing an enhanced EAR in a WebSphere Application Server environment, a system administrator with Configurator privileges is able to see a JDBC provider and a data source in the Integrated Solution Console (ISC) but is not able to delete these resources. How can the administrator resolve this issue?
3.
A system administrator has started a Liberty profile server using the default values. Later, the administrator modified the server.xml file for the server to include The administrator placed the application ServletApp.war in the apps directory under S{ server.config.dir}. While accessing the correct URL for the home page of the application, the error "Context Root Not Found" occurs in the browser. How can the administrator resolve this error?
4.
A system administrator needs to configure a JDBC provider and a data source for an application in a clustered environment. The administrator also needs to copy the JDBC drivers from the database server to the application server machines. How can the administrator meet these requirements?
5.
The administrator needs to identify any security role references and security constraints in a web application. How can the administrator identify these roles and constraints?
6.
A developer created an enterprise application which contained data source and security role information. The developer asked a system administrator to install this application to an application server where global security is enabled using the Integrated Solutions Console (ISC). A new data source was configured at the server scope for the use of this application. While load testing the application, the developer noticed that the attributes configured on the new data source were ignored by the application server. How can the administrator ensure that the attributes configured on the new data source are used by the application server?
7.
In a test environment, a system administrator has configured an external HTTP server in the DMZ that is routing to a cluster of application servers. The administrator wants to achieve higher performance when routing and prioritizing incoming requests to the back-end cluster. How can the system administrator achieve this task?
8.
While monitoring a cluster in the cell, the administrator notices that one server in the cluster periodically loses connections to the database. When this happens, requests to the server have a significantly decreased response time and various error conditions are listed in the log files for the server. Since the error codes are returned quickly, the server starts returning responses faster than the average service times for the application. Due to this, the weight for the server is increased and a large percentage of incoming requests are being routed to the erroneous server and the server is getting overloaded with requests. How can the administrator detect these conditions in the future and take action to prevent this problem?
9.
The application placement controller has been configured with elasticity mode enabled. Intermittently, all instances of a dynamic cluster are removed. After further review, the system administrator noticed that it occurs during peak load on another dynamic cluster. The administrator wants to keep at least one instance available. Which configuration is needed in the dynamic clusters?
10.
A system administrator has deployed an application. The development team has updated a new version of this application. The administrator needs to immediately deploy this updated application and guarantee that only this new edition is used by clients and that any service requests for the application are queued during the deployment of the new application. How can the administrator achieve this task without any downtime to the application?