IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

IBM Certified System Administrator 000-318시험대비덤프

Pass4Test 는 인증시험에 참가하는 분들한테 편리를 제공하는 사이트이며,여러분들의 시험패스에 도움을 줄 수 있는 사이트입니다.많은 분들은   IBM Certified System Administrator 000-318인증시험이 아주 어려운 것은 알고 있습니다. 하지만 Pass4Test를 선택함으로 IBM Certified System Administrator 000-318인증시험은 그렇게 어렵지 않다는 것을 알게 될 것입니다. Pass4 Test의  IBM Certified System Administrator 000-318학습가이드는 시험의 예상문제부터 전면적이로 만들어진 아주 퍼펙트한 시험자료입니다.Pass4Test는 여러분이  IBM Certified System Admi nistrator 000-318인증시험 패스와 추후사업에 모두 도움이 되겠습니다.  Pass4Test제품을 선택함으로 여러분은 시간도 절약하고 돈도 절약하는 일석이조의 득을 얻을수 있습니다. 또한 구매후 일년무료 업데이트 버전을 받을수 있는 기회를 얻을수 있습니다.  IBM Certified System Adm inistrator 000-318 인증시험패스는 아주 어렵습니다. 자기에 맞는 현명한 학습자료 선택은 성공의 지름길을 내딛는 첫발입니다.

 

 

NO.1 Which statement is accurate regarding business-level applications?
A. A business-level application contains application binary files.
B. Only WebSphere artifacts are contained in a business-level application.
C. The business-level application function introduces new application programming interfaces
(APIs).
D. Make a Java EE application a business-level application and add it to another business-level
application.
Answer: D

NO.2 A system administrator has added a server cluster as a member of a service integration bus.
The
system administrator needs to configure one messaging engine for each server in this cluster and
to have a failover location for each messaging engine. Which messaging engine policy should the
system administrator configure to achieve this?
A. Scalability
B. High availability
C. Scalability with high availability
D. Custom policy using the Quorum attribute
Answer: C

NO.3 A system administrator manages a WebSphere Application Server environment which uses a
Federated Repository consisting of multiple LDAP servers. The first LDAP server is the corporate,
highly-available LDAP server and contains most of the users. The second LDAP server contains
only the administrative users and is run on a local system which is restarted regularly. To
maximize the availability of the Federated Repository, what should the system administrator do?
A. Set the second LDAP server as a backup server.
B. Add both LDAP servers to the High Availability Manager's core group.
C. Use a TAI (Trust Association Interceptor) to aggregate the LDAP servers.
D. Enable Allow operations if some of the repositories are down.
Answer: D

NO.4 A system administrator needs to install IBM Installation Manager on a remote host using
Flexible
management. To do so, on which host machine should the system administrator download the
Installation Manager "kits"? (choose 2)
A. Job Manager
B. Remote host
C. On Demand Router
D. Administrative Agent
E. Deployment Manager
Answer: A,E

NO.5 An application development team has developed a new version of an application that needs to
be
rolled out to a selected group of users for testing while the other users can continue to access the
old version of the application. What configuration should the system administrator do in order to
achieve this?
A. Perform a rollout on an application edition.
B. Perform a rollout on an application edition and establish routing policies.
C. Install an application edition and establish routing policies.
D. Activate concurrent application editions and establish routing policies.
Answer: D

NO.6 In a test environment, a system administrator has configured an external HTTP in the DMZ that
is
routing to a cluster of application servers. The administrator wants to achieve high results and
performance when routing and prioritizing incoming requests to the back-end cluster. How can the
system administrator achieve this task?
A. Configure a cluster of external HTTP servers.
B. Enable the prefer local option on the cluster members.
C. Setup a Caching Proxy server between the external web server and the application server.
D. Place an On Demand Router (ODR) between the external web servers and the application
servers.
Answer: D

NO.7 A system administrator has just built a WebSphere Application Server node to replace a node
lost
to disk failure. The system administrator wishes to reincorporate this node into the existing
WebSphere Application Server cell and use the prior configuration information. Unfortunately, the
backup of the cell is extremely out of date. What should the system administrator use to
accomplish this task?
A. wsadmin
B. addNode
C. wsimport
D. manageprofiles
Answer: B

NO.8 A system administrator needs to deploy an enterprise application to a WebSphere
Application
Server environment. Before starting the deployment process, the administrator uses the IBM
Assembly and Deploy Tool (IADT) to inspect the EAR and notices that it is enhanced. Since
enhanced EARs are not allowed in their runtime environment, the system administrator needs to
unenhance the EAR. How can the system administrator successfully remove the enhancements?
A. Use WebSphere Customization Toolbox (WCT) to unenhance the EAR.
B. Disable the application scoped resources in the application deployment descriptor.
C. Remove the META-INF/ibmconfig folder from the project before exporting the EAR.
D. Make sure that Process embedded configurations is not selected when exporting the EAR.
Answer: C

NO.9 A system administrator needs to control which staff members have access to manage certain
application servers. They choose to use fine grained control and map the staff members to only
those specific application servers to which they need access. What does the system administrator
need to do to accomplish this?
A. Add custom properties to each of the application servers with role mappings for each staff
member
B. Use an Administrative Authorization Group to map the staff members and roles to the
application servers.
C. Create a security domain and add the application servers with the staff members in the role
definitions.
D. Create a custom user registry which prevents authorization requests to the application servers
not in the desired list.
Answer: B

NO.10 A system administrator is monitoring a web application and needs to find the slowest JSP page
when a typical client load is run against the server. How can the system administrator find it?
A. Analyze the thread dump.
B. Use the HPEL Log Viewer to view traces.
C. Use the Log Analyzer to view the SystemOut logs
D. Use the Tivoli Performance Viewer (TPV) and view the Servlet Summary reports.
Answer: D
Posted 2013/3/29 3:03:17  |  Category: 미분류  |  Tag: