Monday, 26 January 2015

Websphere Administration interview Questions

1). What is WebSphere Application Servers? Explain 3 tier architecture.
 WebSphere Application Servers are a suite of servers that implement the J2EE specification. The
primary component of the WebSphere Application Server products is
the application server, which provides the environment to run your Web-enabled E-business
applications.
 You can think of an application server as Web middleware, the middle tier in a three-tier ebusiness
environment. The first tier is the Web server that handles requests from the browser client.
 The third tier is the business database, for example DB2® UDB, and the business logic, for
example, traditional business applications such as order processing. The middle tier is IBM WebSphere
Application Server, which provides a framework for consistent, architected linkage between the HTTP
requests and the business data and logic.
2). What is an application server?
 The application server is the primary runtime component in all configurations. It is where an
application executes. All WebSphere Application Server configurations can have one or more
application servers.
 In the Express and Base configurations, each application server functions as a separate entity.
There is no workload distribution or common administration among application servers.
 With Network Deployment, you can build a distributed server environment consisting of
multiple application servers maintained from a central administration point.
In a distributed server environment, you can cluster application servers for workload distribution.
3). Explain node, node agent and node groups.
 A node is a logical grouping of server processes managed by WebSphere and that share
common configuration and operation control. A node is associated with one physical
installation of WebSphere Application Server. In a stand-alone application server configuration, there is
only one node.
 With Network Deployment, you can configure multiple nodes to manage from onecommon
administration server. In these centralized management configurations, each
node has a node agent that works with a deployment manager to manage administration processes.
 A node group is a new concept introduced with WebSphere Application Server V6. A node group
is a grouping of nodes within a cell that have similar capabilities.
4). Explain cell in WebSphere .
 A cell is a grouping of nodes into a single administrative domain. A cell can consist of multiple
nodes which are all administered from a single point.
5). Explain about WebSphere administrative console.
In WebSphere Application Server V6, the administrative console groups administrative tasks into the
following categories:
 Servers
 Applications
 Resources
 Security
 Environment
 System administration
 Monitoring and tuning
 Troubleshooting
 Service integration
 UDDI
6). How do you start the administrator console?
Make sure that deployment manager, dmgr, is running by using this command:
UNIX: <dmgr_profile_home>/bin/serverStatus.sh -all
If the dmgr status is not STARTED, start it with the following command:
On UNIX: <dmgr_profile_home>/bin/startManager.sh
Open a Web browser to the URL of the administrative console. The default
port is 9060 for HTTP and 9043 for HTTPS.
https://<hostname>:9043/admin
7). What is the admin console default session timeout limit?
The default is 30 minutes.
Edit the <was_home>/systemApps/adminconsole.ear/deployment.xml file in a text editor.
8). What are the three major areas of admin console GUI?
The WebSphere administrative console has the following main areas:
 Taskbar
 Navigation tree
 Workspace, including the messages and help display areas.
Options and description are given below:
9). What are the options you see in Navigation tree?
10). What is JNDI?
 The Java Naming and Directory Interface (JNDI) is part of the Java platform, providing
applications based on Java technology with a unified interface to multiple naming and directory services.
 You can build powerful and portable directory-enabled applications using this industry standard
11). What is scope in WebSphere ?
 Scope can be Cell or node or app server of everything.
 Whenever you want to affect changes through dmgr, you need to define the scope whether it is
going to affect cell, node. Or only app servers
12). What is the relation you know with cell – profile –node agent – apps servers?
 A cell can have multiple profiles. Every profile must have at least one node agent.
 One node agent can have multiple app servers – App servers are nothing but jvms, which are
nothing but .war, .ear, .jar files.
13). What is the difference between JMS and MQ SERIES?
 In JMS – communication between the applications is possible only if the apps are in the same
cell.
 But in MQ series, inter application communication is possible even if the apps are in the
different cell.
14 What is virtual host?
 We need to map the app server to a virtual host. We cannot access the app server from
thebrowser if it is not mapped to a virtual host.
 Example: //www.yahoo.com/mail Mail is a virtual host. Internally mail may contact sever .ear
files.
15). If dmgr (deployment manager) is down, can you access app server?
 Yes, you can access application server and everything will be fine. Only issues are that you
cannot do any management of the jvms using admin console.
16). What is the effect of node agent?
 Application server will be running, but you cannot manage the app server because the node
agent is down
17). What action would you take it if you get “page not found error “?
 Basically in three tier architecture, in tier 1 you have webserver, tier 2 is web sphere application
server and in tier 3 you have Database.
 Request from the client browser basically reaches the web server and then for application
execution, it reaches the web applications.
 For data it connects to the database server. Either webserver is down or not reachable. Or
application server is down.
18). Explain the flow of processing a JSP page request.
 If the JSP has already been compiled and the servlet loaded, the flow is as follows
 A Web page is submitted from a client browser with a URL request for a JSP
(http://myserver/MyPage.jsp)
 The HTTP server receives the request and forwards it to the WebSphere server. WebSphere
creates a thread for the client session and processes the servlet, accessing data etc.
 WebSphere returns the generated results as an HTML page back to the client browser.
19). What are the common errors that can occur while accessing webpage?
 General categories of errors
 Most errors fall into general error categories when running Web applications. The codes below
are typical for many common errors.
Code description
 404 page not found for an HTML or JSP page
(often an application configuration or WebSphere plugin problem)
 403 authorization error
( an authentication or authority error for a resource requested by the client)
 500 error running servlet or jsp
(Many different causes possible. A common one is Class Definition Not Found that will show in the error
page which class is not found on the class path).
20 Explain the WebSphere runtime environment objects.
21). Explain the java web application components.
22). What is Web server plug-in?
 A Web server can serve requests that do not require any dynamic content (for example, HTML
pages). However, when a request requires dynamic content, such as Java Server
Pages (JSP™) or servlet processing, it must be forwarded to WebSphere Application Server for handling.
Note: As a special case, if the unmanaged Web server is an IBM HTTP Server, you can administer the
Web server from the WebSphere administrative console.
 Then, you can automatically push the plug-in Configuration file to the Web server with the
deployment manager using HTTP commands to the IBM HTTP Server administration process.
 This configuration does not require a node agent.
 To forward a request, you use a Web server plug-in that is included with the WebSphere
Application Server packages for installation on a Web server. You copy an Extensible
 Markup Language (XML) configuration file, configured on the WebSphere Application Server, to
the Web server plug-in directory. The plug-in uses the configuration file to determine
 whether a request should be handled by the Web server or an application server.
 When WebSphere Application Server receives a request for an application server, it forwards
the request to the appropriate Web container in the application server.
 The plug-in can use HTTP or Https to transmit the request.
23). Can you explain more about web server?
 Web servers can be defined to the administration process as a Web server node, enabling
applications to be associated with one or more defined Web servers. Web server nodes can
be managed or unmanaged. Managed nodes have a node agent on the Web server machine that
enables the deployment manager to administer the Web server. You can start or stop the
Web server from the Deployment manager, generate the Web server plug- in for the node, and
automatically push it to the Web server. You would normally have managed Web server nodes behind
the
firewall with the WebSphere Application Server installations.
 Unmanaged Web server nodes, as the name implies, are not managed by WebSphere. You
would normally find these outside the firewall or in the demilitarized zone.
 You must manually copy or FTP Web server plug-in configuration files to the Web server.
However, if you define the Web server as a node, you can generate custom plug-in configuration
files for it.
 In a z/OS environment, you must use unmanaged nodes if the Web server is a non- z/OS
product.
24). Explain different types of containers WAS 6.0 ?
Application server containers
 Each application server provides the following container support:
Web container
The Web container processes servlets, JSPs (processed as servlets), and other types of server-side
includes. Each application server runtime has one logical Web container, which can be modified but not
created or removed. Requests are received by the Web container through the Web container inbound
transport chain. The chain consists of a TCP inbound channel that provides the connection to the
network, an HTTP inbound channel that serves HTTP 1.0 and 1.1 requests, and a Web container channel
over which requests for servlets and JSPs are sent to the Web container for processing.
Requests for HTML and other static content that are directed to the Web container are served by the
Web container inbound chain. Although the Web container can serve static content, a more likely
scenario is that you will use an external Web server to receive client requests and a Web server plug-in
to forward requests for servlets to the Web container.
EJB container
The Enterprise JavaBeans container provides all of the runtime services that are needed to deploy and
manage enterprise beans. It is a server process that handles requests for both session and entity
beans. The container provides many low-level services, including threading and transaction support.
From an administrative viewpoint, the container manages data storage and retrieval for the
contained enterprise beans. A single container can host more than one EJB Java archive (JAR) file.
Portlet container
The Portlet container processes JSR168 compliant Portlets. The Portlet container is an extension to the
Web container.
Session Initiation Protocol container
The SIP container processes applications that use at least one SIP servlet written to the JSR 116
specification. The Portlet container is an extension to the Web container.
Application client container
The application client container is a separately installed component on the client’s machine. It enables
the client to run applications in a J2EE environment that is compatible with EJB.
25). What are the services provided by application server?
The following are the broad level of services
• J2EE Connector Architecture services
• Transaction service
• Dynamic cache service
• Message listener service
• Object Request Broker service
• Administrative service
• Name service
• Performance Monitoring Infrastructure service
• Security service
• Web services engine
• Data Replication Service
26). Standalone server and distributed server configuration – difference ?
Stand-alone server configuration:
Express, Base, and Network Deployment all support a single stand-alone server environment. With a
stand-alone configuration, each application server acts as a unique entity.
An application server runs one or more J2EE applications and provides the services that are required to
run those applications. Each stand-alone server is created by defining
an application server profile.
Multiple stand-alone application servers can exist on a machine, either through independent
installations of the WebSphere Application Server code or through multiple
profiles within one installation. However, WebSphere Application Server does not provide for central
management or administration for multiple application servers. Stand-alone
application servers do not provide workload management or failover capabilities.
Distributed server configuration
With Network Deployment, you can build a distributed server configuration, which enables central
administration, workload management, and failover. In this environment, you integrate one or more
application servers into a cell that is managed by a deployment manager.
The application servers can reside on the same machine as the deployment manager or on multiple
separate machines. Administration and management is handled centrally from the administration
interfaces via the deployment manager.
With a distributed server configuration, you can create multiple application servers to run unique sets
of applications and then manage those applications from a central location.
However, more important, you can cluster application servers to allow for workload management and
failover capabilities. Applications that you install in the cluster are replicated across the application
servers. When one server fails, another server in the cluster continues processing. Work is distributed
among Web and Enterprise JavaBeans™
. (EJB™) containers in a cluster using a weighted round-robin scheme
Application servers
The application server is the primary runtime component in all configurations and is where an
application actually executes. All WebSphere Application Server configurations can have one or more
application servers. In the Express and Base configurations, each application server functions as a
separate entity.
There is no workload distribution or central administration among application servers. With Network
Deployment, you can build a distributed server environmentconsisting of multiple application
servers maintained from a central administration point.
In a distributed server environment, you can cluster application servers for workload distribution.
27). What is the purpose of a proxy server?
A proxy server is a specific type of application server that routes HTTP requests to application servers
that host the applications. The proxy server is the initial point of entry,
after the firewall, for requests into the enterprise. The proxy server can be configured with rules to
route to and load balance the clusters of application servers. The proxy server is
also capable of securing the transport, using Secure Sockets Layer (SSL), and the content using various
authentication and authorization schemes. Another important feature is its
capability to protect the identity of the content servers from the Web clients by using response
transformations (URL rewriting). The proxy server can also improve performance
by caching content locally and by protecting the content servers from surges in traffic.
2.28 Explain the application flow.
The figure shows the typical application flow for Web browser clients using either JDBC from a servlet or
EJB to access application databases.
The typical application flow is as follows:
1. A Web client requests a URL in the browser input page.
2. The request is routed to the Web server over the Internet.
3. The Web server immediately passes the request to the Web server plug-in. All requests go to the
WebSphere plug-in first.
4. The Web server plug-in examines the URL, verifies the list of host namealiases from which it will
accept traffic based on the virtual host information, and chooses a server to handle the request.
5. A stream is created. A stream is a connection to the Web container. It is possible to maintain a stream
over a number of requests. The Web container receives the request and, based on the URL,
dispatches it to the proper servlet.
6. If the servlet class is not loaded, the dynamic class loader loads the servlet (servlet init(), then doGet()
or doPost()).
7. JNDI is used for lookup of either datasources or EJBs required by the servlet.
8. Depending upon whether a datasource is specified or an EJB is requested, the JNDI directs the servlet:
– To the corresponding database and gets a connection from its connection pool in the case of a data
source.
– To the corresponding EJB container, which then instantiates the EJB when an EJB is requested.
9. If the EJB requested involves an SQL transaction, it goes back to the JNDI to look up the datasource.
10.The SQL statement is executed and the data retrieved is sent back either to the servlet or to the EJB.
11.Data beans are created and handed off to JSPs in the case of EJBs.
12.The servlet sends data to JSPs.
13.The JSP generates the HTML that is sent back through the WebSphere plug-in to the Web server.
14.The Web server sends the output HTML page to the browser.
29). What is configuration repository?
The configuration repository holds copies of the individual component configuration documents stored
in XML files.
Central configuration repository is with dmgr And local configuration repository is with node agents
30). Can you explain about Application packaging?
J2EE applications are packaged into EAR files to be deployed to one or more ppplication servers. A J2EE
application contains any or all of the modules as shown in Table
31) How do you develop and deploy application, can you explain?
Please find below the diagrams that explains how the applications are developed and deployed.
The first step is application design Design tools like Rational Rose® or Rational XDE™ can be used to
model the application using the Unified Modeling Language.
Application development :
Application development is done using Rational Application Developer or a comparable IDE to create
the enterprise application.
During the development phase, you can do component testing using the built-in WebSphere Application
Server test environment.
Application packaging :
J2EE applications are packaged into EAR files to be deployed to one or more application servers.
The WebSphere Enhanced EAR, introduced in WebSphere Application Server V6, is a regular J2EE EAR
file with additional configuration information for resources usually required by J2EE applications.
While adding this extra configuration information at packaging time is not mandatory, it can simplify
deployment of J2EE applications to WebSphere
Application deployment:
Applications are installed on application servers using the administrative console or the wsadmin
scripting interface.
You can deploy an application to a single server or a cluster. In a cluster, the application is installed on
each application server in the cluster.
Installing an application involves the following tasks:
 _ Binding resource references, created during packaging, to real resources For example, a data
source would need to be bound to a real database.
 Defining JNDI names for EJB home objects.
 Specifying data source entries for entity beans
 Binding EJB references to the real EJB JNDI names.
 Mapping Web modules to virtual hosts.
 Specifying listener ports for message-driven beans.
 Mapping application modules to application servers
 Mapping security roles to users or groups
The use of an enhanced EAR file simplifies this installation process.
After a new application is deployed, the Web server plug-in configuration file needs to be regenerated
and copied to the Web server.
32). Explain about various roles in WAS administration.
 WebSphere Application Server provides a granularity of access control through the provision of
four administrative security roles:
 Monitor can view the system state and configuration data, but cannot make any changes.
 Operator has all the functions of Monitor as well as ability to make operational changes, for
example start/stop servers.
 Configurator has all the functions of Monitor as well as ability to make Configurational changes.
 Administrator has all the functions of Operator and Configurator.
 Using these roles requires that WebSphere global security be enabled. Users and groups can be
assigned these roles through the administrative console
33) What is JMX?
 Java Management Extensions. JMX is a framework that provides a standard way of exposing
Java resources, for example application servers, to a system management infrastructure.
 The use of JMX opens the door to third-party management tool providers. Users of WebSphere
are no longer restricted to IBM-supplied management tools.
34) What is the effect of disabling websphere global security ?
 If global security is not enabled, you can enter any user ID, valid or not to log in to the
administrative console.
 The user ID is used to track changes to the configuration, but is not authenticated. You can also
simply leave the User ID field blank and click the Log In button.
35) Can multiple users enter the dmgr?
 A user ID must be unique to the deployment manager.
 If you enter an ID that is already in use and in session, you will receive the message Another user
is currently logged with the same User ID
 The message another user is currently logged with the same User ID appears if a previous
session ended without a logout.
 If the user closed a Web browser during a session and did not logout first or if the session timed
out.
36) What is the admin console default session timeout limit?
The default is 30 minutes.
Edit the <was_home>/systemApps/adminconsole.ear/deployment.xml file in a text editor
37) What are JDBC providers and data sources?
A data source represents a real-world data source, such as a relational database.
When a data source object has been registered with a JNDI naming service, an application can retrieve
it from the naming service and use it to make a connection to the data source it represents.
Information about the data source and how to locate it, such as its name, the server on which it resides,
its port number, and so on, is stored in the form of properties on the DataSource object.
This makes an application more portable because it does not need to hard code a driver name, which
often includes the name of a particular vendor.
38) What are JCA resources?
The J2EE Connector architecture (JCA) defines a standard architecture for connecting the J2EE platform
to heterogeneous Enterprise Information Systems (EIS),
For example, ERP, mainframe transaction processing, database systems, and legacy applications not
written in the Java programming language.
The JCA Resource Adapter is a system-level software driver supplied by EIS vendors or other third-party
vendors.
Multiple resource adapters (one resource adapter per type of EIS) are pluggable into an application
server.
This capability enables application components deployed on the application server to access the
underlying EISs.
In WebSphere Application Server, two types of objects are configured for JCA
support:
Resource adapters,
Connection factories
The role of the WebSphere administrator is to:
Install and define the resource adapter.
Define one or more connection factories associated with the resource adapter.
39) What are resource adapters?
 A WebSphere resource adapter administrative object represents the library that supplies
implementation code for connecting applications to a specific EIS, such as CICS or SAP.
 Resource adapters are stored in a Resource Adapter Archive (RAR) file, which is a Java archive
(JAR) file used to package a resource adapter for the connector architecture.
 The . file has a standard file extension .rar
40) What does .rar file contain?
A RAR file can contain the following:
EIS-supplied resource adapter implementation code in the form of JAR files or other executables, such
as DLLs Utility classes Static documents,
such as HTML files for developer documentation, not used for runtime
J2C common client interfaces, such as cci.jar
A mandatory deployment descriptor (ra.xml)
This deployment descriptor instructs the application server about how to use the resource adapter in an
application server environment.
The deployment descriptor contains information about the resource adapter, including security and
transactional capabilities, and the ManagedConnectionFactory class name.
41). How do you install and configure resource adapters?
To use a resource adapter, you need to install the resource adapter code and create connection
factories that use the adapter. Resource adapter configuration is stored in the resources.xml file.
To install a resource adapter (.rar file), do the following:
1). From the administrative console, expand Resources from the navigation tree.
2). Click Resource Adapters. The administrative console shows all the configured resource adapter
objects. In Figure you see the two resource adapters supplied with WebSphere.
3). Click Install RAR to install a new resource adapter.
4). Enter the path to the RAR file supplied by your EIS vendor. It can reside locally, on the same machine
as the browser, or on any of the nodes in your cell.
5). Select the node where you want to install the RAR file. You have to install the file on each node
separately.
6). Click Next. The Configuration page for the resource adapter selected is displayed. This is shown in
Figure.
In this example you do not have to configure any properties. The defaults combined with the
information supplied in the RAR file provide all the information needed. However, you have the option
of configuring the following:
Name
Create an administrative name for the resource adapter.
Description
Create an optional description of the resource adapter, for your administrative records.
Archive path
This field is the path where the RAR file is installed. If this property is not specified, the archive will be
extracted to the absolute path represented by the ${CONNECTOR_INSTALL_ROOT} variable.
The default is <profile_home>/installedConnectors/<adaptername.rar>
Class path
A list of paths or JAR file names which together form the location for the resource adapter classes. The
resource adapter codebase itself, the RAR file, is automatically added to the classpath.
42). What are the lists of web servers that web sphere can manage?
 Apache HTTP Server
 Domino Web Server
 IBM HTTP Server
 Microsoft Internet Information Services
 Sun Java System Web Server (formerly Sun ONE and iPlanet)
43). What is the special feature in IBM http server compared to other servers?
 If the Web server is defined on an unmanaged node, automatic propagation of a plug-in
configuration is only supported for IBM HTTP Servers.
 WebSphere Application Server supports some additional administrative console tasks for IBM
HTTP Servers on managed and unmanaged nodes.
 For instance, you can start IBM HTTP Servers, stop them, terminate them, display their log files,
and edit their
. configuration files
44). What are unmanaged nodes?
 An unmanaged node does not have a node agent to manage its servers. In a standalone server
environment, you can define one Web server and it, by necessity, resides on an unmanaged
node.
 In a distributed server environment, Web servers defined to an unmanaged node are typically
remote Web servers.
45). What are Managed nodes?
 Managed node has a node agent to manage the webservers or appservers.
46). What is FFDC?
 The First Failure Data Capture (FFDC) function preserves the information generated from a
processing failure and returns control to the affected engines.
47). What are the three property files that control the behavior of FFDC?
 There are three property files located in <was_home>/properties which control the behavior of
the FFDC filter.
ffdcStart.properties, used while the server is starting
ffdcRun.properties, used after the server is ready
ffdcStop.properties, used while the server is stopping
 The captured data is saved automatically in the <profile_home>/logs/ffdc directory for use in
analyzing the problem, and could be collected by the Collector tool.
 The First Failure Data Capture tool is intended primarily for use by IBM Service. It runs as part of
the WebSphere Application Server and you cannot start or stop it. It is recommended that you
not attempt to configure the FFDC tool.
48). What is Application Server Toolkit
The Application Server Toolkit is included with WebSphere Application Server V6. It includes debugging
functionality built on the Eclipse workbench. It provides the following adapters:
 WebSphere Application Server debug adapter
 JavaScript debug adapter
 Compiled language debugger
 Java development tools (JDT) debugger
49). How to find product information
The easiest way to get comprehensive information about the installation is to use the administrative
console. You can use this when the server is running.
1. Select Servers – Application Servers.
2. Click the server.
3. Select the Runtime tab.
4. Click Product Information from the Additional Properties list.
versioninfo.sh is the command line utility to find the information on WebSphere version.
50). How to you determine the Java version.
1). Look in the SystemOut.log file of one of the profile instances.
<profile_home>/logs/server1/SystemOut.log
2). Run java –fullversion
Q.1. What is ND?
A. Network Deployment
Q.2. What is a Cluster?
A. Cluster is a logical name assigned to group of servers (JVMs).
Q.3. What are the different types of clusters?
A. Horizontal and Vertical cluster
Q.4. What is Horizontal and Vertical cluster?
A. A vertical cluster has cluster members on the same node, or a physical machine. A horizontal cluster
has cluster members on multiple nodes across many machines in a cell.
Q.5. What is the difference between WAS v5.x and 6.x?
A. New concepts like Profiles and SIB (System Integration Bus) are introduced in v 6.0.
Q.6. What is the difference between an Application Server and a Web Server?
A. Application Servers hosts the java applications and Web Server is basically used for serving static
HTML pages.
Q.7. What is a Plugin? Where is it installed?
A. WebSphere plug-in integrates with the HTTP Server and directs requests for WebSphere resources
(servlets, JSPs, etc.) to the Websphere application server. The WebSphere plug-in uses a configuration
file called plugin-cfg.xml file to determine which requests are to be handled by WebSphere. As
applications are deployed to the WebSphere configuration, this file must be regenerated (typically using
the Administration Console) and distributed to all Web servers, so that they know which URL requests to
direct to WebSphere.
Q.8. What is the advantage of using Clusters?
A. Clustering provides workload management and failover of URL and EJB requests. The cluster can be
on the same node or on different nodes.
Q.9. What is JDBC, JNDI?
A. JDBC – Java Database Connectivity
JNDI – Java Naming and Directory Interface.
Q.10. What is the command to add a node to the deployment manager?
A. $WAS_HOME/bin/addNode.sh NDHostName SOAPport
Q.11. With Java2Security enabled on WebSphere Application Server, and you are performing an
Enterprise Application deployment, what security file is open during deployment?
A. was.policy
Q.12. Java2Security is enabled at the global level, and an application is deployed to a clustered vm, with
a pair of cluster members. The application encountered performance problems due to Java2Security.
The application team receives a waiver to disable Java2Security. Does J2Security need to be disabled at
the global level or can it be disabled at the server level, leaving Java2Security enabled for other
applications?
A. It can be disabled at the server level leaving it enabled for any other applications.
Q.13. What directory / directories might you find the following IBM script in a Network Deployment
configuration?
PropFilePasswordEncoder.sh
A.under the bin directory for both the nodeagent / deployment manager
Q.14. Identify how you would use the PropFilePasswordEncoder.sh to encode the password for the
following userid in the sas.client..props
# RMI/IIOP user identity
com.ibm.CORBA.loginUserid=websphere
com.ibm.CORBA.loginPassword=test123
A.
./bin/ PropFilePasswordEncoder.sh ../properties/sas.client.props com.ibm.CORBA.loginPassword
Q.15. Identify the steps to enable the PMI (Performance Monitoring Interface).
A. From the Admin Console -> Monitoring and Tuning -> Performance Monitoring Infrastructure – Select
the sever that you want to enable and select the Enable the Performance Monitoring Infrastructure.
Q.16. What is Garbage Collection?
A. Garbage collection is a process of automatically freeing objects that are no longer referenced by the
program.
Q.17. Where would you enable Verbose Garbage Collection?
A. From the Admin Console:
Application Server -> ServerName -> Process Definition -> Java Virtural Machine – Select verbose
garbage collection radio button.
Q.18. What log file would the verbose garbage collection output appear in?
A. native_stdout.log
Q 19. What is the IBM utility script that you can run to take a backup of the WebSphere configuration?
A. backupConfig.sh
Q. Using the Admin Console, where would you find an applications context root?
A. Enterprise Application -> Application - > Additional Properties –> View deployment descriptor.
Q. Using the Admin Console, how to find out the JVM HTTP port?
A. WAS 5.x
– Admin Console -> Servers -> Application Servers -> JVM -> Web Container -> HTTP Transports.
WAS 6.x
- Admin Console -> Servers -> Application Servers -> JVM -> Expand Ports under communications.
Q. How to find the admin console port?
A.
Q. What is a Replication Domain?
A. A replication domain is a collection of replicator entry (or replicator) instances used by clusters or
individual servers within a cell.
All replicators within a replication domain connect with each other, forming a network of replicators.
The default is to define a replication domain for a cluster when creating the cluster. However,
replication domains can span across clusters.
Global default settings apply to all replication use for a given replication domain across a cell. Most
default settings tune and control the behavior of replicator entries in managed servers across the cell.
Such default settings control the use of encryption or the serialization and transferring of objects. Some
default settings tune and control how specific WebSphere Application Server functions (for example,
session manager and dynamic caching) leverage replication, such as session use of partitions.
For situations that require settings values other than the default, change the values for a given
replication domain on the Internal Replication Domains page. Settings include various resource
allocation, replication strategies (such as grouping or partitioning) and methods, as well as some security
related items.
If you are using replication for HttpSession failover, you might also need to filter where the session
replicates. For example, only replicate to two places out of many. The global default settings define the
partition size or number of groups and the session manager settings define the groups to which a
particular instance belongs.
Filtering is less important if you are using replication to distribute information on invalid data and actual
cached data maintained by a Web container's dynamic caching. Replication does not occur for failover
as much as for data synchronization across a cluster or cell when you likely want to avoid expensive
costs for generating data potentially needed across those various servers.
Note that you can filter or segment by using multiple replication domains.
Q. What is SIB (Service Integration Bus)?
Q. What is the difference between SystemOut.log and SystemErr.log?
Q. What does native_stdout.log contains?
Q. What are the SDK versions supported on WAS 4, 4.X, 5, 5.X, 6, 6.X and 7?
A. WAS 7 – SDK 1.6
WAS 6.1.x – SDK 1.5
WAS 6.0.x – SDK 1.4.2
WAS 5.1.1 – SDK 1.4.2
WAS 5.1 – SDK 1.4.1
WAS 5.0.x – SDK 1.3.1
Q. How to check WAS Version / Build Level?
A. ./WAS_HOME/bin/versionInfo.sh
Q. What is the Default SOAP port number?
A. 8879
Q. What are different ways to capture heap dumps for a Websphere JVM?
Q. What do you understand by the term JMS?
A. Java Message Services, JMS, is Sun's standard API for message queuing systems. Message queuing
systems form the front-line interface between businesses (B2B) and for Enterprise Application
Integration (EAI). As such, message queuing systems are often called "middleware" because they
operate in the middle -- between other systems and between enterprises.
Q. What are the different JMS providers available in different WAS versions?
A. WAS 6
WebSphere Embedded Messaging
WebSphere MQ
Generic
V5 Default Messaging
WAS 5
Generic JMS Provider
WebSphere JMS Provider
WebSphere MQ JMS Provider
Q. What are console user roles available in WAS 5 and 6?
A. WAS 5 and WAS 6
Administrator
Configurator
Operator
Monitor
Q. What are the authentication mechanisms available for Global Security in WAS?
A. 1. LTPA (Light weight Third Party Application)
2. SWAM (Simple WebSphere Authentication Mechanism)
Q. What are the User Registries supported by WebSphere for Global Security?
A. Local OS, LDAP and Custom User Registry
Q. How to change the JVM/Process/Diagnostic Trace log file locations for any JVM?
A. 1. Login to the Admin Console.
Q. What are the different types of logs available in WebSphere?
A.
Diagnostic Trace
JVM Logs
Process Logs
IBM Service Logs
BM Interview Questions
These are the interview questions which asked on 17-04-09 by IBM intial round. One thing should
remember by everyone, now a days all the companies who are taking WAS admins they are asking
questions on O/S also, like Linux or UNIX. So be prepare for those operating systems also before
attending an interview.
1. Tell me about yourself (roles and responsibilites)
2. What is the difference b/wn appserver and webserver?
3. How do u configure the plug-in file?
4. How do u configure JDBC drivers and what is meant by J2C authentication?
5. How Internet Works?
A) The Internet is a global system of interconnected computer networks that use the standardized
Internet Protocol Suite (TCP/IP). It is a network of networks that consists of millions of private and
public, academic, business, and government networks of local to global scope that are linked by copper
wires, fiber-optic cables, wireless connections, and other technologies.
6. Explain the process of Federation?
7.How do u administrate admin console in unix?
8. what are the different types of clustering? done
9. What is the advantages of Vertical Clustering?
10. Do u have any idea or did u work with JACL scripts?
11. Where do you find the problems of a Webserver(Log file)?
12. How many types of log files are there! What are they!
13. What is log rotation policy?
14. Where do you enable the Garbage Collector?
using -verbosegc in startup command
15. How to tune an application?
16. When you will perform Thread Dump and Heap Dump?
17. What are the parameters that to pass while generating an Heap Dump?
18. How To identify that heap memory is decreasing and where?
19. Describe the real time problems that u faced in your administration career?
20. What are the major tasks you solved?
21. What is the difference between SSH and Https?
22. Why we enable SSL on webserver rather than App.Server?
A) When ever request comes to application it is start working from Webserver.
SSH
Secure Shell (SSH), sometimes known as Secure Socket Shell, is a Unix-based command interface and
protocol for securely getting access to a remote computer. It is widely used by network administrators
to control Web and other kinds of servers remotely. SSH is actually a suite of three utilities - slogin, ssh,
and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp. SSH commands are
encrypted and secure in several ways. Both ends of the client/server connection are authenticated using
a digital certificate, and passwords are protected by being encrypted.
SSH uses RSA public key cryptography for both connection and authentication. Encryption algorithms
include Blowfish, DES, and IDEA. IDEA is the default.
SSH2, the latest version, is a proposed set of standards from the Internet Engineering Task Force (IETF).
How To Connect To WSadmin Console through SOAP ?
Generally we connect wsadmin console directly with soap port or rmi port.
specially if we want to check whether a particular SOAP port of dmgr is working or not, this requisition
we need whenever we are federating a node to a dmgr.
The following is the command which we use to check whether a particular port is communicating or not.
wsadmin -conntype SOAP -port 8879
wsadmin -conntype RMI -port 9809
wsadmin -conntype RMI -port 2809 -user u1 -password secret1
(1.1) Issues: we got responce from users saying that they not able to receive messages from their
application.
Sol : we identified that message receiver server not able to recive messages from MQ, because of File
storeage failed, then we informed the same to system infrastructure team they added SAN, even though
the problem not got resolved.
I am seeing some transaction timeout errors in the logs:####<21-Jul-2009 16:18:23 o'clock BST>
<21cnedc313>
(1.2) Issues: JMS transaction timeout messages like this in WAS.
Sol: there are bulk number of JMS messages stored in MQ Server, when ever san got added at a time all
the messages in MQ, hit the server at a time, so server is not able process that many number of requests
at a time, then we increase the JTA transaction time out value from 30 to 100, this will allow more time
for transaction to complete. After process all the requests we changed the transaction time out value
back to 30.
(2.1) Issues: the WAS server logs are not getting generated in both the nodes. The last timestamp in the
logs file is 18/07/09 15:36.The same issue has occurred few times and we have to restarted both the
managed servers for the logs to be generated.
Could you please let us know what could be the reason for this issue?
Sol. The log rotation was not set properly, which I have set now. Also the log stopped in the middle of
printing some debugs, which suggests that it ran out of disk space. The /IBM_profile is mounted on root
partition.
(3.1) Can you please send the P2 case (TAM Test Tool not working) which came today morning to
APLSUP54 and request them to check why the ?java.lang.OutOfMemoryError: unable to create new
native thread? occurred.
Also mention in that case that we had taken the thread dump and is present at mps location.
Sol. This is again a native memory issue. The JVM heap allocated is 1.5 Gb (which is necessary otherwise
app starts giving heap errors), which leave 512mb for native memory out of the possible 2Gb max.
This native memory is used by all the native modules like MQ or application codes creating native
memory. If the native memory is not sufficient then you get OutofMemory:unable to create a new
native thread error.
(4.1) We are facing problem with the WebSphere server in dybip04. We are using BEA version 8.1SP6
The Managed server is suddenly going into UNKNOWN state and when we try to restart the server
The following error is occurring::
OutOfMemoryError occured on server
Sol. I have increased the memory size to 2GB and restarted the server. The messages are being
consumed now.
5.1) we are facing connection failure error, due to what causes?
Sol. Finally we found, driver there is one DB driver corrupted in it causes the issue.
Firewarll -> loadbalancer -> Webserver -> app.ser visa plugin -> hits application -> contact db to ds and
request - > firewall -> loadbalancer(split the load into multiple Webserver) -> (sitemider/ssl) webserver -
> via plug in which is in the application server -> application
In side cluster jvm will respond.
How much memory tuned for your application servers in your environment?
Depend upon the application, decided by developer. Or depends on OS.
How will you login to solaris/ linux for installations?
Normally we will not use rout privileged ID for installing/configuring was applications in Linux.
Ex: empid
Su wasuser(not root privileged user) Non-route user
What are the two basic steps that admin have to do after deploying the application & before running
the application?
have to regenerate the web server plug-in, copy it over to the web server machine and do a quick restart
of it
1.wht is hot deployment, and where we get a chance to go for this?
Hot deployment means adding modules or additional services to the existing application or new
application without stopping the application server as well as application. When an application is went
to Production environment then we can't stop the application as application requests will come. So in
that case we will go for hot deployment.
2.Can we access 2 different applications at once running on 2 application servers in a cluster?
If those two applications are mapped exactly on to the same cluster members, we can access for them
by configuring the webserver and plug-in properly for the cluster.
3.how to enable Global Security in WAS though CUI?
To enable Global Security first we have to do
1. Select the Authentication Registry, i.e., either Local OS or LDAP.
Here we have to specify the primary administrative user name which should be present there in the
registry.
2. Select the Authentication Mechanism i.e., LTPA or SWAM.
Here we have to specify the password and confirm-password.
3. Enable Global Security.
4. Save and restart the server.
4.If the app server crashes in the middle of application deployment , wht could be the reason and wht
steps we have to follow?
If the server resources are less while deployment, when application requests are hitting application
server due to less resources the application server will crash. If the application server crash then that
time we can get thread dump.
5.During WAS ND installation, one default server "server1" creates right?can we change its name during
installation?
If we are installing, in silent we can change the default server name we can change, in GUI its not
possible.
Q: What is the default port for SSH server?
A: 22
Posted by Ponraj at 1:27 AM 1 comment:
HSBC Interview
These are the interview questions which are asked in HSBC.
1. What is JavaBean?
A) A JavaBean is a Java Object that is serializable, has a nullary constructor, and allows access to
properties using getter and setter methods.
2. What is difference between soap.client.props and sas.client.props?
3. What is difference between normal JVM and Web sphere JVM?
4. What are the securities in Web sphere?
5. What is DD/Deployment Descriptor?
A) a deployment descriptor describes how a web application or enterprise application should be
deployed. It directs a deployment tool to deploy a module or application with specific container options,
security settings and describes specific configuration requirements
6. What is the deployment descriptor of EAR?
A) as below
7. What is the deployment descriptor of EJB/WAR?
A) ibm-web-bnd.xmi, ibm-web-ext.xmi, web.xml
8. How do you package applications?
9. What is difference between context root and url-pattern?
10. Workload management
11. What is vertical and horizontal scaling and their Advantages and Dis-advantages?
12. How do you configure LDAP and Web sphere?
13. How do you enable global security?
14. How do you find memory leaks? At what situation memory leaks occur –Give any 3
examples? Is there any tool to find memory leaks?
memory leaks in hapen if objects not closing in java program
15. How do you enable verbose GC? In what file, the output is written?
16. When does GC cycle starts?
17. What is OutOfMemory exception and when does it occur?
18. What are your Day-to-Day Activities?
Posted by Ponraj at 1:27 AM No comments:
IBM INTERVIEW Questions on 04-05-09
1. Tell me about your educational background.
2. Tell me about your day to day activity.
3. what is load balancing?
A) Edge component, BIGIP product hardware load balance.
It will be connected to router and switches, Webserver – to – app. server load balancer
4. What is Work Load Management?
A) Failover, High availability, scalability and security are coming from Clustering (WLM).
Two main features are - Load Balancing - AffinityWebSphere WLM is offering these two features on
different levels like - Application/web Server Clustering
5. what is meant by profile? How many types of profiles are there in Was v6.0?
A) 3 types of profiles in 6.0 1.application server , 2. dmgr, 3.default
in 6.1 there are 4 – 1.dmgr, 2.app.serv, 3.default,4.cell profile(already federated appserver profile)
6. how you fedarate a node from deployment manager? and how you federate when global security is
enabled.?
A) we can federate it from console, need to select Node under system administration section, then
select a new node button then provide required(soap port) data.
7. What is SSL ? hOW You configure SSL?
A) It is Already been configured will use dummy, web server part, certificate, configure in that virtual
host.
8. What is meant by Horizontal Clustering? Explain?
A) DONE
9. How to check disk usage in linux or unix?
A) Du -k
10. How to check the multiple NIC in Unix or linux?
A) ifconfig -a
11. How to identify and kill a process ID?
A) Ps –ef
12. What are the measures you follow while deploying an application in production environment?
A) we need to consider below steps.
1. need to take necessary backups, 2. Raise a change request, 3. Approval request, 4. schedule date from
change control.
13. what is the use of trace.log and activity.log?
A) we can use “showlog” commad in bin directory for getting tracer information.
Trace.log : It will have details about the WAS Environment, understandable text format.
Activity.log : It will have complete information about Application server environment, and it is not in
readable format, “waslogbr.bat” for opening/viewing this log. It will have information about complete
base class and other stuff. We have to use “symptom database” for fixing/compare identifying the issue.
15. where do you get performance information in log files of an application server?
A) there are 2 logfiles
1. NativeError.log – at what state the GC happened and how much memory freed up.
2. NativeOut.log – it is having general logs.
Posted by Ponraj at 1:27 AM No comments:
IBM Chennai Interview
1. Are you responsible for production support?
A) Yes
As per on call support, we have dedicate mobile and laptop every week, they will change. And Prioritize,
change at every week on 24x7 basis.
2. Breifly explain about the topology of production environment?
A)
In my production environment we are having 200 applications running across 70 RHEL boxes in 20
WebSphere cells.
Each cell has 3 nodes under dmgr, all nodes are established in horizontal cluster (different RHEL boxes),
All clusters will have 3 jvms run across the RHEL boxes.
Resources: 8 onsite + 8 off shore
Role hierarchy: Business head -> IT MGR -> Middleware mgr -> off-shore team lead ->
My role is Level-1 and 2.
We are did a migration from 5.1 to 6.0/6.1, in my environment, 5.1 will be completely migrated this year
end. We are using paid support from IBM 5.1(3 cells) as free support stopped by IBM.
3. Which environment you are using?
A) Soloaris 6.1/8.x , RHEL Linux: 5.1
4. How many servers and how many applications?
A) Discussed
5. which kind of applications?
A) Client Business:
1. Mortgage, 2.Trading applications
6. Applications are running on clusters?
Yes.
7. How do you verify that you are using Horizontal clusters not a vertical cluster?
A) if u have all the servers in same machine(Host) ,than its vertical ,if cluster servers are installed in
different machine than its horizontal.
-ORGo
to WAS console => select Nodes in left side => in the right side of the console you can see how many
nodes make's your CELL, and also the hostname of the boxes in which the node exists.
if you see all the nodes from different hostnames then its Horizontal clustering if you see same
hostname here then its Vertical clustering
8. your cluster contains how many nodes?
A) 3 nodes
9. Both nodes are running on dmgr. Dmgr is on both nodes?
A) All my production Dmgr in a single box. Nodes will be across different boxes.
Note: if in case failure of DMGR node, then how do we handle the issue?
In that case we need to wait till that problem gets resolved, for any configuration changes in the
console. Generally start and stop server activities will do in application server node.
10. Is it necessary to have dmgr on both nodes?
A) NO, Single dmgr.
11. Do you have dmgr as standalone?
A) We can, but No use.
12. Can we create more than one server in standalone-environement?
A) Never worked on stand alone environment.
13. can we have more than one application in a single server?
A) many
14. I want to depoly the application in any one of the node but not cluster?
A) Node is a server
15. What kind of database you are using?
A) Oracle 10g
16. What kind of security mode you are using or JDBC connection?
A) J2C Authentication
17. What type of driver you are using? Type 4 driver
A)
Type 1 driver: JDBC-ODBC Bridge
This driver called as JDBC-ODBC bridge.The Java Statements converts to JDBC statements.JDBC
statements calls ODBC by using JDBC-ODBC bridge. ODBC drivers convert into the requirements of
databases.
Java--->JDBCStat-->JDBC-ODBC bridge-->ODBC-->Databases.
Type 2 driver: Native-API/partly Java driver
This driver is called as Native Driver where it requires the some native code to connect to the databases.
Type 3 Driver: Net-protocol/all-Java driver
This driver is called as Protocal driver where
Java-->JDBC statements-->SQLStatements--> databases.
Type 4 Driver: This driver directly converts the java statements to SQl Statements which require to
databases. It wont convert to JDBC statement.
18. The application should be authenticate before interacting with database?
A) It will happened, we are creating uid, pwd that will work
19. what is meant by connection pooling?
A) a connection pool is a cache of database connections maintained by the database so that the
connections can be reused when the database receives future requests for data. Connection pools are
used to enhance the performance of executing commands on a database. Opening and maintaining a
database connection for each user, especially requests made to a dynamic database-driven website
application, is costly and wastes resources. In connection pooling, after a connection is created, it is
placed in the pool and it is used over again so that a new connection does not have to be established. If
all the connections are being used, a new connection is made and is added to the pool. Connection
pooling also cuts down on the amount of time a user must wait to establish a connection to the
database.
20. what are the different methods to deploy application?
A)
21. for ear file is context root is necessary?
A) Hostname:9089/appname - context root Yes.
22. I updated the new application but the user is getting the old applicaion only?
A) need to Restart, synch
23. what are the options you have to improve performance?
A) Connection pool, Thread pool of web container, EJB container, web server parameter, jdbc
connection pool
Tuning Application server
Tuning JVM, Tuning Applications, Tuning Database, Tuning JMS, Tuning security, Tuning operating
systems, Tuning Web servers
Connection pool perameters:
$AdminControl getAttribute $objectname surgeCreationInterval
$AdminControl setAttribute $objectname surgeCreationInterval 30
$AdminControl getAttribute $objectname surgeThreshold
$AdminControl setAttribute $objectname surgeThreshold 15
24. to sepcify the weight of a cluster member in which file i have to modify?
A) have to modify in Plugin file
25. I am getting server 500 erro, what will be the reason?
A) Internal server error (server to db middleware)
26. How do enable GC?
In the Administrative Console, expand Servers and then click on Application Servers.
. Click on the server that is encountering the¬ "OutOfMemory" condition.
. On the Configuration tab, under Server¬ Infrastructure, expand Java and Process
Management, and click Process Definition.
. Under the Additional Properties section, click Java Virtual¬ Machine.
. Select the Verbose garbage collection check box.¬
. Click¬ Apply.
. At the top of the Administrative Client, click Save to apply changes¬ to the master
configuration.
. Stop and restart the Application Server
The verbose garbage collection output is written to either native_stderr.log or
native_stdout.log for the Application Server
verbosegc – Tells you what is being done, whether heap size is at min or max.
27. Ho to check GC is active or not, if you don't have?
A) We can check in logs.
28. can you tell me about profiles?
A) WebSphere application binary, profile sharing binaries of existing instance,
29. what is the use of virtual host?
A) Configuration that lets a single host machine resemble multiple host machines. Each virtual
host has a logical name and a list of one or more domain name system (DNS) aliases by which
it is known.
30. Is webserver & application server should be installed in a single machine or different machines?
A) We can do it, but in production different machines.
Webserver OS tuned in different way, app. server different way, normally these web servers in DMZ -
Demilitarized Zone.
31. Difference between managed node and unmanaged node?
A) Managed have node agent, unmanaged not. Unmanaged node we not control from console.
32. How to check application servers are running/not?
A) Ps -grep
33. How to check WAS is running or not through PS?
A) Ps -grep
WAS Edge Components
These are the some of the WAS Edge Components.
WAS Edge Components
Caching Proxy
Proxy Server
Load Balancer
Network Dispatcher Component
Content Based Routing (CBR)
Site Selector Component
Posted by Ponraj at 1:26 AM No comments:
Barclays Interview
1. What is session affinity?
A) Is nothing but a persistence.
Most servers use the term “Session Affinity” to indicate that with in a cluster of servers, requests from
the same client always get routed back to same server. This eliminates the need to replicate session
data like HTTP session or Stateful session Beans.
2. JVM which has been clustered, the server is in production?
A) 1. Memory to memory replication 2. Database persistence
Heartbeat mechanism work in a cluster, member of the cluster identifies that the other server is not
responding it checks 3 times for every 60 seconds, if not responded then it takes the configuration using
memory replication process then completes request.
3. What is fix pack?
A) Patches to fix a particular issue for a particular in environment only not other.
4. What is patch?
A) It is like independent to every body, bug fix of WAS. WAS 6.1.0.17
5. What is migration? How can you migrate from one version to another version?
A) discussed
5. How can you disable the security without admin console?
A) we can disable in Security.xml, but we can’t enable.
6. Complete configureation steps for SSL?
A) We have to install ibm http server, by using ikeyman tool we can create and use SSL certificates.
7. How to configure session management?
A) we can configure though console, either in application/deployment descriptor.
8. How can you provide security authentication for web server?
A) eTrust SiteMinder tool
9. How to know webserver version?
A) we can find in Logfile.
10. How to identify old and new context roots?
A) in Httpd.conf file we can see commented(old) and uncommented(new) data.
11. Difference between v5 & v6.
A)
1. Multiple Profile creations with a single installation (All profiles share same WebSphere binaries)
2. Introduction of Service Integration Bus (SIB) for messaging
3. Has default JMS providers
4. Supports mixed version nodes in a v6 ND Cell
5. Has some extra add-ons in the Admin console navigation tree
6. JACL has been deprecated in 6.1
12. What is the difference between WAS and WL?
A)
1. In weblogic u cant do clustering accros the domain,but in Websphere u can.
2. In weblogic all the configurations are stored in a single file called Config.xml ,but in Websphere its
stored in a directory structure called CELL
3. In weblogic u can start the managed server without a Adminserver(using MSI-config.xml),in
websphere u can not start a node with out Dmgr.
4. In websphere u can add webserver as a unmanaged node where as u cannnt do that in weblogic.
13. How many types of installation are there?
A) GUI, using Response file (silent mode), command line .
14. JACL scripting? Alredy discussed
15. If the performance, of the appliacation goes down? what will u do?
A) Performance Information should collect from monitoring tool
16. what is the difference between L1, L2, L3?
A)
l1- is basic level (monitoring, basic configuration)
l2 -back up who are senior staff (trouble shooting)
l3 –architechts (designing / architect/ requirement(ram/box))
17. the uesr submitted the request, when that request is on processing in the middle the server crashes
then what happens?
It will lost.
Posted by Ponraj at 1:26 AM No comments:
Friday, September 14, 2007
Websphere application server interview Questions
Here is the major websphere application server interview questions collection and answer
Wells Fargo 16-07-09
1) What are your daily day to day Activates?
A) We have ticketing tools, We have 2 Type of tickets:
1. Change request : scheduled activities like new resources creation, JVM settings, Configuration of the
application and development teams raised tickets
2. Incident request : production support or monitoring like up gradation.
We have a dev team; if they found any issues they will raise a ticket.
We have a production support team, and Monitoring team, if they come across some thing abnormal
then they will raise a production support tickets.
We are having WAS 5.1 and 6.1, so daily we are having configuration setups for migration, and building
the similar environment as 5.1 in 6.1In different boxes as new environment.
Right now I don’t have chance to write new scripts. How to check thread dump in jacl
How do you check the health of the appserver? Is there any tool is avialable with you?
A) We have monitoring tools, at the time issue only, TPV (Tivoli Performance Viewer)/Willy Introscope,
and normally it is disabled, at the time of performance issue only we will do monitoring.
2 kinds of monitoring: 1. Availability, 2. performance monitoring 24/7 or not.
L1 team using SiteScope: SiteScope WebSphere Performance Servlet Monitor to monitor the server
statistics of IBM WebSphere Server (versions 3.0x, 3.5, 3.5.x, and 4.0) via a WebSphere Performance
Servlet. The error and warning thresholds for the monitor can be set on as many as ten performance
statistics.
3) Can u configure multpile apache webservers?
A) we can configure in httpd.conf file.
4) Is it possible to configure 10 domain names in apache? if yes? How?
A) we can use virtual hosts.
5) How do you perform heap dump and thread dump?
A) Kill -3 <>
Heap dump relate to jvm memory usage,
Thread dump relate jvm thread usage
6) Is kill -3,kill a process or create a thread dump? explain!
A) kill -3 is used create thread dump.
7) Did u work with any tools which helps you to see the heap dump or thread dump?
A) Heap dump jmap, IBM heap analyzer tool, thread dump using IBM thread analyzer /samurai
8) How to configure security and LDAP?
A) Global security,
Security availability: 1. OS security 2. LDAP (3rd party security) 3. Custom security(Application from DB)
9) What are 202 errors?
Accepted.
10) In ls -lrt, what t stands for and r stands for l stands for?
A)
-l shows you huge amounts of information (permissions, owners, size, and when last modified.)
-r reverses the order of how the files are displayed.
-t shows you the files in modification time
11) How to check a particular port is working or not in unix?
A) netstat -a | grep 80
Posted by Ponraj at 4:50 AM No comments:
Monday, July 03, 2006
IBM Hyderabad
1)Tellme About yourself?
A) Worked as a Websphere administrator. Was responsible for deploying, configuring,
tuning, clustering, and troubleshooting WebSphere related issues.
2)Configuration of WebServer with AppServer?
A) This configuration available in httpd.conf file of a web server, in this file we will configure virtual hosts
and domains etc .
3) Role of Plugin-Cfg.xml?
A) When ever request comes to Webserver it identifies the app. server configuration in this
configuration file.
4) Tell me about RemoteConfiguration?
5) How do you deploy an application in AdminConsole?
6) How do you deploy an EAR file in admin console?
7) What is meant by default bindings?
A) It will bind the resources to connect….at time of startup
8)What are precompiled jsps?
9) Are you comfortable with MQ?
A) I have a little bit knowledge.
10)Tell me about MQConfiguration with WAS?
A) We will configure from console, resources -> JMS -> Queues-> integrating with MQ.
11) Tell me the command to find RAM size in AIX/Unix?
A) prtconf only for AIX
12)Command to find diskfree space?
A) Df –k or m
13) how do you provide Custom security?
A) Developer will give the authorization from an application(may be uid/pwd from Oracle DB)
14)Suppose if u enable customsecurity after opening the admin console in the rightside suppose if you
got only 2 options instead of 3 then what to do?
A) question not clear
15)How much you are comfortable with scripting(JACL/JYTHON)?
A) I have little bit knowledge.
Set $
puts "About to dump threads for this jvm..."
$AdminControl invoke $jvm dumpThreads
puts "... done"
------------
Invoke the generateHeapDump operation on a JVM MBean, for example,
Finding JVM objectName:
set objectName [$AdminControl queryNames
WebSphere:type=JVM,process=<servername>,node=<nodename>,*]
Invoking the generateHeapDump operation on JVM MBean:
$AdminControl invoke $objectName generateHeapDump
Ex: wsadmin -f test.py a b c
test.py content:
import sys
first = sys.argv[0]
second = sys.argv[1]
third = sys.argv[2]
arglen = len(sys.argv)
16)In Jython script how to invoke a variable which was defined in another jython script?
Using MBeans
Calling scripts using another script
Use the execfile command to call a Jython script from another Jython script. For example:
Create a script called test1.py that contains the following:
execfile('c:/temp/script/testFunctions.py')
print printName('Cathy', 'Smith')
Create a script called testFunctions.py that contains the following:
def printName(first, last):
name = first + ' ' + last
return name
Then pass the following path as a script argument:
wsadmin -lang jython -f 'c:/temp/script/test1.py'
1. Are you responsible for production support?
A) Yes
As per on call support, we have dedicate mobile and laptop every week, they will change. And Prioritize,
change at every week on 24x7 basis.
2. Breifly explain about the topology of production environment?
A)
In my production environment we are having 200 applications running across 70 RHEL boxes in 20
WebSphere cells.
Each cell has 3 nodes under dmgr, all nodes are established in horizontal cluster (different RHEL boxes),
All clusters will have 3 jvms run across the RHEL boxes.
Resources: 8 onsite + 8 off shore
Role hierarchy: Business head -> IT MGR -> Middleware mgr -> off-shore team lead ->
My role is Level-1 and 2.
We are did a migration from 5.1 to 6.0/6.1, in my environment, 5.1 will be completely migrated this year
end. We are using paid support from IBM 5.1(3 cells) as free support stopped by IBM.
3. Which environment you are using?
A) Soloaris 6.1/8.x , RHEL Linux: 5.1
4. How many servers and how many applications?
A) Discussed
5. which kind of applications?
A) Client Business:
1. Mortgage, 2.Trading applications
6. Applications are running on clusters?
Yes.
7. How do you verify that you are using Horizontal clusters not a vertical cluster?
A) if u have all the servers in same machine(Host) ,than its vertical ,if cluster servers are installed in
different machine than its horizontal.
-ORGo
to WAS console => select Nodes in left side => in the right side of the console you can see how many
nodes make's your CELL, and also the hostname of the boxes in which the node exists.
if you see all the nodes from different hostnames then its Horizontal clustering if you see same
hostname here then its Vertical clustering
8. your cluster contains how many nodes?
A) 3 nodes
9. Both nodes are running on dmgr. Dmgr is on both nodes?
A) All my production Dmgr in a single box. Nodes will be across different boxes.
Note: if in case failure of DMGR node, then how do we handle the issue?
In that case we need to wait till that problem gets resolved, for any configuration changes in
the console. Generally start and stop server activities will do in application server node.
10. Is it necessary to have dmgr on both nodes?
A) NO, Single dmgr.
11. Do you have dmgr as standalone?
A) We can, but No use.
12. Can we create more than one server in standalone-environement?
A) Never worked on stand alone environment.
13. can we have more than one application in a single server?
A) many
14. I want to depoly the application in any one of the node but not cluster?
A) Node is a server
15. What kind of database you are using?
t
A) Oracle 10g
16. What kind of security mode you are using or JDBC connection?
A) J2C Authentication
17. What type of driver you are using? Type 4 driver
A)
Type 1 driver: JDBC-ODBC Bridge
This driver called as JDBC-ODBC bridge.The Java Statements converts to JDBC statements.JDBC
statements calls ODBC by using JDBC-ODBC bridge. ODBC drivers convert into the requirements of
databases.
Java--->JDBCStat-->JDBC-ODBC bridge-->ODBC-->Databases.
Type 2 driver: Native-API/partly Java driver
This driver is called as Native Driver where it requires the some native code to connect to the databases.
Type 3 Driver: Net-protocol/all-Java driver
This driver is called as Protocal driver where
Java-->JDBC statements-->SQLStatements--> databases.
Type 4 Driver: This driver directly converts the java statements to SQl Statements which require to
databases. It wont convert to JDBC statement.
18. The application should be authenticate before interacting with database?
A) It will happened, we are creating uid, pwd that will work
19. what is meant by connection pooling?
A) a connection pool is a cache of database connections maintained by the database so that the
connections can be reused when the database receives future requests for data. Connection pools are
used to enhance the performance of executing commands on a database. Opening and maintaining a
database connection for each user, especially requests made to a dynamic databasedrivenwebsite
application, is costly and wastes resources. In connection pooling, after a connection is
created, it is placed in the pool and it is used over again so that a new connection does not have to be
established. If all the connections are being used, a new connection is made and is added to the pool.
Connection pooling also cuts down on the amount of time a user must wait to establish a connection to
the database.
20. what are the different methods to deploy application?
A)
21. for ear file is context root is necessary?
A) Hostname:9089/appname - context root Yes.
22. I updated the new application but the user is getting the old applicaion only?
A) need to Restart, synch
23. what are the options you have to improve performance?
A) Connection pool, Thread pool of web container, EJB container, web server parameter, jdbc
connection pool
Tuning Application server
Tuning JVM, Tuning Applications, Tuning Database, Tuning JMS, Tuning security, Tuning operating
systems, Tuning Web servers
Connection pool perameters:
$AdminControl getAttribute $objectname surgeCreationInterval
$AdminControl setAttribute $objectname surgeCreationInterval 30
$AdminControl getAttribute $objectname surgeThreshold
$AdminControl setAttribute $objectname surgeThreshold 15
24. to sepcify the weight of a cluster member in which file i have to modify?
A) have to modify in Plugin file
25. I am getting server 500 erro, what will be the reason?
A) Internal server error (server to db middleware)
26. How do enable GC?
In the Administrative Console, expand Servers and then click on Application Servers.
. Click on the server that is encountering the¬ "OutOfMemory" condition.
. On the Configuration tab, under Server¬ Infrastructure, expand Java and Process
Management, and click Process Definition.
. Under the Additional Properties section, click Java Virtual¬ Machine.
. Select the Verbose garbage collection check box.¬
. Click¬ Apply.
. At the top of the Administrative Client, click Save to apply changes¬ to the master
configuration.
. Stop and restart the Application Server
The verbose garbage collection output is written to either native_stderr.log or
native_stdout.log for the Application Server
verbosegc – Tells you what is being done, whether heap size is at min or max.
27. Ho to check GC is active or not, if you don't have?
A) We can check in logs.
28. can you tell me about profiles?
A) WebSphere application binary, profile sharing binaries of existing instance,
29. what is the use of virtual host?
A) Configuration that lets a single host machine resemble multiple host machines. Each virtual
host has a logical name and a list of one or more domain name system (DNS) aliases by which
it is known.
30. Is webserver & application server should be installed in a single machine or different machines?
A) We can do it, but in production different machines.
Webserver OS tuned in different way, app. server different way, normally these web servers in DMZ -
Demilitarized Zone.
31. Difference between managed node and unmanaged node?
A) Managed have node agent, unmanaged not. Unmanaged node we not control from console.
32. How to check application servers are running/not?
A) Ps -grep
33. How to check WAS is running or not through PS?
A) Ps -grep
WAS Edge Components
These are the some of the WAS Edge Components.
WAS Edge Components
Caching Proxy
Proxy Server
Load Balancer
Network Dispatcher Component
Content Based Routing (CBR)
Site Selector Component
What is JDBC, Jdbc Provider and Data Source and JNDI
1. What is JDBC ?
JDBC is an API (Application Program Interfaces) , that is useful to write a java program to connect any
database, and retrieve the data for the database and utilize the data in the java program.
Making a connection to a database
Creating SQL or MYSQL Statement
Execute that Sql or MySql queries in the database
We have 2 types of Jdbc drivers in WAS, Those are type 2(think) and type 4(thin/native protocol)
type 2 driver require the database client software on the client node to connect to the database server
type 4 driver connect directly to the database server
2. What is Data Source ?
Data Source allow to you to manage a pool of connection to a database
Data Source is handle to which database you want to connect , it is a communication between database
and
client or end-user
3. What is Connection Pool ?
Connection pool is a place where a set of connection are kept and are used in different programs
without creating connection to the database, after using the connection he can send back that
connection to the connection pool
4. What is Jdbc Provider ?
It is a database provided by the vendor which database we have to use like mysql , oracle etc..
This details given by the client or vendor
5.What is JNDI ?
Java Naming Directory Interface Service is used to register the resource hosted by server's
JNDI gives unique name for every server
It is implements on the top of CORBA (Common Request Broker Architecture)
The SSL configuration for WebSphere provides the authentication between the WEB Server (IBM IHS
2.0.47.1) and the WebSphere JVM. The configuration uses Self Signed Certificates with a Five Year (1825
days) operational limit. No Keys are purchased to provide this security as no customer facing interaction
is involved, hence certificates are self signed.
The principle sections of the setup are:-
ServerKey.jks - Holds the WebSphere Server Certificate
ServerTrust.jks - Holds the Server Key, Client Key and the Plugin Key
allowing WebSphere to trust client connections (SAS,
SOAP) and the WEB Server via the WEB Plugin.
ClientKey.jks - Holds the Client Certificate for SAS & SOAP /
WebServices Authentication.
ClientTrust.jks - Holds the Server Key and Client Key allowing the
SAS & SOAP Web Services to trust the WebSphere
JVM.
PluginKey.kdb - Holds the Plugin Certificate and the Server Key to
enable the Web Server to trust the WebSphere JVM.
PluginKey.sth - Holds the Access password for the PluginKey.kdb
Part-V :
1)Tellme About yourself?
A) Worked as a Websphere administrator. Was responsible for deploying, configuring,
tuning, clustering, and troubleshooting WebSphere related issues.
2)Configuration of WebServer with AppServer?
A) This configuration available in httpd.conf file of a web server, in this file we will configure virtual hosts
and domains etc .
3) Role of Plugin-Cfg.xml?
A) When ever request comes to Webserver it identifies the app. server configuration in this
configuration file.
4) Tell me about RemoteConfiguration?
5) How do you deploy an application in AdminConsole?
6) How do you deploy an EAR file in admin console?
7) What is meant by default bindings?
A) It will bind the resources to connect….at time of startup
8)What are precompiled jsps?
9) Are you comfortable with MQ?
A) I have a little bit knowledge.
10)Tell me about MQConfiguration with WAS?
A) We will configure from console, resources -> JMS -> Queues-> integrating with MQ.
11) Tell me the command to find RAM size in AIX/Unix?
A) prtconf only for AIX
12)Command to find diskfree space?
A) Df –k or m
13) how do you provide Custom security?
A) Developer will give the authorization from an application(may be uid/pwd from Oracle DB)
14)Suppose if u enable customsecurity after opening the admin console in the rightside suppose if you
got only 2 options instead of 3 then what to do?
A) question not clear
15)How much you are comfortable with scripting(JACL/JYTHON)?
A) I have little bit knowledge.
Set $
puts "About to dump threads for this jvm..."
$AdminControl invoke $jvm dumpThreads
puts "... done"
------------
Invoke the generateHeapDump operation on a JVM MBean, for example,
Finding JVM objectName:
set objectName [$AdminControl queryNames
WebSphere:type=JVM,process=<servername>,node=<nodename>,*]
Invoking the generateHeapDump operation on JVM MBean:
$AdminControl invoke $objectName generateHeapDump
Ex: wsadmin -f test.py a b c
test.py content:
import sys
first = sys.argv[0]
second = sys.argv[1]
third = sys.argv[2]
arglen = len(sys.argv)
16)In Jython script how to invoke a variable which was defined in another jython script?
Using MBeans
Calling scripts using another script
Use the execfile command to call a Jython script from another Jython script. For example:
Create a script called test1.py that contains the following:
execfile('c:/temp/script/testFunctions.py')
print printName('Cathy', 'Smith')
Create a script called testFunctions.py that contains the following:
def printName(first, last):
name = first + ' ' + last
return name
Then pass the following path as a script argument:
wsadmin -lang jython -f 'c:/temp/script/test1.py’
1) What are your daily day to day Activates?
A) We have ticketing tools, We have 2 Type of tickets:
1. Change request : scheduled activities like new resources creation, JVM settings, Configuration of the
application and development teams raised tickets
2. Incident request : production support or monitoring like up gradation.
We have a dev team; if they found any issues they will raise a ticket.
We have a production support team, and Monitoring team, if they come across some thing abnormal
then they will raise a production support tickets.
We are having WAS 5.1 and 6.1, so daily we are having configuration setups for migration, and building
the similar environment as 5.1 in 6.1In different boxes as new environment.
Right now I don’t have chance to write new scripts. How to check thread dump in jacl
How do you check the health of the appserver? Is there any tool is avialable with you?
A) We have monitoring tools, at the time issue only, TPV (Tivoli Performance Viewer)/Willy Introscope,
and normally it is disabled, at the time of performance issue only we will do monitoring.
2 kinds of monitoring: 1. Availability, 2. performance monitoring 24/7 or not.
L1 team using SiteScope: SiteScope WebSphere Performance Servlet Monitor to monitor the server
statistics of IBM WebSphere Server (versions 3.0x, 3.5, 3.5.x, and 4.0) via a WebSphere Performance
Servlet. The error and warning thresholds for the monitor can be set on as many as ten performance
statistics.
3) Can u configure multpile apache webservers?
A) we can configure in httpd.conf file.
4) Is it possible to configure 10 domain names in apache? if yes? How?
A) we can use virtual hosts.
5) How do you perform heap dump and thread dump?
A) Kill -3 <>
Heap dump relate to jvm memory usage,
Thread dump relate jvm thread usage
6) Is kill -3,kill a process or create a thread dump? explain!
A) kill -3 is used create thread dump.
7) Did u work with any tools which helps you to see the heap dump or thread dump?
A) Heap dump jmap, IBM heap analyzer tool, thread dump using IBM thread analyzer /samurai
8) How to configure security and LDAP?
A) Global security,
Security availability: 1. OS security 2. LDAP (3rd party security) 3. Custom security(Application from DB)
9) What are 202 errors?
Accepted.
10) In ls -lrt, what t stands for and r stands for l stands for?
A)
-l shows you huge amounts of information (permissions, owners, size, and when last modified.)
-r reverses the order of how the files are displayed.
-t shows you the files in modification time
11) How to check a particular port is working or not in unix?
A) netstat -a | grep 80
1. What is session affinity?
A) Is nothing but a persistence.
Most servers use the term “Session Affinity” to indicate that with in a cluster of servers, requests from
the same client always get routed back to same server. This eliminates the need to replicate session
data like HTTP session or Stateful session Beans.
2. JVM which has been clustered, the server is in production?
A) 1. Memory to memory replication 2. Database persistence
Heartbeat mechanism work in a cluster, member of the cluster identifies that the other server is not
responding it checks 3 times for every 60 seconds, if not responded then it takes the configuration using
memory replication process then completes request.
3. What is fix pack?
A) Patches to fix a particular issue for a particular in environment only not other.
4. What is patch?
A) It is like independent to every body, bug fix of WAS. WAS 6.1.0.17
5. What is migration? How can you migrate from one version to another version?
A) discussed
5. How can you disable the security without admin console?
A) we can disable in Security.xml, but we can’t enable.
6. Complete configureation steps for SSL?
A) We have to install ibm http server, by using ikeyman tool we can create and use SSL certificates.
7. How to configure session management?
A) we can configure though console, either in application/deployment descriptor.
8. How can you provide security authentication for web server?
A) eTrust SiteMinder tool
9. How to know webserver version?
A) we can find in Logfile.
10. How to identify old and new context roots?
A) in Httpd.conf file we can see commented(old) and uncommented(new) data.
11. Difference between v5 & v6.
A)
1. Multiple Profile creations with a single installation (All profiles share same WebSphere binaries)
2. Introduction of Service Integration Bus (SIB) for messaging
3. Has default JMS providers
4. Supports mixed version nodes in a v6 ND Cell
5. Has some extra add-ons in the Admin console navigation tree
6. JACL has been deprecated in 6.1
12. What is the difference between WAS and WL?
A)
1. In weblogic u cant do clustering accros the domain,but in Websphere u can.
2. In weblogic all the configurations are stored in a single file called Config.xml ,but in Websphere its
stored in a directory structure called CELL
3. In weblogic u can start the managed server without a Adminserver(using MSI-config.xml),in
websphere u can not start a node with out Dmgr.
4. In websphere u can add webserver as a unmanaged node where as u cannnt do that in weblogic.
13. How many types of installation are there?
A) GUI, using Response file (silent mode), command line .
14. JACL scripting? Alredy discussed
15. If the performance, of the appliacation goes down? what will u do?
A) Performance Information should collect from monitoring tool
16. what is the difference between L1, L2, L3?
A)
l1- is basic level (monitoring, basic configuration)
l2 -back up who are senior staff (trouble shooting)
l3 –architechts (designing / architect/ requirement(ram/box))
17. the uesr submitted the request, when that request is on processing in the middle the server crashes
then what happens?
It will lost.
1. Are you responsible for production support?
A) Yes
As per on call support, we have dedicate mobile and laptop every week, they will change. And Prioritize,
change at every week on 24x7 basis.
2. Breifly explain about the topology of production environment?
In my production environment we are having 200 applications running across 70 RHEL boxes in 20
WebSphere cells.
Each cell has 3 nodes under dmgr, all nodes are established in horizontal cluster (different RHEL boxes),
All clusters will have 3 jvms run across the RHEL boxes.
Resources: 8 onsite + 8 off shore
Role hierarchy: Business head -> IT MGR -> Middleware mgr -> off-shore team lead ->
My role is Level-1 and 2.
We are did a migration from 5.1 to 6.0/6.1, in my environment, 5.1 will be completely migrated this year
end. We are using paid support from IBM 5.1(3 cells) as free support stopped by IBM.
3. Which environment you are using?
A) Soloaris 6.1/8.x , RHEL Linux: 5.1
4. How many servers and how many applications?
A) Discussed
5. which kind of applications?
A) Client Business:
1. Mortgage, 2.Trading applications
6. Applications are running on clusters?
Yes.
7. How do you verify that you are using Horizontal clusters not a vertical cluster?
A) if u have all the servers in same machine(Host) ,than its vertical ,if cluster servers are installed in
different machine than its horizontal.
-ORGo
to WAS console => select Nodes in left side => in the right side of the console you can see how many
nodes make's your CELL, and also the hostname of the boxes in which the node exists.
if you see all the nodes from different hostnames then its Horizontal clustering if you see same
hostname here then its Vertical clustering
8. your cluster contains how many nodes?
A) 3 nodes
9. Both nodes are running on dmgr. Dmgr is on both nodes?
A) All my production Dmgr in a single box. Nodes will be across different boxes.
Note: if in case failure of DMGR node, then how do we handle the issue?
In that case we need to wait till that problem gets resolved, for any configuration changes in
the console. Generally start and stop server activities will do in application server node.
10. Is it necessary to have dmgr on both nodes?
A) NO, Single dmgr.
11. Do you have dmgr as standalone?
A) We can, but No use.
12. Can we create more than one server in standalone-environement?
A) Never worked on stand alone environment.
13. can we have more than one application in a single server?
A) many
14. I want to depoly the application in any one of the node but not cluster?
A) Node is a server
15. What kind of database you are using?
A) Oracle 10g
16. What kind of security mode you are using or JDBC connection?
A) J2C Authentication
17. What type of driver you are using? Type 4 driver
A)
Type 1 driver: JDBC-ODBC Bridge
This driver called as JDBC-ODBC bridge.The Java Statements converts to JDBC statements.JDBC
statements calls ODBC by using JDBC-ODBC bridge. ODBC drivers convert into the requirements of
databases.
Java--->JDBCStat-->JDBC-ODBC bridge-->ODBC-->Databases.
Type 2 driver: Native-API/partly Java driver
This driver is called as Native Driver where it requires the some native code to connect to the databases.
Type 3 Driver: Net-protocol/all-Java driver
This driver is called as Protocal driver where
Java-->JDBC statements-->SQLStatements--> databases.
Type 4 Driver: This driver directly converts the java statements to SQl Statements which require to
databases. It wont convert to JDBC statement.
18. The application should be authenticate before interacting with database?
A) It will happened, we are creating uid, pwd that will work
19. what is meant by connection pooling?
A) a connection pool is a cache of database connections maintained by the database so that the
connections can be reused when the database receives future requests for data. Connection pools are
used to enhance the performance of executing commands on a database. Opening and maintaining a
database connection for each user, especially requests made to a dynamic databasedrivenwebsite
application, is costly and wastes resources. In connection pooling, after a connection is
created, it is placed in the pool and it is used over again so that a new connection does not have to be
established. If all the connections are being used, a new connection is made and is added to the pool.
Connection pooling also cuts down on the amount of time a user must wait to establish a connection to
the database.
20. what are the different methods to deploy application?
A)
21. for ear file is context root is necessary?
A) Hostname:9089/appname - context root Yes.
22. I updated the new application but the user is getting the old applicaion only?
A) need to Restart, synch
23. what are the options you have to improve performance?
A) Connection pool, Thread pool of web container, EJB container, web server parameter, jdbc
connection pool
Tuning Application server
Tuning JVM, Tuning Applications, Tuning Database, Tuning JMS, Tuning security, Tuning operating
systems, Tuning Web servers
Connection pool perameters:
$AdminControl getAttribute $objectname surgeCreationInterval
$AdminControl setAttribute $objectname surgeCreationInterval 30
$AdminControl getAttribute $objectname surgeThreshold
$AdminControl setAttribute $objectname surgeThreshold 15
24. to sepcify the weight of a cluster member in which file i have to modify?
A) have to modify in Plugin file
25. I am getting server 500 erro, what will be the reason?
A) Internal server error (server to db middleware)
26. How do enable GC?
In the Administrative Console, expand Servers and then click on Application Servers.
. Click on the server that is encountering the¬ "OutOfMemory" condition.
. On the Configuration tab, under Server¬ Infrastructure, expand Java and Process
Management, and click Process Definition.
. Under the Additional Properties section, click Java Virtual¬ Machine.
. Select the Verbose garbage collection check box.¬
. Click¬ Apply.
. At the top of the Administrative Client, click Save to apply changes¬ to the master
configuration.
. Stop and restart the Application Server
The verbose garbage collection output is written to either native_stderr.log or
native_stdout.log for the Application Server
verbosegc – Tells you what is being done, whether heap size is at min or max.
27. Ho to check GC is active or not, if you don't have?
A) We can check in logs.
28. can you tell me about profiles?
A) WebSphere application binary, profile sharing binaries of existing instance,
29. what is the use of virtual host?
A) Configuration that lets a single host machine resemble multiple host machines. Each virtual
host has a logical name and a list of one or more domain name system (DNS) aliases by which
it is known.
30. Is webserver & application server should be installed in a single machine or different machines?
A) We can do it, but in production different machines.
Webserver OS tuned in different way, app. server different way, normally these web servers in DMZ -
Demilitarized Zone.
31. Difference between managed node and unmanaged node?
A) Managed have node agent, unmanaged not. Unmanaged node we not control from console.
32. How to check application servers are running/not?
A) Ps -grep
33. How to check WAS is running or not through PS?
A) Ps -grep
WAS Edge Components
These are the some of the WAS Edge Components.
WAS Edge Components
Caching Proxy
Proxy Server
Load Balancer
Network Dispatcher Component
Content Based Routing (CBR)
Site Selector Component
1) Explain about web sphere?
The word web sphere popularly refers to IBM middleware technology products. Web sphere is
known for its turn key operation in e business applications. It has run time components and tools
which can help in creating applications which run on WAS. WAS refers to web sphere
application server.
2) Explain about web sphere commerce?
IBM web sphere commerce has a single platform which offers complete ecommerce solutions to
developers. It can be very productive if you are planning to do business with consumers,
business and indirectly through channel partners. This can be used to perform business with
consumers, business and channel partners altogether.
3) Detail about the architecture of web sphere?
Web Sphere is built on three main components they are
• Database
• J2EE application server
• A web server
The databases which it supports are
• DB2
• Oracle
• Cloudscape
Application server is IBMWAS and the supported web servers are
• IBM server
• Microsoft IIS
• Sun web server
4) State some of the features present in web sphere?
Some of the features which are present in web sphere are: -
• Order management
• Web sphere commerce accelerator
• Analytical and business intelligence
• Open standards such as Java, EJB, etc
• Web sphere commerce payments and customer care, etc
5) Explain about IBM Web Sphere edge server?
Web sphere edge server is used to improve the performance of web based systems. It can be used
as forward or proxy server. Basically four components are present in the web sphere they are
Network dispatcher, Caching proxy, Content distribution and application service at the edge.
6) Explain about extended deployment?
Web sphere application server extended deployment increases the functionality of the server in
two main areas they are manageability and performance. Dynamic virtualization between servers
is possible with the help of XD. A stand alone distributed cache was added to it under the
performance header, it is known as Object Grid.
7) Explain about the security features present in WAS?
Security model for web sphere is primarily based on JAVA EE security model. It also depends
upon the operating system. User authentication and authorization mechanisms are also provided
in WAS. Light weight third party authentication mechanism is the main security feature present
in WAS.
8) Explain about asymmetric clustering?
Asymmetric clustering applications are primarily used in electronic trading systems employed in
banks. Some of the features are, partitions can be declared during run time and are usually run on
a single cluster at a time. Work specific to a particular can be routed to that cluster.
9) Explain the various Administrator benefits using Web sphere?
Web sphere almost reduces the work of server administrator as he can manage load on servers
efficiently without any hassles. It also gives him flexibility to divide the load and applications
among different server farms. He can also predict about the incoming load on servers. Email
alerts, restart options, memory leak detection, etc.
10) Explain about caching proxy of IBM Web sphere Edge sphere?
A caching proxy can be configured in forward direction or as a proxy. Content requested by the
user is cached by edge before sending or adhering to the query. Page fragments arising from JSP
or servlets are cached by Edge and the caching process is slow. Performance and scalability of
J2EE applications can be increased by edge.
11) Explain about the network deployment feature present in WAS?
Managing singletons will be a thing of the past and it also provides hot recovery of singletons
which makes you forget about your GC collected singletons. Transaction logs can stored on a
shared file system. For clustering run time operations deployment manager`s role was
eliminated. J2EE failover support and cell configuration support is also present.
12) Explain about IBM web sphere integration developer?
Web sphere integration developer provides an IDE to build applications based on service
oriented architecture. Web sphere process server and web sphere ESB were built with WID.
WID was built with RAD Eclipse based technology.
13) Explain about compute Grid?
Compute grid is also known as Web sphere batch. Web sphere extended deployment offers a
Java batch processing system called as Compute Grid. This forms an additional feature to Web
sphere network environment. Various features are provided which help a developer to create,
manage and execute batch jobs. Job scheduler, xJCL, batch container and batch programming
controller.
14) Explain about web sphere MQ Real time transport?
This feature is very useful in instant messaging across different clients through intranet and
internet. This supports high volume and high performance across different clients. It uses the
concept of light weight transport which is again based on IP rather than the queue process.
15) Explain about Web sphere MQ JMS Provider?
Web sphere MQ and Web Sphere Business integration manager Broker are very useful in
providing Java messaging services to wide range of clients (publisher –subscribe, point to point).
Java classes are chiefly responsible for translating the API calls to API`s defined by web sphere.
It is very useful to have knowledge of Web sphere MQ for proper configuration.
16) Explain the attribute CHANNEL in web sphere MQ?
CHANNEL specifies the name of the server connection channel. Generally this is Web Sphere
MQ network abstraction. The default standard used by CHANNEL is SVRCONN which is the
server connection channel. This server is generally used to communicate to the queue manager
by the client.
17) Is the naming of connection factory independent of the name specified by JMS
client?
Yes, the naming of connection factory is independent of the name specified by JMS client. This
is made possible by WAS (Web sphere application server) with its resource references. It isolates
the application from object names. This feature is important because it gives us the flexibility to
change the administered object without changing the JMS client code.
18) What is the difference between Web Server and Application Server ?
Webserver:
A Web server handles the HTTP protocol. When the Web server receives an HTTP request, it
responds with an HTTP response, such as sending back an HTML page. To process a request, a
Web server may respond with a static HTML page or image, send a redirect, or delegate the
dynamic response generation to some other program such as CGI scripts, JSPs (JavaServer
Pages), servlets, ASPs (Active Server Pages), server-side JavaScripts, or some other server-side
technology. Whatever their purpose, such server-side programs generate a response, most often
in HTML, for viewing in a Web browser.
Application Server:
As for the application server, according to our definition, an application server exposes business
logic to client applications through various protocols, possibly including HTTP. While a Web
server mainly deals with sending HTML for display in a Web browser, an application server
provides access to business logic for use by client application programs. The application program
can use this logic just as it would call a method on an object
19) What is JDBC ?
JDBC technology is an API (included in both J2SE and J2EE releases) that provides cross-
DBMS connectivity to a wide range of SQL databases and access to other tabular data sources,
such as spreadsheets or flat files. With a JDBC technology-enabled driver, you can connect all
corporate data even in a heterogeneous environment
20) What is EJB ?
Enterprise JavaBeans (EJB) technology is the server-side component architecture for the Java 2
Platform, Enterprise Edition (J2EE) platform. EJB technology enables rapid and simplified
development of distributed, transactional, secure and portable applications based on Java
technology.
21) What are the different application servers and Web Servers supporting J2EE
technology’s ?
JBoss Is an Application Server that supports J2EE
IBM Websphere and BEA WebLogic servers are a combination of Application Server, Web
Server & container
Jakarta Tomcat is a Servlet container and a Web server.
Apache Sever is a Web server
22. What is the WebSphere Application Server Console and what is it’s role? What is the
default URL and port for accessing it?
The administrative console is a browser-based interface that allows you to configure application
server settings, deploy and manage applications, and perform additional tasks that are not
included in the HTTP Server Administration interface. It used to be a Java application, however
to be firewall safe it was made into a web-based application.
It runs on the default install port 9060 e.g http:\\hostname:9060\ibm\console, however this can be
changed by editing virtual_hosts names. also when during installation ie GUI or response-file
install you can set the ports that will be used.
23. What Development Environment(s) are available to develop applications for
WebSphere?
IBM provides several industrial strength development environments based on Eclipse
development framework the current IDE is Rational Developer for Websphere. Applications can
also be developed with the Websphere Application Server Toolkit and third party tools like
Jbuilder, and Eclipse/ANT etc.
24. In WebSphere how would you provide the ability for an Web application (JSP) to be
able to provide authentication for both a local user and LDAP.
Using the Administration Console:
Turn on Administrative security.
Federate a local repository and an LDAP repository together.
Restart server.
Ensure Web application has a web.xml file to be able assign LDAP groups to roles.
25. What version of Websphere software is required to install WebSphere clustering? How
would you configure Websphere for clustering: list basic steps?
WebSphere Application Server Network Deployment is the software required to install a
WebSphere cluster.
Install base with Deployment Manager
Create profiles for Deployment Manager and each node in the cell using with the Profile
Management Tool ensuring the nodes are federated.
Use the Deployment Manager’s Administration Console to create the cluster and set cluster
settings as appropriate.
Create Windows Services or Start up scripts for Deployment Manager, Node manager and
Severs to ensure restart when OS is rebooted.
26. How would you ensure that a Websphere Application server or Websphere Application
Server Node is started when the OS being windows 2000/2003 is re-booted?
Use the command WASService to register the Websphere Application Server or Websphere
Application node as a Windows service.
27. What language is the default scripting language for Websphere and which language is
the preferred scripting language? What Websphere tool can be used to run scripts and
where is it located?
JACL is the default scripting language for WAS, Both JACL and Jython can be used.
Jython is the preferred scripting language as JACL is now deprecated.
WSAdmin tool located in the <installroot>\bin directory
28. What type of files are required to deploy an application into Websphere. How can they
be installed?
WAR or EAR files.
Can be installed using Administration Console or scripts.
29. How would use ensure WebSphere server logs are created on a different drive than the
installation root?
Change the WebSphere server’s server variables using the Administrative Console or use scripts.
Web Sphere Application Server 6.1
Questions and Answers
QUESTION 1
A cluster member has suddenly crashed. The administrator is concerned about aborted
transactions holding locks in the database. What can an administrator do to release the locks?
1. Unmount the shared file system such as Network Attached Storage (NAS) where the
transaction log is stored
2. Restart the deployment manager and node agents who manage the transaction log
3. Verify another running cluster member has access to the transaction log
4. Reconnect the database where the transaction log is stored
Answer: C
QUESTION 2
What functionality does the Caching Proxy server provide?
1. Reverse proxy and content-based routing
2. Dynamic content caching and integration with servlet caching
3. File serving enabler
4. HTTP compression
5. Integration with Dynacache and third party object caches
Answer: A,B
QUESTION 3
What is needed to load balance the HTTP traffic across a cluster of Web servers?
1. Configure a proxy server such as Tivoli Access Manager (TAM)
2. Enable server affinity for each HTTP server in the cluster
3. Implement the caching proxy server component of the WebSphere Edge
4. Use an IP sprayer from the load balancing component of the WebSphere Edge
Components
Answer: D
QUESTION 4
What does a WebSphere application server provide to support the installation and deployment of
JSR 168 compliant portlets?
1. An embedded portlet container
2. A scaled-down version of the WebSphere Portal Server
3. Several J2EE applications that render and aggregate portlets in a browser
4. An embedded version of WebSphere Portal Express
Answer: A
QUESTION 5
Which two components provide workload management capabilities?
1. Node agent
2. Web server plug-in
3. Caching proxy
4. Deployment manager
5. Load balancer
Answer: B,E
QUESTION 6
Which services are implemented by the WebSphere application server?
1. Security, JMS messaging, Naming and HTTP Plug-in
2. The user registry, Naming and HTTP Plug-in
3. HTTP Load Balancing services, JMS messaging and Data Replication Service (DRS)
4. Security, Naming, Transaction and Dynamic Cache
Answer: D
QUESTION 7
Session Initiation Protocol (SIP) servlets are packaged in which type of archive file?
1. SAR
2. WAR
3. JAR
4. EJB-JAR
5. SIP-JAR
Answer: A
QUESTION 8
In a WebSphere cell configuration, which component is a single point of failure?
1. Deployment manager
2. Web container
3. EJB container
4. HTTP server
Answer: A
QUESTION 9
Which approach should be recommended when designing a production topology for WebSphere
application servers providing high availability and failover capabilities?
1. Create a design using multiple machines that handles the full production load, enabling
the use of
Application server clustering to provide failover capabilities
1. Utilize load balancers between the Web servers and the application servers to provide
failover support at the application server tier
2. Place the Authentication servers outside of the intrusion firewall with the Web servers,
since the Web servers will need to access them
3. Use the largest processor engines and least number of physical machines for the
application server tier, to minimize the software licensing costs
Answers: A
QUESTION 10
If an administrator configures session management for an application server to user SSL ID
tracking, which two other session tracking mechanisms should also be enabled?
1. Cookies
2. URL Rewriting
3. Security Integration
4. Serial Access
5. Java2 Security
Answer: A, B
QUESTION 11
An application server is using data source connections being managed thru connection
pooling.How ever, the server is logging database errors resulting from lack of connections. In
this context, what applies to tuning database connections?
1. Data sources are abstracted from the JDBC drivers to permit database upgrades without
impacting the application logic. The administrator should decrease the connection
timeout value.
2. The connection pool is managed by the application server container, so in addition to
increasing the connection setting, additional connections allowed must be configured on
the database.
3. The data sources are released at the end of the commit phase when using Type 4 JDBC
drivers. New connections will be created upon the next database access.
4. It is necessary to tune the applications before tuning WebSphere application server.
Connections not returned to the pool are often caused by programs not closing
connections properly.
Answer: D
QUESTION 12
Which set of parameters can a system administrator adjust to directly improve performance for
the EJB container?
1. Transaction lifetime and client inactivity timeout
2. Cache size and cache cleanup interval
3. Data source connection pool and server JVM size
4. Session timeout and HTTP session object size
Answer: B
QUESTION 13
When altering the level of logging information, which level provides more detailed logging
information than the default (info) level ?
1. Fatal
2. Warning
3. Severe
4. Config
Answer: D
QUESTION 14
A J2EE application needs to be configured as follows:
The EJB module and the utility JAR in the application must be loaded by the same Class loader.
Web module WAR1 and the EJB module must use the same Class loader and Webmodule
WAR2 must have its own Class loader.
What is the correct Web module Class loader configuration for this application?
1. WAR1 – Module, WAR2 – Module
2. WAR1 – Module, WAR2 – Application
3. WAR1 – Application, WAR2 – Application
4. WAR1 – Application, WAR2 – Module
Answer: D
QUESTION 15
Which Web module parameter adjustments would result in improved response time for Web
clients ?
1. Disable load on startup
2. Enable pre-compile JSP option
3. Set the distributable flag
4. Set the reload interval to 20 seconds or less
Answer: B
QUESTION 16
Which Web server plug-in setting is NOT configurable using the administrative console?
1. Load balancing option
2. Retry interval
3. Refresh configuration interval
4. Minimum number of connections
Answer: D
QUESTION 17
An application has 15 concurrent users and a connection pool size of 10. Each user users 3
prepared statements. For this application, what is the recommended prepared statement cache
size?
1. 10
2. 15
3. 30
4. 45
Answer: C
QUESTION 18
What is the correct syntax when running the backup configuration of administrative server files
when WebSphere Security is enabled?
1. backupConfig WebSphereConfig user <name> -password <password>
2. backupConfig WebSphereConfig backup.zip nohalt user <name> -password <password>
3. backupConfig WebSphereConfig –cell user <name> -password <password>
4. backupConfig WebSphereConfig profilename=AppSrv01 user <name> -password
<password>
Answer: A
QUESTION 19
When the application server is experiencing normal to heavy usage, which statement most
accurately describes optimal pool usage?
1. The pools will all show similar numerical values, indicating balanced workload is
occurring throughout the application server.
2. Pools used by the application should be released and rebuilt in conjunction with JVM
garbage collection cycles ensuring that no state connections persist.
3. The performance Management Interface (PMI) must be explicitly enabled on the
application server to be monitored, since it requires CPU resources on the server being
monitored.
4. Pools used by the application should be nearly fully utilized, indicating that resources are
being efficiently used.
Answer: D
QUESTION 20
When configuring a J2C connection factory, which setting can be configured using the
administrative console ?
1. Container-managed authentication alias
2. Component-managed authentication alias
3. Authentication preference
4. Mapping configuration alias
Answer: B
QUESTION 21
What is the correct command to save configuration changes in a Jython script file?
1. AdminConfig.save()
2. $AdminConfig save
3. AdminTask.save()
4. $AdminTask.save
5. The WebSphere scripting tool does not a periodic save based on a property in its
configuration.
Answer: A
QUESTION 22
Which additional deployment descriptor information can a WebSphere application have beyond
the J2EE requirements ?
1. IBM Bindings associate local names to deployment platform specific resources
2. IBM Extensions support additional options
3. For EJB modules, a set of files map Entity Enterprise JavaBeans to a specific data store
“schema”
4. Web Service Interoperability mapping files
5. Jython deployment scripts
6. Cloudspace DDL files
Answer: A, B, C
QUESTION 23
What is the name of the WebSphere scripting tool?
1. wasadmin
2. wsadmin
3. ws_ant
4. wsdeploy
Answer: B
QUESTION 24
When is J2EE mapping of security roles to users and groups allowed?
1. During application development with Rational Application Developer (RAD) or with
Application Server Toolkit (AST)
2. During an application installation
3. After an application is installed
4. During application runtime
5. During the creation of an application profile
6. When configuring the user registry
Answer: A, B, C
QUESTION 25
In a federated namespace, what are the primary uses of cell and node persistent partitions?
1. For the storage of topological data in the XML repository
2. For the storage of configuration buildings, such as CORBA and indirect name lookups
3. For binding the server root of the server, such as EJB homes and resource artifacts
4. For reading configuration data from the file system, such as EJB deployment descriptors,
and registering the necessary objects
Answer: B
QUESTION 26
An administrator needs to enable support for a number of applications that use message-driven
bean (MDBs). Some of the beans use point-to-point messaging and other beans use
publishsubscribe messaging. The administrator will typically need to perform which two sets of
tasks?
1. Configure the default JMS provider and the necessary destinations (queues and topics)
2. Deploy the MDBs to the message engine and select the SOAP over JMS protocol
3. Configure queue managers using the WebSphere MQ JMS provider
4. Configure a service integration bus and add the appropriate bus member
5. Deploy the MDBs to JCA container and select bean managed persistence
Answer: A, D
QUESTION 27
A DB2 data source is used across different applications. The application is installed in multiple
machines for horizontal scaling, but the database driver location differs from machine to
machine. When using WebSphere variables, what is the most maintainable way to define the
scope for this data source?
1. JDBC provider-cell scope data source- node scope
2. JDBC provider-cell scope data source- cell scope
3. JDBC provider-node scope data source- cell scope
4. JDBC provider-node scope data source- node scope
Answer: B
QUESTION 28
In addition to data sources and Shared Libraries, which resources can enhanced EARs support?
1. JAAS Authentication Aliases, Class loader policy and Virtual host information
2. JAAS Authentication Aliases, Class loader policy and Virtual host information and JVM
command line parameters
3. JAAS Authentication Aliases, Virtual host information and JVM command line
parameters
4. JAAS Authentication Aliases, Class loader policy and JVM command line parameters
5. Class loader policy, Virtual host information and JVM command line parameters
Answer: A
QUESTION 29
When installing WebSphere Application Server v6.1 along with IBM HTTP Server and related
plug-ins, an administrator notices the following message in the
<plugins_root>/logs/install/log.txt Plugin.Install, com.ibm.ws.install.ni.ismp.actions
ISMPComponentizedFileRepositoryDeployAction, err, Component not found: prereq.jdk
Which two additional entries should the administrator verify?
1. The JAVA_HOME system environment variable
2. The CLASSPATH system environment variable
3. The JAVA_INSTALL_PATH value in log.txt
4. The CURRENT_WORKING_DIRECTORY value in log.txt
5. The PLUGIN_JDK_ROOT value in log.txt
Answer: C, D
QUESTION 30
To create a customized installation package (CIP), which file must be created first so that the
installation factory can use it to generate the CIP?
1. An Ant file
2. A response file
3. A build definition file
4. A ifcli file
Answer: C
QUESTION 31
A system administrator is planning to do a silent install using a customized response file. The
system
Administrator does not want to install the samples that come with the product.
Which option in the response file should the administrator update to NOT include the samples
with the
Installation?
1. Install Type
2. custom
3. feature
4. PROF_Action
Answer: C
QUESTION 32
A system administrator has just completed installing the core binary files of WebSphere
Application Server Network Deployment. The system administrator wants to create a
deployment manager profile with a Federated Node. What is the easiest method to accomplish
this?
1. Create a Cell profile using the Profile Management Tool
2. Create a deployment manager profile using the Profile Management Tool
3. Create deployment manager and custom profiles using the manageprofiles command
4. Create deployment manager and custom profiles using the Profile Management Tool
Answer: A
QUESTION 33
If a Web Server is located in the intranet, behind the DMZ (Demilitarized Zone), which
configuration option is the easiest to maintain and operate?
1. Web server in an unmanaged node
2. Web server in a stand-alone profile
3. Web server in a managed node
4. Web server in the deployment manager profile
Answer: C
QUESTION 34
When creating a profile, which statement is NOT true?
1. Administrative security must be enabled.
2. There is an option to make a profile the default profile.
3. Typical profile creation uses default configuration settings.
4. A Web server definition can be created in the profile.
Answer: A
QUESTION 35
After installation and application server profile creation, which servlet is useful for validating
system configuration?
1. HitCount
2. HelloHTML
3. WSSamples
4. Snoop
Answer: D
QUESTION 36
How can an administrator view the contents of the activity.log file in the profile root directory?
1. Run the waslogbr script from the command line and use the Log Analyzer
2. Open the file using the IBM Support Assistant (ISA) and use the Thread Analyzer tool
3. Use the Profiling and Logging perspective in the Application Server Toolkit (AST)
4. Open the file using any text editor
Answer: C
QUESTION 37
Which statement is true about WebSphere JVM logs?
1. The number of historical JVM log files is fixed at 3; this value will reset on each server
restart.
2. The JVM logs are self-managing and can roll over based on time or file size.
3. The JVM logs should be moved from the default location to make them easier to access
from the command line.
4. The JVM logs are, by default, kept outside the Application server filesystem directory
tree to prevent them from being overwritten when applying fixpacks.
Answer: B
QUESTION 38
From which root can the JNDI dumpNameSpace utility be used to examine the contents of the
namespace when JNDI errors are occurring?
1. Node, which contains all JNDI references used within the cells defined scope
2. Server, which contains the objects that are accessible by remote processes
3. Local, which contains objects that are available by local processes only
4. Java, which contains naming information unique to the specific server application
Answer: B
QUESTION 39
While monitoring a server, an administrator notices that the server is being restarted by its node
agent approximately every 60 minutes. The administrator suspects that the server is crashing for
memory related reasons. How can the administrator troubleshoot possible causes for the server
crashing?
1. Look for heap dumps in the servers root profile directory and examine them with a Heap
Analyzer tool
2. Start the server using the trace option and examine the startServer.log file using the
Application Server Toolkit (AST)
3. Stop the server using the trace option and examine the stopServer.log file using the AST
4. Set the environment variable IBM_HEAPDUMP equal to true for the servers node agent
and examine any node agent heap dumps
Answer: A
QUESTION 40
To enable tracing on a WebSphere component, such as the naming service or the rsadapter using
a servers Diagnostic Trace Service, which set of tasks should an administrator perform?
1. Use the Application Server Toolkit (AST) to improve the activity.log file and edit this
file to specify a trace string for the component, then export the activity.log file to the
node agents configuration directory
2. Use the Administrative console to direct the trace output to memory buffer, select a trace
output format, select a component to trace and set the log detail level to either fine, finer,
or finest
3. Edit the wsadmin.properties file to specify a trace string for the component and accept all
of the default tracing properties then perform a full-resynchronize of the node agent
4. From the administrative console select Tracing, select a node agent, select Process Logs,
select a trace output format, select a component to trace and set the Log Details Levels to
detail
Answer: B
QUESTION 41
Which statement describes the WebSphere v6.1 FFDC feature?
1. FFDC does not affect performance of the WebSphere application server.
2. FFDC logs are mainly intended for application development teams.
3. The application server needs to be restarted after enabling FFDC.
4. FFDC information is stored in an optimized relational database.
Answer: A
QUESTION 42
An administrator should use the IMB Support Assistant (ISA) to perform which tasks?
1. Submit a Problem Management Report (PMR) electronically to IBM Support and check
the PMRs status
2. Analyze a service log file against a symptom database and submit the results to IBM
support
3. Assemble and package enterprise applications into EAR files and submit to IBM Support
for profiling
4. Create a log of the activity for several components of an application server and submit
the log to IBM support
Answer: A
QUESTION 43
An administrator creates a horizontal cluster and deploys an application that uses HTTP session
objects. How should the administrator configure support for session object persistence?
1. Configure memory-to-memory persistence in the Web server plug-in properties
2. Configure HTTP session memory-to-memory replication when creating the cluster
3. For each cluster member, configure memory-to-memory replication for the Web
container session management
4. Configure memory-to-memory persistence in the HTTP servers httpd.conf file
5. Enable session affinity in the Web server plug-in properties
Answer: B, C
QUESTION 44
A system administrator has enabled dynamic caching across a cluster of servers and configured a
replication domain for the cluster. Which configuration mode should the system administrator
enable for memory to memory session partitioning to ensure each object is replicated to every
consumer of the replication domain?
1. Single replica
2. Full Group replica
3. Specific number of replicas
4. Entire domain
Answer: B
QUESTION 45
A system administrator is federating a node using the addNode command.
The addNode command CANNOT perform, by default, which step?
1. Create entries in the master repository for the federated node
2. Include applications in the cell
3. Update the node’s wsadmin.properties file to reflect the new cell environment settings
4. Create a definition for the node agent
Answer: B
QUESTION 46
If the Web server is not an IBM HTTP Server and is defined to managed node, which two
actions can be taken from the administrative console?
1. Check the status of the Web server
2. Enable dynamic trace on the server
3. Generate a plug-in configuration file for that Web server and propagate the plug-in
configuration file after it is generated
4. Start the server
5. Stop the server
Answer: A, C
QUESTION 47
For performance reasons, a J2EE application maintains HTTP session information in memory
(not persisted). The information in the session can be recreated based on the contents of various
cookies. Recreating this data from the cookies would incur performance penalties.
Which mechanism minimizes the need to recreate session data?
1. Memory-to-memory replication in Server mode
2. Memory-to-memory replication in Both client and server mode
3. Session affinity in Web server plug-in
4. Database persistence
Answer: C
QUESTION 48
When adding a new member to a cluster, why might it be necessary for an administrator to select
the option for generating unique HTTP ports?
1. To avoid port conflicts with other servers on the same node
2. To ensure that cluster members on different nodes have unique ports
3. To prevent other applications from using these ports
4. To enable encryption over the secure HTTP ports
Answer: A
QUESTION 49
Mapping J2EE security roles to users is a function of:
1. Installing an application
2. Defining the JDBC connections to the backend databases.
3. Defining the security configuration on the Web server.
4. Regenerating the Web server plug-in file.
Answer: A
QUESTION 50
A company needs to merge several user repositories so that users from each repository can
authenticate to the WebSphere cell. The existing repositories are contained in different relational
databases and LDAP directories. How can an administrator most easily leverage the existing
repositories to configure a single user repository that contains all of the users?
1. Implement a federated user repository using the Virtual Member Manager (VMM)
2. Use Tivoli Access Manager (TAM) to create a single virtual repository
3. Create a custom user registry and import the user data from the repositories
4. Creating a single LADP directory that contains each of the repositories as sub-trees
Answer: A
QUESTIN 51
What is the minimum administrative role that is required for an enterprise application to be
started through the console?
1. Operator
2. Administrator
3. Configurator
4. Monitor
Answer: A
QUESTION 52
The application server is architected to use an existing user registry that stores administrative
users and application users. What is needed to setup this architecture?
1. Configure the JNDI path to the security database
2. Configure the connection to the existing user registry
3. Retrieve a list of nodes and node agents contained within the cell
4. Generate Web services binding for the existing user registry
Answer: B
QUESTION 53
Which two tasks can be performed using the IBM Key Management Utility (IKeyman) for
managing SSL for IBM HTTP Server?
1. Install GSKit
2. Create a key database file
3. Create self-signed certificate
4. Edit httpd.conf to use a certificate
5. Sign certificates on certificate authority’s (CA) behalf
Answer: B, C
QUESTION 54
The Virtual Member Manager (VMM) in WebSphere is NOT able to federate which
repository/registry?
1. The file-based repository that is built into the system
2. One or more external LDAP repositories
3. A JDBC accessible database repository
4. Local operating system registry
Answer: D
QUESTION 55
Which statement most accurately defines the location of where the WebSphere security service
runs?
1. The security service runs on the LDAP server and is accessed through the application
server node agent
2. The security service runs in the federated nodes of the cell
3. The security service runs on the deployment manager
4. The security service runs locally in each of the WebSphere processes (deployment
manager, node agent and application server.)
Answer: D
QUESTION 56
When implementing WebSphere security, which statement is true about authentication and
authorization credentials?
1. Authentication takes place utilizing a user registry, however authorization is done based
on properties defined within the .ear file
2. Both authentication and authorization require lookups to the security service LDAP
database.
3. WebSphere security processes run on a centralized security service LDAP database to
facilitate single sign on administration of both authentication and authorization
credentials.
4. Authorization must occur before authentication to ensure the proper J2EE Security roles
are utilized for the LDAP lookup.
Answer: A
QUESTION 57
Which three steps are automatically performed to enable SSL between the HTTP plug-in and
WebSphere application server?
1. Creation of keyrings and keys for the plug-in
2. Creation of keyrings and keys for the application server
3. Procurement of a certificate from a certificate authority (CA) for the plug-in
4. Procurement of a certificate from a certificate authority (CA) for the application server
5. Establishment of a trust relationship between the plug-in and the application server
6. Importing the application server’s certificate to the trust file
Answer: A, B, E
QUESTION 58
Assume that a federated repository is configured from three existing repositories: A, B and C, A
user tries to log in but is denied access. What is a possible reason for the login failure?
1. The users ID does not exists in all three repositories
2. One or more of the three repositories is not accessible
3. The users ID is contained in repository A, which is a file-based repository
4. The users LDAP Distinguished Name (DN) is not the same across all repositories.
Answer B
QUESTION 59
What is the minimum administrative role required for Java 2 security to be enabled through the
administrative console?
1. Administrator
2. Configurator
3. Operator
4. Security
Answer: A
QUESTION 60
What are three goals of the Virtual Member Manager (VMM)?
1. Provide a repository that can span multiple WebSphere cells
2. Provide a repository-independent programming interface
3. Support various pluggable repositories
4. Provide the ability for users to achieve a single view of their own multiple repositories in
a federated model
5. Provide a cache or repository information
Answer: B, C, D
QUESTION 61
Which statement is NOT true about Application Server Toolkit (AST)?
1. It has a similar look and feel to the IBM Rational family of products and is based on
Eclipse.
2. It has a complete development environment for enterprise applications including EJBs.
3. It is supported on Windows, Linux and AIX.
4. It has Jython editor and source debugger.
5. It can run wsadmin scripts inside AST.
Answer: C
QUESTION 62
The WebSphere scripting tool supports which two scripting languages?
1. BSF
2. Jython
3. Perl
4. Ant
5. Jacl
Answer: B, E
QUESTION 63
A system administrator needs to create a data source and make it available on multiple nodes
using different directory structures. Which two actions should the system administrator take to
do this?
1. Define the JDBC provider at the cell scope
2. Define the JDBC provider at the node scope
3. Define the JDBC provider at the server scope
4. Create the data source that uses this JDBC provider at the cell scope
5. Create the data source that uses this JDBC provider at the node scope
6. Create the data source that uses this JDBC provider at the server scope
Answer: A, D
QUESTION 64
An application uses a JMS queue for point-to-point messaging. As part of the queue
configuration, an administrator is able to specify which two sets of properties?
1. Scope, activation specification and connection factory
2. Scope, JMS provider and JNDI name
3. J2C authentication data, connection timeout and reap time
4. Bus name, delivery mode and priority
5. Class path, topic name and JMS name
Answer: B, D
QUESTION 65
A customer has a WebSphere Application Server v4 client and wishes to look up and access
objects in WebSphere Application Server V6.1 without requiring changes to the client. What
must the customer do to enable WebSphere Application Server V6.1 objects to be accessible
through the legacy name space?
1. Configure a leaf binding
2. Create a corbaname binding
3. Use a compound name
4. Create a configured name binding
Answer: D
QUESTION 66
Which are the three possible components of Web modules?
1. Servlets
2. JSPs
3. SIP servlet files
4. MDB files
5. HTMLs
6. Session and entity beans
7. RAR files
Answer: A, B, E
QUESTION 67
Which three statements are true about J2EE security roles?
1. Authorization is performed using the J2EE security roles.
2. Security roles are applied to the Web and EJB application components.
3. Security roles provide an access control mechanism to manage the applications access to
system level resources.
4. Binding of the users and groups to the J2EE security roles is usually done at the
application install time.
5. Authentication is performed using the J2EE security roles.
6. Security roles can be modified dynamically at runtime.
Answer: A, B, D
QUESTION 68
What is the default connection pool that the WebSphere scripting tool uses?
1. SOAP
2. RMI
3. SOAP is tried first then RMI is tried second
4. NONE
5. TCP
Answer: A
QUESTION 69
An administrator need to configure a data source for use by a Servlet 2.2 based Web application.
Which data source type must the administrator define?
1. WebSphere Application Server V6 data source
2. WebSphere Application Server V4 data source
3. JDBC Type 4 data source
4. JDBC Type 2 data source
Answer: B
QUESTION 70
The Profile Management Tool allows you to enable WebSphere administrative security. Which
user registry is used for this default security?
1. Local operating system
2. Standalone custom registry
3. Standalone LDAP registry
4. Federated Repositories
Answer: D
QUESTION 71
An installation and profile creation was just completed. Which tool can be used to check
installation files, report differences and create an inventory of configured files?
1. Collector tool
2. Installation verification tool (IVT)
3. Installver tool
4. Administrative console
Answer: C
QUESTION 72
Which file can a system administrator consult prior to starting an installation to determine which
components are already installed on the machine?
1. vpd.properties
2. prereqChecker.xml
3. log.txt
4. profileregistry.xml
Answer: A
QUESTION 73
After creating a profile, a system administrator discovers there are port conflicts. Which action
should the system administrator take to fix the port conflicts in the existing profile?
1. Re-create the profile entering different ports
2. Update the portdef.props file
3. Run the updatePorts.ant script
4. Edit the server.xml file
Answer: C
QUESTION 74
What does the Installation Factory use to create a customized installation package (CIP)?
1. A build definition that defines how to customize WebSphere application server
2. A CIP containing a customized WebSphere application server
3. A customized response file containing the definition of the installation package
4. The ifgui command to build a silent response file
Answer: A
QUESTION 75
A system administrator needs to create an application server profile that does NOT contain the
administrative console. Which action should the system administrator take while using the
Profile Management Tool to create the profile?
1. Select the typical installation which does not install the administrative console to the
server
2. Select the advanced operation which has an option to install the administrative console to
the server
3. After the profile creation, uninstall the administrative console application
4. Delete the application from the installed directory
Answer: B
QUESTION 76
When attempting to install WebSphere Application Server v6.1 using the silent install, the
installation fails early in the process and no log files appear to be created in the logs directory.
Which two steps can the administrator perform to troubleshoot the issue?
1. Restart the installation after an OS restart
2. Restart the installation with the –log parameter
3. Look for the log files in the system temporary area
4. Run the installation verification test (IVT)
5. Start over by creating a new responsefile.txt using the responsefile.base.txt
Answer: B, C
QUESTION 77
When accessing the application server process logs, STDOUT and STDERR, on a federated
node, in which default file system path will they be found?
1. <profile_root>/<profile_name>/logs/<server_name>/native_stderr.log and
<profile_root>/<profile_name>/logs/<server_name>/native_stdout.log
2. <was_root>/logs/<server_name>/native_stderr.log and
<was_root>/logs/native_stdout.log
3. <nd_root>/logs/stderr.log and <nd_root>/logs/stdout.log
4. <was_root>/logs/stderr.log and <was_root>/logs/stdout.log
Answer: A
QUESTION 78
An administrator is analyzing an activity.log file from a profile by using the Application Server
Toolkit (AST) Profiling and Logging perspective. There are hundreds of log records.
Most of the records are informational messages. How can the administrator view only the
records whose severity is at the Warning and Error level?
1. The activity.log file must be filtered using the Log Analyzer before it is improved into
AST
2. Create two filters, one showing only Errors and one showing only Warnings. Export each
and merge them into a single new activity log.
1. When the activity.log file is imported into AST, use the filter option to exclude the
informational message
2. Update the filter so that it shows only Error and Warning log records.
Answer: D
QUESTION 79
After hearing from clients that they are having problems logging into an application, an
administrator enables tracing on WebSphere security components using the following log trace
string:
com.ibm.ws.security.*=detail and restarts the server
When the administrator examines the trace log, there are no events recorded for any security
components.
What must be the administrator do to ensure that the trace information is written to the trace log?
1. Modify the server.xml file to enable tracing and restart the server
2. Configure the trace output format with the advanced setting
3. Set the Log Detail Levels to one of the following: fine, finer, finest
4. Update the Log Detail Levels for the servers node agent
Answer: C
QUESTION 80
Under which circumstance should the WebSphere administrator use the dumpNameSpace
utility?
1. When the application server will not start because the JNDI namespace tables have
become corrupted
2. When applications are experiencing a problem accessing a specific WebSphere data
source
3. Before regenerating the plug-in for the Web server
4. To clear the namespace prior to installing or redeploying an application
Answer: B
QUESTION 81
An administrator is monitoring a servers JVM Runtime by using the administrative consoles
Tivoli Performances Viewer. It appears that garbage collection is running frequently and taking a
relatively long time to complete. Which action should the administrator take to gather more
information on the garbage collection process for this server?
1. Edit the servers sas.server.props file and set com.ws.jvmgc equal to verbose
2. Use the administrative console to enable Verbose garbage collection for the server
3. Enable tracing on the server with the following trace string: com.ibm.ws.jvm.*=finest
4. Use wsadmin to generate a heap dump and analyze the dump with the Application Server
Toolkit (AST)
Answer: B
QUESTION 82
To conserve disk space, an administrator would like to roll the FFDC log files every three days.
Without interfering with normal application server operation, how can this be accomplished?
1. By writing a logRoller script and executing it every three days.
2. By running a system job that cleans the files as needed
3. By configuring the ExceptionFileMaximumAge property in ffdcRun.properties
4. By configuring the TimesToDump property in ffdcStop.properties
Answer: C
QUESTION 83
In order to gather all of the necessary data required by IBM Support to troubleshoot a database
connection pooling problem, an administrator should perform which task(s)?
1. Run the collector command, use the problemType option to specify database connection
pooling and submit the resulting JAR file to IBM Support
2. Use the Service component of the IBM Support Assistant (ISA) to gather data for the
database connection pooling problem type
3. Reproduce the problem, create a JAR file including the System.log and native_stdout.log
files then submit the JAR file to IBM Support
4. Reproduce the problem, use the Tivoli Performance Viewer to log the JDBC connection
pool activity then submit the log file to IBM Support
Answer: B
QUESTION 84
What is the advantage of implementinga multi-tiered environments across multiple machines?
1. It can more closely align with a customer’s business functions (i.e. distribution, ordering,
and inventory management.)
2. The tiers allow you to tune individual products
3. It is the separation of tiers that allows operating system tuning parameters to be used
based on the machine’s function
4. Separation reduces maintenance complexities since components are highly available in a
distributed configuration
Answer: C
QUESTION 85
A WAR file containing several JSR 168 compliant portlets has been successfully installed in an
application server. If portlet serving has been enabled, how can the portlets be accessed with a
browser?
1. Request the PortletServingServlet servlet and then submit the name of the portlet
2. Request the portlets index.jsp and then submit the context root and portlet name
3. Request the wpsServlet servlet and then select the portlet from a portal menu
4. Request the portlet directly using a URL that includes the name of the portlet
Answer: D
QUESTION 86
When an application server cluster is added to a Service Integration Bus as a cluster bus member,
the messaging engine defined will be highly available. The messaging engine becomes active on:
1. all the servers within the cluster
1. each node agent
2. only one server within the cluster
3. the deployment manager
Answer: C
QUESTION 87
Which statement is NOT true about the Session Initiation Protocol (SIP) container?
1. The servlet container provides the network services over which requests and responses
are received and sent.
2. A SIP servlet container manages the network listener points on which it listens for
incoming SIP traffic.
3. The SIP servlet container can employ a SIP proxy server to route, load balance, and
improve response times between SIP requests and back-end SIP container resources.
4. The SIP servlet container can directly interact with other SIP servlet container in the cell
to co-ordinate SIP servlet requests.
5. The SIP servlet container decides which appliations to invoke and in what order. The
container also contains and manages servlets through their life cycle.
Answer: D
QUESTION 88
Which statement describes the relationship between WebSphere MQ and WebSphere default
messaging as a JMS provider?
1. Default messaging relies on WebSphere MQ as the JMS Provider
2. Default messaging is a version of WebSphere MQ.
3. WebSphere MQ and default messaging are separate and do not share any modules or
configuration data
4. WebSphere MQ and default messaging must share the same Cloudscape database.
Answer: C
QUESTION 89
Which statement is true for a managed application server process to startup?
1. A node agent and deployment manager must be running before starting a managed server.
2. Starting a managed server is not dependent on the presence of a running deployment
manager.
3. The node agent should not be started before any managed servers on that node.
4. The deployment manager needs to be started before the managed server.
Answer: B
QUESTION 90
In a cell configuration, which protocol is used for sending requests between application servers?
1. HTTP
2. HTTPS
3. IIOP
4. OSE
Answer: C
QUESTION 91
What are the three possible modes that the replication service instance can be set up to run in?
1. Server mode
2. Client mode
3. Both mode
4. Publish/Subscribe mode
5. Event Listener mode
6. Broadcast mode
Answer: A, B, C
QUESTION 92
What has to be configured to implement memory-to-memory HTTP Session persistence?
1. EJB session beans and EJB Container
2. The HTTP Plug-in and embedded HTTP Server
3. The JMS Server and Queue Manager
4. The Data Replication Service (DRS) and Web container
Answer: D
QUESTION 93
An administrator is configuring JDBC database connections. Where is the file system path to the
DB2 or Oracle driver .zip files specified?
1. Within the .ear file of the deployed application
2. Within the connection pool parameters for the cell
3. On the connection manager J2C configuration panel
4. From the Environment -> WebSphere Variables panel of the Administration Console
Answer: D
QUESTION 94
While an administrator is using the Tivoli Performance Viewer to analyze a performance
problem with a production application server, the administrator notes that the database
connection pools have a much lower percentage of utilization than the other pools. Which
statement explains this observation?
1. The database server is constrained, causing calls to the database to consume more
resources than are available for processing
2. This condition indicates there is a bottleneck in one of the processes upstream in the
pipeline of process flows within the application server.
3. The connection pools have not been defined to account for parallel application server
calls to the database, causing this particular server to show low utilization
4. The Tivoli Performance Viewer percentages are only useful for performing performance
analysis on a server that is executing in a controlled load test scenario.
Answer: B
QUESTION 95
A J2EE application needs to be configured as follows:
The EJB module and the utility JAR in the application must be loaded by the same Class loader.
Each Web module must have its own unique Class loader.
What is the correct application server and Web module Class loader configuration for this
application?
1. Isolation policy -> Single, Class loader policy -> Application
2. Isolation policy -> Single, Class loader policy ->Module
3. Isolation policy -> Multiple, Class loader policy -> Module
4. Isolation policy -> Multiple, Class loader policy -> Application
Answer: C
QUESTION 96
Which statement most accurately describes the effect of increasing the JVM maximum heap
size?
1. No measurable performance change will result from increasing the heap size
2. A larger heap size will cause the server to take longer to start
3. More objects will be created and the time required to garbage collect will decrease.
4. The time between garbage collections will increase, but the garbage collection will take
longer.
Answer: D
QUESTION 97
For security reasons, an administrator would like to ensure that HTML resources are isolated
between Web modules running on a server. Which setting should the administrator configure?
1. Class loader configuration
2. Virtual host configuration
3. HTTPS ports configuration
4. Admin console configuration
Answer: B
QUESTION 98
In order to generate a plug-in configuration file on which all applications in the cell are mapped,
which action must a system administrator take?
1. Run the GenPluginCfg command on each server
2. Run the GenPluginCfg command on the deployment manager
3. Select the Automatically Generate Plug-in option in the administrative console
4. Select the Generate Plug-in option in the Web server’s page in the administrative console
Answer: B
QUESTION 99
When using the Tivoli Performance Viewer, the WebSphere administrator notes that the
Summary and Detailed reports display in tabular format, however the graphics do not display.
What must the administrator do to correct the problem?
1. The graphics display only if there is sufficient variance in the data being collected. The
application server monitored is not under load condition, therefore the default reports are
the preferred display mechanism and no action is required.
2. The Performance Monitoring Interface and the Performance Advisor must both be
enabled from the Administrative Console accessed through the Deployment Manager in
order for the Performance Advisor graphics to display.
3. The administrator must override the default scale set in the default report since it is set
too high to cause the graphics to be generated
4. The Scalable Vector Graphics (SVG) plug-in for Adobe must be downloaded and
installed on the administrators browser since this is required for the graphics display.
Answer: D
QUESTION 100
According to the Upstream Queuing model for performance tuning, what reflects the correct
application of recommended settings for maximum concurrent clients?
1. Web server=75, Web container=75, Datasource=25
2. Web server=75, Web container=50, Datasource=25
3. Web server=50, Web container=50, Datasource=50
4. Web server=25, Web container=50, Datasource=75
Answer: B
QUESTION 101
A critical error is occuring on a production node causing the JVM logs to rapidly fill up. Which
resolution should the WebSphere administrator take as the first step for troubleshooting?
1. The logs are self-managing and can roll over based on time ro file size, so simply
opening the logs with a text editor will ensure that new log files are created.
2. Removing the application server from the network, either administratively or physically,
is necessary to stop the JVM processing.
3. Stopping the JVM process from the command line, removing the application
administratively thru the console and restarting the JVM will allow processing to
continue on other applications.
4. The administrator should remove the failing application server from user requests,
thereby stabilizing the application server so that troubleshooting can begin.
Answer: D
QUESTION 102
When configuring session management for a Web container, which property represents the
number of cached sessions?
1. Session Expiry value
2. Maximum in-memory session count
3. L2 Cache Integration count
1. Maximum wait on serial access
Answer: B
QUESTION 103
An administrator has a cluster of two members and needs to ensure that roughly twice as many
client requests are routed to cluster member A. than are routed to cluster member B. How should
the administrator configure this type of load distribution?
1. Create two entries for member A in the HTTP plug-in configuration
2. Double the OS priority for member As JVM process
3. Assign to member A, a weight two times as large as member Bs weight
4. Double the minimum size of member As Web container thread pool
Answer: C
QUESTION 104
What is the default behavior of federating a node using the addNode command?
1. Starts the node agent and application server processes
2. Includes applications and buses
3. Starts the deployment manager and the node agent
4. Does NOT include applications and buses
Answer: D
QUESTION 105
It has been decided to use database session persistence for a particular J2EE application. Which
two steps must be performed to implement this feature?
1. Configure the JDBC provider and data source
2. Select a multi row schema
3. Create session database
4. Configure row size to match session size
5. Create session database tables
Answer: A, C
QUESTION 106
If an IBM HTTP Server is defined, the IHS Administration is installed and the IBM HTTP
Server is defined to an unmanaged node, which two can be done?
1. Display the IBM HTTP Server Error log (error.log) and Access log (access.log) files as
well as display and edit the IBM HTTP Server configuration file (httpd.conf)
2. Start and stop the server and propagate the plug-in configuration file after it is generated
3. Update the server with new fixpacks
4. Enable dynamic trace
5. Flush its local cache
Answer: A, B
QUESTION 107
In order to create a new WebSphere cell and implement a horizontal scaling topology, an
administrator needs to perform which task(s)?
1. Federate nodes and create multiple clusters
2. Load balance multiple HTTP servers using Edge Components
3. Deploy multiple database servers using a high availability software product
4. Federate nodes and create cluster members across multiple machines
Answer: D
QUESTION 108
What is the default configuration setting for the Data Replication Service (DRS)?
1. Single replica
2. Full group replica
3. Specify number of replicas
4. Entire domain
Answer: A
1. What about master repository?
Ans: deployment manager contains the MASTER configuration and application files. All updates
to the configuration files should go through the deployment manager.
2. Tell me IHS executable files, means bin directory files?
Ans: Apache, ApacheMonitor, htpasswd, htdigest, htdbm, ldapstash, httpd.exe
3. Why given the httpd.conf file to installation of plug-in?
Ans: identify the web server (port, virtual hosts) to configure the web server definition
4. How to configure remote system httpd.conf file?
Ans: select web server machine (remote)
5. Several types of log files in the appserver?
Ans: system out, system err, trace, native out , native err, activity.
6. websphere packages?
Ans: express, base, network deployment
7. What is the profile?
Ans: profiles are a set of files that represent a websphere application server configuration.
8. What is the trace?
Ans: A trace is an informational record that is intended for service engineers or developers to
use. As such, a trace record might be considerably more complex, verbose and detailed than a
message entry.
9. What is heap memory?
Ans: Objects storage space for objects references created at run time in a jvm is heap memory.
10. Out of memory exception is there, how to handle that exception?
Ans: To incrise heap memory size
11. What about IHS?
Ans: IHS (IBM HTTP Server) is one of the web servers. It serves the static content only and it
takes up only http requests.
12. What about plug-in?
Ans: plug-in is one of the modules it is interface between application server and web server, the
plug-in process receives the request from the client first. If the request is for dynamic content, the
plug-in diverts the request to the websphere application server. If the request is for static content,
the plug-in forwards it to the Http server.
13. What is the global security?
Ans: it provides the authentication and authorization for websphere application server domain
(administration client or console).
14. How to configure the global security?
Ans: open console and then select security option in the right side menu, and then select localOs
registry in the user registry, then enter the username, passwords. And again select global security
then ltpa option then provide the password, then save the configuration. And restart the
deployment server and then relogin the console.
15. What is SSL?
Ans: ssl is a protocol for providing encrypted data communications between two processes.
16. What is PMI? How to configure PMI?
Ans: monitoring and tuning–>PMI–>select any process (server1, nodeagent, dmgr) and then
enable PMI–>then apply and then save. Select performance viewer–>current activity and then
select enabled process and click the start monitoring button after that process select.
17. What is the UNIX command of all display server processes?
Ans: ps –ef| grep java
18. What is node?
Ans: logical group of servers.
19. How to start the server?
Ans: startserver.sh server1
20. How you get nodeagent……what you have to install to get nodeagent?
Ans: Custom Profile
21. How to add the node?
Ans: addnode.sh 8879
22. What is the application server?
Ans: The application server provides a runtime environment in which to deploy, manage, and run
j2ee applications.
23. What is the node?
Ans: A node corresponds to a physical computer system with a distinct IP host address.The node
name is usually the same as the host name for the computer.
24. What is the node?
Ans: A node corresponds to a physical computer system with a distinct IP host address. The node
name is usually the same as the host name for the computer.
25. How many types of profiles are in nd product?
Ans: 1.deployment manager profiles 2.application server profiles 3.custom profile
26. What is diffrence b/w dmgr and other profiles?
Ans: dmgr app custom
1.its used for administration 1.admin console is there 1.plain node purpose of remaining profiles
2.initially one app server there 2.empty node 2.it supports the distributed 3.work independently
environment. 4. Put applications 3.it is not included app server 4.admin console is there 5.work
independently 6.do not put applications
27. Diff b/w 5.0 and 6.0?
Ans: Web Sphere Studio 3.5, comes up with Visual Age for Java. WSAD 5.0 supports J2EE 1.3
java specifications. RAD 6.0 supports J2EE 1.4 and integrated with Eclipse 3.0, UML Visual
Editor, Tomcat Jakarta, Ant scripting, EJB universal test client and SOA tools.
28. What is the difference between web server and application server?
Ans: Application Server: takes care of Security, Transaction, Multithreading, Resource pooling,
load balancing, clustering, performance, highly availability, scalability, etc. Exposes business
logic to client applications through various protocols, possibly including HTTP. Supports
deployment of .war and .ear files Application server = web server + EJB container.
29. Diff b/w weblogic and websphere?
Ans: Both BEA Weblogic and IBM’s WebSphere provide J2EE based application servers which
are competitors. WebSphere leverages more on connectivity issues with MQ and legacy systems
with strong dominance in J2EE.
30. Some problem is there in web server, so this information which log file contain?
Ans: http.log, plugin.log
31. What is jdbc?
Ans: jdbc is a low level pure java api used to execute sql statements.
32. What is datasource?
Ans: A data source is associated with a jdbc provider that supplies the specific jdbc driver
implementation class
33. What is diff b/w type4 and type2?
Ans: type4 type2
1. It is pure java oriented 1.it is not a pure java oriented driver
2.require client side software 2.no need any client software
34. Some application not accessing, so what is the problem? This information which log file
contains?
Ans: systemout, systemerr
35. In type3 client software which machine you have install?
Ans: server side machine
36. two databases there (oracle and db2),so I want 3 datasources for oracle and 2 data
sources for db2 so create 3 datasource names for oracle and 2datasourcename for db2 is
possible or not?
Ans: possible
37. What is jndi?
Ans: we can register resources in the application server’s java naming and directory interface
(jndi) namespace. Client applications can then obtain the references to these resource objects in
their programs.
38. Why use the boostrap port number?
Ans: client applications use the bootstrap port to access websphere’s built-in object request
broker (orb) to use enterprise java beans in applications installed on the application server. The
java naming and directory interface service provider url used by the client application needs to
reference the bootstrap port to obtain an initial context for looking up ejb’s it wants to use. (For
communicate two servers)
39. What are the appserver components?
Ans: admin server, web container, ejb container,j2c service, naming server, messaging engine,
security server.
40. LDAP port number?
Ans: 389 or 636
41. How to start the server?
Ans: startserver.sh server1
42. Packages of websphere?
Ans: express, base, network deployment
43. What is webcontainer?
Ans: The web container provides a runtime environment for servlets, jsp’s, javabeans, and static
content.
44. How to find out free diskspace from command prompt?
Ans: du -sk (kb) du -sm (mb)
45. How to find out certain server configuration details like port no, server name, node
name, pid?
Ans: through admin console.
46. Configure the plug-in through admin console is possible or not?
Ans: possible
47. Where to set the path?
Ans: environments–>websphere variables
48. How many types of installations?
49. Application installed but not working. What are troubleshooting steps?
Ans: see jvm & application are up, check plugin-cfg.xml file for the root context used by the web
application if it does not exist generate plugin and restart web server.
50. Applications installed fine, also generated plugin, but application still not working, in
this case which log to see?
Ans: plugin.log
51. Default admin port?
Ans: 9060, ssl 9043
52. Default bootstrap port?
Ans: 2809
53. How to hit application without hitting the web server?
Ans: webcontainer port on application server
54. In how many ways you can perform administration?
Ans: console,,,JMX
55. No of ways of doing deployments?
Ans: Admin console…..jython (jacl) scripts
56. What is CellDiscoveryAddress
Ans: Node uses this port to talk to DMGR
57. What is NodeDiscoveryAddress
Ans: DMGR uses this port to talk to node
58. How websphere discovers a change in JSP and compiles it?
Ans: There is an algorithm that websphere uses to find the timestamp of .jsp and .class files. It
checks that timestamp of .class file is always later than its corresponding .jsp file.
59. What is classloader?
Ans: The Java Classloader is a part of the Java Runtime Environment that dynamically loads
Java classes into the Java Virtual Machine
60. how do you specify a jar file to be used by the application, consider that you have many
jar files in your system?
Ans: classloader
61. What is a managed node?
Ans: Node with NodeAgent
62. What is a managed webserver?
Ans: Remote webserver access through local (dmgr/cell)
1) What is the default user registry, if you enable Global Security at the time of installation
Its federated repositories…. actually it is a file
2) Which commands require username/password , if you enable admin security
all stop* , syncNode, addNode(?)
3) When can you enable global security?
- while installing
- After installation also
4) Does enabling admin security needs j2ee security to be enabled?
No
5) Does enabling admin security enables j2ee security?
yes
6) What is the most important step to do, if you change your user repository.
recycle all the JVMs. otherwise the key tokens will not be updated for the new repo
7) who can change admin security settings?
Adminstrator
8. what is the tool supplied by IBM for SSL management in Websphere
ikeyman
9) How do you change the cell wide SSL?
http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21154255
10) how do you replace the default plugin-key.kdb file with new kdb file?
11) can we use diffrent SSL for nodes and plugin ?
Yes
1.WHAT IS TRACING?
Tracing is when you go through an entire program and record the value of variables and the
output. You trace a program when you want to find out what actually went wrong
2.WHERE TO GIVE APPLICATION PRIORITY WHILE STARTING SERVER?
it will be under Enterprise applications ->app name -> startup behaviour ->Startup order in the
admin console
3.HOW TO MOVE CODE DEV ENVIRONMENT TO TESTING ENVIRONMENT?
I’m sure what they mean by code here. I think, incase of applications, export them from in DEC
and deploy in TEST.
4.WHAT IS SSL?WHEN IT ENCRYPT & DECRYPT THE DATA?
SSL are digital signed certificates. user for meesage/communication integrity and
confidentiality. Generally encrypt at Sender side and decrypt at receiver side
5.WHAT IS INCIDENT MANAGEMENT?
It is part of ITIL process….. simple explanation is, when there is a problem in ur WAS
environment, which procedure do you follow.
6.WHEN APPLICATION IS DOWN WHAT U WILL DO?
First look at the logs for errors. If you find the error, save the logs and start ur application. Then
start trouble shoot.
If no error found, run a trace and look for FFDC etc..
7.I HAVE 16GB RAM,WHAT IS THE MINIMUM & MAXIMUM HEAPSIZE ?
No relation. Heap settings should be made depends on application
8.HOW TO OPEN ADMIN CONSOLE IN AIX/UNIX & WHAT IS THE DEFAULT FILE
SYSTEM OF AIX?
admin console can be viewed from remote machine which has a browser, if not behind firewall.
9.WHAT IS FILE DESCRIPTORS IN AIX?
A file descriptor is a handle created by a process when a file is opened. There is a limit to the
amount of file descriptors per process.If the file descriptor limit is exceeded for a process, you
may see the following errors:”Too Many Open Files”
10.HOW TO RESOLVE PORT CONFLICTS IN PRODUCTION ENVIRONMENT?
check why there is port conflict
run updateports script in WAS
what is cluster
how do you create a cluster
go to servers -> clusters-> new ->give cluster_name->define first member->define other
members->finish
how do you add a new cluster member
go to servers -> clusters->cluster_name ->cluster members ->new ->give name/node/others-
>apply->ok->save
one of the cluster member (jvm) is having issues. To troubleshoot the issue, you decided to take
it out of the cluster. How do you do that?
Make its runtime weight to 0
In a complex environment, there are 10 machines. Machine A is having 8GB RAM and machine
B having 2GB of RAM. The administrator decided to send twice as many request as machineB
to machineA. How can he achive it?
give machineA twice the weight as machineB
After making some changes on a cluster, it is required to recycle/restart all the cluster JVMs. The
lead admin told you to make sure that there should not be any downtime during this recycle.
Which option do you use to achieve it?
Ripplestart
A large application which has 5web modules has been deployed on to a cluster. After some
months, the developer asked you to update on of the 5web modules. How do you do it?
Rollout
what is a backup cluster
can you change the cluster name, once it was created
No
1. What is the difference b/n web and app servers
2. What are the new f1). What is WebSphere Application Servers? Explain 3 tier architecture.
 WebSphere Application Servers are a suite of servers that implement the J2EE specification. The
primary component of the WebSphere Application Server products is
the application server, which provides the environment to run your Web-enabled E-business
applications.
 You can think of an application server as Web middleware, the middle tier in a three-tier ebusiness
environment. The first tier is the Web server that handles requests from the browser client.
 The third tier is the business database, for example DB2® UDB, and the business logic, for
example, traditional business applications such as order processing. The middle tier is IBM WebSphere
Application Server, which provides a framework for consistent, architected linkage between the HTTP
requests and the business data and logic.
2). What is an application server?
 The application server is the primary runtime component in all configurations. It is where an
application executes. All WebSphere Application Server configurations can have one or more
application servers.
 In the Express and Base configurations, each application server functions as a separate entity.
There is no workload distribution or common administration among application servers.
 With Network Deployment, you can build a distributed server environment consisting of
multiple application servers maintained from a central administration point.
In a distributed server environment, you can cluster application servers for workload distribution.
3). Explain node, node agent and node groups.
 A node is a logical grouping of server processes managed by WebSphere and that share
common configuration and operation control. A node is associated with one physical
installation of WebSphere Application Server. In a stand-alone application server configuration, there is
only one node.
 With Network Deployment, you can configure multiple nodes to manage from onecommon
administration server. In these centralized management configurations, each
node has a node agent that works with a deployment manager to manage administration processes.
 A node group is a new concept introduced with WebSphere Application Server V6. A node group
is a grouping of nodes within a cell that have similar capabilities.
4). Explain cell in WebSphere .
 A cell is a grouping of nodes into a single administrative domain. A cell can consist of multiple
nodes which are all administered from a single point.
5). Explain about WebSphere administrative console.
In WebSphere Application Server V6, the administrative console groups administrative tasks into the
following categories:
 Servers
 Applications
 Resources
 Security
 Environment
 System administration
 Monitoring and tuning
 Troubleshooting
 Service integration
 UDDI
6). How do you start the administrator console?
Make sure that deployment manager, dmgr, is running by using this command:
UNIX: <dmgr_profile_home>/bin/serverStatus.sh -all
If the dmgr status is not STARTED, start it with the following command:
On UNIX: <dmgr_profile_home>/bin/startManager.sh
Open a Web browser to the URL of the administrative console. The default
port is 9060 for HTTP and 9043 for HTTPS.
https://<hostname>:9043/admin
7). What is the admin console default session timeout limit?
The default is 30 minutes.
Edit the <was_home>/systemApps/adminconsole.ear/deployment.xml file in a text editor.
8). What are the three major areas of admin console GUI?
The WebSphere administrative console has the following main areas:
 Taskbar
 Navigation tree
 Workspace, including the messages and help display areas.
Options and description are given below:
9). What are the options you see in Navigation tree?
10). What is JNDI?
 The Java Naming and Directory Interface (JNDI) is part of the Java platform, providing
applications based on Java technology with a unified interface to multiple naming and directory services.
 You can build powerful and portable directory-enabled applications using this industry standard
11). What is scope in WebSphere ?
 Scope can be Cell or node or app server of everything.
 Whenever you want to affect changes through dmgr, you need to define the scope whether it is
going to affect cell, node. Or only app servers
12). What is the relation you know with cell – profile –node agent – apps servers?
 A cell can have multiple profiles. Every profile must have at least one node agent.
 One node agent can have multiple app servers – App servers are nothing but jvms, which are
nothing but .war, .ear, .jar files.
13). What is the difference between JMS and MQ SERIES?
 In JMS – communication between the applications is possible only if the apps are in the same
cell.
 But in MQ series, inter application communication is possible even if the apps are in the
different cell.
14 What is virtual host?
 We need to map the app server to a virtual host. We cannot access the app server from
thebrowser if it is not mapped to a virtual host.
 Example: //www.yahoo.com/mail Mail is a virtual host. Internally mail may contact sever .ear
files.
15). If dmgr (deployment manager) is down, can you access app server?
 Yes, you can access application server and everything will be fine. Only issues are that you
cannot do any management of the jvms using admin console.
16). What is the effect of node agent?
 Application server will be running, but you cannot manage the app server because the node
agent is down
17). What action would you take it if you get “page not found error “?
 Basically in three tier architecture, in tier 1 you have webserver, tier 2 is web sphere application
server and in tier 3 you have Database.
 Request from the client browser basically reaches the web server and then for application
execution, it reaches the web applications.
 For data it connects to the database server. Either webserver is down or not reachable. Or
application server is down.
18). Explain the flow of processing a JSP page request.
 If the JSP has already been compiled and the servlet loaded, the flow is as follows
 A Web page is submitted from a client browser with a URL request for a JSP
(http://myserver/MyPage.jsp)
 The HTTP server receives the request and forwards it to the WebSphere server. WebSphere
creates a thread for the client session and processes the servlet, accessing data etc.
 WebSphere returns the generated results as an HTML page back to the client browser.
19). What are the common errors that can occur while accessing webpage?
 General categories of errors
 Most errors fall into general error categories when running Web applications. The codes below
are typical for many common errors.
Code description
 404 page not found for an HTML or JSP page
(often an application configuration or WebSphere plugin problem)
 403 authorization error
( an authentication or authority error for a resource requested by the client)
 500 error running servlet or jsp
(Many different causes possible. A common one is Class Definition Not Found that will show in the error
page which class is not found on the class path).
20 Explain the WebSphere runtime environment objects.
21). Explain the java web application components.
22). What is Web server plug-in?
 A Web server can serve requests that do not require any dynamic content (for example, HTML
pages). However, when a request requires dynamic content, such as Java Server
Pages (JSP™) or servlet processing, it must be forwarded to WebSphere Application Server for handling.
Note: As a special case, if the unmanaged Web server is an IBM HTTP Server, you can administer the
Web server from the WebSphere administrative console.
 Then, you can automatically push the plug-in Configuration file to the Web server with the
deployment manager using HTTP commands to the IBM HTTP Server administration process.
 This configuration does not require a node agent.
 To forward a request, you use a Web server plug-in that is included with the WebSphere
Application Server packages for installation on a Web server. You copy an Extensible
 Markup Language (XML) configuration file, configured on the WebSphere Application Server, to
the Web server plug-in directory. The plug-in uses the configuration file to determine
 whether a request should be handled by the Web server or an application server.
 When WebSphere Application Server receives a request for an application server, it forwards
the request to the appropriate Web container in the application server.
 The plug-in can use HTTP or Https to transmit the request.
23). Can you explain more about web server?
 Web servers can be defined to the administration process as a Web server node, enabling
applications to be associated with one or more defined Web servers. Web server nodes can
be managed or unmanaged. Managed nodes have a node agent on the Web server machine that
enables the deployment manager to administer the Web server. You can start or stop the
Web server from the Deployment manager, generate the Web server plug- in for the node, and
automatically push it to the Web server. You would normally have managed Web server nodes behind
the
firewall with the WebSphere Application Server installations.
 Unmanaged Web server nodes, as the name implies, are not managed by WebSphere. You
would normally find these outside the firewall or in the demilitarized zone.
 You must manually copy or FTP Web server plug-in configuration files to the Web server.
However, if you define the Web server as a node, you can generate custom plug-in configuration
files for it.
 In a z/OS environment, you must use unmanaged nodes if the Web server is a non- z/OS
product.
24). Explain different types of containers WAS 6.0 ?
Application server containers
 Each application server provides the following container support:
Web container
The Web container processes servlets, JSPs (processed as servlets), and other types of server-side
includes. Each application server runtime has one logical Web container, which can be modified but not
created or removed. Requests are received by the Web container through the Web container inbound
transport chain. The chain consists of a TCP inbound channel that provides the connection to the
network, an HTTP inbound channel that serves HTTP 1.0 and 1.1 requests, and a Web container channel
over which requests for servlets and JSPs are sent to the Web container for processing.
Requests for HTML and other static content that are directed to the Web container are served by the
Web container inbound chain. Although the Web container can serve static content, a more likely
scenario is that you will use an external Web server to receive client requests and a Web server plug-in
to forward requests for servlets to the Web container.
EJB container
The Enterprise JavaBeans container provides all of the runtime services that are needed to deploy and
manage enterprise beans. It is a server process that handles requests for both session and entity
beans. The container provides many low-level services, including threading and transaction support.
From an administrative viewpoint, the container manages data storage and retrieval for the
contained enterprise beans. A single container can host more than one EJB Java archive (JAR) file.
Portlet container
The Portlet container processes JSR168 compliant Portlets. The Portlet container is an extension to the
Web container.
Session Initiation Protocol container
The SIP container processes applications that use at least one SIP servlet written to the JSR 116
specification. The Portlet container is an extension to the Web container.
Application client container
The application client container is a separately installed component on the client’s machine. It enables
the client to run applications in a J2EE environment that is compatible with EJB.
25). What are the services provided by application server?
The following are the broad level of services
• J2EE Connector Architecture services
• Transaction service
• Dynamic cache service
• Message listener service
• Object Request Broker service
• Administrative service
• Name service
• Performance Monitoring Infrastructure service
• Security service
• Web services engine
• Data Replication Service
26). Standalone server and distributed server configuration – difference ?
Stand-alone server configuration:
Express, Base, and Network Deployment all support a single stand-alone server environment. With a
stand-alone configuration, each application server acts as a unique entity.
An application server runs one or more J2EE applications and provides the services that are required to
run those applications. Each stand-alone server is created by defining
an application server profile.
Multiple stand-alone application servers can exist on a machine, either through independent
installations of the WebSphere Application Server code or through multiple
profiles within one installation. However, WebSphere Application Server does not provide for central
management or administration for multiple application servers. Stand-alone
application servers do not provide workload management or failover capabilities.
Distributed server configuration
With Network Deployment, you can build a distributed server configuration, which enables central
administration, workload management, and failover. In this environment, you integrate one or more
application servers into a cell that is managed by a deployment manager.
The application servers can reside on the same machine as the deployment manager or on multiple
separate machines. Administration and management is handled centrally from the administration
interfaces via the deployment manager.
With a distributed server configuration, you can create multiple application servers to run unique sets
of applications and then manage those applications from a central location.
However, more important, you can cluster application servers to allow for workload management and
failover capabilities. Applications that you install in the cluster are replicated across the application
servers. When one server fails, another server in the cluster continues processing. Work is distributed
among Web and Enterprise JavaBeans™
. (EJB™) containers in a cluster using a weighted round-robin scheme
Application servers
The application server is the primary runtime component in all configurations and is where an
application actually executes. All WebSphere Application Server configurations can have one or more
application servers. In the Express and Base configurations, each application server functions as a
separate entity.
There is no workload distribution or central administration among application servers. With Network
Deployment, you can build a distributed server environmentconsisting of multiple application
servers maintained from a central administration point.
In a distributed server environment, you can cluster application servers for workload distribution.
27). What is the purpose of a proxy server?
A proxy server is a specific type of application server that routes HTTP requests to application servers
that host the applications. The proxy server is the initial point of entry,
after the firewall, for requests into the enterprise. The proxy server can be configured with rules to
route to and load balance the clusters of application servers. The proxy server is
also capable of securing the transport, using Secure Sockets Layer (SSL), and the content using various
authentication and authorization schemes. Another important feature is its
capability to protect the identity of the content servers from the Web clients by using response
transformations (URL rewriting). The proxy server can also improve performance
by caching content locally and by protecting the content servers from surges in traffic.
2.28 Explain the application flow.
The figure shows the typical application flow for Web browser clients using either JDBC from a servlet or
EJB to access application databases.
The typical application flow is as follows:
1. A Web client requests a URL in the browser input page.
2. The request is routed to the Web server over the Internet.
3. The Web server immediately passes the request to the Web server plug-in. All requests go to the
WebSphere plug-in first.
4. The Web server plug-in examines the URL, verifies the list of host namealiases from which it will
accept traffic based on the virtual host information, and chooses a server to handle the request.
5. A stream is created. A stream is a connection to the Web container. It is possible to maintain a stream
over a number of requests. The Web container receives the request and, based on the URL,
dispatches it to the proper servlet.
6. If the servlet class is not loaded, the dynamic class loader loads the servlet (servlet init(), then doGet()
or doPost()).
7. JNDI is used for lookup of either datasources or EJBs required by the servlet.
8. Depending upon whether a datasource is specified or an EJB is requested, the JNDI directs the servlet:
– To the corresponding database and gets a connection from its connection pool in the case of a data
source.
– To the corresponding EJB container, which then instantiates the EJB when an EJB is requested.
9. If the EJB requested involves an SQL transaction, it goes back to the JNDI to look up the datasource.
10.The SQL statement is executed and the data retrieved is sent back either to the servlet or to the EJB.
11.Data beans are created and handed off to JSPs in the case of EJBs.
12.The servlet sends data to JSPs.
13.The JSP generates the HTML that is sent back through the WebSphere plug-in to the Web server.
14.The Web server sends the output HTML page to the browser.
29). What is configuration repository?
The configuration repository holds copies of the individual component configuration documents stored
in XML files.
Central configuration repository is with dmgr And local configuration repository is with node agents
30). Can you explain about Application packaging?
J2EE applications are packaged into EAR files to be deployed to one or more ppplication servers. A J2EE
application contains any or all of the modules as shown in Table
31) How do you develop and deploy application, can you explain?
Please find below the diagrams that explains how the applications are developed and deployed.
The first step is application design Design tools like Rational Rose® or Rational XDE™ can be used to
model the application using the Unified Modeling Language.
Application development :
Application development is done using Rational Application Developer or a comparable IDE to create
the enterprise application.
During the development phase, you can do component testing using the built-in WebSphere Application
Server test environment.
Application packaging :
J2EE applications are packaged into EAR files to be deployed to one or more application servers.
The WebSphere Enhanced EAR, introduced in WebSphere Application Server V6, is a regular J2EE EAR
file with additional configuration information for resources usually required by J2EE applications.
While adding this extra configuration information at packaging time is not mandatory, it can simplify
deployment of J2EE applications to WebSphere
Application deployment:
Applications are installed on application servers using the administrative console or the wsadmin
scripting interface.
You can deploy an application to a single server or a cluster. In a cluster, the application is installed on
each application server in the cluster.
Installing an application involves the following tasks:
 _ Binding resource references, created during packaging, to real resources For example, a data
source would need to be bound to a real database.
 Defining JNDI names for EJB home objects.
 Specifying data source entries for entity beans
 Binding EJB references to the real EJB JNDI names.
 Mapping Web modules to virtual hosts.
 Specifying listener ports for message-driven beans.
 Mapping application modules to application servers
 Mapping security roles to users or groups
The use of an enhanced EAR file simplifies this installation process.
After a new application is deployed, the Web server plug-in configuration file needs to be regenerated
and copied to the Web server.
32). Explain about various roles in WAS administration.
 WebSphere Application Server provides a granularity of access control through the provision of
four administrative security roles:
 Monitor can view the system state and configuration data, but cannot make any changes.
 Operator has all the functions of Monitor as well as ability to make operational changes, for
example start/stop servers.
 Configurator has all the functions of Monitor as well as ability to make Configurational changes.
 Administrator has all the functions of Operator and Configurator.
 Using these roles requires that WebSphere global security be enabled. Users and groups can be
assigned these roles through the administrative console
33) What is JMX?
 Java Management Extensions. JMX is a framework that provides a standard way of exposing
Java resources, for example application servers, to a system management infrastructure.
 The use of JMX opens the door to third-party management tool providers. Users of WebSphere
are no longer restricted to IBM-supplied management tools.
34) What is the effect of disabling websphere global security ?
 If global security is not enabled, you can enter any user ID, valid or not to log in to the
administrative console.
 The user ID is used to track changes to the configuration, but is not authenticated. You can also
simply leave the User ID field blank and click the Log In button.
35) Can multiple users enter the dmgr?
 A user ID must be unique to the deployment manager.
 If you enter an ID that is already in use and in session, you will receive the message Another user
is currently logged with the same User ID
 The message another user is currently logged with the same User ID appears if a previous
session ended without a logout.
 If the user closed a Web browser during a session and did not logout first or if the session timed
out.
36) What is the admin console default session timeout limit?
The default is 30 minutes.
Edit the <was_home>/systemApps/adminconsole.ear/deployment.xml file in a text editor
37) What are JDBC providers and data sources?
A data source represents a real-world data source, such as a relational database.
When a data source object has been registered with a JNDI naming service, an application can retrieve
it from the naming service and use it to make a connection to the data source it represents.
Information about the data source and how to locate it, such as its name, the server on which it resides,
its port number, and so on, is stored in the form of properties on the DataSource object.
This makes an application more portable because it does not need to hard code a driver name, which
often includes the name of a particular vendor.
38) What are JCA resources?
The J2EE Connector architecture (JCA) defines a standard architecture for connecting the J2EE platform
to heterogeneous Enterprise Information Systems (EIS),
For example, ERP, mainframe transaction processing, database systems, and legacy applications not
written in the Java programming language.
The JCA Resource Adapter is a system-level software driver supplied by EIS vendors or other third-party
vendors.
Multiple resource adapters (one resource adapter per type of EIS) are pluggable into an application
server.
This capability enables application components deployed on the application server to access the
underlying EISs.
In WebSphere Application Server, two types of objects are configured for JCA
support:
Resource adapters,
Connection factories
The role of the WebSphere administrator is to:
Install and define the resource adapter.
Define one or more connection factories associated with the resource adapter.
39) What are resource adapters?
 A WebSphere resource adapter administrative object represents the library that supplies
implementation code for connecting applications to a specific EIS, such as CICS or SAP.
 Resource adapters are stored in a Resource Adapter Archive (RAR) file, which is a Java archive
(JAR) file used to package a resource adapter for the connector architecture.
 The . file has a standard file extension .rar
40) What does .rar file contain?
A RAR file can contain the following:
EIS-supplied resource adapter implementation code in the form of JAR files or other executables, such
as DLLs Utility classes Static documents,
such as HTML files for developer documentation, not used for runtime
J2C common client interfaces, such as cci.jar
A mandatory deployment descriptor (ra.xml)
This deployment descriptor instructs the application server about how to use the resource adapter in an
application server environment.
The deployment descriptor contains information about the resource adapter, including security and
transactional capabilities, and the ManagedConnectionFactory class name.
41). How do you install and configure resource adapters?
To use a resource adapter, you need to install the resource adapter code and create connection
factories that use the adapter. Resource adapter configuration is stored in the resources.xml file.
To install a resource adapter (.rar file), do the following:
1). From the administrative console, expand Resources from the navigation tree.
2). Click Resource Adapters. The administrative console shows all the configured resource adapter
objects. In Figure you see the two resource adapters supplied with WebSphere.
3). Click Install RAR to install a new resource adapter.
4). Enter the path to the RAR file supplied by your EIS vendor. It can reside locally, on the same machine
as the browser, or on any of the nodes in your cell.
5). Select the node where you want to install the RAR file. You have to install the file on each node
separately.
6). Click Next. The Configuration page for the resource adapter selected is displayed. This is shown in
Figure.
In this example you do not have to configure any properties. The defaults combined with the
information supplied in the RAR file provide all the information needed. However, you have the option
of configuring the following:
Name
Create an administrative name for the resource adapter.
Description
Create an optional description of the resource adapter, for your administrative records.
Archive path
This field is the path where the RAR file is installed. If this property is not specified, the archive will be
extracted to the absolute path represented by the ${CONNECTOR_INSTALL_ROOT} variable.
The default is <profile_home>/installedConnectors/<adaptername.rar>
Class path
A list of paths or JAR file names which together form the location for the resource adapter classes. The
resource adapter codebase itself, the RAR file, is automatically added to the classpath.
42). What are the lists of web servers that web sphere can manage?
 Apache HTTP Server
 Domino Web Server
 IBM HTTP Server
 Microsoft Internet Information Services
 Sun Java System Web Server (formerly Sun ONE and iPlanet)
43). What is the special feature in IBM http server compared to other servers?
 If the Web server is defined on an unmanaged node, automatic propagation of a plug-in
configuration is only supported for IBM HTTP Servers.
 WebSphere Application Server supports some additional administrative console tasks for IBM
HTTP Servers on managed and unmanaged nodes.
 For instance, you can start IBM HTTP Servers, stop them, terminate them, display their log files,
and edit their
. configuration files
44). What are unmanaged nodes?
 An unmanaged node does not have a node agent to manage its servers. In a standalone server
environment, you can define one Web server and it, by necessity, resides on an unmanaged
node.
 In a distributed server environment, Web servers defined to an unmanaged node are typically
remote Web servers.
45). What are Managed nodes?
 Managed node has a node agent to manage the webservers or appservers.
46). What is FFDC?
 The First Failure Data Capture (FFDC) function preserves the information generated from a
processing failure and returns control to the affected engines.
47). What are the three property files that control the behavior of FFDC?
 There are three property files located in <was_home>/properties which control the behavior of
the FFDC filter.
ffdcStart.properties, used while the server is starting
ffdcRun.properties, used after the server is ready
ffdcStop.properties, used while the server is stopping
 The captured data is saved automatically in the <profile_home>/logs/ffdc directory for use in
analyzing the problem, and could be collected by the Collector tool.
 The First Failure Data Capture tool is intended primarily for use by IBM Service. It runs as part of
the WebSphere Application Server and you cannot start or stop it. It is recommended that you
not attempt to configure the FFDC tool.
48). What is Application Server Toolkit
The Application Server Toolkit is included with WebSphere Application Server V6. It includes debugging
functionality built on the Eclipse workbench. It provides the following adapters:
 WebSphere Application Server debug adapter
 JavaScript debug adapter
 Compiled language debugger
 Java development tools (JDT) debugger
49). How to find product information
The easiest way to get comprehensive information about the installation is to use the administrative
console. You can use this when the server is running.
1. Select Servers – Application Servers.
2. Click the server.
3. Select the Runtime tab.
4. Click Product Information from the Additional Properties list.
versioninfo.sh is the command line utility to find the information on WebSphere version.
50). How to you determine the Java version.
1). Look in the SystemOut.log file of one of the profile instances.
<profile_home>/logs/server1/SystemOut.log
2). Run java –fullversion
Q.1. What is ND?
A. Network Deployment
Q.2. What is a Cluster?
A. Cluster is a logical name assigned to group of servers (JVMs).
Q.3. What are the different types of clusters?
A. Horizontal and Vertical cluster
Q.4. What is Horizontal and Vertical cluster?
A. A vertical cluster has cluster members on the same node, or a physical machine. A horizontal cluster
has cluster members on multiple nodes across many machines in a cell.
Q.5. What is the difference between WAS v5.x and 6.x?
A. New concepts like Profiles and SIB (System Integration Bus) are introduced in v 6.0.
Q.6. What is the difference between an Application Server and a Web Server?
A. Application Servers hosts the java applications and Web Server is basically used for serving static
HTML pages.
Q.7. What is a Plugin? Where is it installed?
A. WebSphere plug-in integrates with the HTTP Server and directs requests for WebSphere resources
(servlets, JSPs, etc.) to the Websphere application server. The WebSphere plug-in uses a configuration
file called plugin-cfg.xml file to determine which requests are to be handled by WebSphere. As
applications are deployed to the WebSphere configuration, this file must be regenerated (typically using
the Administration Console) and distributed to all Web servers, so that they know which URL requests to
direct to WebSphere.
Q.8. What is the advantage of using Clusters?
A. Clustering provides workload management and failover of URL and EJB requests. The cluster can be
on the same node or on different nodes.
Q.9. What is JDBC, JNDI?
A. JDBC – Java Database Connectivity
JNDI – Java Naming and Directory Interface.
Q.10. What is the command to add a node to the deployment manager?
A. $WAS_HOME/bin/addNode.sh NDHostName SOAPport
Q.11. With Java2Security enabled on WebSphere Application Server, and you are performing an
Enterprise Application deployment, what security file is open during deployment?
A. was.policy
Q.12. Java2Security is enabled at the global level, and an application is deployed to a clustered vm, with
a pair of cluster members. The application encountered performance problems due to Java2Security.
The application team receives a waiver to disable Java2Security. Does J2Security need to be disabled at
the global level or can it be disabled at the server level, leaving Java2Security enabled for other
applications?
A. It can be disabled at the server level leaving it enabled for any other applications.
Q.13. What directory / directories might you find the following IBM script in a Network Deployment
configuration?
PropFilePasswordEncoder.sh
A.under the bin directory for both the nodeagent / deployment manager
Q.14. Identify how you would use the PropFilePasswordEncoder.sh to encode the password for the
following userid in the sas.client..props
# RMI/IIOP user identity
com.ibm.CORBA.loginUserid=websphere
com.ibm.CORBA.loginPassword=test123
A.
./bin/ PropFilePasswordEncoder.sh ../properties/sas.client.props com.ibm.CORBA.loginPassword
Q.15. Identify the steps to enable the PMI (Performance Monitoring Interface).
A. From the Admin Console -> Monitoring and Tuning -> Performance Monitoring Infrastructure – Select
the sever that you want to enable and select the Enable the Performance Monitoring Infrastructure.
Q.16. What is Garbage Collection?
A. Garbage collection is a process of automatically freeing objects that are no longer referenced by the
program.
Q.17. Where would you enable Verbose Garbage Collection?
A. From the Admin Console:
Application Server -> ServerName -> Process Definition -> Java Virtural Machine – Select verbose
garbage collection radio button.
Q.18. What log file would the verbose garbage collection output appear in?
A. native_stdout.log
Q 19. What is the IBM utility script that you can run to take a backup of the WebSphere configuration?
A. backupConfig.sh
Q. Using the Admin Console, where would you find an applications context root?
A. Enterprise Application -> Application - > Additional Properties –> View deployment descriptor.
Q. Using the Admin Console, how to find out the JVM HTTP port?
A. WAS 5.x
– Admin Console -> Servers -> Application Servers -> JVM -> Web Container -> HTTP Transports.
WAS 6.x
- Admin Console -> Servers -> Application Servers -> JVM -> Expand Ports under communications.
Q. How to find the admin console port?
A.
Q. What is a Replication Domain?
A. A replication domain is a collection of replicator entry (or replicator) instances used by clusters or
individual servers within a cell.
All replicators within a replication domain connect with each other, forming a network of replicators.
The default is to define a replication domain for a cluster when creating the cluster. However,
replication domains can span across clusters.
Global default settings apply to all replication use for a given replication domain across a cell. Most
default settings tune and control the behavior of replicator entries in managed servers across the cell.
Such default settings control the use of encryption or the serialization and transferring of objects. Some
default settings tune and control how specific WebSphere Application Server functions (for example,
session manager and dynamic caching) leverage replication, such as session use of partitions.
For situations that require settings values other than the default, change the values for a given
replication domain on the Internal Replication Domains page. Settings include various resource
allocation, replication strategies (such as grouping or partitioning) and methods, as well as some security
related items.
If you are using replication for HttpSession failover, you might also need to filter where the session
replicates. For example, only replicate to two places out of many. The global default settings define the
partition size or number of groups and the session manager settings define the groups to which a
particular instance belongs.
Filtering is less important if you are using replication to distribute information on invalid data and actual
cached data maintained by a Web container's dynamic caching. Replication does not occur for failover
as much as for data synchronization across a cluster or cell when you likely want to avoid expensive
costs for generating data potentially needed across those various servers.
Note that you can filter or segment by using multiple replication domains.
Q. What is SIB (Service Integration Bus)?
Q. What is the difference between SystemOut.log and SystemErr.log?
Q. What does native_stdout.log contains?
Q. What are the SDK versions supported on WAS 4, 4.X, 5, 5.X, 6, 6.X and 7?
A. WAS 7 – SDK 1.6
WAS 6.1.x – SDK 1.5
WAS 6.0.x – SDK 1.4.2
WAS 5.1.1 – SDK 1.4.2
WAS 5.1 – SDK 1.4.1
WAS 5.0.x – SDK 1.3.1
Q. How to check WAS Version / Build Level?
A. ./WAS_HOME/bin/versionInfo.sh
Q. What is the Default SOAP port number?
A. 8879
Q. What are different ways to capture heap dumps for a Websphere JVM?
Q. What do you understand by the term JMS?
A. Java Message Services, JMS, is Sun's standard API for message queuing systems. Message queuing
systems form the front-line interface between businesses (B2B) and for Enterprise Application
Integration (EAI). As such, message queuing systems are often called "middleware" because they
operate in the middle -- between other systems and between enterprises.
Q. What are the different JMS providers available in different WAS versions?
A. WAS 6
WebSphere Embedded Messaging
WebSphere MQ
Generic
V5 Default Messaging
WAS 5
Generic JMS Provider
WebSphere JMS Provider
WebSphere MQ JMS Provider
Q. What are console user roles available in WAS 5 and 6?
A. WAS 5 and WAS 6
Administrator
Configurator
Operator
Monitor
Q. What are the authentication mechanisms available for Global Security in WAS?
A. 1. LTPA (Light weight Third Party Application)
2. SWAM (Simple WebSphere Authentication Mechanism)
Q. What are the User Registries supported by WebSphere for Global Security?
A. Local OS, LDAP and Custom User Registry
Q. How to change the JVM/Process/Diagnostic Trace log file locations for any JVM?
A. 1. Login to the Admin Console.
Q. What are the different types of logs available in WebSphere?
A.
Diagnostic Trace
JVM Logs
Process Logs
IBM Service Logs
BM Interview Questions
These are the interview questions which asked on 17-04-09 by IBM intial round. One thing should
remember by everyone, now a days all the companies who are taking WAS admins they are asking
questions on O/S also, like Linux or UNIX. So be prepare for those operating systems also before
attending an interview.
1. Tell me about yourself (roles and responsibilites)
2. What is the difference b/wn appserver and webserver?
3. How do u configure the plug-in file?
4. How do u configure JDBC drivers and what is meant by J2C authentication?
5. How Internet Works?
A) The Internet is a global system of interconnected computer networks that use the standardized
Internet Protocol Suite (TCP/IP). It is a network of networks that consists of millions of private and
public, academic, business, and government networks of local to global scope that are linked by copper
wires, fiber-optic cables, wireless connections, and other technologies.
6. Explain the process of Federation?
7.How do u administrate admin console in unix?
8. what are the different types of clustering? done
9. What is the advantages of Vertical Clustering?
10. Do u have any idea or did u work with JACL scripts?
11. Where do you find the problems of a Webserver(Log file)?
12. How many types of log files are there! What are they!
13. What is log rotation policy?
14. Where do you enable the Garbage Collector?
using -verbosegc in startup command
15. How to tune an application?
16. When you will perform Thread Dump and Heap Dump?
17. What are the parameters that to pass while generating an Heap Dump?
18. How To identify that heap memory is decreasing and where?
19. Describe the real time problems that u faced in your administration career?
20. What are the major tasks you solved?
21. What is the difference between SSH and Https?
22. Why we enable SSL on webserver rather than App.Server?
A) When ever request comes to application it is start working from Webserver.
SSH
Secure Shell (SSH), sometimes known as Secure Socket Shell, is a Unix-based command interface and
protocol for securely getting access to a remote computer. It is widely used by network administrators
to control Web and other kinds of servers remotely. SSH is actually a suite of three utilities - slogin, ssh,
and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp. SSH commands are
encrypted and secure in several ways. Both ends of the client/server connection are authenticated using
a digital certificate, and passwords are protected by being encrypted.
SSH uses RSA public key cryptography for both connection and authentication. Encryption algorithms
include Blowfish, DES, and IDEA. IDEA is the default.
SSH2, the latest version, is a proposed set of standards from the Internet Engineering Task Force (IETF).
How To Connect To WSadmin Console through SOAP ?
Generally we connect wsadmin console directly with soap port or rmi port.
specially if we want to check whether a particular SOAP port of dmgr is working or not, this requisition
we need whenever we are federating a node to a dmgr.
The following is the command which we use to check whether a particular port is communicating or not.
wsadmin -conntype SOAP -port 8879
wsadmin -conntype RMI -port 9809
wsadmin -conntype RMI -port 2809 -user u1 -password secret1
(1.1) Issues: we got responce from users saying that they not able to receive messages from their
application.
Sol : we identified that message receiver server not able to recive messages from MQ, because of File
storeage failed, then we informed the same to system infrastructure team they added SAN, even though
the problem not got resolved.
I am seeing some transaction timeout errors in the logs:####<21-Jul-2009 16:18:23 o'clock BST>
<21cnedc313>
(1.2) Issues: JMS transaction timeout messages like this in WAS.
Sol: there are bulk number of JMS messages stored in MQ Server, when ever san got added at a time all
the messages in MQ, hit the server at a time, so server is not able process that many number of requests
at a time, then we increase the JTA transaction time out value from 30 to 100, this will allow more time
for transaction to complete. After process all the requests we changed the transaction time out value
back to 30.
(2.1) Issues: the WAS server logs are not getting generated in both the nodes. The last timestamp in the
logs file is 18/07/09 15:36.The same issue has occurred few times and we have to restarted both the
managed servers for the logs to be generated.
Could you please let us know what could be the reason for this issue?
Sol. The log rotation was not set properly, which I have set now. Also the log stopped in the middle of
printing some debugs, which suggests that it ran out of disk space. The /IBM_profile is mounted on root
partition.
(3.1) Can you please send the P2 case (TAM Test Tool not working) which came today morning to
APLSUP54 and request them to check why the ?java.lang.OutOfMemoryError: unable to create new
native thread? occurred.
Also mention in that case that we had taken the thread dump and is present at mps location.
Sol. This is again a native memory issue. The JVM heap allocated is 1.5 Gb (which is necessary otherwise
app starts giving heap errors), which leave 512mb for native memory out of the possible 2Gb max.
This native memory is used by all the native modules like MQ or application codes creating native
memory. If the native memory is not sufficient then you get OutofMemory:unable to create a new
native thread error.
(4.1) We are facing problem with the WebSphere server in dybip04. We are using BEA version 8.1SP6
The Managed server is suddenly going into UNKNOWN state and when we try to restart the server
The following error is occurring::
OutOfMemoryError occured on server
Sol. I have increased the memory size to 2GB and restarted the server. The messages are being
consumed now.
5.1) we are facing connection failure error, due to what causes?
Sol. Finally we found, driver there is one DB driver corrupted in it causes the issue.
Firewarll -> loadbalancer -> Webserver -> app.ser visa plugin -> hits application -> contact db to ds and
request - > firewall -> loadbalancer(split the load into multiple Webserver) -> (sitemider/ssl) webserver -
> via plug in which is in the application server -> application
In side cluster jvm will respond.
How much memory tuned for your application servers in your environment?
Depend upon the application, decided by developer. Or depends on OS.
How will you login to solaris/ linux for installations?
Normally we will not use rout privileged ID for installing/configuring was applications in Linux.
Ex: empid
Su wasuser(not root privileged user) Non-route user
What are the two basic steps that admin have to do after deploying the application & before running
the application?
have to regenerate the web server plug-in, copy it over to the web server machine and do a quick restart
of it
1.wht is hot deployment, and where we get a chance to go for this?
Hot deployment means adding modules or additional services to the existing application or new
application without stopping the application server as well as application. When an application is went
to Production environment then we can't stop the application as application requests will come. So in
that case we will go for hot deployment.
2.Can we access 2 different applications at once running on 2 application servers in a cluster?
If those two applications are mapped exactly on to the same cluster members, we can access for them
by configuring the webserver and plug-in properly for the cluster.
3.how to enable Global Security in WAS though CUI?
To enable Global Security first we have to do
1. Select the Authentication Registry, i.e., either Local OS or LDAP.
Here we have to specify the primary administrative user name which should be present there in the
registry.
2. Select the Authentication Mechanism i.e., LTPA or SWAM.
Here we have to specify the password and confirm-password.
3. Enable Global Security.
4. Save and restart the server.
4.If the app server crashes in the middle of application deployment , wht could be the reason and wht
steps we have to follow?
If the server resources are less while deployment, when application requests are hitting application
server due to less resources the application server will crash. If the application server crash then that
time we can get thread dump.
5.During WAS ND installation, one default server "server1" creates right?can we change its name during
installation?
If we are installing, in silent we can change the default server name we can change, in GUI its not
possible.
Q: What is the default port for SSH server?
A: 22
Posted by Ponraj at 1:27 AM 1 comment:
HSBC Interview
These are the interview questions which are asked in HSBC.
1. What is JavaBean?
A) A JavaBean is a Java Object that is serializable, has a nullary constructor, and allows access to
properties using getter and setter methods.
2. What is difference between soap.client.props and sas.client.props?
3. What is difference between normal JVM and Web sphere JVM?
4. What are the securities in Web sphere?
5. What is DD/Deployment Descriptor?
A) a deployment descriptor describes how a web application or enterprise application should be
deployed. It directs a deployment tool to deploy a module or application with specific container options,
security settings and describes specific configuration requirements
6. What is the deployment descriptor of EAR?
A) as below
7. What is the deployment descriptor of EJB/WAR?
A) ibm-web-bnd.xmi, ibm-web-ext.xmi, web.xml
8. How do you package applications?
9. What is difference between context root and url-pattern?
10. Workload management
11. What is vertical and horizontal scaling and their Advantages and Dis-advantages?
12. How do you configure LDAP and Web sphere?
13. How do you enable global security?
14. How do you find memory leaks? At what situation memory leaks occur –Give any 3
examples? Is there any tool to find memory leaks?
memory leaks in hapen if objects not closing in java program
15. How do you enable verbose GC? In what file, the output is written?
16. When does GC cycle starts?
17. What is OutOfMemory exception and when does it occur?
18. What are your Day-to-Day Activities?
Posted by Ponraj at 1:27 AM No comments:
IBM INTERVIEW Questions on 04-05-09
1. Tell me about your educational background.
2. Tell me about your day to day activity.
3. what is load balancing?
A) Edge component, BIGIP product hardware load balance.
It will be connected to router and switches, Webserver – to – app. server load balancer
4. What is Work Load Management?
A) Failover, High availability, scalability and security are coming from Clustering (WLM).
Two main features are - Load Balancing - AffinityWebSphere WLM is offering these two features on
different levels like - Application/web Server Clustering
5. what is meant by profile? How many types of profiles are there in Was v6.0?
A) 3 types of profiles in 6.0 1.application server , 2. dmgr, 3.default
in 6.1 there are 4 – 1.dmgr, 2.app.serv, 3.default,4.cell profile(already federated appserver profile)
6. how you fedarate a node from deployment manager? and how you federate when global security is
enabled.?
A) we can federate it from console, need to select Node under system administration section, then
select a new node button then provide required(soap port) data.
7. What is SSL ? hOW You configure SSL?
A) It is Already been configured will use dummy, web server part, certificate, configure in that virtual
host.
8. What is meant by Horizontal Clustering? Explain?
A) DONE
9. How to check disk usage in linux or unix?
A) Du -k
10. How to check the multiple NIC in Unix or linux?
A) ifconfig -a
11. How to identify and kill a process ID?
A) Ps –ef
12. What are the measures you follow while deploying an application in production environment?
A) we need to consider below steps.
1. need to take necessary backups, 2. Raise a change request, 3. Approval request, 4. schedule date from
change control.
13. what is the use of trace.log and activity.log?
A) we can use “showlog” commad in bin directory for getting tracer information.
Trace.log : It will have details about the WAS Environment, understandable text format.
Activity.log : It will have complete information about Application server environment, and it is not in
readable format, “waslogbr.bat” for opening/viewing this log. It will have information about complete
base class and other stuff. We have to use “symptom database” for fixing/compare identifying the issue.
15. where do you get performance information in log files of an application server?
A) there are 2 logfiles
1. NativeError.log – at what state the GC happened and how much memory freed up.
2. NativeOut.log – it is having general logs.
Posted by Ponraj at 1:27 AM No comments:
IBM Chennai Interview
1. Are you responsible for production support?
A) Yes
As per on call support, we have dedicate mobile and laptop every week, they will change. And Prioritize,
change at every week on 24x7 basis.
2. Breifly explain about the topology of production environment?
A)
In my production environment we are having 200 applications running across 70 RHEL boxes in 20
WebSphere cells.
Each cell has 3 nodes under dmgr, all nodes are established in horizontal cluster (different RHEL boxes),
All clusters will have 3 jvms run across the RHEL boxes.
Resources: 8 onsite + 8 off shore
Role hierarchy: Business head -> IT MGR -> Middleware mgr -> off-shore team lead ->
My role is Level-1 and 2.
We are did a migration from 5.1 to 6.0/6.1, in my environment, 5.1 will be completely migrated this year
end. We are using paid support from IBM 5.1(3 cells) as free support stopped by IBM.
3. Which environment you are using?
A) Soloaris 6.1/8.x , RHEL Linux: 5.1
4. How many servers and how many applications?
A) Discussed
5. which kind of applications?
A) Client Business:
1. Mortgage, 2.Trading applications
6. Applications are running on clusters?
Yes.
7. How do you verify that you are using Horizontal clusters not a vertical cluster?
A) if u have all the servers in same machine(Host) ,than its vertical ,if cluster servers are installed in
different machine than its horizontal.
-ORGo
to WAS console => select Nodes in left side => in the right side of the console you can see how many
nodes make's your CELL, and also the hostname of the boxes in which the node exists.
if you see all the nodes from different hostnames then its Horizontal clustering if you see same
hostname here then its Vertical clustering
8. your cluster contains how many nodes?
A) 3 nodes
9. Both nodes are running on dmgr. Dmgr is on both nodes?
A) All my production Dmgr in a single box. Nodes will be across different boxes.
Note: if in case failure of DMGR node, then how do we handle the issue?
In that case we need to wait till that problem gets resolved, for any configuration changes in the
console. Generally start and stop server activities will do in application server node.
10. Is it necessary to have dmgr on both nodes?
A) NO, Single dmgr.
11. Do you have dmgr as standalone?
A) We can, but No use.
12. Can we create more than one server in standalone-environement?
A) Never worked on stand alone environment.
13. can we have more than one application in a single server?
A) many
14. I want to depoly the application in any one of the node but not cluster?
A) Node is a server
15. What kind of database you are using?
A) Oracle 10g
16. What kind of security mode you are using or JDBC connection?
A) J2C Authentication
17. What type of driver you are using? Type 4 driver
A)
Type 1 driver: JDBC-ODBC Bridge
This driver called as JDBC-ODBC bridge.The Java Statements converts to JDBC statements.JDBC
statements calls ODBC by using JDBC-ODBC bridge. ODBC drivers convert into the requirements of
databases.
Java--->JDBCStat-->JDBC-ODBC bridge-->ODBC-->Databases.
Type 2 driver: Native-API/partly Java driver
This driver is called as Native Driver where it requires the some native code to connect to the databases.
Type 3 Driver: Net-protocol/all-Java driver
This driver is called as Protocal driver where
Java-->JDBC statements-->SQLStatements--> databases.
Type 4 Driver: This driver directly converts the java statements to SQl Statements which require to
databases. It wont convert to JDBC statement.
18. The application should be authenticate before interacting with database?
A) It will happened, we are creating uid, pwd that will work
19. what is meant by connection pooling?
A) a connection pool is a cache of database connections maintained by the database so that the
connections can be reused when the database receives future requests for data. Connection pools are
used to enhance the performance of executing commands on a database. Opening and maintaining a
database connection for each user, especially requests made to a dynamic database-driven website
application, is costly and wastes resources. In connection pooling, after a connection is created, it is
placed in the pool and it is used over again so that a new connection does not have to be established. If
all the connections are being used, a new connection is made and is added to the pool. Connection
pooling also cuts down on the amount of time a user must wait to establish a connection to the
database.
20. what are the different methods to deploy application?
A)
21. for ear file is context root is necessary?
A) Hostname:9089/appname - context root Yes.
22. I updated the new application but the user is getting the old applicaion only?
A) need to Restart, synch
23. what are the options you have to improve performance?
A) Connection pool, Thread pool of web container, EJB container, web server parameter, jdbc
connection pool
Tuning Application server
Tuning JVM, Tuning Applications, Tuning Database, Tuning JMS, Tuning security, Tuning operating
systems, Tuning Web servers
Connection pool perameters:
$AdminControl getAttribute $objectname surgeCreationInterval
$AdminControl setAttribute $objectname surgeCreationInterval 30
$AdminControl getAttribute $objectname surgeThreshold
$AdminControl setAttribute $objectname surgeThreshold 15
24. to sepcify the weight of a cluster member in which file i have to modify?
A) have to modify in Plugin file
25. I am getting server 500 erro, what will be the reason?
A) Internal server error (server to db middleware)
26. How do enable GC?
In the Administrative Console, expand Servers and then click on Application Servers.
. Click on the server that is encountering the¬ "OutOfMemory" condition.
. On the Configuration tab, under Server¬ Infrastructure, expand Java and Process
Management, and click Process Definition.
. Under the Additional Properties section, click Java Virtual¬ Machine.
. Select the Verbose garbage collection check box.¬
. Click¬ Apply.
. At the top of the Administrative Client, click Save to apply changes¬ to the master
configuration.
. Stop and restart the Application Server
The verbose garbage collection output is written to either native_stderr.log or
native_stdout.log for the Application Server
verbosegc – Tells you what is being done, whether heap size is at min or max.
27. Ho to check GC is active or not, if you don't have?
A) We can check in logs.
28. can you tell me about profiles?
A) WebSphere application binary, profile sharing binaries of existing instance,
29. what is the use of virtual host?
A) Configuration that lets a single host machine resemble multiple host machines. Each virtual
host has a logical name and a list of one or more domain name system (DNS) aliases by which
it is known.
30. Is webserver & application server should be installed in a single machine or different machines?
A) We can do it, but in production different machines.
Webserver OS tuned in different way, app. server different way, normally these web servers in DMZ -
Demilitarized Zone.
31. Difference between managed node and unmanaged node?
A) Managed have node agent, unmanaged not. Unmanaged node we not control from console.
32. How to check application servers are running/not?
A) Ps -grep
33. How to check WAS is running or not through PS?
A) Ps -grep
WAS Edge Components
These are the some of the WAS Edge Components.
WAS Edge Components
Caching Proxy
Proxy Server
Load Balancer
Network Dispatcher Component
Content Based Routing (CBR)
Site Selector Component
Posted by Ponraj at 1:26 AM No comments:
Barclays Interview
1. What is session affinity?
A) Is nothing but a persistence.
Most servers use the term “Session Affinity” to indicate that with in a cluster of servers, requests from
the same client always get routed back to same server. This eliminates the need to replicate session
data like HTTP session or Stateful session Beans.
2. JVM which has been clustered, the server is in production?
A) 1. Memory to memory replication 2. Database persistence
Heartbeat mechanism work in a cluster, member of the cluster identifies that the other server is not
responding it checks 3 times for every 60 seconds, if not responded then it takes the configuration using
memory replication process then completes request.
3. What is fix pack?
A) Patches to fix a particular issue for a particular in environment only not other.
4. What is patch?
A) It is like independent to every body, bug fix of WAS. WAS 6.1.0.17
5. What is migration? How can you migrate from one version to another version?
A) discussed
5. How can you disable the security without admin console?
A) we can disable in Security.xml, but we can’t enable.
6. Complete configureation steps for SSL?
A) We have to install ibm http server, by using ikeyman tool we can create and use SSL certificates.
7. How to configure session management?
A) we can configure though console, either in application/deployment descriptor.
8. How can you provide security authentication for web server?
A) eTrust SiteMinder tool
9. How to know webserver version?
A) we can find in Logfile.
10. How to identify old and new context roots?
A) in Httpd.conf file we can see commented(old) and uncommented(new) data.
11. Difference between v5 & v6.
A)
1. Multiple Profile creations with a single installation (All profiles share same WebSphere binaries)
2. Introduction of Service Integration Bus (SIB) for messaging
3. Has default JMS providers
4. Supports mixed version nodes in a v6 ND Cell
5. Has some extra add-ons in the Admin console navigation tree
6. JACL has been deprecated in 6.1
12. What is the difference between WAS and WL?
A)
1. In weblogic u cant do clustering accros the domain,but in Websphere u can.
2. In weblogic all the configurations are stored in a single file called Config.xml ,but in Websphere its
stored in a directory structure called CELL
3. In weblogic u can start the managed server without a Adminserver(using MSI-config.xml),in
websphere u can not start a node with out Dmgr.
4. In websphere u can add webserver as a unmanaged node where as u cannnt do that in weblogic.
13. How many types of installation are there?
A) GUI, using Response file (silent mode), command line .
14. JACL scripting? Alredy discussed
15. If the performance, of the appliacation goes down? what will u do?
A) Performance Information should collect from monitoring tool
16. what is the difference between L1, L2, L3?
A)
l1- is basic level (monitoring, basic configuration)
l2 -back up who are senior staff (trouble shooting)
l3 –architechts (designing / architect/ requirement(ram/box))
17. the uesr submitted the request, when that request is on processing in the middle the server crashes
then what happens?
It will lost.
Posted by Ponraj at 1:26 AM No comments:
Friday, September 14, 2007
Websphere application server interview Questions
Here is the major websphere application server interview questions collection and answer
Wells Fargo 16-07-09
1) What are your daily day to day Activates?
A) We have ticketing tools, We have 2 Type of tickets:
1. Change request : scheduled activities like new resources creation, JVM settings, Configuration of the
application and development teams raised tickets
2. Incident request : production support or monitoring like up gradation.
We have a dev team; if they found any issues they will raise a ticket.
We have a production support team, and Monitoring team, if they come across some thing abnormal
then they will raise a production support tickets.
We are having WAS 5.1 and 6.1, so daily we are having configuration setups for migration, and building
the similar environment as 5.1 in 6.1In different boxes as new environment.
Right now I don’t have chance to write new scripts. How to check thread dump in jacl
How do you check the health of the appserver? Is there any tool is avialable with you?
A) We have monitoring tools, at the time issue only, TPV (Tivoli Performance Viewer)/Willy Introscope,
and normally it is disabled, at the time of performance issue only we will do monitoring.
2 kinds of monitoring: 1. Availability, 2. performance monitoring 24/7 or not.
L1 team using SiteScope: SiteScope WebSphere Performance Servlet Monitor to monitor the server
statistics of IBM WebSphere Server (versions 3.0x, 3.5, 3.5.x, and 4.0) via a WebSphere Performance
Servlet. The error and warning thresholds for the monitor can be set on as many as ten performance
statistics.
3) Can u configure multpile apache webservers?
A) we can configure in httpd.conf file.
4) Is it possible to configure 10 domain names in apache? if yes? How?
A) we can use virtual hosts.
5) How do you perform heap dump and thread dump?
A) Kill -3 <>
Heap dump relate to jvm memory usage,
Thread dump relate jvm thread usage
6) Is kill -3,kill a process or create a thread dump? explain!
A) kill -3 is used create thread dump.
7) Did u work with any tools which helps you to see the heap dump or thread dump?
A) Heap dump jmap, IBM heap analyzer tool, thread dump using IBM thread analyzer /samurai
8) How to configure security and LDAP?
A) Global security,
Security availability: 1. OS security 2. LDAP (3rd party security) 3. Custom security(Application from DB)
9) What are 202 errors?
Accepted.
10) In ls -lrt, what t stands for and r stands for l stands for?
A)
-l shows you huge amounts of information (permissions, owners, size, and when last modified.)
-r reverses the order of how the files are displayed.
-t shows you the files in modification time
11) How to check a particular port is working or not in unix?
A) netstat -a | grep 80
Posted by Ponraj at 4:50 AM No comments:
Monday, July 03, 2006
IBM Hyderabad
1)Tellme About yourself?
A) Worked as a Websphere administrator. Was responsible for deploying, configuring,
tuning, clustering, and troubleshooting WebSphere related issues.
2)Configuration of WebServer with AppServer?
A) This configuration available in httpd.conf file of a web server, in this file we will configure virtual hosts
and domains etc .
3) Role of Plugin-Cfg.xml?
A) When ever request comes to Webserver it identifies the app. server configuration in this
configuration file.
4) Tell me about RemoteConfiguration?
5) How do you deploy an application in AdminConsole?
6) How do you deploy an EAR file in admin console?
7) What is meant by default bindings?
A) It will bind the resources to connect….at time of startup
8)What are precompiled jsps?
9) Are you comfortable with MQ?
A) I have a little bit knowledge.
10)Tell me about MQConfiguration with WAS?
A) We will configure from console, resources -> JMS -> Queues-> integrating with MQ.
11) Tell me the command to find RAM size in AIX/Unix?
A) prtconf only for AIX
12)Command to find diskfree space?
A) Df –k or m
13) how do you provide Custom security?
A) Developer will give the authorization from an application(may be uid/pwd from Oracle DB)
14)Suppose if u enable customsecurity after opening the admin console in the rightside suppose if you
got only 2 options instead of 3 then what to do?
A) question not clear
15)How much you are comfortable with scripting(JACL/JYTHON)?
A) I have little bit knowledge.
Set $
puts "About to dump threads for this jvm..."
$AdminControl invoke $jvm dumpThreads
puts "... done"
------------
Invoke the generateHeapDump operation on a JVM MBean, for example,
Finding JVM objectName:
set objectName [$AdminControl queryNames
WebSphere:type=JVM,process=<servername>,node=<nodename>,*]
Invoking the generateHeapDump operation on JVM MBean:
$AdminControl invoke $objectName generateHeapDump
Ex: wsadmin -f test.py a b c
test.py content:
import sys
first = sys.argv[0]
second = sys.argv[1]
third = sys.argv[2]
arglen = len(sys.argv)
16)In Jython script how to invoke a variable which was defined in another jython script?
Using MBeans
Calling scripts using another script
Use the execfile command to call a Jython script from another Jython script. For example:
Create a script called test1.py that contains the following:
execfile('c:/temp/script/testFunctions.py')
print printName('Cathy', 'Smith')
Create a script called testFunctions.py that contains the following:
def printName(first, last):
name = first + ' ' + last
return name
Then pass the following path as a script argument:
wsadmin -lang jython -f 'c:/temp/script/test1.py'
1. Are you responsible for production support?
A) Yes
As per on call support, we have dedicate mobile and laptop every week, they will change. And Prioritize,
change at every week on 24x7 basis.
2. Breifly explain about the topology of production environment?
A)
In my production environment we are having 200 applications running across 70 RHEL boxes in 20
WebSphere cells.
Each cell has 3 nodes under dmgr, all nodes are established in horizontal cluster (different RHEL boxes),
All clusters will have 3 jvms run across the RHEL boxes.
Resources: 8 onsite + 8 off shore
Role hierarchy: Business head -> IT MGR -> Middleware mgr -> off-shore team lead ->
My role is Level-1 and 2.
We are did a migration from 5.1 to 6.0/6.1, in my environment, 5.1 will be completely migrated this year
end. We are using paid support from IBM 5.1(3 cells) as free support stopped by IBM.
3. Which environment you are using?
A) Soloaris 6.1/8.x , RHEL Linux: 5.1
4. How many servers and how many applications?
A) Discussed
5. which kind of applications?
A) Client Business:
1. Mortgage, 2.Trading applications
6. Applications are running on clusters?
Yes.
7. How do you verify that you are using Horizontal clusters not a vertical cluster?
A) if u have all the servers in same machine(Host) ,than its vertical ,if cluster servers are installed in
different machine than its horizontal.
-ORGo
to WAS console => select Nodes in left side => in the right side of the console you can see how many
nodes make's your CELL, and also the hostname of the boxes in which the node exists.
if you see all the nodes from different hostnames then its Horizontal clustering if you see same
hostname here then its Vertical clustering
8. your cluster contains how many nodes?
A) 3 nodes
9. Both nodes are running on dmgr. Dmgr is on both nodes?
A) All my production Dmgr in a single box. Nodes will be across different boxes.
Note: if in case failure of DMGR node, then how do we handle the issue?
In that case we need to wait till that problem gets resolved, for any configuration changes in
the console. Generally start and stop server activities will do in application server node.
10. Is it necessary to have dmgr on both nodes?
A) NO, Single dmgr.
11. Do you have dmgr as standalone?
A) We can, but No use.
12. Can we create more than one server in standalone-environement?
A) Never worked on stand alone environment.
13. can we have more than one application in a single server?
A) many
14. I want to depoly the application in any one of the node but not cluster?
A) Node is a server
15. What kind of database you are using?
t
A) Oracle 10g
16. What kind of security mode you are using or JDBC connection?
A) J2C Authentication
17. What type of driver you are using? Type 4 driver
A)
Type 1 driver: JDBC-ODBC Bridge
This driver called as JDBC-ODBC bridge.The Java Statements converts to JDBC statements.JDBC
statements calls ODBC by using JDBC-ODBC bridge. ODBC drivers convert into the requirements of
databases.
Java--->JDBCStat-->JDBC-ODBC bridge-->ODBC-->Databases.
Type 2 driver: Native-API/partly Java driver
This driver is called as Native Driver where it requires the some native code to connect to the databases.
Type 3 Driver: Net-protocol/all-Java driver
This driver is called as Protocal driver where
Java-->JDBC statements-->SQLStatements--> databases.
Type 4 Driver: This driver directly converts the java statements to SQl Statements which require to
databases. It wont convert to JDBC statement.
18. The application should be authenticate before interacting with database?
A) It will happened, we are creating uid, pwd that will work
19. what is meant by connection pooling?
A) a connection pool is a cache of database connections maintained by the database so that the
connections can be reused when the database receives future requests for data. Connection pools are
used to enhance the performance of executing commands on a database. Opening and maintaining a
database connection for each user, especially requests made to a dynamic databasedrivenwebsite
application, is costly and wastes resources. In connection pooling, after a connection is
created, it is placed in the pool and it is used over again so that a new connection does not have to be
established. If all the connections are being used, a new connection is made and is added to the pool.
Connection pooling also cuts down on the amount of time a user must wait to establish a connection to
the database.
20. what are the different methods to deploy application?
A)
21. for ear file is context root is necessary?
A) Hostname:9089/appname - context root Yes.
22. I updated the new application but the user is getting the old applicaion only?
A) need to Restart, synch
23. what are the options you have to improve performance?
A) Connection pool, Thread pool of web container, EJB container, web server parameter, jdbc
connection pool
Tuning Application server
Tuning JVM, Tuning Applications, Tuning Database, Tuning JMS, Tuning security, Tuning operating
systems, Tuning Web servers
Connection pool perameters:
$AdminControl getAttribute $objectname surgeCreationInterval
$AdminControl setAttribute $objectname surgeCreationInterval 30
$AdminControl getAttribute $objectname surgeThreshold
$AdminControl setAttribute $objectname surgeThreshold 15
24. to sepcify the weight of a cluster member in which file i have to modify?
A) have to modify in Plugin file
25. I am getting server 500 erro, what will be the reason?
A) Internal server error (server to db middleware)
26. How do enable GC?
In the Administrative Console, expand Servers and then click on Application Servers.
. Click on the server that is encountering the¬ "OutOfMemory" condition.
. On the Configuration tab, under Server¬ Infrastructure, expand Java and Process
Management, and click Process Definition.
. Under the Additional Properties section, click Java Virtual¬ Machine.
. Select the Verbose garbage collection check box.¬
. Click¬ Apply.
. At the top of the Administrative Client, click Save to apply changes¬ to the master
configuration.
. Stop and restart the Application Server
The verbose garbage collection output is written to either native_stderr.log or
native_stdout.log for the Application Server
verbosegc – Tells you what is being done, whether heap size is at min or max.
27. Ho to check GC is active or not, if you don't have?
A) We can check in logs.
28. can you tell me about profiles?
A) WebSphere application binary, profile sharing binaries of existing instance,
29. what is the use of virtual host?
A) Configuration that lets a single host machine resemble multiple host machines. Each virtual
host has a logical name and a list of one or more domain name system (DNS) aliases by which
it is known.
30. Is webserver & application server should be installed in a single machine or different machines?
A) We can do it, but in production different machines.
Webserver OS tuned in different way, app. server different way, normally these web servers in DMZ -
Demilitarized Zone.
31. Difference between managed node and unmanaged node?
A) Managed have node agent, unmanaged not. Unmanaged node we not control from console.
32. How to check application servers are running/not?
A) Ps -grep
33. How to check WAS is running or not through PS?
A) Ps -grep
WAS Edge Components
These are the some of the WAS Edge Components.
WAS Edge Components
Caching Proxy
Proxy Server
Load Balancer
Network Dispatcher Component
Content Based Routing (CBR)
Site Selector Component
What is JDBC, Jdbc Provider and Data Source and JNDI
1. What is JDBC ?
JDBC is an API (Application Program Interfaces) , that is useful to write a java program to connect any
database, and retrieve the data for the database and utilize the data in the java program.
Making a connection to a database
Creating SQL or MYSQL Statement
Execute that Sql or MySql queries in the database
We have 2 types of Jdbc drivers in WAS, Those are type 2(think) and type 4(thin/native protocol)
type 2 driver require the database client software on the client node to connect to the database server
type 4 driver connect directly to the database server
2. What is Data Source ?
Data Source allow to you to manage a pool of connection to a database
Data Source is handle to which database you want to connect , it is a communication between database
and
client or end-user
3. What is Connection Pool ?
Connection pool is a place where a set of connection are kept and are used in different programs
without creating connection to the database, after using the connection he can send back that
connection to the connection pool
4. What is Jdbc Provider ?
It is a database provided by the vendor which database we have to use like mysql , oracle etc..
This details given by the client or vendor
5.What is JNDI ?
Java Naming Directory Interface Service is used to register the resource hosted by server's
JNDI gives unique name for every server
It is implements on the top of CORBA (Common Request Broker Architecture)
The SSL configuration for WebSphere provides the authentication between the WEB Server (IBM IHS
2.0.47.1) and the WebSphere JVM. The configuration uses Self Signed Certificates with a Five Year (1825
days) operational limit. No Keys are purchased to provide this security as no customer facing interaction
is involved, hence certificates are self signed.
The principle sections of the setup are:-
ServerKey.jks - Holds the WebSphere Server Certificate
ServerTrust.jks - Holds the Server Key, Client Key and the Plugin Key
allowing WebSphere to trust client connections (SAS,
SOAP) and the WEB Server via the WEB Plugin.
ClientKey.jks - Holds the Client Certificate for SAS & SOAP /
WebServices Authentication.
ClientTrust.jks - Holds the Server Key and Client Key allowing the
SAS & SOAP Web Services to trust the WebSphere
JVM.
PluginKey.kdb - Holds the Plugin Certificate and the Server Key to
enable the Web Server to trust the WebSphere JVM.
PluginKey.sth - Holds the Access password for the PluginKey.kdb
Part-V :
1)Tellme About yourself?
A) Worked as a Websphere administrator. Was responsible for deploying, configuring,
tuning, clustering, and troubleshooting WebSphere related issues.
2)Configuration of WebServer with AppServer?
A) This configuration available in httpd.conf file of a web server, in this file we will configure virtual hosts
and domains etc .
3) Role of Plugin-Cfg.xml?
A) When ever request comes to Webserver it identifies the app. server configuration in this
configuration file.
4) Tell me about RemoteConfiguration?
5) How do you deploy an application in AdminConsole?
6) How do you deploy an EAR file in admin console?
7) What is meant by default bindings?
A) It will bind the resources to connect….at time of startup
8)What are precompiled jsps?
9) Are you comfortable with MQ?
A) I have a little bit knowledge.
10)Tell me about MQConfiguration with WAS?
A) We will configure from console, resources -> JMS -> Queues-> integrating with MQ.
11) Tell me the command to find RAM size in AIX/Unix?
A) prtconf only for AIX
12)Command to find diskfree space?
A) Df –k or m
13) how do you provide Custom security?
A) Developer will give the authorization from an application(may be uid/pwd from Oracle DB)
14)Suppose if u enable customsecurity after opening the admin console in the rightside suppose if you
got only 2 options instead of 3 then what to do?
A) question not clear
15)How much you are comfortable with scripting(JACL/JYTHON)?
A) I have little bit knowledge.
Set $
puts "About to dump threads for this jvm..."
$AdminControl invoke $jvm dumpThreads
puts "... done"
------------
Invoke the generateHeapDump operation on a JVM MBean, for example,
Finding JVM objectName:
set objectName [$AdminControl queryNames
WebSphere:type=JVM,process=<servername>,node=<nodename>,*]
Invoking the generateHeapDump operation on JVM MBean:
$AdminControl invoke $objectName generateHeapDump
Ex: wsadmin -f test.py a b c
test.py content:
import sys
first = sys.argv[0]
second = sys.argv[1]
third = sys.argv[2]
arglen = len(sys.argv)
16)In Jython script how to invoke a variable which was defined in another jython script?
Using MBeans
Calling scripts using another script
Use the execfile command to call a Jython script from another Jython script. For example:
Create a script called test1.py that contains the following:
execfile('c:/temp/script/testFunctions.py')
print printName('Cathy', 'Smith')
Create a script called testFunctions.py that contains the following:
def printName(first, last):
name = first + ' ' + last
return name
Then pass the following path as a script argument:
wsadmin -lang jython -f 'c:/temp/script/test1.py’
1) What are your daily day to day Activates?
A) We have ticketing tools, We have 2 Type of tickets:
1. Change request : scheduled activities like new resources creation, JVM settings, Configuration of the
application and development teams raised tickets
2. Incident request : production support or monitoring like up gradation.
We have a dev team; if they found any issues they will raise a ticket.
We have a production support team, and Monitoring team, if they come across some thing abnormal
then they will raise a production support tickets.
We are having WAS 5.1 and 6.1, so daily we are having configuration setups for migration, and building
the similar environment as 5.1 in 6.1In different boxes as new environment.
Right now I don’t have chance to write new scripts. How to check thread dump in jacl
How do you check the health of the appserver? Is there any tool is avialable with you?
A) We have monitoring tools, at the time issue only, TPV (Tivoli Performance Viewer)/Willy Introscope,
and normally it is disabled, at the time of performance issue only we will do monitoring.
2 kinds of monitoring: 1. Availability, 2. performance monitoring 24/7 or not.
L1 team using SiteScope: SiteScope WebSphere Performance Servlet Monitor to monitor the server
statistics of IBM WebSphere Server (versions 3.0x, 3.5, 3.5.x, and 4.0) via a WebSphere Performance
Servlet. The error and warning thresholds for the monitor can be set on as many as ten performance
statistics.
3) Can u configure multpile apache webservers?
A) we can configure in httpd.conf file.
4) Is it possible to configure 10 domain names in apache? if yes? How?
A) we can use virtual hosts.
5) How do you perform heap dump and thread dump?
A) Kill -3 <>
Heap dump relate to jvm memory usage,
Thread dump relate jvm thread usage
6) Is kill -3,kill a process or create a thread dump? explain!
A) kill -3 is used create thread dump.
7) Did u work with any tools which helps you to see the heap dump or thread dump?
A) Heap dump jmap, IBM heap analyzer tool, thread dump using IBM thread analyzer /samurai
8) How to configure security and LDAP?
A) Global security,
Security availability: 1. OS security 2. LDAP (3rd party security) 3. Custom security(Application from DB)
9) What are 202 errors?
Accepted.
10) In ls -lrt, what t stands for and r stands for l stands for?
A)
-l shows you huge amounts of information (permissions, owners, size, and when last modified.)
-r reverses the order of how the files are displayed.
-t shows you the files in modification time
11) How to check a particular port is working or not in unix?
A) netstat -a | grep 80
1. What is session affinity?
A) Is nothing but a persistence.
Most servers use the term “Session Affinity” to indicate that with in a cluster of servers, requests from
the same client always get routed back to same server. This eliminates the need to replicate session
data like HTTP session or Stateful session Beans.
2. JVM which has been clustered, the server is in production?
A) 1. Memory to memory replication 2. Database persistence
Heartbeat mechanism work in a cluster, member of the cluster identifies that the other server is not
responding it checks 3 times for every 60 seconds, if not responded then it takes the configuration using
memory replication process then completes request.
3. What is fix pack?
A) Patches to fix a particular issue for a particular in environment only not other.
4. What is patch?
A) It is like independent to every body, bug fix of WAS. WAS 6.1.0.17
5. What is migration? How can you migrate from one version to another version?
A) discussed
5. How can you disable the security without admin console?
A) we can disable in Security.xml, but we can’t enable.
6. Complete configureation steps for SSL?
A) We have to install ibm http server, by using ikeyman tool we can create and use SSL certificates.
7. How to configure session management?
A) we can configure though console, either in application/deployment descriptor.
8. How can you provide security authentication for web server?
A) eTrust SiteMinder tool
9. How to know webserver version?
A) we can find in Logfile.
10. How to identify old and new context roots?
A) in Httpd.conf file we can see commented(old) and uncommented(new) data.
11. Difference between v5 & v6.
A)
1. Multiple Profile creations with a single installation (All profiles share same WebSphere binaries)
2. Introduction of Service Integration Bus (SIB) for messaging
3. Has default JMS providers
4. Supports mixed version nodes in a v6 ND Cell
5. Has some extra add-ons in the Admin console navigation tree
6. JACL has been deprecated in 6.1
12. What is the difference between WAS and WL?
A)
1. In weblogic u cant do clustering accros the domain,but in Websphere u can.
2. In weblogic all the configurations are stored in a single file called Config.xml ,but in Websphere its
stored in a directory structure called CELL
3. In weblogic u can start the managed server without a Adminserver(using MSI-config.xml),in
websphere u can not start a node with out Dmgr.
4. In websphere u can add webserver as a unmanaged node where as u cannnt do that in weblogic.
13. How many types of installation are there?
A) GUI, using Response file (silent mode), command line .
14. JACL scripting? Alredy discussed
15. If the performance, of the appliacation goes down? what will u do?
A) Performance Information should collect from monitoring tool
16. what is the difference between L1, L2, L3?
A)
l1- is basic level (monitoring, basic configuration)
l2 -back up who are senior staff (trouble shooting)
l3 –architechts (designing / architect/ requirement(ram/box))
17. the uesr submitted the request, when that request is on processing in the middle the server crashes
then what happens?
It will lost.
1. Are you responsible for production support?
A) Yes
As per on call support, we have dedicate mobile and laptop every week, they will change. And Prioritize,
change at every week on 24x7 basis.
2. Breifly explain about the topology of production environment?
In my production environment we are having 200 applications running across 70 RHEL boxes in 20
WebSphere cells.
Each cell has 3 nodes under dmgr, all nodes are established in horizontal cluster (different RHEL boxes),
All clusters will have 3 jvms run across the RHEL boxes.
Resources: 8 onsite + 8 off shore
Role hierarchy: Business head -> IT MGR -> Middleware mgr -> off-shore team lead ->
My role is Level-1 and 2.
We are did a migration from 5.1 to 6.0/6.1, in my environment, 5.1 will be completely migrated this year
end. We are using paid support from IBM 5.1(3 cells) as free support stopped by IBM.
3. Which environment you are using?
A) Soloaris 6.1/8.x , RHEL Linux: 5.1
4. How many servers and how many applications?
A) Discussed
5. which kind of applications?
A) Client Business:
1. Mortgage, 2.Trading applications
6. Applications are running on clusters?
Yes.
7. How do you verify that you are using Horizontal clusters not a vertical cluster?
A) if u have all the servers in same machine(Host) ,than its vertical ,if cluster servers are installed in
different machine than its horizontal.
-ORGo
to WAS console => select Nodes in left side => in the right side of the console you can see how many
nodes make's your CELL, and also the hostname of the boxes in which the node exists.
if you see all the nodes from different hostnames then its Horizontal clustering if you see same
hostname here then its Vertical clustering
8. your cluster contains how many nodes?
A) 3 nodes
9. Both nodes are running on dmgr. Dmgr is on both nodes?
A) All my production Dmgr in a single box. Nodes will be across different boxes.
Note: if in case failure of DMGR node, then how do we handle the issue?
In that case we need to wait till that problem gets resolved, for any configuration changes in
the console. Generally start and stop server activities will do in application server node.
10. Is it necessary to have dmgr on both nodes?
A) NO, Single dmgr.
11. Do you have dmgr as standalone?
A) We can, but No use.
12. Can we create more than one server in standalone-environement?
A) Never worked on stand alone environment.
13. can we have more than one application in a single server?
A) many
14. I want to depoly the application in any one of the node but not cluster?
A) Node is a server
15. What kind of database you are using?
A) Oracle 10g
16. What kind of security mode you are using or JDBC connection?
A) J2C Authentication
17. What type of driver you are using? Type 4 driver
A)
Type 1 driver: JDBC-ODBC Bridge
This driver called as JDBC-ODBC bridge.The Java Statements converts to JDBC statements.JDBC
statements calls ODBC by using JDBC-ODBC bridge. ODBC drivers convert into the requirements of
databases.
Java--->JDBCStat-->JDBC-ODBC bridge-->ODBC-->Databases.
Type 2 driver: Native-API/partly Java driver
This driver is called as Native Driver where it requires the some native code to connect to the databases.
Type 3 Driver: Net-protocol/all-Java driver
This driver is called as Protocal driver where
Java-->JDBC statements-->SQLStatements--> databases.
Type 4 Driver: This driver directly converts the java statements to SQl Statements which require to
databases. It wont convert to JDBC statement.
18. The application should be authenticate before interacting with database?
A) It will happened, we are creating uid, pwd that will work
19. what is meant by connection pooling?
A) a connection pool is a cache of database connections maintained by the database so that the
connections can be reused when the database receives future requests for data. Connection pools are
used to enhance the performance of executing commands on a database. Opening and maintaining a
database connection for each user, especially requests made to a dynamic databasedrivenwebsite
application, is costly and wastes resources. In connection pooling, after a connection is
created, it is placed in the pool and it is used over again so that a new connection does not have to be
established. If all the connections are being used, a new connection is made and is added to the pool.
Connection pooling also cuts down on the amount of time a user must wait to establish a connection to
the database.
20. what are the different methods to deploy application?
A)
21. for ear file is context root is necessary?
A) Hostname:9089/appname - context root Yes.
22. I updated the new application but the user is getting the old applicaion only?
A) need to Restart, synch
23. what are the options you have to improve performance?
A) Connection pool, Thread pool of web container, EJB container, web server parameter, jdbc
connection pool
Tuning Application server
Tuning JVM, Tuning Applications, Tuning Database, Tuning JMS, Tuning security, Tuning operating
systems, Tuning Web servers
Connection pool perameters:
$AdminControl getAttribute $objectname surgeCreationInterval
$AdminControl setAttribute $objectname surgeCreationInterval 30
$AdminControl getAttribute $objectname surgeThreshold
$AdminControl setAttribute $objectname surgeThreshold 15
24. to sepcify the weight of a cluster member in which file i have to modify?
A) have to modify in Plugin file
25. I am getting server 500 erro, what will be the reason?
A) Internal server error (server to db middleware)
26. How do enable GC?
In the Administrative Console, expand Servers and then click on Application Servers.
. Click on the server that is encountering the¬ "OutOfMemory" condition.
. On the Configuration tab, under Server¬ Infrastructure, expand Java and Process
Management, and click Process Definition.
. Under the Additional Properties section, click Java Virtual¬ Machine.
. Select the Verbose garbage collection check box.¬
. Click¬ Apply.
. At the top of the Administrative Client, click Save to apply changes¬ to the master
configuration.
. Stop and restart the Application Server
The verbose garbage collection output is written to either native_stderr.log or
native_stdout.log for the Application Server
verbosegc – Tells you what is being done, whether heap size is at min or max.
27. Ho to check GC is active or not, if you don't have?
A) We can check in logs.
28. can you tell me about profiles?
A) WebSphere application binary, profile sharing binaries of existing instance,
29. what is the use of virtual host?
A) Configuration that lets a single host machine resemble multiple host machines. Each virtual
host has a logical name and a list of one or more domain name system (DNS) aliases by which
it is known.
30. Is webserver & application server should be installed in a single machine or different machines?
A) We can do it, but in production different machines.
Webserver OS tuned in different way, app. server different way, normally these web servers in DMZ -
Demilitarized Zone.
31. Difference between managed node and unmanaged node?
A) Managed have node agent, unmanaged not. Unmanaged node we not control from console.
32. How to check application servers are running/not?
A) Ps -grep
33. How to check WAS is running or not through PS?
A) Ps -grep
WAS Edge Components
These are the some of the WAS Edge Components.
WAS Edge Components
Caching Proxy
Proxy Server
Load Balancer
Network Dispatcher Component
Content Based Routing (CBR)
Site Selector Component
1) Explain about web sphere?
The word web sphere popularly refers to IBM middleware technology products. Web sphere is
known for its turn key operation in e business applications. It has run time components and tools
which can help in creating applications which run on WAS. WAS refers to web sphere
application server.
2) Explain about web sphere commerce?
IBM web sphere commerce has a single platform which offers complete ecommerce solutions to
developers. It can be very productive if you are planning to do business with consumers,
business and indirectly through channel partners. This can be used to perform business with
consumers, business and channel partners altogether.
3) Detail about the architecture of web sphere?
Web Sphere is built on three main components they are
• Database
• J2EE application server
• A web server
The databases which it supports are
• DB2
• Oracle
• Cloudscape
Application server is IBMWAS and the supported web servers are
• IBM server
• Microsoft IIS
• Sun web server
4) State some of the features present in web sphere?
Some of the features which are present in web sphere are: -
• Order management
• Web sphere commerce accelerator
• Analytical and business intelligence
• Open standards such as Java, EJB, etc
• Web sphere commerce payments and customer care, etc
5) Explain about IBM Web Sphere edge server?
Web sphere edge server is used to improve the performance of web based systems. It can be used
as forward or proxy server. Basically four components are present in the web sphere they are
Network dispatcher, Caching proxy, Content distribution and application service at the edge.
6) Explain about extended deployment?
Web sphere application server extended deployment increases the functionality of the server in
two main areas they are manageability and performance. Dynamic virtualization between servers
is possible with the help of XD. A stand alone distributed cache was added to it under the
performance header, it is known as Object Grid.
7) Explain about the security features present in WAS?
Security model for web sphere is primarily based on JAVA EE security model. It also depends
upon the operating system. User authentication and authorization mechanisms are also provided
in WAS. Light weight third party authentication mechanism is the main security feature present
in WAS.
8) Explain about asymmetric clustering?
Asymmetric clustering applications are primarily used in electronic trading systems employed in
banks. Some of the features are, partitions can be declared during run time and are usually run on
a single cluster at a time. Work specific to a particular can be routed to that cluster.
9) Explain the various Administrator benefits using Web sphere?
Web sphere almost reduces the work of server administrator as he can manage load on servers
efficiently without any hassles. It also gives him flexibility to divide the load and applications
among different server farms. He can also predict about the incoming load on servers. Email
alerts, restart options, memory leak detection, etc.
10) Explain about caching proxy of IBM Web sphere Edge sphere?
A caching proxy can be configured in forward direction or as a proxy. Content requested by the
user is cached by edge before sending or adhering to the query. Page fragments arising from JSP
or servlets are cached by Edge and the caching process is slow. Performance and scalability of
J2EE applications can be increased by edge.
11) Explain about the network deployment feature present in WAS?
Managing singletons will be a thing of the past and it also provides hot recovery of singletons
which makes you forget about your GC collected singletons. Transaction logs can stored on a
shared file system. For clustering run time operations deployment manager`s role was
eliminated. J2EE failover support and cell configuration support is also present.
12) Explain about IBM web sphere integration developer?
Web sphere integration developer provides an IDE to build applications based on service
oriented architecture. Web sphere process server and web sphere ESB were built with WID.
WID was built with RAD Eclipse based technology.
13) Explain about compute Grid?
Compute grid is also known as Web sphere batch. Web sphere extended deployment offers a
Java batch processing system called as Compute Grid. This forms an additional feature to Web
sphere network environment. Various features are provided which help a developer to create,
manage and execute batch jobs. Job scheduler, xJCL, batch container and batch programming
controller.
14) Explain about web sphere MQ Real time transport?
This feature is very useful in instant messaging across different clients through intranet and
internet. This supports high volume and high performance across different clients. It uses the
concept of light weight transport which is again based on IP rather than the queue process.
15) Explain about Web sphere MQ JMS Provider?
Web sphere MQ and Web Sphere Business integration manager Broker are very useful in
providing Java messaging services to wide range of clients (publisher –subscribe, point to point).
Java classes are chiefly responsible for translating the API calls to API`s defined by web sphere.
It is very useful to have knowledge of Web sphere MQ for proper configuration.
16) Explain the attribute CHANNEL in web sphere MQ?
CHANNEL specifies the name of the server connection channel. Generally this is Web Sphere
MQ network abstraction. The default standard used by CHANNEL is SVRCONN which is the
server connection channel. This server is generally used to communicate to the queue manager
by the client.
17) Is the naming of connection factory independent of the name specified by JMS
client?
Yes, the naming of connection factory is independent of the name specified by JMS client. This
is made possible by WAS (Web sphere application server) with its resource references. It isolates
the application from object names. This feature is important because it gives us the flexibility to
change the administered object without changing the JMS client code.
18) What is the difference between Web Server and Application Server ?
Webserver:
A Web server handles the HTTP protocol. When the Web server receives an HTTP request, it
responds with an HTTP response, such as sending back an HTML page. To process a request, a
Web server may respond with a static HTML page or image, send a redirect, or delegate the
dynamic response generation to some other program such as CGI scripts, JSPs (JavaServer
Pages), servlets, ASPs (Active Server Pages), server-side JavaScripts, or some other server-side
technology. Whatever their purpose, such server-side programs generate a response, most often
in HTML, for viewing in a Web browser.
Application Server:
As for the application server, according to our definition, an application server exposes business
logic to client applications through various protocols, possibly including HTTP. While a Web
server mainly deals with sending HTML for display in a Web browser, an application server
provides access to business logic for use by client application programs. The application program
can use this logic just as it would call a method on an object
19) What is JDBC ?
JDBC technology is an API (included in both J2SE and J2EE releases) that provides cross-
DBMS connectivity to a wide range of SQL databases and access to other tabular data sources,
such as spreadsheets or flat files. With a JDBC technology-enabled driver, you can connect all
corporate data even in a heterogeneous environment
20) What is EJB ?
Enterprise JavaBeans (EJB) technology is the server-side component architecture for the Java 2
Platform, Enterprise Edition (J2EE) platform. EJB technology enables rapid and simplified
development of distributed, transactional, secure and portable applications based on Java
technology.
21) What are the different application servers and Web Servers supporting J2EE
technology’s ?
JBoss Is an Application Server that supports J2EE
IBM Websphere and BEA WebLogic servers are a combination of Application Server, Web
Server & container
Jakarta Tomcat is a Servlet container and a Web server.
Apache Sever is a Web server
22. What is the WebSphere Application Server Console and what is it’s role? What is the
default URL and port for accessing it?
The administrative console is a browser-based interface that allows you to configure application
server settings, deploy and manage applications, and perform additional tasks that are not
included in the HTTP Server Administration interface. It used to be a Java application, however
to be firewall safe it was made into a web-based application.
It runs on the default install port 9060 e.g http:\\hostname:9060\ibm\console, however this can be
changed by editing virtual_hosts names. also when during installation ie GUI or response-file
install you can set the ports that will be used.
23. What Development Environment(s) are available to develop applications for
WebSphere?
IBM provides several industrial strength development environments based on Eclipse
development framework the current IDE is Rational Developer for Websphere. Applications can
also be developed with the Websphere Application Server Toolkit and third party tools like
Jbuilder, and Eclipse/ANT etc.
24. In WebSphere how would you provide the ability for an Web application (JSP) to be
able to provide authentication for both a local user and LDAP.
Using the Administration Console:
Turn on Administrative security.
Federate a local repository and an LDAP repository together.
Restart server.
Ensure Web application has a web.xml file to be able assign LDAP groups to roles.
25. What version of Websphere software is required to install WebSphere clustering? How
would you configure Websphere for clustering: list basic steps?
WebSphere Application Server Network Deployment is the software required to install a
WebSphere cluster.
Install base with Deployment Manager
Create profiles for Deployment Manager and each node in the cell using with the Profile
Management Tool ensuring the nodes are federated.
Use the Deployment Manager’s Administration Console to create the cluster and set cluster
settings as appropriate.
Create Windows Services or Start up scripts for Deployment Manager, Node manager and
Severs to ensure restart when OS is rebooted.
26. How would you ensure that a Websphere Application server or Websphere Application
Server Node is started when the OS being windows 2000/2003 is re-booted?
Use the command WASService to register the Websphere Application Server or Websphere
Application node as a Windows service.
27. What language is the default scripting language for Websphere and which language is
the preferred scripting language? What Websphere tool can be used to run scripts and
where is it located?
JACL is the default scripting language for WAS, Both JACL and Jython can be used.
Jython is the preferred scripting language as JACL is now deprecated.
WSAdmin tool located in the <installroot>\bin directory
28. What type of files are required to deploy an application into Websphere. How can they
be installed?
WAR or EAR files.
Can be installed using Administration Console or scripts.
29. How would use ensure WebSphere server logs are created on a different drive than the
installation root?
Change the WebSphere server’s server variables using the Administrative Console or use scripts.
Web Sphere Application Server 6.1
Questions and Answers
QUESTION 1
A cluster member has suddenly crashed. The administrator is concerned about aborted
transactions holding locks in the database. What can an administrator do to release the locks?
1. Unmount the shared file system such as Network Attached Storage (NAS) where the
transaction log is stored
2. Restart the deployment manager and node agents who manage the transaction log
3. Verify another running cluster member has access to the transaction log
4. Reconnect the database where the transaction log is stored
Answer: C
QUESTION 2
What functionality does the Caching Proxy server provide?
1. Reverse proxy and content-based routing
2. Dynamic content caching and integration with servlet caching
3. File serving enabler
4. HTTP compression
5. Integration with Dynacache and third party object caches
Answer: A,B
QUESTION 3
What is needed to load balance the HTTP traffic across a cluster of Web servers?
1. Configure a proxy server such as Tivoli Access Manager (TAM)
2. Enable server affinity for each HTTP server in the cluster
3. Implement the caching proxy server component of the WebSphere Edge
4. Use an IP sprayer from the load balancing component of the WebSphere Edge
Components
Answer: D
QUESTION 4
What does a WebSphere application server provide to support the installation and deployment of
JSR 168 compliant portlets?
1. An embedded portlet container
2. A scaled-down version of the WebSphere Portal Server
3. Several J2EE applications that render and aggregate portlets in a browser
4. An embedded version of WebSphere Portal Express
Answer: A
QUESTION 5
Which two components provide workload management capabilities?
1. Node agent
2. Web server plug-in
3. Caching proxy
4. Deployment manager
5. Load balancer
Answer: B,E
QUESTION 6
Which services are implemented by the WebSphere application server?
1. Security, JMS messaging, Naming and HTTP Plug-in
2. The user registry, Naming and HTTP Plug-in
3. HTTP Load Balancing services, JMS messaging and Data Replication Service (DRS)
4. Security, Naming, Transaction and Dynamic Cache
Answer: D
QUESTION 7
Session Initiation Protocol (SIP) servlets are packaged in which type of archive file?
1. SAR
2. WAR
3. JAR
4. EJB-JAR
5. SIP-JAR
Answer: A
QUESTION 8
In a WebSphere cell configuration, which component is a single point of failure?
1. Deployment manager
2. Web container
3. EJB container
4. HTTP server
Answer: A
QUESTION 9
Which approach should be recommended when designing a production topology for WebSphere
application servers providing high availability and failover capabilities?
1. Create a design using multiple machines that handles the full production load, enabling
the use of
Application server clustering to provide failover capabilities
1. Utilize load balancers between the Web servers and the application servers to provide
failover support at the application server tier
2. Place the Authentication servers outside of the intrusion firewall with the Web servers,
since the Web servers will need to access them
3. Use the largest processor engines and least number of physical machines for the
application server tier, to minimize the software licensing costs
Answers: A
QUESTION 10
If an administrator configures session management for an application server to user SSL ID
tracking, which two other session tracking mechanisms should also be enabled?
1. Cookies
2. URL Rewriting
3. Security Integration
4. Serial Access
5. Java2 Security
Answer: A, B
QUESTION 11
An application server is using data source connections being managed thru connection
pooling.How ever, the server is logging database errors resulting from lack of connections. In
this context, what applies to tuning database connections?
1. Data sources are abstracted from the JDBC drivers to permit database upgrades without
impacting the application logic. The administrator should decrease the connection
timeout value.
2. The connection pool is managed by the application server container, so in addition to
increasing the connection setting, additional connections allowed must be configured on
the database.
3. The data sources are released at the end of the commit phase when using Type 4 JDBC
drivers. New connections will be created upon the next database access.
4. It is necessary to tune the applications before tuning WebSphere application server.
Connections not returned to the pool are often caused by programs not closing
connections properly.
Answer: D
QUESTION 12
Which set of parameters can a system administrator adjust to directly improve performance for
the EJB container?
1. Transaction lifetime and client inactivity timeout
2. Cache size and cache cleanup interval
3. Data source connection pool and server JVM size
4. Session timeout and HTTP session object size
Answer: B
QUESTION 13
When altering the level of logging information, which level provides more detailed logging
information than the default (info) level ?
1. Fatal
2. Warning
3. Severe
4. Config
Answer: D
QUESTION 14
A J2EE application needs to be configured as follows:
The EJB module and the utility JAR in the application must be loaded by the same Class loader.
Web module WAR1 and the EJB module must use the same Class loader and Webmodule
WAR2 must have its own Class loader.
What is the correct Web module Class loader configuration for this application?
1. WAR1 – Module, WAR2 – Module
2. WAR1 – Module, WAR2 – Application
3. WAR1 – Application, WAR2 – Application
4. WAR1 – Application, WAR2 – Module
Answer: D
QUESTION 15
Which Web module parameter adjustments would result in improved response time for Web
clients ?
1. Disable load on startup
2. Enable pre-compile JSP option
3. Set the distributable flag
4. Set the reload interval to 20 seconds or less
Answer: B
QUESTION 16
Which Web server plug-in setting is NOT configurable using the administrative console?
1. Load balancing option
2. Retry interval
3. Refresh configuration interval
4. Minimum number of connections
Answer: D
QUESTION 17
An application has 15 concurrent users and a connection pool size of 10. Each user users 3
prepared statements. For this application, what is the recommended prepared statement cache
size?
1. 10
2. 15
3. 30
4. 45
Answer: C
QUESTION 18
What is the correct syntax when running the backup configuration of administrative server files
when WebSphere Security is enabled?
1. backupConfig WebSphereConfig user <name> -password <password>
2. backupConfig WebSphereConfig backup.zip nohalt user <name> -password <password>
3. backupConfig WebSphereConfig –cell user <name> -password <password>
4. backupConfig WebSphereConfig profilename=AppSrv01 user <name> -password
<password>
Answer: A
QUESTION 19
When the application server is experiencing normal to heavy usage, which statement most
accurately describes optimal pool usage?
1. The pools will all show similar numerical values, indicating balanced workload is
occurring throughout the application server.
2. Pools used by the application should be released and rebuilt in conjunction with JVM
garbage collection cycles ensuring that no state connections persist.
3. The performance Management Interface (PMI) must be explicitly enabled on the
application server to be monitored, since it requires CPU resources on the server being
monitored.
4. Pools used by the application should be nearly fully utilized, indicating that resources are
being efficiently used.
Answer: D
QUESTION 20
When configuring a J2C connection factory, which setting can be configured using the
administrative console ?
1. Container-managed authentication alias
2. Component-managed authentication alias
3. Authentication preference
4. Mapping configuration alias
Answer: B
QUESTION 21
What is the correct command to save configuration changes in a Jython script file?
1. AdminConfig.save()
2. $AdminConfig save
3. AdminTask.save()
4. $AdminTask.save
5. The WebSphere scripting tool does not a periodic save based on a property in its
configuration.
Answer: A
QUESTION 22
Which additional deployment descriptor information can a WebSphere application have beyond
the J2EE requirements ?
1. IBM Bindings associate local names to deployment platform specific resources
2. IBM Extensions support additional options
3. For EJB modules, a set of files map Entity Enterprise JavaBeans to a specific data store
“schema”
4. Web Service Interoperability mapping files
5. Jython deployment scripts
6. Cloudspace DDL files
Answer: A, B, C
QUESTION 23
What is the name of the WebSphere scripting tool?
1. wasadmin
2. wsadmin
3. ws_ant
4. wsdeploy
Answer: B
QUESTION 24
When is J2EE mapping of security roles to users and groups allowed?
1. During application development with Rational Application Developer (RAD) or with
Application Server Toolkit (AST)
2. During an application installation
3. After an application is installed
4. During application runtime
5. During the creation of an application profile
6. When configuring the user registry
Answer: A, B, C
QUESTION 25
In a federated namespace, what are the primary uses of cell and node persistent partitions?
1. For the storage of topological data in the XML repository
2. For the storage of configuration buildings, such as CORBA and indirect name lookups
3. For binding the server root of the server, such as EJB homes and resource artifacts
4. For reading configuration data from the file system, such as EJB deployment descriptors,
and registering the necessary objects
Answer: B
QUESTION 26
An administrator needs to enable support for a number of applications that use message-driven
bean (MDBs). Some of the beans use point-to-point messaging and other beans use
publishsubscribe messaging. The administrator will typically need to perform which two sets of
tasks?
1. Configure the default JMS provider and the necessary destinations (queues and topics)
2. Deploy the MDBs to the message engine and select the SOAP over JMS protocol
3. Configure queue managers using the WebSphere MQ JMS provider
4. Configure a service integration bus and add the appropriate bus member
5. Deploy the MDBs to JCA container and select bean managed persistence
Answer: A, D
QUESTION 27
A DB2 data source is used across different applications. The application is installed in multiple
machines for horizontal scaling, but the database driver location differs from machine to
machine. When using WebSphere variables, what is the most maintainable way to define the
scope for this data source?
1. JDBC provider-cell scope data source- node scope
2. JDBC provider-cell scope data source- cell scope
3. JDBC provider-node scope data source- cell scope
4. JDBC provider-node scope data source- node scope
Answer: B
QUESTION 28
In addition to data sources and Shared Libraries, which resources can enhanced EARs support?
1. JAAS Authentication Aliases, Class loader policy and Virtual host information
2. JAAS Authentication Aliases, Class loader policy and Virtual host information and JVM
command line parameters
3. JAAS Authentication Aliases, Virtual host information and JVM command line
parameters
4. JAAS Authentication Aliases, Class loader policy and JVM command line parameters
5. Class loader policy, Virtual host information and JVM command line parameters
Answer: A
QUESTION 29
When installing WebSphere Application Server v6.1 along with IBM HTTP Server and related
plug-ins, an administrator notices the following message in the
<plugins_root>/logs/install/log.txt Plugin.Install, com.ibm.ws.install.ni.ismp.actions
ISMPComponentizedFileRepositoryDeployAction, err, Component not found: prereq.jdk
Which two additional entries should the administrator verify?
1. The JAVA_HOME system environment variable
2. The CLASSPATH system environment variable
3. The JAVA_INSTALL_PATH value in log.txt
4. The CURRENT_WORKING_DIRECTORY value in log.txt
5. The PLUGIN_JDK_ROOT value in log.txt
Answer: C, D
QUESTION 30
To create a customized installation package (CIP), which file must be created first so that the
installation factory can use it to generate the CIP?
1. An Ant file
2. A response file
3. A build definition file
4. A ifcli file
Answer: C
QUESTION 31
A system administrator is planning to do a silent install using a customized response file. The
system
Administrator does not want to install the samples that come with the product.
Which option in the response file should the administrator update to NOT include the samples
with the
Installation?
1. Install Type
2. custom
3. feature
4. PROF_Action
Answer: C
QUESTION 32
A system administrator has just completed installing the core binary files of WebSphere
Application Server Network Deployment. The system administrator wants to create a
deployment manager profile with a Federated Node. What is the easiest method to accomplish
this?
1. Create a Cell profile using the Profile Management Tool
2. Create a deployment manager profile using the Profile Management Tool
3. Create deployment manager and custom profiles using the manageprofiles command
4. Create deployment manager and custom profiles using the Profile Management Tool
Answer: A
QUESTION 33
If a Web Server is located in the intranet, behind the DMZ (Demilitarized Zone), which
configuration option is the easiest to maintain and operate?
1. Web server in an unmanaged node
2. Web server in a stand-alone profile
3. Web server in a managed node
4. Web server in the deployment manager profile
Answer: C
QUESTION 34
When creating a profile, which statement is NOT true?
1. Administrative security must be enabled.
2. There is an option to make a profile the default profile.
3. Typical profile creation uses default configuration settings.
4. A Web server definition can be created in the profile.
Answer: A
QUESTION 35
After installation and application server profile creation, which servlet is useful for validating
system configuration?
1. HitCount
2. HelloHTML
3. WSSamples
4. Snoop
Answer: D
QUESTION 36
How can an administrator view the contents of the activity.log file in the profile root directory?
1. Run the waslogbr script from the command line and use the Log Analyzer
2. Open the file using the IBM Support Assistant (ISA) and use the Thread Analyzer tool
3. Use the Profiling and Logging perspective in the Application Server Toolkit (AST)
4. Open the file using any text editor
Answer: C
QUESTION 37
Which statement is true about WebSphere JVM logs?
1. The number of historical JVM log files is fixed at 3; this value will reset on each server
restart.
2. The JVM logs are self-managing and can roll over based on time or file size.
3. The JVM logs should be moved from the default location to make them easier to access
from the command line.
4. The JVM logs are, by default, kept outside the Application server filesystem directory
tree to prevent them from being overwritten when applying fixpacks.
Answer: B
QUESTION 38
From which root can the JNDI dumpNameSpace utility be used to examine the contents of the
namespace when JNDI errors are occurring?
1. Node, which contains all JNDI references used within the cells defined scope
2. Server, which contains the objects that are accessible by remote processes
3. Local, which contains objects that are available by local processes only
4. Java, which contains naming information unique to the specific server application
Answer: B
QUESTION 39
While monitoring a server, an administrator notices that the server is being restarted by its node
agent approximately every 60 minutes. The administrator suspects that the server is crashing for
memory related reasons. How can the administrator troubleshoot possible causes for the server
crashing?
1. Look for heap dumps in the servers root profile directory and examine them with a Heap
Analyzer tool
2. Start the server using the trace option and examine the startServer.log file using the
Application Server Toolkit (AST)
3. Stop the server using the trace option and examine the stopServer.log file using the AST
4. Set the environment variable IBM_HEAPDUMP equal to true for the servers node agent
and examine any node agent heap dumps
Answer: A
QUESTION 40
To enable tracing on a WebSphere component, such as the naming service or the rsadapter using
a servers Diagnostic Trace Service, which set of tasks should an administrator perform?
1. Use the Application Server Toolkit (AST) to improve the activity.log file and edit this
file to specify a trace string for the component, then export the activity.log file to the
node agents configuration directory
2. Use the Administrative console to direct the trace output to memory buffer, select a trace
output format, select a component to trace and set the log detail level to either fine, finer,
or finest
3. Edit the wsadmin.properties file to specify a trace string for the component and accept all
of the default tracing properties then perform a full-resynchronize of the node agent
4. From the administrative console select Tracing, select a node agent, select Process Logs,
select a trace output format, select a component to trace and set the Log Details Levels to
detail
Answer: B
QUESTION 41
Which statement describes the WebSphere v6.1 FFDC feature?
1. FFDC does not affect performance of the WebSphere application server.
2. FFDC logs are mainly intended for application development teams.
3. The application server needs to be restarted after enabling FFDC.
4. FFDC information is stored in an optimized relational database.
Answer: A
QUESTION 42
An administrator should use the IMB Support Assistant (ISA) to perform which tasks?
1. Submit a Problem Management Report (PMR) electronically to IBM Support and check
the PMRs status
2. Analyze a service log file against a symptom database and submit the results to IBM
support
3. Assemble and package enterprise applications into EAR files and submit to IBM Support
for profiling
4. Create a log of the activity for several components of an application server and submit
the log to IBM support
Answer: A
QUESTION 43
An administrator creates a horizontal cluster and deploys an application that uses HTTP session
objects. How should the administrator configure support for session object persistence?
1. Configure memory-to-memory persistence in the Web server plug-in properties
2. Configure HTTP session memory-to-memory replication when creating the cluster
3. For each cluster member, configure memory-to-memory replication for the Web
container session management
4. Configure memory-to-memory persistence in the HTTP servers httpd.conf file
5. Enable session affinity in the Web server plug-in properties
Answer: B, C
QUESTION 44
A system administrator has enabled dynamic caching across a cluster of servers and configured a
replication domain for the cluster. Which configuration mode should the system administrator
enable for memory to memory session partitioning to ensure each object is replicated to every
consumer of the replication domain?
1. Single replica
2. Full Group replica
3. Specific number of replicas
4. Entire domain
Answer: B
QUESTION 45
A system administrator is federating a node using the addNode command.
The addNode command CANNOT perform, by default, which step?
1. Create entries in the master repository for the federated node
2. Include applications in the cell
3. Update the node’s wsadmin.properties file to reflect the new cell environment settings
4. Create a definition for the node agent
Answer: B
QUESTION 46
If the Web server is not an IBM HTTP Server and is defined to managed node, which two
actions can be taken from the administrative console?
1. Check the status of the Web server
2. Enable dynamic trace on the server
3. Generate a plug-in configuration file for that Web server and propagate the plug-in
configuration file after it is generated
4. Start the server
5. Stop the server
Answer: A, C
QUESTION 47
For performance reasons, a J2EE application maintains HTTP session information in memory
(not persisted). The information in the session can be recreated based on the contents of various
cookies. Recreating this data from the cookies would incur performance penalties.
Which mechanism minimizes the need to recreate session data?
1. Memory-to-memory replication in Server mode
2. Memory-to-memory replication in Both client and server mode
3. Session affinity in Web server plug-in
4. Database persistence
Answer: C
QUESTION 48
When adding a new member to a cluster, why might it be necessary for an administrator to select
the option for generating unique HTTP ports?
1. To avoid port conflicts with other servers on the same node
2. To ensure that cluster members on different nodes have unique ports
3. To prevent other applications from using these ports
4. To enable encryption over the secure HTTP ports
Answer: A
QUESTION 49
Mapping J2EE security roles to users is a function of:
1. Installing an application
2. Defining the JDBC connections to the backend databases.
3. Defining the security configuration on the Web server.
4. Regenerating the Web server plug-in file.
Answer: A
QUESTION 50
A company needs to merge several user repositories so that users from each repository can
authenticate to the WebSphere cell. The existing repositories are contained in different relational
databases and LDAP directories. How can an administrator most easily leverage the existing
repositories to configure a single user repository that contains all of the users?
1. Implement a federated user repository using the Virtual Member Manager (VMM)
2. Use Tivoli Access Manager (TAM) to create a single virtual repository
3. Create a custom user registry and import the user data from the repositories
4. Creating a single LADP directory that contains each of the repositories as sub-trees
Answer: A
QUESTIN 51
What is the minimum administrative role that is required for an enterprise application to be
started through the console?
1. Operator
2. Administrator
3. Configurator
4. Monitor
Answer: A
QUESTION 52
The application server is architected to use an existing user registry that stores administrative
users and application users. What is needed to setup this architecture?
1. Configure the JNDI path to the security database
2. Configure the connection to the existing user registry
3. Retrieve a list of nodes and node agents contained within the cell
4. Generate Web services binding for the existing user registry
Answer: B
QUESTION 53
Which two tasks can be performed using the IBM Key Management Utility (IKeyman) for
managing SSL for IBM HTTP Server?
1. Install GSKit
2. Create a key database file
3. Create self-signed certificate
4. Edit httpd.conf to use a certificate
5. Sign certificates on certificate authority’s (CA) behalf
Answer: B, C
QUESTION 54
The Virtual Member Manager (VMM) in WebSphere is NOT able to federate which
repository/registry?
1. The file-based repository that is built into the system
2. One or more external LDAP repositories
3. A JDBC accessible database repository
4. Local operating system registry
Answer: D
QUESTION 55
Which statement most accurately defines the location of where the WebSphere security service
runs?
1. The security service runs on the LDAP server and is accessed through the application
server node agent
2. The security service runs in the federated nodes of the cell
3. The security service runs on the deployment manager
4. The security service runs locally in each of the WebSphere processes (deployment
manager, node agent and application server.)
Answer: D
QUESTION 56
When implementing WebSphere security, which statement is true about authentication and
authorization credentials?
1. Authentication takes place utilizing a user registry, however authorization is done based
on properties defined within the .ear file
2. Both authentication and authorization require lookups to the security service LDAP
database.
3. WebSphere security processes run on a centralized security service LDAP database to
facilitate single sign on administration of both authentication and authorization
credentials.
4. Authorization must occur before authentication to ensure the proper J2EE Security roles
are utilized for the LDAP lookup.
Answer: A
QUESTION 57
Which three steps are automatically performed to enable SSL between the HTTP plug-in and
WebSphere application server?
1. Creation of keyrings and keys for the plug-in
2. Creation of keyrings and keys for the application server
3. Procurement of a certificate from a certificate authority (CA) for the plug-in
4. Procurement of a certificate from a certificate authority (CA) for the application server
5. Establishment of a trust relationship between the plug-in and the application server
6. Importing the application server’s certificate to the trust file
Answer: A, B, E
QUESTION 58
Assume that a federated repository is configured from three existing repositories: A, B and C, A
user tries to log in but is denied access. What is a possible reason for the login failure?
1. The users ID does not exists in all three repositories
2. One or more of the three repositories is not accessible
3. The users ID is contained in repository A, which is a file-based repository
4. The users LDAP Distinguished Name (DN) is not the same across all repositories.
Answer B
QUESTION 59
What is the minimum administrative role required for Java 2 security to be enabled through the
administrative console?
1. Administrator
2. Configurator
3. Operator
4. Security
Answer: A
QUESTION 60
What are three goals of the Virtual Member Manager (VMM)?
1. Provide a repository that can span multiple WebSphere cells
2. Provide a repository-independent programming interface
3. Support various pluggable repositories
4. Provide the ability for users to achieve a single view of their own multiple repositories in
a federated model
5. Provide a cache or repository information
Answer: B, C, D
QUESTION 61
Which statement is NOT true about Application Server Toolkit (AST)?
1. It has a similar look and feel to the IBM Rational family of products and is based on
Eclipse.
2. It has a complete development environment for enterprise applications including EJBs.
3. It is supported on Windows, Linux and AIX.
4. It has Jython editor and source debugger.
5. It can run wsadmin scripts inside AST.
Answer: C
QUESTION 62
The WebSphere scripting tool supports which two scripting languages?
1. BSF
2. Jython
3. Perl
4. Ant
5. Jacl
Answer: B, E
QUESTION 63
A system administrator needs to create a data source and make it available on multiple nodes
using different directory structures. Which two actions should the system administrator take to
do this?
1. Define the JDBC provider at the cell scope
2. Define the JDBC provider at the node scope
3. Define the JDBC provider at the server scope
4. Create the data source that uses this JDBC provider at the cell scope
5. Create the data source that uses this JDBC provider at the node scope
6. Create the data source that uses this JDBC provider at the server scope
Answer: A, D
QUESTION 64
An application uses a JMS queue for point-to-point messaging. As part of the queue
configuration, an administrator is able to specify which two sets of properties?
1. Scope, activation specification and connection factory
2. Scope, JMS provider and JNDI name
3. J2C authentication data, connection timeout and reap time
4. Bus name, delivery mode and priority
5. Class path, topic name and JMS name
Answer: B, D
QUESTION 65
A customer has a WebSphere Application Server v4 client and wishes to look up and access
objects in WebSphere Application Server V6.1 without requiring changes to the client. What
must the customer do to enable WebSphere Application Server V6.1 objects to be accessible
through the legacy name space?
1. Configure a leaf binding
2. Create a corbaname binding
3. Use a compound name
4. Create a configured name binding
Answer: D
QUESTION 66
Which are the three possible components of Web modules?
1. Servlets
2. JSPs
3. SIP servlet files
4. MDB files
5. HTMLs
6. Session and entity beans
7. RAR files
Answer: A, B, E
QUESTION 67
Which three statements are true about J2EE security roles?
1. Authorization is performed using the J2EE security roles.
2. Security roles are applied to the Web and EJB application components.
3. Security roles provide an access control mechanism to manage the applications access to
system level resources.
4. Binding of the users and groups to the J2EE security roles is usually done at the
application install time.
5. Authentication is performed using the J2EE security roles.
6. Security roles can be modified dynamically at runtime.
Answer: A, B, D
QUESTION 68
What is the default connection pool that the WebSphere scripting tool uses?
1. SOAP
2. RMI
3. SOAP is tried first then RMI is tried second
4. NONE
5. TCP
Answer: A
QUESTION 69
An administrator need to configure a data source for use by a Servlet 2.2 based Web application.
Which data source type must the administrator define?
1. WebSphere Application Server V6 data source
2. WebSphere Application Server V4 data source
3. JDBC Type 4 data source
4. JDBC Type 2 data source
Answer: B
QUESTION 70
The Profile Management Tool allows you to enable WebSphere administrative security. Which
user registry is used for this default security?
1. Local operating system
2. Standalone custom registry
3. Standalone LDAP registry
4. Federated Repositories
Answer: D
QUESTION 71
An installation and profile creation was just completed. Which tool can be used to check
installation files, report differences and create an inventory of configured files?
1. Collector tool
2. Installation verification tool (IVT)
3. Installver tool
4. Administrative console
Answer: C
QUESTION 72
Which file can a system administrator consult prior to starting an installation to determine which
components are already installed on the machine?
1. vpd.properties
2. prereqChecker.xml
3. log.txt
4. profileregistry.xml
Answer: A
QUESTION 73
After creating a profile, a system administrator discovers there are port conflicts. Which action
should the system administrator take to fix the port conflicts in the existing profile?
1. Re-create the profile entering different ports
2. Update the portdef.props file
3. Run the updatePorts.ant script
4. Edit the server.xml file
Answer: C
QUESTION 74
What does the Installation Factory use to create a customized installation package (CIP)?
1. A build definition that defines how to customize WebSphere application server
2. A CIP containing a customized WebSphere application server
3. A customized response file containing the definition of the installation package
4. The ifgui command to build a silent response file
Answer: A
QUESTION 75
A system administrator needs to create an application server profile that does NOT contain the
administrative console. Which action should the system administrator take while using the
Profile Management Tool to create the profile?
1. Select the typical installation which does not install the administrative console to the
server
2. Select the advanced operation which has an option to install the administrative console to
the server
3. After the profile creation, uninstall the administrative console application
4. Delete the application from the installed directory
Answer: B
QUESTION 76
When attempting to install WebSphere Application Server v6.1 using the silent install, the
installation fails early in the process and no log files appear to be created in the logs directory.
Which two steps can the administrator perform to troubleshoot the issue?
1. Restart the installation after an OS restart
2. Restart the installation with the –log parameter
3. Look for the log files in the system temporary area
4. Run the installation verification test (IVT)
5. Start over by creating a new responsefile.txt using the responsefile.base.txt
Answer: B, C
QUESTION 77
When accessing the application server process logs, STDOUT and STDERR, on a federated
node, in which default file system path will they be found?
1. <profile_root>/<profile_name>/logs/<server_name>/native_stderr.log and
<profile_root>/<profile_name>/logs/<server_name>/native_stdout.log
2. <was_root>/logs/<server_name>/native_stderr.log and
<was_root>/logs/native_stdout.log
3. <nd_root>/logs/stderr.log and <nd_root>/logs/stdout.log
4. <was_root>/logs/stderr.log and <was_root>/logs/stdout.log
Answer: A
QUESTION 78
An administrator is analyzing an activity.log file from a profile by using the Application Server
Toolkit (AST) Profiling and Logging perspective. There are hundreds of log records.
Most of the records are informational messages. How can the administrator view only the
records whose severity is at the Warning and Error level?
1. The activity.log file must be filtered using the Log Analyzer before it is improved into
AST
2. Create two filters, one showing only Errors and one showing only Warnings. Export each
and merge them into a single new activity log.
1. When the activity.log file is imported into AST, use the filter option to exclude the
informational message
2. Update the filter so that it shows only Error and Warning log records.
Answer: D
QUESTION 79
After hearing from clients that they are having problems logging into an application, an
administrator enables tracing on WebSphere security components using the following log trace
string:
com.ibm.ws.security.*=detail and restarts the server
When the administrator examines the trace log, there are no events recorded for any security
components.
What must be the administrator do to ensure that the trace information is written to the trace log?
1. Modify the server.xml file to enable tracing and restart the server
2. Configure the trace output format with the advanced setting
3. Set the Log Detail Levels to one of the following: fine, finer, finest
4. Update the Log Detail Levels for the servers node agent
Answer: C
QUESTION 80
Under which circumstance should the WebSphere administrator use the dumpNameSpace
utility?
1. When the application server will not start because the JNDI namespace tables have
become corrupted
2. When applications are experiencing a problem accessing a specific WebSphere data
source
3. Before regenerating the plug-in for the Web server
4. To clear the namespace prior to installing or redeploying an application
Answer: B
QUESTION 81
An administrator is monitoring a servers JVM Runtime by using the administrative consoles
Tivoli Performances Viewer. It appears that garbage collection is running frequently and taking a
relatively long time to complete. Which action should the administrator take to gather more
information on the garbage collection process for this server?
1. Edit the servers sas.server.props file and set com.ws.jvmgc equal to verbose
2. Use the administrative console to enable Verbose garbage collection for the server
3. Enable tracing on the server with the following trace string: com.ibm.ws.jvm.*=finest
4. Use wsadmin to generate a heap dump and analyze the dump with the Application Server
Toolkit (AST)
Answer: B
QUESTION 82
To conserve disk space, an administrator would like to roll the FFDC log files every three days.
Without interfering with normal application server operation, how can this be accomplished?
1. By writing a logRoller script and executing it every three days.
2. By running a system job that cleans the files as needed
3. By configuring the ExceptionFileMaximumAge property in ffdcRun.properties
4. By configuring the TimesToDump property in ffdcStop.properties
Answer: C
QUESTION 83
In order to gather all of the necessary data required by IBM Support to troubleshoot a database
connection pooling problem, an administrator should perform which task(s)?
1. Run the collector command, use the problemType option to specify database connection
pooling and submit the resulting JAR file to IBM Support
2. Use the Service component of the IBM Support Assistant (ISA) to gather data for the
database connection pooling problem type
3. Reproduce the problem, create a JAR file including the System.log and native_stdout.log
files then submit the JAR file to IBM Support
4. Reproduce the problem, use the Tivoli Performance Viewer to log the JDBC connection
pool activity then submit the log file to IBM Support
Answer: B
QUESTION 84
What is the advantage of implementinga multi-tiered environments across multiple machines?
1. It can more closely align with a customer’s business functions (i.e. distribution, ordering,
and inventory management.)
2. The tiers allow you to tune individual products
3. It is the separation of tiers that allows operating system tuning parameters to be used
based on the machine’s function
4. Separation reduces maintenance complexities since components are highly available in a
distributed configuration
Answer: C
QUESTION 85
A WAR file containing several JSR 168 compliant portlets has been successfully installed in an
application server. If portlet serving has been enabled, how can the portlets be accessed with a
browser?
1. Request the PortletServingServlet servlet and then submit the name of the portlet
2. Request the portlets index.jsp and then submit the context root and portlet name
3. Request the wpsServlet servlet and then select the portlet from a portal menu
4. Request the portlet directly using a URL that includes the name of the portlet
Answer: D
QUESTION 86
When an application server cluster is added to a Service Integration Bus as a cluster bus member,
the messaging engine defined will be highly available. The messaging engine becomes active on:
1. all the servers within the cluster
1. each node agent
2. only one server within the cluster
3. the deployment manager
Answer: C
QUESTION 87
Which statement is NOT true about the Session Initiation Protocol (SIP) container?
1. The servlet container provides the network services over which requests and responses
are received and sent.
2. A SIP servlet container manages the network listener points on which it listens for
incoming SIP traffic.
3. The SIP servlet container can employ a SIP proxy server to route, load balance, and
improve response times between SIP requests and back-end SIP container resources.
4. The SIP servlet container can directly interact with other SIP servlet container in the cell
to co-ordinate SIP servlet requests.
5. The SIP servlet container decides which appliations to invoke and in what order. The
container also contains and manages servlets through their life cycle.
Answer: D
QUESTION 88
Which statement describes the relationship between WebSphere MQ and WebSphere default
messaging as a JMS provider?
1. Default messaging relies on WebSphere MQ as the JMS Provider
2. Default messaging is a version of WebSphere MQ.
3. WebSphere MQ and default messaging are separate and do not share any modules or
configuration data
4. WebSphere MQ and default messaging must share the same Cloudscape database.
Answer: C
QUESTION 89
Which statement is true for a managed application server process to startup?
1. A node agent and deployment manager must be running before starting a managed server.
2. Starting a managed server is not dependent on the presence of a running deployment
manager.
3. The node agent should not be started before any managed servers on that node.
4. The deployment manager needs to be started before the managed server.
Answer: B
QUESTION 90
In a cell configuration, which protocol is used for sending requests between application servers?
1. HTTP
2. HTTPS
3. IIOP
4. OSE
Answer: C
QUESTION 91
What are the three possible modes that the replication service instance can be set up to run in?
1. Server mode
2. Client mode
3. Both mode
4. Publish/Subscribe mode
5. Event Listener mode
6. Broadcast mode
Answer: A, B, C
QUESTION 92
What has to be configured to implement memory-to-memory HTTP Session persistence?
1. EJB session beans and EJB Container
2. The HTTP Plug-in and embedded HTTP Server
3. The JMS Server and Queue Manager
4. The Data Replication Service (DRS) and Web container
Answer: D
QUESTION 93
An administrator is configuring JDBC database connections. Where is the file system path to the
DB2 or Oracle driver .zip files specified?
1. Within the .ear file of the deployed application
2. Within the connection pool parameters for the cell
3. On the connection manager J2C configuration panel
4. From the Environment -> WebSphere Variables panel of the Administration Console
Answer: D
QUESTION 94
While an administrator is using the Tivoli Performance Viewer to analyze a performance
problem with a production application server, the administrator notes that the database
connection pools have a much lower percentage of utilization than the other pools. Which
statement explains this observation?
1. The database server is constrained, causing calls to the database to consume more
resources than are available for processing
2. This condition indicates there is a bottleneck in one of the processes upstream in the
pipeline of process flows within the application server.
3. The connection pools have not been defined to account for parallel application server
calls to the database, causing this particular server to show low utilization
4. The Tivoli Performance Viewer percentages are only useful for performing performance
analysis on a server that is executing in a controlled load test scenario.
Answer: B
QUESTION 95
A J2EE application needs to be configured as follows:
The EJB module and the utility JAR in the application must be loaded by the same Class loader.
Each Web module must have its own unique Class loader.
What is the correct application server and Web module Class loader configuration for this
application?
1. Isolation policy -> Single, Class loader policy -> Application
2. Isolation policy -> Single, Class loader policy ->Module
3. Isolation policy -> Multiple, Class loader policy -> Module
4. Isolation policy -> Multiple, Class loader policy -> Application
Answer: C
QUESTION 96
Which statement most accurately describes the effect of increasing the JVM maximum heap
size?
1. No measurable performance change will result from increasing the heap size
2. A larger heap size will cause the server to take longer to start
3. More objects will be created and the time required to garbage collect will decrease.
4. The time between garbage collections will increase, but the garbage collection will take
longer.
Answer: D
QUESTION 97
For security reasons, an administrator would like to ensure that HTML resources are isolated
between Web modules running on a server. Which setting should the administrator configure?
1. Class loader configuration
2. Virtual host configuration
3. HTTPS ports configuration
4. Admin console configuration
Answer: B
QUESTION 98
In order to generate a plug-in configuration file on which all applications in the cell are mapped,
which action must a system administrator take?
1. Run the GenPluginCfg command on each server
2. Run the GenPluginCfg command on the deployment manager
3. Select the Automatically Generate Plug-in option in the administrative console
4. Select the Generate Plug-in option in the Web server’s page in the administrative console
Answer: B
QUESTION 99
When using the Tivoli Performance Viewer, the WebSphere administrator notes that the
Summary and Detailed reports display in tabular format, however the graphics do not display.
What must the administrator do to correct the problem?
1. The graphics display only if there is sufficient variance in the data being collected. The
application server monitored is not under load condition, therefore the default reports are
the preferred display mechanism and no action is required.
2. The Performance Monitoring Interface and the Performance Advisor must both be
enabled from the Administrative Console accessed through the Deployment Manager in
order for the Performance Advisor graphics to display.
3. The administrator must override the default scale set in the default report since it is set
too high to cause the graphics to be generated
4. The Scalable Vector Graphics (SVG) plug-in for Adobe must be downloaded and
installed on the administrators browser since this is required for the graphics display.
Answer: D
QUESTION 100
According to the Upstream Queuing model for performance tuning, what reflects the correct
application of recommended settings for maximum concurrent clients?
1. Web server=75, Web container=75, Datasource=25
2. Web server=75, Web container=50, Datasource=25
3. Web server=50, Web container=50, Datasource=50
4. Web server=25, Web container=50, Datasource=75
Answer: B
QUESTION 101
A critical error is occuring on a production node causing the JVM logs to rapidly fill up. Which
resolution should the WebSphere administrator take as the first step for troubleshooting?
1. The logs are self-managing and can roll over based on time ro file size, so simply
opening the logs with a text editor will ensure that new log files are created.
2. Removing the application server from the network, either administratively or physically,
is necessary to stop the JVM processing.
3. Stopping the JVM process from the command line, removing the application
administratively thru the console and restarting the JVM will allow processing to
continue on other applications.
4. The administrator should remove the failing application server from user requests,
thereby stabilizing the application server so that troubleshooting can begin.
Answer: D
QUESTION 102
When configuring session management for a Web container, which property represents the
number of cached sessions?
1. Session Expiry value
2. Maximum in-memory session count
3. L2 Cache Integration count
1. Maximum wait on serial access
Answer: B
QUESTION 103
An administrator has a cluster of two members and needs to ensure that roughly twice as many
client requests are routed to cluster member A. than are routed to cluster member B. How should
the administrator configure this type of load distribution?
1. Create two entries for member A in the HTTP plug-in configuration
2. Double the OS priority for member As JVM process
3. Assign to member A, a weight two times as large as member Bs weight
4. Double the minimum size of member As Web container thread pool
Answer: C
QUESTION 104
What is the default behavior of federating a node using the addNode command?
1. Starts the node agent and application server processes
2. Includes applications and buses
3. Starts the deployment manager and the node agent
4. Does NOT include applications and buses
Answer: D
QUESTION 105
It has been decided to use database session persistence for a particular J2EE application. Which
two steps must be performed to implement this feature?
1. Configure the JDBC provider and data source
2. Select a multi row schema
3. Create session database
4. Configure row size to match session size
5. Create session database tables
Answer: A, C
QUESTION 106
If an IBM HTTP Server is defined, the IHS Administration is installed and the IBM HTTP
Server is defined to an unmanaged node, which two can be done?
1. Display the IBM HTTP Server Error log (error.log) and Access log (access.log) files as
well as display and edit the IBM HTTP Server configuration file (httpd.conf)
2. Start and stop the server and propagate the plug-in configuration file after it is generated
3. Update the server with new fixpacks
4. Enable dynamic trace
5. Flush its local cache
Answer: A, B
QUESTION 107
In order to create a new WebSphere cell and implement a horizontal scaling topology, an
administrator needs to perform which task(s)?
1. Federate nodes and create multiple clusters
2. Load balance multiple HTTP servers using Edge Components
3. Deploy multiple database servers using a high availability software product
4. Federate nodes and create cluster members across multiple machines
Answer: D
QUESTION 108
What is the default configuration setting for the Data Replication Service (DRS)?
1. Single replica
2. Full group replica
3. Specify number of replicas
4. Entire domain
Answer: A
1. What about master repository?
Ans: deployment manager contains the MASTER configuration and application files. All updates
to the configuration files should go through the deployment manager.
2. Tell me IHS executable files, means bin directory files?
Ans: Apache, ApacheMonitor, htpasswd, htdigest, htdbm, ldapstash, httpd.exe
3. Why given the httpd.conf file to installation of plug-in?
Ans: identify the web server (port, virtual hosts) to configure the web server definition
4. How to configure remote system httpd.conf file?
Ans: select web server machine (remote)
5. Several types of log files in the appserver?
Ans: system out, system err, trace, native out , native err, activity.
6. websphere packages?
Ans: express, base, network deployment
7. What is the profile?
Ans: profiles are a set of files that represent a websphere application server configuration.
8. What is the trace?
Ans: A trace is an informational record that is intended for service engineers or developers to
use. As such, a trace record might be considerably more complex, verbose and detailed than a
message entry.
9. What is heap memory?
Ans: Objects storage space for objects references created at run time in a jvm is heap memory.
10. Out of memory exception is there, how to handle that exception?
Ans: To incrise heap memory size
11. What about IHS?
Ans: IHS (IBM HTTP Server) is one of the web servers. It serves the static content only and it
takes up only http requests.
12. What about plug-in?
Ans: plug-in is one of the modules it is interface between application server and web server, the
plug-in process receives the request from the client first. If the request is for dynamic content, the
plug-in diverts the request to the websphere application server. If the request is for static content,
the plug-in forwards it to the Http server.
13. What is the global security?
Ans: it provides the authentication and authorization for websphere application server domain
(administration client or console).
14. How to configure the global security?
Ans: open console and then select security option in the right side menu, and then select localOs
registry in the user registry, then enter the username, passwords. And again select global security
then ltpa option then provide the password, then save the configuration. And restart the
deployment server and then relogin the console.
15. What is SSL?
Ans: ssl is a protocol for providing encrypted data communications between two processes.
16. What is PMI? How to configure PMI?
Ans: monitoring and tuning–>PMI–>select any process (server1, nodeagent, dmgr) and then
enable PMI–>then apply and then save. Select performance viewer–>current activity and then
select enabled process and click the start monitoring button after that process select.
17. What is the UNIX command of all display server processes?
Ans: ps –ef| grep java
18. What is node?
Ans: logical group of servers.
19. How to start the server?
Ans: startserver.sh server1
20. How you get nodeagent……what you have to install to get nodeagent?
Ans: Custom Profile
21. How to add the node?
Ans: addnode.sh 8879
22. What is the application server?
Ans: The application server provides a runtime environment in which to deploy, manage, and run
j2ee applications.
23. What is the node?
Ans: A node corresponds to a physical computer system with a distinct IP host address.The node
name is usually the same as the host name for the computer.
24. What is the node?
Ans: A node corresponds to a physical computer system with a distinct IP host address. The node
name is usually the same as the host name for the computer.
25. How many types of profiles are in nd product?
Ans: 1.deployment manager profiles 2.application server profiles 3.custom profile
26. What is diffrence b/w dmgr and other profiles?
Ans: dmgr app custom
1.its used for administration 1.admin console is there 1.plain node purpose of remaining profiles
2.initially one app server there 2.empty node 2.it supports the distributed 3.work independently
environment. 4. Put applications 3.it is not included app server 4.admin console is there 5.work
independently 6.do not put applications
27. Diff b/w 5.0 and 6.0?
Ans: Web Sphere Studio 3.5, comes up with Visual Age for Java. WSAD 5.0 supports J2EE 1.3
java specifications. RAD 6.0 supports J2EE 1.4 and integrated with Eclipse 3.0, UML Visual
Editor, Tomcat Jakarta, Ant scripting, EJB universal test client and SOA tools.
28. What is the difference between web server and application server?
Ans: Application Server: takes care of Security, Transaction, Multithreading, Resource pooling,
load balancing, clustering, performance, highly availability, scalability, etc. Exposes business
logic to client applications through various protocols, possibly including HTTP. Supports
deployment of .war and .ear files Application server = web server + EJB container.
29. Diff b/w weblogic and websphere?
Ans: Both BEA Weblogic and IBM’s WebSphere provide J2EE based application servers which
are competitors. WebSphere leverages more on connectivity issues with MQ and legacy systems
with strong dominance in J2EE.
30. Some problem is there in web server, so this information which log file contain?
Ans: http.log, plugin.log
31. What is jdbc?
Ans: jdbc is a low level pure java api used to execute sql statements.
32. What is datasource?
Ans: A data source is associated with a jdbc provider that supplies the specific jdbc driver
implementation class
33. What is diff b/w type4 and type2?
Ans: type4 type2
1. It is pure java oriented 1.it is not a pure java oriented driver
2.require client side software 2.no need any client software
34. Some application not accessing, so what is the problem? This information which log file
contains?
Ans: systemout, systemerr
35. In type3 client software which machine you have install?
Ans: server side machine
36. two databases there (oracle and db2),so I want 3 datasources for oracle and 2 data
sources for db2 so create 3 datasource names for oracle and 2datasourcename for db2 is
possible or not?
Ans: possible
37. What is jndi?
Ans: we can register resources in the application server’s java naming and directory interface
(jndi) namespace. Client applications can then obtain the references to these resource objects in
their programs.
38. Why use the boostrap port number?
Ans: client applications use the bootstrap port to access websphere’s built-in object request
broker (orb) to use enterprise java beans in applications installed on the application server. The
java naming and directory interface service provider url used by the client application needs to
reference the bootstrap port to obtain an initial context for looking up ejb’s it wants to use. (For
communicate two servers)
39. What are the appserver components?
Ans: admin server, web container, ejb container,j2c service, naming server, messaging engine,
security server.
40. LDAP port number?
Ans: 389 or 636
41. How to start the server?
Ans: startserver.sh server1
42. Packages of websphere?
Ans: express, base, network deployment
43. What is webcontainer?
Ans: The web container provides a runtime environment for servlets, jsp’s, javabeans, and static
content.
44. How to find out free diskspace from command prompt?
Ans: du -sk (kb) du -sm (mb)
45. How to find out certain server configuration details like port no, server name, node
name, pid?
Ans: through admin console.
46. Configure the plug-in through admin console is possible or not?
Ans: possible
47. Where to set the path?
Ans: environments–>websphere variables
48. How many types of installations?
49. Application installed but not working. What are troubleshooting steps?
Ans: see jvm & application are up, check plugin-cfg.xml file for the root context used by the web
application if it does not exist generate plugin and restart web server.
50. Applications installed fine, also generated plugin, but application still not working, in
this case which log to see?
Ans: plugin.log
51. Default admin port?
Ans: 9060, ssl 9043
52. Default bootstrap port?
Ans: 2809
53. How to hit application without hitting the web server?
Ans: webcontainer port on application server
54. In how many ways you can perform administration?
Ans: console,,,JMX
55. No of ways of doing deployments?
Ans: Admin console…..jython (jacl) scripts
56. What is CellDiscoveryAddress
Ans: Node uses this port to talk to DMGR
57. What is NodeDiscoveryAddress
Ans: DMGR uses this port to talk to node
58. How websphere discovers a change in JSP and compiles it?
Ans: There is an algorithm that websphere uses to find the timestamp of .jsp and .class files. It
checks that timestamp of .class file is always later than its corresponding .jsp file.
59. What is classloader?
Ans: The Java Classloader is a part of the Java Runtime Environment that dynamically loads
Java classes into the Java Virtual Machine
60. how do you specify a jar file to be used by the application, consider that you have many
jar files in your system?
Ans: classloader
61. What is a managed node?
Ans: Node with NodeAgent
62. What is a managed webserver?
Ans: Remote webserver access through local (dmgr/cell)
1) What is the default user registry, if you enable Global Security at the time of installation
Its federated repositories…. actually it is a file
2) Which commands require username/password , if you enable admin security
all stop* , syncNode, addNode(?)
3) When can you enable global security?
- while installing
- After installation also
4) Does enabling admin security needs j2ee security to be enabled?
No
5) Does enabling admin security enables j2ee security?
yes
6) What is the most important step to do, if you change your user repository.
recycle all the JVMs. otherwise the key tokens will not be updated for the new repo
7) who can change admin security settings?
Adminstrator
8. what is the tool supplied by IBM for SSL management in Websphere
ikeyman
9) How do you change the cell wide SSL?
http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21154255
10) how do you replace the default plugin-key.kdb file with new kdb file?
11) can we use diffrent SSL for nodes and plugin ?
Yes
1.WHAT IS TRACING?
Tracing is when you go through an entire program and record the value of variables and the
output. You trace a program when you want to find out what actually went wrong
2.WHERE TO GIVE APPLICATION PRIORITY WHILE STARTING SERVER?
it will be under Enterprise applications ->app name -> startup behaviour ->Startup order in the
admin console
3.HOW TO MOVE CODE DEV ENVIRONMENT TO TESTING ENVIRONMENT?
I’m sure what they mean by code here. I think, incase of applications, export them from in DEC
and deploy in TEST.
4.WHAT IS SSL?WHEN IT ENCRYPT & DECRYPT THE DATA?
SSL are digital signed certificates. user for meesage/communication integrity and
confidentiality. Generally encrypt at Sender side and decrypt at receiver side
5.WHAT IS INCIDENT MANAGEMENT?
It is part of ITIL process….. simple explanation is, when there is a problem in ur WAS
environment, which procedure do you follow.
6.WHEN APPLICATION IS DOWN WHAT U WILL DO?
First look at the logs for errors. If you find the error, save the logs and start ur application. Then
start trouble shoot.
If no error found, run a trace and look for FFDC etc..
7.I HAVE 16GB RAM,WHAT IS THE MINIMUM & MAXIMUM HEAPSIZE ?
No relation. Heap settings should be made depends on application
8.HOW TO OPEN ADMIN CONSOLE IN AIX/UNIX & WHAT IS THE DEFAULT FILE
SYSTEM OF AIX?
admin console can be viewed from remote machine which has a browser, if not behind firewall.
9.WHAT IS FILE DESCRIPTORS IN AIX?
A file descriptor is a handle created by a process when a file is opened. There is a limit to the
amount of file descriptors per process.If the file descriptor limit is exceeded for a process, you
may see the following errors:”Too Many Open Files”
10.HOW TO RESOLVE PORT CONFLICTS IN PRODUCTION ENVIRONMENT?
check why there is port conflict
run updateports script in WAS
what is cluster
how do you create a cluster
go to servers -> clusters-> new ->give cluster_name->define first member->define other
members->finish
how do you add a new cluster member
go to servers -> clusters->cluster_name ->cluster members ->new ->give name/node/others-
>apply->ok->save
one of the cluster member (jvm) is having issues. To troubleshoot the issue, you decided to take
it out of the cluster. How do you do that?
Make its runtime weight to 0
In a complex environment, there are 10 machines. Machine A is having 8GB RAM and machine
B having 2GB of RAM. The administrator decided to send twice as many request as machineB
to machineA. How can he achive it?
give machineA twice the weight as machineB
After making some changes on a cluster, it is required to recycle/restart all the cluster JVMs. The
lead admin told you to make sure that there should not be any downtime during this recycle.
Which option do you use to achieve it?
Ripplestart
A large application which has 5web modules has been deployed on to a cluster. After some
months, the developer asked you to update on of the 5web modules. How do you do it?
Rollout
what is a backup cluster
can you change the cluster name, once it was created
No
1. What is the difference b/n web and app servers
2. What are the new features in WAS ND 6.1
3. How many types of profiles are available in WAS ND6.1
4. What is a Cell
5. What is NodeAgent
6. What is DMGRs default admin port
7. What are the pre-perquisites for installing WAS
8. While installing WAS, if the installation fails and no logs are found. Which location should
you check for the details
9. While installing WAS, can we create any CELL in WAS ND 6.1
10. After installing WAS, you found INSTALLCONFPATIALSUCCESS in the install log, what
does it mean?
11. While installing as non-root, can WAS detect other existing WAS installations
12. Which file hold the existing WAS installation details
13. After installation you found that some ports are conflicting, how do you change/update the
ports
14. Where do you find the installation logs
15. if the DMGR is not running, can you start the other JVMs?
16. While installing using silent installation method, if you do not wish to install sample
applications. Which parameter should you change in the response file?
17. You have been asked to install WAS and create a CELL profile, how many response files do
you need?
18. How do you get a new nodeagent
19. After you install the WAS, how do you verify the installation
20. How do you delete a profile?
eatures in WAS ND 6.1
3. How many types of profiles are available in WAS ND6.1
4. What is a Cell
5. What is NodeAgent
6. What is DMGRs default admin port
7. What are the pre-perquisites for installing WAS
8. While installing WAS, if the installation fails and no logs are found. Which location should
you check for the details
9. While installing WAS, can we create any CELL in WAS ND 6.1
10. After installing WAS, you found INSTALLCONFPATIALSUCCESS in the install log, what
does it mean?
11. While installing as non-root, can WAS detect other existing WAS installations
12. Which file hold the existing WAS installation details
13. After installation you found that some ports are conflicting, how do you change/update the
ports
14. Where do you find the installation logs
15. if the DMGR is not running, can you start the other JVMs?
16. While installing using silent installation method, if you do not wish to install sample
applications. Which parameter should you change in the response file?
17. You have been asked to install WAS and create a CELL profile, how many response files do
you need?
18. How do you get a new nodeagent
19. After you install the WAS, how do you verify the installation
20. How do you delete a profile?