100 Important IBM WebSphere Application Server 6.1 Interview Question Answer Part-7

QUESTION 61
Which statement is NOT true about Application Server Toolkit (AST)?
  1. It has a similar look and feel to the IBM Rational family of products and is based on Eclipse.
  2. It has a complete development environment for enterprise applications including EJBs.
  3. It is supported on Windows, Linux and AIX.
  4. It has Jython editor and source debugger.
  5. It can run wsadmin scripts inside AST.
Answer: C

QUESTION 62
The WebSphere scripting tool supports which two scripting languages?
  1. BSF
  2. Jython
  3. Perl
  4. Ant
  5. Jacl
Answer: B, E

QUESTION 63
A system administrator needs to create a data source and make it available on multiple nodes using different directory structures. Which two actions should the system administrator take to do this?
  1. Define the JDBC provider at the cell scope
  2. Define the JDBC provider at the node scope
  3. Define the JDBC provider at the server scope
  4. Create the data source that uses this JDBC provider at the cell scope
  5. Create the data source that uses this JDBC provider at the node scope
  6. Create the data source that uses this JDBC provider at the server scope
Answer: A, D

QUESTION 64
An application uses a JMS queue for point-to-point messaging. As part of the queue configuration, an administrator is able to specify which two sets of properties?
  1. Scope, activation specification and connection factory
  2. Scope, JMS provider and JNDI name
  3. J2C authentication data, connection timeout and reap time
  4. Bus name, delivery mode and priority
  5. Class path, topic name and JMS name
Answer: B, D

QUESTION 65
A customer has a WebSphere Application Server v4 client and wishes to look up and access objects in WebSphere Application Server V6.1 without requiring changes to the client. What must the customer do to enable WebSphere Application Server V6.1 objects to be accessible through the legacy name space?
  1. Configure a leaf binding
  2. Create a corbaname binding
  3. Use a compound name
  4. Create a configured name binding
Answer: D

QUESTION 66
Which are the three possible components of Web modules?
  1. Servlets
  2. JSPs
  3. SIP servlet files
  4. MDB files
  5. HTMLs
  6. Session and entity beans
  7. RAR files
Answer: A, B, E

QUESTION 67
Which three statements are true about J2EE security roles?
  1. Authorization is performed using the J2EE security roles.
  2. Security roles are applied to the Web and EJB application components.
  3. Security roles provide an access control mechanism to manage the applications access to system level resources.
  4. Binding of the users and groups to the J2EE security roles is usually done at the application install time.
  5. Authentication is performed using the J2EE security roles.
  6. Security roles can be modified dynamically at runtime.
Answer: A, B, D

QUESTION 68
What is the default connection pool that the WebSphere scripting tool uses?
  1. SOAP
  2. RMI
  3. SOAP is tried first then RMI is tried second
  4. NONE
  5. TCP
Answer: A

QUESTION 69
An administrator need to configure a data source for use by a Servlet 2.2 based Web application. Which data source type must the administrator define?
  1. WebSphere Application Server V6 data source
  2. WebSphere Application Server V4 data source
  3. JDBC Type 4 data source
  4. JDBC Type 2 data source
Answer: B

­QUESTION 70
The Profile Management Tool allows you to enable WebSphere administrative security. Which user registry is used for this default security?
  1. Local operating system
  2. Standalone custom registry
  3. Standalone LDAP registry
  4. Federated Repositories
Answer: D

Comments

Popular posts from this blog

ERROR: Port values must be a positive integer between 0 and 65535. while install IBM Http Server 8.5.5

How to remove the node from the deployment manager profile

What is clean start in websphere application server