Month End Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

C9510-401 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

C9510-401 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: D Application Server Network Deployment V8.5.5 and Liberty Profile System Administration
  • Last Update: May 25, 2025
  • Questions and Answers: 73
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

C9510-401 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

C9510-401 Practice Exam Questions with Answers D Application Server Network Deployment V8.5.5 and Liberty Profile System Administration Certification

Question # 6

A web application is hosted on an application server that receives HTTP requests from a third party application named myApp. The URIGroup mapping for this application is called default_host_myApp.

The development team asks a system administrator to configure the HTTP plug-in to prevent routing requests to any application server except server1.

The following exhibit shows the parts of the plugin-cfg.xml file that are relevant for myApp. The UriGroups for other applications are not shown in the exhibit.

C9510-401 question answer

What should the administrator do to the plugin-cfg.xml file to ensure that requests for default_host_myApp URIGroup are routed only to machine1?

A.

Delete the Server tag for CloneId=”b20000002”

Delete all of the tags within the Server tag

B.

Delete the UriGroup tag for default_host_myApp

Delete all of the tags within the UriGroup tag

C.

Delete the VirtualHostGroup tag for default_host

Delete all of the tags within the VirtualHostGroup tag

D.

Edit the LoadBalanceWeight for server1 to 20

Edit the LoadBalanceWeight for server2 to 2

Full Access
Question # 7

While monitoring a cluster in the cell, the administrator notices that one server in the cluster periodically loses connections to the database. When this happens, requests to the server have a significantly decreased response time and various error conditions are listed in the log files for the server. Since the error codes are returned quickly, the server starts returning responses faster than the average service times for the application. Due to this, the weight for the server is increased and a large percentage of incoming requests are being routed to the erroneous server and the server is getting overloaded with requests.

How can the administrator detect these conditions in the future and take action to prevent this problem?

A.

Configure the storm drain health policy.

B.

Configure the on demand router (ODR) transport chain to tune inbound connections.

C.

Monitor the JVM heap usage to determine a new server weight.

D.

Enable the PMI Extended statistic set and use the Connection Pool summary report.

Full Access
Question # 8

An application deployed to a multi-node cluster is reported to have slowness and hung threads. A system administrator is asked to review the logs on each node and identify if the hung threads are a false alarm.

How can the administrator determine that the hung threads are a false alarm?

Analyze the:

A.

ffdc logs

B.

SystemErr.log

C.

SystemOut.log

D.

native_stderr.log

Full Access
Question # 9

A web application was deployed on a WebSphere Application Server cluster. While users are using the application, one of the cluster servers fails and the users lose their working data.

What can the system administrator configure to ensure users can continue to work if one of the cluster server fails?

A.

An increased session timeout.

B.

A cluster of external HTTP servers.

C.

A load balancer to spread work between existing servers.

D.

A WebSphere eXtreme Scale HTTP session management.

Full Access
Question # 10

A system administrator has created a Jython script called globalScript.py.

What should the administrator do to ensure globalScript.py is loaded when the wsadmin shell is used?

A.

Compile globalScript.py to a Java class in the bin directory.

B.

Invoke wsadmin with the argument –profileName globalScript.py.

C.

Modify the configureCustomProperty script to import globalScript.py.

D.

Set the script profiles in the wsadmin.properties file to load globalScript.py.

Full Access
Question # 11

The computer where a federated node was running had a failure and cannot be recovered. A system administrator wants to recreate the node with the same configurations in another computer.

Which steps should the administrator execute in order to recover the damaged node?

A.

Configure the new computer with a different hostname.

Create a custom profile with the same name.

Federate to the cell using the command addNode with the default options.

B.

Configure the new computer with a different hostname.

Create a custom profile with a different name.

Federate to the cell using the command addNote with the option –asExistingNode.

C.

Configure the new computer with the same hostname.

Create a custom profile with the same name.

Federate to the cell using the command addNote with the option –asExistingNode.

D.

Configure the new computer with the same hostname.

Create a custom profile with the same name.

Federate to the cell using the command addNote with the options –includeapps.

Full Access
Question # 12

A system administrator needs to create a cell for a test environment. The administrator uses the Profile Management Tool (PMT) to create the deployment manager profile using the advanced profile creation option and creates a custom profile using the typical profile creation option. The administrator examines the log files for the custom profile creation and sees an INSTCONFFAIL message indicating the deployment manager was not running during the custom profile creation.

How should the administrator fix this?

A.

Delete the custom profile.

Start the deployment manager.

Create the custom profile again.

B.

Start the deployment manager.

Use PMT to re-create the custom profile.

C.

Use the syncNode command to synchronize the node.

D.

Run the addNode command to federate the custom profile.

Full Access
Question # 13

A system administrator has configured a network deployment cell containing multiple nodes and global security enabled with an LDAP repository. To increase capacity, the administrator needs to add additional nodes to the cell. After adding the nodes by using both scripts and the Integrated Solutions Console (ISC), the administrator examines the System.out log for the deployment manager and notices the following message:

C9510-401 question answer

How can the administrator resolve this problem?

A.

Disable Java 2 security.

B.

Restart the deployment manager.

C.

Increase the RSA token timeout value.

D.

Change the number of active LTPA keys.

Full Access
Question # 14

A system administrator is required to monitor the application server logs for heap memory issues and determine if the heap memory usage is reaching close to 70% of the maximum heap. The application server is configured with an initial heap of 256 MB and a max heap of 1 GB.

How should the administrator determine if the application server is utilizing 70% of the max allocated heap memory?

A.

Check the System logs for OutOfMemoryErrors.

Trigger a heap dump from the Integrated Solutions Console (ISC).

Analyze the heap dump.

B.

Configure WebSphere Application Server to enable verbose garbage collection.

Analyze the garbage collection cycles in the native logs.

C.

Configure Initial heap to be equal to the max heap.

Trigger a heap dump from the Integrated Solutions Console (ISC).

Analyze the heap dump.

D.

Configure WebSphere Application Server to increase max heap.

Trigger a heap dump from the Integrated Solutions Console (ISC).

Analyze the heap dump.

Full Access
Question # 15

There are many applications deployed in a large WebSphere Application Server cluster. A system administrator is required to give Configurator role access to a developer for a single application deployed in that cluster.

How should the administrator meet this requirement and restrict Configurator role access for a single application?

A.

Create a J2C authentication alias for that developer.

B.

Create an Administrative user role and provide Configurator access to the developer.

C.

Create an Administrative group role and provide Configurator access to the developer.

D.

Create an administrative authorization group, scope it only for that application and create an Administrative user or group role to give Configurator access to the developer.

Full Access
Question # 16

A system administrator has created a Python script called globalScript. py.

What should the administrator do to ensure globalScript. py is loaded when the wsadmin shell is used?

A.

Compile globalScript.py to a Java class in the bin directory.

B.

Invoke wsadmin with the argument-profileName globalScript.py.

C.

Modify the configureCustomProperty script to import globalScript. py.

D.

Set the script profiles in the wsadmin.properties file to load globalScript .py.

Full Access
Question # 17

A system administrator has deployed an application. The development team has updated a new version of this application. The administrator needs to immediately deploy this updated application and guarantee that only this new edition is used by clients and that any service requests for the application are queued during the deployment of the new application.

How can the administrator achieve this task without any downtime to the application?

A.

Perform a soft rollout.

B.

Perform a hard rollout.

C.

Perform an atomic rollout.

D.

Perform a concurrent activation rollout.

Full Access
Question # 18

How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the server’s file system?

A.

Configure the CSIv2 outbound communications under RMI/IIOP security.

B.

Configure the file-based repository and create the fileRegistry.xml file.

C.

Enable Java 2 security and configure the app.policy and was.policy files.

D.

Use the AdminTask deleteAuthorizationGroup to remove application access.

Full Access
Question # 19

A system administrator discovers an issue that requires a change to a federated server. In this cell, WebSphere administrative security is enabled, but application security is not enabled.

How should the administrator make this change?

The administrator should use:

A.

a web browser to connect to the node agent https port.

B.

a web browser to connect to the deployment manager admin_host port.

C.

the job manager to submit a job to update the unmanaged server.

D.

an ssh connection to the node and modify the client_types.xml file.

Full Access
Question # 20

A system administrator runs a Python script that creates and configures several servers and realizes that the script fails before completing. Although many tasks succeeded, they are rolled back when the script fails.

Before running the script again, what can the administrator add to the script after each task so the completed tasks are committed even if other tasks fail?

A.

AdminApp.update ()

B.

AdminConfig.save()

C.

AdminControl.invoke(server, 'sync’)

D.

AdminTask.backupJobManager('server')

Full Access
Question # 21

A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users.

What should the administrator do to implement the required security configuration?

A.

Install and configure a TAI (Trust Association Interceptor)

B.

Configure a security domain for the stand-alone LDAP server.

C.

Use Federated repositories and configure the supported entity types.

D.

Use Stand-alone custom registry and configure the flat file implementation.

Full Access