Saturday, April 2, 2011

WebSphere Job Interview Sample Questions 003

Which one of the following profile related tasks can only be performed using the manageprofiles commandline facility?
A. Delete a profile
B. Secure a profile
C. Federate a profile
D. Update profile templates
Answer: A

A system administrator has successfully installed WebSphere Application Server V7.0 and has run the Installation Verification Tool (IVT) with a success message. Which additional step can be taken to further verify the installation?
A. Check to see if the InstallShield application will run again.
B. Check to see if the installation directory specified exists in the file system.
C. Use a browser to access the launch page of the IBM HTTP Server.
D. Use a browser to access the administrative console and log in successfully.
Answer: D

In order to verify that a server has started successfully and all of its components have initialized without throwing any exceptions, what steps should an administrator perform?
A. Use the Log Analyzer to view the servers activity.log file.
B. View the servers startServer.log and native_stdout.log files.
C. Examine the SystemOut.log file for the current server process.
D. Log in to the administrative console and examine the runtime messages.
Answer: C

An application server is hung and has to be killed and restarted by the administrator. In order to troubleshoot the server hang problem, the administrator decides to reproduce the hang condition and trigger thread dumps for further analysis. What is the most effective way to collect the thread dump data?
A. Trigger one thread dump before and one thread dump after the server restart.
B. Take three consecutive thread dumps 10 seconds apart immediately after the server restart.
C. After server restart wait for the thread monitor to create the first thread dump, then take two more.
D. Wait for the thread monitor to signal a possible hung thread, then take three thread dumps several seconds apart.
Answer: D

Data replication service (DRS) is turned on for replicating in-memory data among WebSphere processes. During peak load, the developer found an OutOfMemoryError in the log. The developer suggests turning off data replication service (DRS).
What services would be impacted?
A. Stateful session EJB persistence and failover.
B. HTTP session persistence and failover.
C. JDBC data source failover.
D. Dynamic cache replication.
E. JVM in memory replication and failover.
Answer: ABD

An administrator has enabled security auditing for the WebSphere Application Server. They wish to view the audit records in order to verify that it is working properly. Which tool would best allow them to view the audit data?
A. IBM Support Assistant using the AuditLogReporter tool
B. wsadmin, using the AdminTask.binaryAuditLogReader command
C. The administrative console - they could invoke the Tivoli Audit Viewer (TAV)
D. The LogAna|yzer from within the Rational Application Developer Assembly and Deploy Tool.
Answer: B

What must an administrator do before he can create method permissions for an Enterprise JavaBean?
A. Map role to groups.
B. Define one or more security roles.
C. Map logical role name to runtime rule.
D. Exclude a set of EJB methods from access.
Answer: B

A federated cell has two nodes, Node01 and NodeO2. Global Security is turned on and is using a file based user registry. Node01 has servers A, B, C and D. A developer has deployed a new security check-in application to servers A and D. As a security requirement, this new application is required to use local operating system registry for user authentications. Identify which one of the following is the most direct way to enable this secured application.
A. Migrate user information from operating system registry to LDAP registry.
B. Create a security domain and scope it to application server A and D.
C. Update global security configuration file security.xml with operating system registry definition.
D. Merge operating system registry and file based user registry to a new LDAP and assign the new LDAP to the federated cell.
Answer: B

In a test cell which has WebSphere global security disabled, an administrator has created a service integration bus (SIBus) with security enabled for testing applications that use messaging resources. Now the administrator needs to enable security on the bus for further testing. Which of the following tasks must be performed to enable security on the bus?
A. Enable administrative security for the cell.
B. Configure a separate security domain for the bus.
C. Delete the bus and recreate it with security enabled.
D. Require messaging clients to use SSL protected transpor1s.
Answer: A

The application accesses an external resource using a J2C adaptor. The security credential for the external resource authentication has changed. Which one of the following should be updated?
A. J2C authentication data.
B. Key stores and certificates.
C. Web security trust association.
D. JAAS login module in WebSphere.
Answer: A

An administrator needs to set up a new employee with administrative access to an existing WebSphere cell. What administrative security roles must the administrator have in order to grant the new employee operator access'?
A. The operator role is required to assign another administrator operator access.
B. The administrator must have administrator role access in order to make the new administrator an operator.
C. The administrator must be the primary administrative user in order to grant security roles to new administrators.
D. The Admin Security Manager role is required so that the administrator can assign new users to administrative roles.
Answer: D

In addition to the normal process for assembling an application, which one of the following tasks must be performed if the EAR file contains a Web services-enabled module?
A. Generate EJB resource mappings.
B. Generate deployment code for the application.
C. Redefine the bindings properties.
D Edit the annotations or deployment descriptors.
Answer: B

Which action below must be performed to ensure that requests routed through the Web server can reach a Web application deployed in WebSphere Application Server Network Deployment V7.0?
A. Security is enabled on the administrative console.
B. An updated plugin-cfg.xml is generated and propagated to the Web server.
C. The Web server and the WebSphere Application Server must be installed on the same physical sewer.
D. The Web server plug-in and the WebSphere Application Server must be installed on the same physical server.
Answer: B

What is the correct console command to execute a wsadmin script file in WebSphere Application Sewer, ND, V7.O?
A. wsadmin -f
B. wsadmin
C. wsadmin /file:
D. wsadmin @executeScript (script file will be prompted)
Answer: A


To use a messager driven bean (MDB) to communicate with the default messaging provider, the administrator must create which one of the following?
A. JDBC provider
B. JCA resource adapter
C. JMS connection factory
D. JMS activation specification
Answer: D

In a Java EE application, how are EJB resources protected?
A. Security constraints
B. Method permissions
C. Java 2 security policy files
D. Administrative permissions
Answer: B

An application which uses JMS clients will be deployed to a stand--alone application server. Messages will be produced by a session EJB and consumed by a message-driven bean (MDB) via a queue destination. What JMS resources must be configured by an administrator to support this application?
A. Destination, queue point, mediation
B. Destination, connection factory, data store
C. Message points, destination, connection factory
D. Queue, connection factory, activation specification
Answer: D

When an administrator creates a service integration bus (SIBus) destination, which one of the following tasks must be performed?
A. Scope the bus destination to a specific cluster.
B. Assign the destination to a specific bus member.
C. Select an appropriate mediation for the bus destination.
D. Create the appropriate message point for the bus destination.
Answer: B

If a deployed application is mapped to a Web server, an updated plug-in configuration file must be generated and propagated. By viewing the plug-in configuration file, how can an administrator determine if the mapping was successful? There will be a:
A. Property element under Transport with a Name attribute equal to the path of the mapped application.
B. URI element under UriGroup With a Name attribute equal to the context root of the mapped application.
C. Server element under ServerCluster with a Name attribute equal to the .ear file of the mapped application.
D. VirtualHost element under VirtualHostGroup with a Name attribute equal to the assigned port number of the mapped application.
Answer: B

When adding a new member to a cluster, why is it necessary for an administrator to select the option for generating unique HTTP ports?
A. To enable encryption over the secure HTTP ports
B. To prevent other applications from using these ports
C. To avoid port conflicts with other servers on the same node
D. To ensure that cluster members on different hosts have unique ports
Answer: C

Aside from the administrative console and the addNode command, what other facilities does WebSphere Application Server provide for federating nodes into cells?
A. wsadmin
B. The administrative agent
C. The Profile Management Tool (PMT)
D. Rational Application Developer Assembly and Deploy Module
Answer: C

A cluster, Cluster1, contains application servers Server1 and Server2. Cluster1 is configured as a member of service integration bus (SIBus). Bus1 using the High availability messaging engine policy. A messaging engine (ME) for Busl starts up on Server1, then Server1 crashes. An ME for Busl will:
A. already be running on Server2. When Server1 recovers, an ME for Busl will start on Server1.
B. start on Server2. When Server1 recovers, a second ME for Busl will start on Server1.
C. start on Server2 but fail back to Server1 after Server1 has recovered.
D. start on Server2 and continue running on Server2 even after Server1 has recovered.
Answer: D

An administrator has created a cluster, C1, and configured memory-to-memory HTTP session replication. How can the administrator best ensure that every HTTP session is replicated on all members of the cluster?
A. In the Replication domain settings for the C1 replication domain, set Number of replicas to entire domain
B. In the Replication domain settings for the C1 replication domain, set Number of replicas to 0
C. In the Memory--to-memory replication settings for each member of C1, set Number of replicas to entire domain
D. In the Memory--to-memory replication settings for each member of C1, check Replicate to all members
Answer: A

A J2EE application maintains information in the HTTP session in memory. This information can be recreated, but there is a performance penalty to restore state if a user session fails over to a different cluster member. Which of the following features maximizes the use of information already stored in a server`s session?
A. Database persistence
B. Session affinity in Web server plugin
C. Memory--to-memory replication in Both Mode
D. Memory--to-memory replication in Server Mode
Answer: B

An administrator wishes to control an Apache Web server on a remote host via the WebSphere Application Server Network Deployment administrative console. What must be done to accomplish this?
A. Configure a web server definition in the administrative console.
B. Configure the Apache administrative process on the remote node.
C. Configure an unmanaged node definition in the administrative console.
D. Configure a managed node on the remote host.
Answer: AD

A cluster, Cluster1, contains two servers, Serverl and Server2. Server1 has a weight of 20 and Server2 has a weight of 4. A single web server is used to route HTTP requests to Cluster1. The web server is started and receives 4 HTTP requests for an application deployed on Cluster1. If the requests are all part of the same HTTP session, and the first request is routed to Server2, how many requests are routed to Server1?
A. O
B. 1
C. 2
D. 3
Answer: A

What does backupConfig back up?
A. Log files
B. Profile configuration
C. WebSphere binaries
D. First failure data capture (FFDC) directory
Answer: B

Where can an administrator find binding information for an application?
A. In the IBM extension file
B. In the activation specification
C. In the deployment descriptors
D. Executing the wsadmin command AdminApp.viewBindings (-ApplicationName)
Answer: C

To install fix packs to remote hosts using the Centralized Installation Manager (CIM), the administrator must download the update installer for the appropriate platforms into:
A. a directory on the class path of a Node Agent on each remote host.
B. the WebSphere Application Server Network Deployment cells CIM repository.
C. the maintenance sub-directory of the application server install on each remote host.
D. the maintenance sub-directory of the profile root of the node hosting the CIM repository.
Answer: B

What is the sequence of components which would typically be involved in the flow of a request from a Web browser to a servlet?
A. External HTTP Server, HTTP Server Plug-in and EJB Container
B. Load Balancer, Embedded HTTP Server, HTTP Server Plug-in and Web Container
C. Edge Component, HTTP Server Plug-in, external HTTP Server, and Web Container
D. External HTTP Server, HTTP Server Plug-in, embedded HTTP Server and Web Container
Answer: D

A system administrator wants to improve response time and system load of a Web application running in a clustered environment. What might the system administrator attempt to decrease the response time of the Web application?
A. Configure dynamic caching
B. Enable memory-to-memory replication
C. Configure session replication to use a database.
D. Ensure that all cluster members are in the same node group.
Answer: A

How could an administrator manage multiple stand-alone application servers on different hosts in a network? By using:
A. a job manager which administers multiple application server nodes through administrative agents.
B. a deployment manager which administers multiple application server nodes through their node agents.
C. a high availability manager which administers multiple application server nodes through their administrative agents.
D an administrative agent which administers multiple application server nodes through their administrative service.
Answer: A

What are the three possible replication types for the dynamic caching service?
A. Client mode
B. Server mode
C. Not shared
D. Push only
E. Both push and pull
F. Broadcast mode
Answer: CDE

Which of the following statements most accurately describes the relationship between a flexible management topology and the network deployment cell?
A. Flexible management can be an alternative to the network deployment cell model.
B. Flexible management eliminates the need for node agents in a network deployment cell.
C. The flexible management topology is a replacement for the network deployment cell.
D. The flexible management job manager can perform all the tasks of the deployment manager.
Answer: A


Interview Tips
  • Be prepared
    • Go over your resume one more time, especially if a consulting company has helped improving your resume
    • In each area of key competence, prepare to talk about your skills including one or two examples of using a skill
    • Review key WebSphere concepts and terminologies, for example, dynamic cluster
  • Speak clearly and concisely, if needed, slowly
    • Speak clearly and make sure that you are understood
    • Be concise and be crispy. Say it once, and say it powerfully. Do not let wordiness make your interview performance suffer
    • If you feel that the phone line is not clear enough etc, slow down and make sure that the hiring manager does not have to struggle to understand you
    • Ask the hiring manager if you need to speak slowly and clearly 
    • Do not let a technical discussion become an argument and competition of ego. Be honest, be respectful, and be professional
      • Be respectful - years back, I argued with a senior software engineer at a top technology company about a difficult memory management detail before his manager during an interview. You know what happened then
      • Be professional - even if you feel the technical questions asked are not what you expect, try to answer. For example, I was asked about database joint while interviewing for a middleware engineer position. It is common for companies to evaluate your background in computer science
      • Be honest - there is nothing wrong to say that "I do not know. But given an opportunity, this is something I would like to learn". Do not try to talk about something that you do not know. It is a waste of your time and it is irritating to the hiring manager
      • Listen carefully 
        • Listen carefully to understand the question 
        • Do not hesitate to ask for more details about a question if needed
        • Do not interrupt but listen patiently 
        • Take notes if needed 
        • Ask for feedback and take the interview as a learning opportunity
          • You can and should ask for feedback on your interview
          • You can choose to ask for feedback immediately
            • Ask the hiring manager if you can take a short moment and ask for feedback
            • How you were doing on the interview
            • Where you could make improvement in your technical skills
            • Any other improvements possible, for example, listening or being easy to be understood
          • You can also ask for feedback from the HR representative whom you have worked with to set up the interview
          • You can ask the HR representative if it is possible to get feedback on the interview so that the hiring manager is prepared to take notes and provide feedback 
        • Prepare two or three questions (that you are genuinely interested in) about the position, the team, or the company - asking about new technology strategy can be a good topic to get the hiring manager talking.

          No comments: