When installing a new application to IBM WebSphere Application Server, which location is valid for the application file?
Answer : B
Configuration file location during application installation
Several things occur upon installation of an application onto WebSphere Application Server:
Note: A node is a logical grouping of managed servers. Nodes can be managed or unmanaged. An unmanaged node does not have a node agent or administrative agent to manage its servers, whereas a managed node does. Both application servers and supported web servers can be on unmanaged or managed nodes.
Which of the following describes how communication occurs when a Web Services client sends a request to an application server?
Answer : D
How can the administrator change the console session expiration for the Integrated Solutions Console?
Answer : A
Change the <timeout value> on the two lines of the timeout.jacl script to the new session expiration value. This number specifies the number of minutes the console preserves the session during inactivity.
When adding a repository to a federated repository configuration, which type of repository can be added only using wsadmin commands?
Answer : D
Federated repositories
Supports multiple types of repositories such as file-based, LDAP, database, and custom. In WebSphere Application Server Version 8.5, file-based and LDAP repositories are supported by the administrative console. For database and custom repositories, you can use the wsadmin command-line interface or the configuration application programming interfaces (API).
When installing IBM WebSphere Application Server on a network file system, IBM Installation Manager fails with an insufficient disk space error.
How could this be resolved?
Answer : D
On some network file systems, disk space might not be reported correctly at times; and you might need to bypass disk-space checking and proceed with your installation.
To disable disk-space checking, specify the following system property in the config.ini file in IM_install_root/eclipse/configuration and restart Installation Manager.
Which of the following is true about executing the Installation Verification Tool?
Answer : A
Which type of security restricts access to the operating system from applications?
Answer : A