Cause all that matters here is passing the IBM C9510-401 exam. Cause all that you need is a high score of C9510-401 IBM WebSphere Application Server Network Deployment V8.5.5 and Liberty Profile, System Administration exam. The only one thing you need to do is downloading Pass4sure C9510-401 exam study guides now. We will not let you down with our money-back guarantee.

Q9. The computer where a federated node was running had a failure and cannot be recovered. A system administrator wants to recreate the node with the same configurations in another computer.

Which steps should the administrator execute in order to recover the damaged node?

A. Configure the new computer with a different hostname. Create a custom profile with the same name.

Federate to the cell using the command addNode with the default options.

B. Configure the new computer with a different hostname. Create a custom profile with a different name.

Federate to the cell using the command addNode with the option -asExistingNode.

C. Configure the new computer with the same hostname. Create a custom profile with the same name.

Federate to the cell using the command addNode with the option -asExistingNode.

D. Configure the new computer with the same hostname. Create a custom profile with the same name.

Federate to the cell using the command addNode with the options -includeapps.

Answer: B

Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSD28V_8.5.5/com.ibm.websphere.zseries.doc/ae/tagt_addNode_asExistingNode.html (See the Heading Procedure).


Q10. The administrator needs to identify any security role references and security constraints in a web application.

How can the administrator identify these roles and constraints?

A. ibm-application-ext.xml file using a text editor.

B. ibmconfig folder in the application after using the EARExpander command.

C. Web deployment descriptor using IBM Assembly and Deploy Tools.

D. Security role to user/group mapping by using the Integrated Solutions Console (ISC).

Answer: A


Q11. A system administrator ran the backup Config command to backup the configuration using the -nostop option. The administrator changed the properties for the service integration environment by modifying the sib.properties file. During testing the administrator noticed Service Integration Bus related errors and wanted to restore the service integration environment. The administrator used the restore config command, but the tuning properties for the service integration environment were not restored.

How can the administrator prevent this issue?

A. Use full repository checkpoints for both the backup and the restore.

B. Use the restore config command with -nostop for the restore.

C. Use the manage profiles command for both the backup and the restore.

D. Use the backup config command without -nostop for the backup Use the restore config command without -nostop for the restore.

Answer: B


Q12. A system administrator has deployed an application. The development team has updated a new version of this application. The administrator needs to immediately deploy this updated application and guarantee that only this new edition is used by clients and that any service requests for the application are queued during the deployment of the new application.

How can the administrator achieve this task without any downtime to the application?

A. Perform a soft rollout.

B. Perform a hard rollout.

C. Perform an atomic rollout.

D. Perform a concurrent activation rollout.

Answer: C


Q13. A newly deployed application has authorization errors when invoking EJB methods from a servlet. An additional review indicates that users are authenticated, but do not have the correct authorization.

How can a system administrator fix the issue ensuring only authorized access?

A. Using the Integrated Solutions Console (ISC), map all security roles to the special subject Everyone.

B. Using the Integrated Solutions Console (ISC), map the security roles that are still not mapped to groups in the current user registry.

C. Edit the application using an assembly tool to add a security constraint for the servlet and reinstall the application.

D. Edit the application using an assembly tool to remove the security constraint defined for the servlet and reinstall the application.

Answer: B


Q14. A system administrator is required to create a star topology for multi-cell performance management for three WebSphere Application Server cells.

How should the administrator configure the Application Placement Controller (APC) in a star topology?

Configure the cell custom property Center Cell to:

A. False in all three WebSphere Application Server cells.

B. False in one WebSphere Application Server cell

True in the other two WebSphere Application Server cells.

C. True in all three WebSphere Application Server cells.

D. True in one WebSphere Application Server cell

False in the other two WebSphere Application Server cells.

Answer: D

Explanation: Reference: http://www-01.ibm.com/support/knowledgecenter/SSEQTP_8.5.5/com.ibm.websphere.nd.multiplatform.doc/ae/twve_mcpconfig.html


Q15. A new cell contains a cluster with members defined in two managed nodes running on two different machines. The cell also contains two unmanaged nodes running on HTTP servers with HTTP plug-in. Session persistence has been enabled.

Which additional component(s) can the system administrator configure to make this environment highly available?

A. Enable administrative security.

B. Configure a DMZ secure proxy.

C. Configure High Performance Extensible Logging.

D. Configure primary and backup load balancers for the HTTP servers.

Answer: C


Q16. A web application is hosted on an application server that receives HTTP requests from a third party application named myApp. The URlGroup mapping for this application is called default_host_myApp.

The development team asks a system administrator to configure the HTTP plug-in to prevent routing requests to any application server except serverl.

The following exhibit shows the parts of the plugin-cfg.xml file that are relevant for myApp. The UriGroups for other applications are not shown in the exhibit.

What should the administrator do to the plugin-cfg.xml file to ensure that requests for default_host_myApp URIGroup are routed only to machine1?

A. Delete the server tag for Cloneld="b20000002" Delete all of the tags within the Server tag

B. Delete the UriGroup tag for default_host_myApp Delete all of the tags within this UriGroup tag

C. Delete the VirtualHostGroup tag for default_host Delete all of the tags within the VirtualHostGroup tag

D. Edit the LoadBalanceWeight forserverl to 20 Edit the LoadBalanceWeight for server2 to 2

Answer: C