최신 WebSphere 000-608 무료샘플문제:
1. A company has a complex server infrastructure. All servers are allowed to communicate with each other due to the shared network infrastructure. A development team implemented new applications working with confidential business data and deployed them on a dedicated test server. A specific service provider application on a different business server exposes the data using the Business Process Choreographer (BPC) EJB interface to many other applications. The client application will query the data using synchronous requests on the remote EJB API. A special approval from the management was needed to test the new applications with realtime data. What should a deployment professional do to efficiently secure the environment and prepare the test environment?
A) Configure the Representational State Transfer (REST) services for the BPC. Create a secured
proxy server exposing the service endpoints
and provide the exposed URL and login credentials to the development team.
B) Enable the development server for Single sign on (SSO). Configure identity assertion for
Common Secure Interoperability Version 2 (CSIv2)
outbound authentication on the development server and disable identity assertion on the business
server.
C) Enable Java 2 security on the business server. Request a list of necessary permissions for the
client application from the development team
and add them to the business servers policy file.
D) Configure the Common Secure Interoperability Version 2 (CSIv2) inbound and outbound
authentication for the test and business server.
Register the test server as trusted identity on the business server.
2. A deployment professional is installing an application which uses business processes in a clustered WebSphere Process Server environment. The Business Process Choreographer (BPC) container has previously been configured. During which phase of the installation is the application validated?
A) During the installation phase on the deployment manager.
B) During the configuration phase on the application server.
C) During the installation phase on the node agent.
D) During the application start phase on the application server.
3. A new integration developer has just deployed a new business module to the test cell using WebSphere Integration Developer (WID). The new integration developer does not have access to the Integrated Solutions Console (ISC) for the test cell, so the integration developer used the servers panel in WID to deploy the business module and got no errors. The new integration developer is complaining that any output in the SystemOut.log cannot be seen. What is the likely problem? The business module was:
A) not started.
B) not deployed using the ejbdeploy tool.
C) packaged in a JAR and not an EAR.
D) not deployed using serviceDeploy tool.
4. An application which uses Business Processes extensively has found that there is an excessive number of messages being sent to the hold queue. The deployment professional is asked to modify the configuration of the Business Process Choreographer (BPC) settings for that server in an effort to reduce the amount of messages in the hold queue. Which value should be changed to improve this situation?
A) Retention queue message limit
B) Process limit
C) Hold queue timeout
D) Retry limit
5. A deployment professional has created a Remote Messaging and Remote Support cluster with DB2 as the database including an application cluster (cluster1). This environment is used for testing the solution1 project. For another project, solution2, the development team requests another cluster (cluster2). The deployment professional decides to add another application cluster (cluster2) and another messaging cluster to the environment in order fulfill this requirement. What should the deployment professional do as part of this task, given that business processes from the new solution2 project will be called as services from the solution1 project modules?
A) Use a new database/schema for the BPEDB and the CommonDB for cluster2.
B) Use the existing database/schema from cluster1 for the BPEDB required for cluster2.
C) Use the existing database/schema from cluster1 for the BPEDB and the CommonDB required for cluster2.
D) Use a new database/schema for the BPEDB required for cluster2.
질문과 대답:
질문 # 1 정답: D | 질문 # 2 정답: A | 질문 # 3 정답: A | 질문 # 4 정답: D | 질문 # 5 정답: D |