최신 WebSphere C2180-608 무료샘플문제:
1. New applications are being deployed which use Business Rules. To manage the Business Rules, the deployment professional chooses to deploy the Business Rule Manager. The environment is a WebSphere Process Server clustered configuration. Which configuration information is required to complete this task using the Integrated Solutions Console (ISC)?
A) Event database name
B) Support cluster name
C) Context root for the Business Rules Manager application
D) JNDI name for the Business Rules Manager application
2. An integration developer has informed the deployment professional that the new business integration module being worked on is using Common Event Infrastructure (CEI) events to monitor performance during stress testing, and that the plan is to remove the CEI event emitting code before going to production. What concerns should the deployment professional raise with the integration developer?
A) Is static monitoring used to emit CEI events?
B) CEI events are performance heavy and will invalidate the stress testing results once removed.
C) The business integration module will be changed to remove the CEI emitting events when going from stress testing to production.
D) Is dynamic monitoring used to emit CEI events?
E) CEI is designed for business monitoring, and is not designed for performance monitoring.
3. A company has a complex server infrastructure. All servers are allowed to communicate with each other due to the shared network infrastructure. A development team implemented new applications working with confidential business data and deployed them on a dedicated test server. A specific service provider application on a different business server exposes the data using the Business Process Choreographer (BPC) EJB interface to many other applications. The client application will query the data using synchronous requests on the remote EJB API. A special approval from the management was needed to test the new applications with realtime data. What should a deployment professional do to efficiently secure the environment and prepare the test environment?
A) Configure the Representational State Transfer (REST) services for the BPC. Create a secured
proxy server exposing the service endpoints
and provide the exposed URL and login credentials to the development team.
B) Enable the development server for Single sign on (SSO). Configure identity assertion for
Common Secure Interoperability Version 2 (CSIv2)
outbound authentication on the development server and disable identity assertion on the business
server.
C) Enable Java 2 security on the business server. Request a list of necessary permissions for the
client application from the development team
and add them to the business servers policy file.
D) Configure the Common Secure Interoperability Version 2 (CSIv2) inbound and outbound
authentication for the test and business server.
Register the test server as trusted identity on the business server.
4. A deployment professional is installing an application which uses business processes in a clustered WebSphere Process Server environment. The Business Process Choreographer (BPC) container has previously been configured. During which phase of the installation is the application validated?
A) During the installation phase on the deployment manager.
B) During the configuration phase on the application server.
C) During the installation phase on the node agent.
D) During the application start phase on the application server.
5. An application is processing a sales order between two SCA modules. The business process requires that all invocations between the modules are performed in a specific order. A runtime problem on one of the asynchronous invocations caused the application to fail and the processing stopped for one of the transactions. What should a deployment professional do to solve the problem?
A) Enable the store-and-forward feature for the application and the events will be processed automatically if the runtime problem is solved.
B) Identify the failed sequenced event related to the asynchronous invocation of the calling module and resubmit the event.
C) Identify the failed business process invoke activity and restart the activity to resubmit the event and complete the transaction.
D) Use the esAdmin tool to manually release all locks of the failing application module and restart the application.
질문과 대답:
질문 # 1 정답: C | 질문 # 2 정답: B,E | 질문 # 3 정답: D | 질문 # 4 정답: A | 질문 # 5 정답: B |