My Daypo

1Z0-102 Weblogic 11G 98% Score

Title of test:
1Z0-102 Weblogic 11G 98% Score

1Z0-102 Weblogic 11G 98% Score

(Other tests from this author)

Creation Date:

Driving Test

Number of questions: 111
Share the Test:
Share the Test:
Last comments
PavanBhavaniShekhar ( uploaded 7 years )
johnny, you did a great job. appreciate your charitable work. I shared with my WebLogic learning participants and it also made them successful in their certification with 94% and 95%. Now the target is hit 100% I hope you mistype 3 questions. Few typos negligible who read and prepared for WebLogic Certification this is the great source. Thanks for your efforts. Looking for 12c Certification Exam from you. Cheers!!!
Vamsi Krishna ( uploaded 8 years )
Very Good
Which two statements are true about java EE shared libraries? A. A shared library cannot be deployed to a cluster. B. An application that is targeted to server1 can use a shared library that is targeted to server 2. C. Multiple versions of the same shared library can be deployed and be active at the same time D. A shared library is referenced through an application's deployment descriptor.
Refer to the Exhibit. You use the Start button in the administration console to start managed2 successfully. Which two statements must be true? A. Managad2 is part of a cluster. B. The Administration Server is running. C. Managed2 has applications deployed to it. D. The Node Manager for machine2 is configured and running. E. The Node Manager for the Administration Server machine is configured and running.
Within your data center, the Administration and Managed Servers utilize a shared, central storage device, which server''s access via NFS. In this scenario, your application files no longer need to be copied to servers across the network. Which server attribute allows you to override this behavior? A. Startup Mode B. Staging Mode C. Root Directory D. Listen Address.
An EJB application is targeted to a cluster. Remote EJB clients can therefore take advantage of WebLogic Server''s load balancing and failover capabilities. However, a proxy server exists between the clients and the cluster, which performs IP address translation. Which cluster attribute should you modify to ensure that load balancing and failover work correctly? A. Multicast Address B. Persistent Store C. Cluster Address D. Migration Basis E. Replication Channel.
You run the default startmanageWeblogic (.cmd in Windows) script as shown here: startmanageWeblogic.sh server1 What does this do? A. It starts the administration server named server1, which is running at B. It starts the managed server named server1, which is running at C. It starts the managed server named server1 whose Node Manager is running at D. It starts the Managed Server named server1 whose Administration Server is running at
An application requires a JDBC data source, which you create in the domain. You name it but the administrator allot another domain name the same data source DatasourceB. Without modifying either domain, which is the best method to ensure that the application deploys successfully in both? A. Create a separate application archive to use with each domain. B. Create a separate deployment plan file to use with each domain. C. Create and register a custom deployment listener. D. Modify the application code to determine the current domain.
Identify three options for Keystores in a server's configuration. A. Demo Identity and Demo Trust B. Demo Identity and Java Standard Trust C. Java Standard Identity and Custom Trust D. Custom Identity and Demo Trust E. Custom Identity and Custom Trust F. Custom Identity and Command Line Trust.
When installing Oracle Weblogic Server 11g with the graphical installer, which three statements are true? A. You must choose either a typical or a custom installation. B. You install under Microsoft Windows because the graphical installer is available only for Window C. You may create a new middleware home directory or choose an existing one. D. You must register for critical security updates. E. You may install a JDK or choose one that was previously installed.
Each domain has a directory called servers that contains subdirectories for each server in the domain. Your domain has a managed server named managed1. When will the managed1 directory be created? A. When the managed1 server is defined in the configuration Wizard B. When the domain is created C. When the administration server comes up for the first time D. When the managed1 server1 comes for the first time.
Identify three properties required by the domain Configuration Wizard when creating a new domain. A. machine name B. Managed Server name C. domain startup mode D. domain name E. administrator username and password.
Which two statements are true about adding servers to a cluster? A. When you create a cluster, you must add at least one server to it. B. Only managed servers can be in a cluster. C. The administration server is automatically added to a new cluster. D. You must explicitly identify which servers belong to the cluster.
Consider a single JMS module that includes a connection factory as well as queue. Based on your system''s requirements, the connection factory needs to be made available to all servers in the domain. The queue, on the other hand, can be targeted to only a single JMS server domain. What is the best way to achieve the desired JMS setup? A. Create two subdeployments within the JMS module. B. Target the JMS server to the JMS module. C. Target the JMS module to the entire domain. D. Replace the queue with a topic.
Which three attributes are part of the configuration of an existing Managed Server and can be modified through the" administration console? A. name of the server B. the cluster it is in C. the machine it runs on D. its replication group E. whether it is in Development Mode or Production Mode F. that it should become the Administration Server for the domain.
Which can be associated with multiple domains? A. Cluster B. Server Log C. Node Manager D. Administration Server.
Identify two supported methods of deploying a JMS module to a domain. A. Create a module by using the administration console. B. Load a module into the WebLogic database. C. Include a module file within a web application archive. D. Include a module file within an enterprise application archive. E. Define a module within an existing JDBC module.
Which statement is true about the java Node Manager? A. It runs on Windows not on Linux B. In its secure form, it uses one-way SSL. C. It does not use the nodemanager.domains file, whereas the script-based Node Manager. D. Unlike the script based Node Manager, it should not be run as an operating system service.
Which two statements are true about a WebLogic domain? A. It is the basic administrative unit of WebLogic Server. B. It is an optional administrative construct to organize groups of WebLogic C. Administration Servers are defined within a domain, but Managed Servers D. You must first have a domain to define a WebLogic Server cluster. E. Every domain has one Administration Server and at least one managed server.
Which two statements are true about multicast communication within a cluster? A. Multicast can be used for cluster heartbeat messages. B. Multicast is used to replicate session state between servers. C. Multiple clusters can share the same multicast address and port. D. You may disable multicast on individual cluster members. E. Multicast traffic is often limited to a single subnet.
Identify two true statements about an Oracle WebLogic Server JMS Connection Factory. A. A default JMS Connection Factory exists and is named weblogic.jms.connections B. A Connection Factory can be targeted to only one WebLogic Server. C. A JMS Connection Factory's Default Priority and Default Time-to-Live attribute cannot be modified after the Connection Factory is created. D. A JMS Connection factory can be created as a system module resource within the administration console.
In WLST, you enter the shutdown () command with no arguments. Which statement is true in this case? A. The server you are connected to will shut down. B. The command does a "Force" shutdown. C. The command blocks user interaction. D. The command has timeout of 30,000 milliseconds.
Which three statements are true about WebLogic users and groups? A. A user is associated with a single security provider. B. A user can be a member of several groups. C. A group can contain other groups. D. A group consists of a name and a password. E. A group is associated with multiple security providers. F. Both users and groups are assigned a keystore.
Your production JMS server and/or its consumers are not able to handle the incoming message workload. The number of messages on the server never stabilizes and the server eventually becomes overload. Which JMS server attribute will best help prevent the JMS server from being overloaded by producers? A. Producer Pause High B. Messages Threshold High C. Reconnect Polity D. Paging Directory E. Pool Maximum Capacity.
Which three statements are true about WebLogic clusters? A. Clusters provide clients with transparent failover. B. EJB applications can be targeted to an entire cluster. C. All cluster members must bind to the same port number. D. Cluster members replicate application data by using heartbeats. E. Cluster members can be associated with one or more domains. F. Web applications require a proxy in order to be used in a cluster.
Which three statements are true when an Administration Server is compared to a managed server? A. A domain must have at least one of each type of server. B. Administration Server keeps a domain log, but a Managed Server does not. C. A Managed Server keeps a server log, but an Administration Server does not. D. When a Managed Server comes up, it asks its Administration Server for the latest configuration. E. An Administration Server manages the domain configuration. F. JEE applications are deployed only to a Managed Server.
Which three tasks can be performed by the Node manager? A. Start a server. B. Define a node server. C. Host the Node Manager console. D. Automatically restart a failed server. E. Kill a failed application on a server. F. Kill the process of a server that did not shut down properly.
You have successfully created a global data source and connection pool via the administration console. In which directory relative to the domain will this new data source and connection pool definition located? A. in a directory named config/dataSource B. in a directory named config/connPool C. in a directory named config/resources D. in a directory named config/jdbc E. in a directory named config.
What is the maximum number of targets (standard or migrate) that you can configure for a JMS server? A. 0 B. 1 C. 2 D. No limit.
You are deploying a web application called inventory.war. It has been installed and has the Stat* "Prepared." It is targeted to the Managed Server named managed1. The web application's context route is /inventory and the starting page is index.jsp However, you want to test the application before allowing end users access to it. In the administration console, you select inventory-war, and then select Start and "Servicing only administration requests. In your web browser, you need to enter a host and port followed by /inventory/index.jsp. What host and port would you use? A. managed, host and port B. Administration Server host and port C. Managed1 host and Administration port D. Administration Server host and Administration port.
You deployed a simple web application WAR by using the administration console. Its state is currently "Active." In the administration console, under Configuration of the application, you change some deployment descriptor values. What happens when you save such changes? A. The changes are in memory and temporary B. This is not possible because changes cannot be made to an "Active" application. C. You are prompted to select a location for a new deployment plan where the changes will be stored. D. The archive is opened and new versions of the deployment descriptors are placed within it.
Your server includes an application that uses a generic JDBC data source to connect to a database. However, the network connection between the server and the database is not 100% reliable. You wish to avoid scenarios in which the application fails due to a failed JDBC connection. Identify two data source attributes to help accomplish this. A. Statement Cache B. Pool Reserve Mode C. Test Table Name D. Test Connection Mode E. Test Connections on Reserve.
You have selected Configuration Archive Enabled for the domain. When a configuration change and activated, where is the previous version of the configuration archived? A. in the Oracle database B. in the config directory C. in the pending directory D. in the console-ext directory E. in the configArchive directory.
When a typical application utilizes a JDBC data source, the process involves several steps. Identify three of these steps. A. The application returns the connection to the data source. B. The application looks up the data source using the JNDI name. C. The application tests the connection to verify the database's availability. D. The application adds a now connection to the data source if none are available. E. The application requests a connection from the data source.
As an Oracle WebLogic Server administrator, you are given an EAR file application to deploy. Identity three reasons for creating an EAR file first. A. After the .ear file has been deployed, the developer will not have to ask for your assistance to deploy it again. B. The EAR file is created to avoid namespace clashes in the Java code. C. The EAR file can contain multiple WAR, EAR, and other resources to easily bundle together. D. The EAR file is required if you are deploying an application. E. The EAR file can declare application-wide security roles definitions.
Identify three types of JMS resources that can be configured as a part of a JMS module. A. JMS Distributed Destination B. JMS Connection Factory C. JMS Data Source D. JMS Destination E. JMS Server.
A managed server, myserver1, has a boot.properties file in the security directory. It was started with the startManageWeblogic.sh script(.cmd in windows) and his boot.properties file was used for its startup credentials. You just used the administration console to change all administrator passwords. To continue using boot.properties, what can you do? A. This is not possible. A boot.properties file can be used only with the Administration Server. B. Delete boot.properties. In the administration console, under the myserver configuration, select Generate Boot Identity file. C. You need not do anything- The password in boot .properties was automatically updated by administration console when you changed the password. D. Edit boot.propetties. Type over the encrypted password with the new password in clear text. The next time myserver1is started, it will encrypt the password in the file. E. Delete boot .properties. Use the WLST encrypt () command to create a new boot.properties file containing the new password. Copy that file into the security directory of myserver1.
Refer to the Exhibit. see exhibit below,,, Which three statements are true about using the administration console to shut down a server? A. The configuration must first be locked. B. The choice "Force Shutdown Now" drops in-work requests. C. Both the choices, "When work completes" and "Force Shutdown Now", reject any new requests. D. The choice "When work completes" allows in work requests to complete before the server down. E. The administration console can be used to shut down Managed Servers, such as managed not the Administration Server.
Your company is developing batch order system that utilities JMS. Each order message that is created will be broadcasted to and consumed by several order processing and billing applications. As part of configuring the domain that will support this system, which type of JMS destination resource should you create? A. Grid B. Queue C. Topic D. Batch E. Client.
You monitor a running JDBC data source with the console and note the following values: Current Capacity = 10 Current Capacity High Count = 20 Identify two plausible explanations for these metrics. A. The pool size has increased. B. The pool size has decreased. C. The workload was higher than it is now. D. The workload was lower than it is now. E. The statement cache size is 10. F. The statement cache size is 20.
Identify the server attributes that you must configure to communicate with the server via HTTPS. A. SSL Listen Address B. SSL listen Port C. SSL Listen Port Enabled D. Production Mode Enabled E. Startup Mode.
You are creating a new domain by using the Configuration Wizard, based solely on the Basic WebLogic Server Domain product (no template). Select three resources that you can create while still in the Configuration Wizard. A. Administration Server B. Managed Server C. Data Server D. JMS Server E. Cluster F. Domain Log.
Which three statements are true about the administration console? A. The administration console cannot be disabled. B. The context path of the administration console may be changed. C. The administration console may be extended. D. If a domain is in Development Mode, the administration console no longer requires an administration-level user when logging in. E. If a domain is in Production Mode, access to the administration console must be made through secure port. F. If the domain's Administration Port is enabled, access to the administration console must be made only through that port.
Which three statements are true about deployment plans? A. A plan is an XML file. B. A plan is packaged within an application archive. C. You can generate a new plan with the administration console. D. A plan is a required to deploy EJB applications and modules. E. A plan may override values in an application's deployment descriptors. F. A single application deployment can be associated with multiple plans.
All the servers in your domain are running. After you connect to the Administration Server in WLST you run the following command, which completes with no error: Progress = deploy (appName = ''salesapp'', path = ''sales.war'', target = managed1, managed2'', planpath = ''plan.xml'') Which two statements are true? A. The web application is now "Active." B. The command creates new deployment plan called plan.xml. C. In the administration console, the name of this deployment is sales.war. D. The web application has been targeted to managed1, managed2, and the Administration Server. E. You can view the status of the deployment by sending a message to the object named progress.
Your task is to create and start a managed server on a ''remote'' computer (a computer other than the one where the domain has been created and the Administration server is currently running). So far you have: 1. Created the managed server, called startmanaged1, in the administration console 2. Created a managed server" JAR file template by using the pack command or, the Administration server computer. Which order of steps on the remote computer will successfully finish your task? A. 3. Copy the JAR file from the Administration Server computer. 4. Run the unpack command on the JAR file. 5. In the new domain folder created by the command, start managed: by using the startManagedWebLogic. sh script (. cmd in Windows), which is found under its bin directory B. 3. Install WebLogic Server. 4. Copy the JAR file from the Administration Server computer. 5. Run the unpack command on the JAR file. 6. In the administration console, under the Control tab, select managed1 and click the Start button. C. 3. Install WebLogic Server. 4. Copy the JAR file from the Administration Server computer. 5. Run the unpack command on the JAR file. 6. In the new domain folder created by the command, start managed1 by using the Logic. sh script (. cmd in Windows), which is found under its bin directory. D. 3. Install WebLogic Server. 4. Copy the JAR file from the Administration Server computer. 5. Run the unpack command on the JAR file. 6. In the new domain folder created by the command, startmanaged1 by using the startManagedWeblogic.sh script (. cmd in Windows), which is found under its bin directory.
Identify three attributes of a WebLogic cluster. A. Listen Address B. Cluster Address C. Cluster Factory D. Messaging Mode E. Servers F. Targets.
A client accesses a web application named companystore that is running on WebLogic Server. After adding several items to the shopping cart, the host server crashes. The client is automatically redirected to another server by a proxy, but the shopping cart is now empty. Which WebLogic Server feature would you enable to remedy this situation? A. Application Persistence B. Message Persistence C. Session Replication D. Dynamic Failover E. Stateful Pooling.
Which three statements are true about the Change Center in administration console? A. The Change Center has a link to view the changes made so far. B. The Change Center is available only in a Production Mode domain. C. The Change Center has a link to view any servers that need to be restarted. D. After activating the changes to a server's configuration, you must always restart that server. E. In a Development Mode domain, the configuration lock can be acquired automatically. F. Changes must always be activated before they can be undone.
Identify two methods for utilizing WebLogic Server's production redeployment feature. A. Specify a version identifier when deploying the application. B. Include a version identifier in the application's manifest file. C. Provide a version identifier when running the Plan Generator tool. D. Include a unique context root in the application's descriptor files.
Identify four attributes of a JDBC data source. A. URL B. Targets C. JNDI Name D. Delivery Mode E. Database Driver F. Server Log.
Identify two reasons for defining machines and assigning servers to them in Weblogic Server. A. A machine can be the proxy to a cluster. B. A machine definition is required to configure the Node Manager. C. To reference an instance of WebLogic Server, you must know its machine and port. D. Machine is a required organizational unit. A domain contains machines and machines contain servers. E. WebLogic Server uses server machine assignments to help it choose servers in a cluster on which to replicate session state. F. The machine's Cluster Weight attribute may be used by load balancers to help them determine how often to send requests to servers assigned to that machine.
The computer that the Administration Server was running on has crashed and cannot be restarted. Which three steps are required to bring up the Administration Server on the backup computer? A. Move the crashed computer's IP address to the backup computer. B. Have WebLoqic Server installed on the backup computer. C. Have a copy of the configuration and security files of the domain on the backup computer. D. Shut down the managed servers of the domain. E. Start the Administration Server on the backup computer.
You received a signed certificate from a Certificate Authority and you wish to use the keytool command-line utility to store it in your keystore. Which command of keytool would you us A. ''genkeypair B. ''importcert C. ''gensockey D. ''importkeystore E. '' storepasswd.
YCMJ are viewing the deployments in the administration console. A web application that is targeted to the Managed Server named server01 has a State of "Now." Which statement best explains this State? A. Server01 is running and the application has been installed. B. Sarver01 is shut down and the application has been installed. C. Server01 is running and the application has not been installed. D. Server01 is shut down and the application has not been installed. E. Server01 is running and the application was installed for the first time. F. Server01 is running and the application has been installed, but is not servicing requests.
Which three tasks are required to use JDBC session persistence for a web application? A. Enable automatic migration on each server. B. Create the session database table. C. Configure SSL on each server. D. Edit the weblogic.xml descriptor. E. Create a multi data source. F. Create a JDBC data source.
Which three statements are true about the default behavior of WebLogic Server proxy plug-ins? A. The proxy will pin a client to a specific server if a session cookie is created. B. The proxy fails over to another server if a connection or request times out. C. The proxy distributes requests to cluster members based on their CPU usage. D. The proxy dynamically learns the latest locations of cluster members. E. The proxy always uses SSL, regardless of the client's protocol. F. The proxy replicates session data to its backup proxy.
Refer to the Exhibit see exhibit below,,, What is the meaning of the yellow triangle icon next to Listen Address? A. This attribute has no value. B. The server must be running to change this attribute. C. The server must be shut down to change this attribute. D. The server must be restarted for a change to this attribute to take effect. E. This attribute is read only and cannot be changed in the administration console.
You run the following WLST script and it completes successfully. Which statement best describes what the script created? see exhibit below,,, A. A CMO named myserver with the listen address and port 8008 B. A Managed Server named myserver with the listen address and port 7001 C. A Managed Server named myserver with listen address and port 8008 D. An Administration Server named myserver with the listen address and port 8008.
You are logged in to the administration console for a domain that is running in Development Mode. The domain configuration, you select Production Mode, Save, and then Activate Changes. Which two statements are true? A. All running servers must be restarted. B. Only the Administration Server must be restarted. C. Auto-deployment will no longer be available for this domain. D. This change may be made only through the Administration Server's secure port. E. If you decide to go back to Development Mode, uncheck Production Mode in the administrate console.
Identify three ways to create a domain template. A. Administration console B. Domain Template Builder C. unpack command D. pack command E. Node Manager F. WLST G. Configuration Wizard.
View the following file excerpt, which configures HTTP session replication: <session - descriptor > <persistent-store-type>replicated</persistent-store-type> </session-descriptor> From which file is this excerpt taken? A. weblogic-application.xml B. weblogic.xml C. session.xml D. config.xml E. web.xml.
You use a web browser to log in to a web application that is deployed to WebLogic Server. When you click link named "publish" on the site, an "Access Denied" message appears. Which two statements must be true about this server's security configuration? A. The application is not associated with any security roles. B. Multiple security realms are active at the same time. C. Your user account is a member of a group. D. Your user account exists in an authentication provider. E. A security policy is attached to the "publish" link URL.
You have set Server log Rotation criteria to either size or time. When a domain is in Production Mode, which statement is true? A. Log files are rotated when the server restarts. B. Log files are not rotated in Production Mode. C. Log files are rotated only when the rotation criteria are met. D. Log files are rotated when the rotation criteria are met or rotated when the server restarts.
Which three methods does WebLogic provide to implement persistent JMS messaging? A. Create a file store and assign it to a JMS server. B. Create a JDBC store and assign it to a JMS server. C. Configure a file store within a JMS module. D. Configure the domain's default store. E. Use the target server's default store.
Managed Server Independence enabled is not selected in the configuration of myserver1. Which statement is true? A. Only the Node Manager can start myserver1 B. Only a local start script can start myserver1 C. Myserver1 cannot be part of a cluster. D. The Administration Server must be available before starting myserver1.
You have opened a terminal window (or a Window command prompt) to run a WLST script named weeklydeployer.py. You enter the following command: Java weblogic.WLST weeklydeployer.py Instead of the WLST initializing and the script running, however, you receive the NoClassDefFoundError java exception for weblogic/WLST. What is the problem? A. You forgot to set PATH to include the java executable. B. There is an error in the code of the script. C. You forgot to set CLASSPATH to include weblogic.jar. D. You are not in the directory where weeklydeployer.py resides. E. You should have omitted the ".py" in the file name; it is assumed by WLST. F. You forgot to set PATH to include the WLST executable.
You monitor a running JMS topic with the console and note the following values: Consumers Current = 3 Message Current = 1 Message Pending = 0 These values do not change for several minutes. Which is the most plausible explanation? A. Production on the topic has been paused. B. A message arrived after a durable subscribe disconnected from the topic. C. One of the consumers received a message but did not acknowledge it. D. None of the consumers are durable subscribes.
Which statement best describes WebLog''s default application staging behavior? A. The Administration Sever distributes application files when the application is first accessed by a client. B. The Administration Sever copied application files to a database that is shared with the Managed Servers. C. The Managed Servers obtain application files from a disk that is shared with the Administration Server. D. The Administration Sever distributes copied of application files over the network to the Managed Servers.
Indentify two valid elements that can belong in the weblogic-application.xml deployment descriptor. A. <shared-library-reference> B. <library-ref> C. <app-scoped-ref> D. <work-manager>.
You create a system-wide JMS module named Payroll-JMS and set its default target to an existing cluster in your domain named PayrollCluster. Next, you add a standard JMS topic to Payroll-JMS. To which are you permitted to target this topic? A. the entire PayrollCluster B. any single JMS server in the domain C. any combination of member servers in Payrollcluster D. several JMS servers targeted to PayrollCluster.
The project''s architect has provided you with a design diagram that identifies the key components of the new insurance system. From the diagram, you can clearly see that JMS will be used as the communication channel between several applications. Identify four tasks that you may need to perform to support this design. A. Create a JMS server B. Create a JMS message template C. Add JMS destinations to a JMS module D. Add a JMS module to a JMS factory E. Target JMS destinations to JMS servers F. Target a JMS server to a WebLogic Server G. Target a JMS module to a JMS store.
Which three statements are true about the Node Manager? A. The Node Manager can restart the Managed Serves that have failed. B. The Node Manager should be run as either a daemon or a service so that if the host computer is rebooted, the Node Manager will also be automatically started. C. The Node Manager runs on a different host from the Managed Server it is controlling. D. The Node Manager can start a Managed Server the first time the Managed Server starts if the Administration Server is unavailable because MSI mode is enabled by default. E. The Node Manager allows you to start Managed Servers from the administration console.
You have made several changes to variable attributes on a managed server within a domain. You first locked the console, made some nondynamic changes, made some dynamic changes as well, and then activated your changes. Which statement is true? A. All the changes that you made on the server will take effect immediately. B. The dynamic changes that you made will take effect immediately and the changes that are nondynamic will take effect after the server is restarted. C. The changes that you made on the server will not take effect until you restart the server. D. You will receive an error because you cannot make dynamic and nondynamic changes to a server at the same time.
When you use the Embedded LDAP that is supplied by Oracle WebLogic Server, which three statements are true? A. The Embedded LDAP can be used to store user, group, security roles and security policies for the WebLogic security providers. B. The Embedded LDAP uses the file system to store Weblogic security provider data. C. The Embedded LDAP can be accessed by an external LDAP viewer. D. The Embedded LDAP cannot be used in a production environment E. The Embedded LDAP can store Auditing Data.
An application is deployed to your domain and its manifest indicates version 1.1. You then perform an application update by using a manifest that indicates version 1.2. Indentify two outcomes of this scenario. A. The existing 1.1 clients are redirected to the 1.2 application B. The existing 1.1 clients are shown a warning message. C. The existing 1.1 clients continue to use the 1.1 application. D. New clients are asked which version they wish to use. E. New clients use only use 1.2 application.
View the exhibit. see exhibit below,,, You are logged in to the WebLogic Server administration console and you are editing the fields shown in exhibit. Which type of WebLogic Server resource are you currently editing? A. JMS Server B. Persistent Store C. JDBC Data Source D. Diagnostics Module E. JMS Connection Factory.
You have 10 cluster managed servers in a domain. Due to the maintenance tasks currently in progress, two of the managed servers are in a ''Shutdown'' status. You have been asked to deploy an application. As a default behavior of WebLogic Server, which two statements are true? A. The application cannot be deployed until the two managed servers are available. B. The application can be deployed while the two managed servers are in ''Shutdown'' status. C. The application will be deployed to the eight managed servers that are running. The two managed servers that are in the Shutdown state will eventually receive the deployment when they are started again. D. The application deployment will fail and the application will not be deployed to any managed server in the cluster. E. The application deployment will fail and the eight managed servers that are running will transition to ''Admin'' state.
An application fails. The exception indicates that the JDBC data source, jdbc-hr.HRDS, cannot be found. Identify two possible steps that you can perform to verify the data source''s availability. A. Launch the JDBCDiagnostics utility. B. Verify the Targets attribute of the application. C. Verify the Dependencies attribute of the data source. D. Verify the target server''s JNDI tree in the console. E. Verify the Target attribute of the data source.
Indentify three ways to create a domain template. A. Administration console B. Domain Template Builder C. unpack command D. pack command E. Node Manager F. WLST G. Configuration Wizard.
What is the default Staging Mode for servers? A. No-Stage B. Stage C. External Stage D. Use the defaults defined by the deployment targets E. Copy the application onto every target for me.
When using the Install Application Assistant in the administrator console, what are the two options that may select for ''Choose Targeting Style''? A. Choosing ''Install this deployment as a resource'' will allow you to deploy any type of resource archive. B. Choosing ''Install this deployment as a library'' will allow you to deploy any archive, which can be referenced by other applications. C. Choosing ''Install this deployment as expanded format'' allow expanded directories to be utilized. D. Choosing ''Install this deployment as an application'' will allow you to deploy any archive or extended directory. E. Choosing ''Install this deployment as a stand-alone library'' will allow you to deploy a library, which can be used only by nonclustered servers.
You wish to provide failover for HTTP sessions within a cluster. However, you are limited by the following constraints: 1. While under load, your servers have very little free memory. 2. you do not have appropriate access rights to modify your company''s database. Which is the best option, given these restrictions? A. in-memory replication B. automatic migration C. file persistence D. JDBC persistence E. replication groups.
Indentify three tools that you can use to create a deployment plan. A. administration console B. weblogic.PlanGenerator C. the /autodeploy folder that is locked in the domain directory D. developer tools such as JDeveloper or Eclipse E. the /plan subfolder that resides outside the application archive.
While creating a new domain in the Configuration Wizard, there are two types of machines that may be configured. Indentify them. A. Machine and Windows machine B. administrator machine and managed machine C. machine and Unix machine D. stand-alone machine and cluster machine E. RDBMS machine and LDAP machine.
View the Exhibit. see exhibit below,,, You previously deployed an application but later decide to change various configuration parameters, such as timeouts. You access the application''s Configuration tab in the console and make your configurations, as shown in the Exhibit. In which file does WebLogic record these modifications? A. config.xml B. weblogic.xml C. Application.xml D. Plan.xml.
Identify four features of the default administration console. A. XML Editor B. WLST Editor C. Breadcrumbs D. Change Center E. Template Builder F. Domain Structure G. Configuration Wizard H. WLST Script Recorder.
You wish to restrict access to a JMS queue so that only specific accounts may receive messages from the queue. Identify two steps that, when performed together, implement this security requirement. A. Create a policy for queue''s URL pattern. B. Add a policy to the queue and associate it with a role. C. Configure an identify assertion provider. D. Acquire the domain configuration lock. E. Create a global role and assign users to it.
A domain created based on the Basic WebLogic Server Domain product has start scripts called startWebLogic.sh and startManagedWebLogic.sh (.cmd in Windows). Which three statements are true? A. startWebLogic.sh starts Node Manager. B. startWebLogic.sh has a required parameter. C. startManagedWebLogic.sh has a required parameter. D. startWebLogic.sh starts the Administration Server of the domain. E. startManagedWebLogic.sh can start any managed server in the domain. F. Both scripts can start any WebLogic Server, but each has different default parameter values.
Which answer best describes how you can start the Java-based version of the Node Manager? A. W1scontrol.sh (.cmd in Windows) B. Wisifconfig.sh (.cmd in Windows) C. startNodeManager.sh (.cmd in Windows) D. startNM.sh (.cmd in Windows).
Which two statements are true about Log Filters? A. Log Filters are created at the domain level. B. You do not have to lock the configuration to create Log Filters. C. You can apply a Log Filter to the server log, but not to standard out. D. The administration console assists in the creation of Log Filter expressions.
Consider a domain with an existing JDBC data source, which connects to an Oracle database. Your administrator requests that the JDBC connections to this database now specify a different username. Which data source attribute would you modify to implement this requirement? A. Properties B. Credentials C. Initial Capacity D. Test Table E. URL.
Which two are typically found in the WEB-INF folder of a Java web application? A. the web application HTML and JSP files B. the classes directory containing the compiled classes C. the web.xml deployment descriptor D. the weblogicserver.xml deployment descriptor.
Which four tasks can be accomplished in the administration console only after the configuration is locked? A. deploying an application B. changing console preferences C. creating a new JMS Server D. monitoring the health of a server E. enabling the Administrator Port F. creating a new Managed Server G. adding a new user to the default authentication provider.
A web application called sales was deployed and is currently ''Active''. It is targeted to managed1 and managed2. The developers have given you an upload WAR file and you have replaced the original WAR file with it. From the directory where the WAR file resides, you run the following weblogic.Deployer command: java weblogic.Deployer ''adminurl t3:// weblogic ''password welcom1 ''name sales ''redeploy Which statement best describes what happens? A. The command fails because no target was specified. B. The application is deployed to the Administration Server because no target was specified. C. The application is deployed to whichever server is running at D. The application is deployed to managed1 and managed2 because that is where it is currently targeted.
When creating a new Managed Server using the administration console, which two points must be considered? A. The Server Name must be unique within the domain. B. After you assign a Listen Port value for the server, you cannot change it C. The Listen Port value must be unique for ever server. D. The Server Name cannot be changed after you have created the server.
Indentify two attributes of a JMS server. A. Target B. Persistent Store C. Destination D. Connection Factory E. Store and Forward.
The master Embedded LDAP has the capability to back up its data. Which statement is true? A. The Managed Servers should be shut down when backups are being performed on the Embedded LDAP. B. The backup feature is enabled by default. C. The backup featureof the Embedded LDAP should be enabled for all the servers in the domain on a per-basis. D. The backup is stored in a comma-separated variable format.
Indentify two requirements for in-memory session replication. A. Clusters must contain an even number of members. B. Web applications must be configured to use replication. C. Web applications must be deployed as an archive file. D. Cluster members must be started by using the Node Manager. E. Web applications must be accessed via a proxy that supports session cookies.
You are deploying an EAR by using the administration console. You are part way through the process. In the administration console, you see that the EAR has the State of ''Prepared.'' What can you do in the administration console to bring the deployment to the ''Active'' State? A. Select it and click the Install button. B. Select it, and then from the Install drop-down list, select ''Servicing all requests'' C. Select it, and then from the update drop-down list, select ''Servicing all requests'' D. Select it, and then from the Start drop-down list, select ''Servicing all requests'' E. Select it, and then from the Start drop-down list, select ''Servicing only administration requests''.
Your domain includes a cluster of five servers, but only three are currently running. A colleague then uses the administration console to install and deploy a new EJB application to the cluster. By default, which outcome would you expect? A. The application deploys successfully on the three servers that are running. B. The deployment fails because the entire cluster is not running. C. The deployment succeeds, but the application is not accessible. D. The user is prompted to start the two unavailable servers before continuing. E. The two unavailable servers are automatically removed from the cluster.
Consider an IT infrastructure comprising several web and EJB applications. Each application is expected to handle significantly different workloads, and therefore has different resource and scalability requirements. Which is the best solution for this scenario? A. Configure a dedicated server for each application. B. Configure a separate cluster for each application. C. Configure a separate domain for each application. D. Configure a separate proxy for each application.
Which two statements are true about cluster configuration? A. A server must be running before it can be added to a cluster. B. You cannot define cluster membership through the Configuration Wizard. C. The console allows you to add new and existing servers to a cluster. D. The console allows you to add an administration server to a cluster. E. You cannot remove a server that is running from a cluster.
Which four statements are true about WLST? A. You can create a domain with WLST. B. WLST commands are case-insensitive. C. You can shut down servers with WLST. D. All WLST commands include parentheses. E. WLST is based on the Perl scripting language. F. You can connect to any server through WLST. G. The Administration Server needs to be running to use WLST.
Indentify two server attributes that you must configure to communicate with the server via HTTPS. A. SSL Listen Address B. SSL Listen Port C. SSL Listen Port Enabled D. Production Mode Enabled E. Startup Mode.
Consider a cluster of four servers: SeverA, ServerB, ServerC, and ServerD. The cluster hosts a web application and is accessed using a proxy pug-in. This web application is configured to use in-memory session replication. A user is directed to ServerA. An HTTP session is established on ServerA and is also replicated to ServerC. If ServerA subsequently fails, which server will this user be redirected to? A. none; the user will receive an error message B. ServerB C. ServerC D. ServerD E. Any other available server.
Which three techniques can create a new WebLogic domain? A. Configuration Wizard B. Domain Template Builder C. WLST D. Administration console E. Unpack command F. Node Manager.
Which four tasks are required to use database persistence for JMS messages? A. Assign a data source to a JDBC store. B. Configure a data source''s delivery mode. C. Assign a JDBC store to a JMS server. D. Create a JDBC data source. E. Disable a server''s file store. F. Create a JDBC store.
When describing a WebLogic domain, which three statements are true? A. A domain may be set up in either Production Mode Production Mode or Development Mode. B. All instances of WebLogic Server must be defined within a domain. C. The domain configuration is stored in Oracle database by default. D. Any instance of WebLogic Server may update the domain configuration E. The security realm for a domain is optional. F. A domain maybe created by using the Configuration Wizard.
You are responsible for configuration a WebLogic domain to support an order processing application. This application will communicate with multiple JDBC data sources to fulfill each customer order. To maintain data integrity across these databases, work will be performed within a global transaction. However, you have learned that one of the data sources in the transaction does not have an XA driver. Which option should you select on this non-XA data source to ensure that orders are still processed as global transactions? A. Ignore Heuristics B. Planned to Thread C. Password Encrypted D. Logging Last Resource E. Test Connections on Reserve.
You are installing Oracle WebLogic Server 11g for some new developers in the department. They have asked for a very generic installation for development and want you to ensure that the ''MedRec'' sample domain is included. What should you do to accomplish this? A. Select the typical installation because the ''MedRec'' sample domain is included in it. B. You won''t be able to do this, because all the samples were removed from the installer after 10g. C. Select the custom installation and select Server Examples. D. After installation, create a sample domain named ''MedRec'' by using the Configuration Wizard.
Consider the following excerpt from mod_wl_ohs.conf: <IfModule weblogic_module> WebLogicCluster,, </IfModule> <Location /welcome> SetHandler weblogic-handler </Location> Assuming that this is a valid is a valid configuration, which two conclusions can you make? A. A web application name ''welcome'' is configured to use session replication. B. A web application that uses the paths ''welcome'' is targeted to the cluster. C. The proxy server will ignore any requests that contain the name ''welcome.'' D. The proxy server is listening on the host name ''welcome.'' E. A cluster exists that consists of at least two managed servers. F. All cluster members are running on the same machine.
Which two statements are true about data sources that have been created? A. Data sources must be targed to a server. B. Data sources must be bound in the JDNI tree of a server. C. Data sources are an Oracle WebLogic Server-specific feature. D. Data sources are tied directly to a connection pool. E. Data sources are required for a domain.
Report abuse Terms of use
Author's Tests