Independence Day Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

You are configuring two-way SSL for a WebLogic Server domain. As a security professional, you realize that even if a client certificate is authentic, it is always possible for a valid certificate to become compromised.

Which two options can you configure for WebLogic Server to check if a certificate it receives has been compromised? (Choose two.)

A.

Certification Revocation List

B.

Certificate Revocation Status Protocol

C.

Online Revocation Status Protocol

D.

Online Certificate Status Protocol

Full Access
Question # 5

My domain consists of an administration server and two managed servers. During runtime, my administration server has crashed and I wish to start the managed servers in MSI mode.

Which two files need to be copied from the admin server to the managed servers when starting them in this mode? (Choose two.)

A.

config.xml

B.

AdminServer.log

C.

SerializedSystemIni.dat

D.

access.log

E.

MSI.xml

Full Access
Question # 6

My JMS file store size has grown very large and is using up a significant chunk of the disk. I need to reduce the file size during the maintenance window without impacting any relevant information.

Which utility enables me to do this? (Choose the best answer.)

A.

weblogic.store.Compacter

B.

weblogic.store.Admin

C.

weblogic.store.Reducer

D.

weblogic.file.FileUtil

Full Access
Question # 7

You need to make sure that a JMS Message never expires.

What value should you set for the JMSExpiration header? (Choose the best answer.)

A.

0

B.

999

C.

1000

D.

1

Full Access
Question # 8

You created a user and group using the WebLogic Server default authentication provider.

Where are these principals stored? (Choose the best answer.)

A.

the WebLogic Server OPSS jps-config.xml security store

B.

the WebLogic Server embedded LDAP server

C.

the WebLogic Server embedded database security store

D.

the default jazn-data.xml file-based security store

Full Access
Question # 9

Which three WebLogic Server entities can be set up for service level migration? (Choose three.)

A.

JMS Server

B.

JOLT Service

C.

JTA Transaction Recovery Service

D.

User Defined Singleton Service

E.

JDBC Service

F.

JNDI Service

Full Access
Question # 10

You have an enterprise application that includes a resource adapter module. You are considering leveraging WebLogic Server’s Production Redeployment feature for this application. In preparation for deployment, you decide to create a checklist of items to discuss with the developers of the application.

Which item would you omit from your checklist as it is irrelevant to production Redeployment? (Choose the best answer.)

A.

Ensure the developers have implemented the weblogic.connector.extensions.Suspendadle interface for the adapter.

B.

Ensure that the adapter is accessed by a web or web service module within the application.

C.

Ensure the adapter is used in an application-scoped manner, having enable-access-outside-app set to false.

D.

Ensure that the adapter is compliant with the JCA 1.5 specification.

Full Access
Question # 11

You are using the WebLogic Diagnostic Framework (WLDF) to monitor your domain for certain scenarios based on runtime data of your running servers. Different groups are responsible for different aspects of the application.

As a result, your configuration must fulfill the following requirements:

  • Notifications must be sent only to the correct group that is responsible for the respective part of the application.
  • You must ensure that you can enable and disable monitoring for each level whenever it is needed.

How would you configure WLDF watches and notifications to achieve this result? (Choose the best answer.)

A.

Configure a single module with a watch for each area, and use a notification filter to send an email to the correct group for each area.

B.

Configure a module for each area with a watch that triggers a notification email for the group responsible for that area.

C.

Configure a single module with a watch for each area, and each watch triggers a notification email for the group responsible for that area.

D.

Configure a module for each area with a watch that uses a notification filter to send an email to the correct group for each area.

Full Access
Question # 12

You have been asked to assist developers with executing a partial redeployment of static files within a Java EE Web Application deployed to WebLogic Server. The Web Application has already been deployed as an exploded archive directory.

Which of the following represents the correct conditions for this to be successful? (Choose the best answer.)

A.

The -redeploy argument is used when executing the weblogic.Deployer command.

B.

The -distribute argument is used when executing the weblogic.Deployer command.

C.

The -distribute argument is used when executing the weblogic.Deployer command and the domain must be in development mode.

D.

The -redeploy argument is used when executing the weblogic.Deployer command and the domain must be in development mode.

Full Access
Question # 13

What are two differences between a group and a role? (Choose two.)

A.

Groups are static and roles are dynamic and conditional.

B.

Roles can be scoped to applications and groups are only global.

C.

Roles are static and groups are dynamic and conditional.

D.

Groups can be scoped to applications and roles are only global.

E.

Groups can contain roles but roles cannot contain groups.

Full Access
Question # 14

You are tasked with creating an Extension Template for an existing domain.

What are three options that are presented during the extension creation process? (Choose three.)

A.

Use Domain as a Source

B.

Use Template as a Source

C.

Scripts and Files

D.

SQL Script Files

E.

Company Name

F.

Revision Number

G.

Creation Date

Full Access
Question # 15

You are tasked with configuring a proxy tier for a WebLogic Server domain that has managed Coherence servers configured.

What must the Coherence cache configuration file include as part of this task? (Choose the best answer.)

A.

connection properties to enable push replication between two Coherence clusters connected over a WAN

B.

connection properties to enable Coherence*Extend clients to connect to the cluster via TCP/IP

C.

HTTP proxy server settings to enable Coherence caching on the web server tier

D.

network connection settings to enable Coherence caching on the client’s web browser

Full Access
Question # 16

You are concerned with messages being received systematically. You designed Message-Driven beans (MDB) to guarantee the most reliable way to consume messages.

In which three scenarios would JMS always redeliver a message? (Choose three.)

A.

when the onMessaqe() method of the MDB throws a Java error

B.

when the transaction the MDB participates in eventually fails and rolls back

C.

when the onMessage() method fails to acknowledge the reception of the message

D.

when messages are not being sent as part of a transaction

E.

when messages are non-persistent

Full Access
Question # 17

Review the following WLST commands.

What happens when these commands are executed? (Choose the best answer.)

A.

A diagnostic module named mymodule is created in the domain configuration file and it is enabled on cluster1.

B.

A JMS module named mymodule is created without changing the domain configuration file and it is enabled on cluster1.

C.

A diagnostic module named mymodule is created without changing the domain configuration file and it is enabled on cluster1.

D.

A JMS module named mymodule is created in the domain configuration file and it is enabled on cluster1.

Full Access
Question # 18

Which two statements correctly describe the WLST nmGenBootStartupProps command? (Choose two.)

A.

The target root directory must be on the same machine on which Node Manager is running.

B.

The target root directory must be on the same machine on which the Administration Server is running.

C.

The name of a server must be supplied to the nmGenBootStartupProps command; otherwise, the command will fail.

D.

If you do not specify a server name using the servername argument, the argument defaults to myServer, which must match a server name in the domain or the command will fail.

E.

The nmGenBootStartupProps command generates the Node Manager properties files, boot.properties and startup.properties, for the specified server.

Full Access