Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Oracle 1z0-133 - Oracle WebLogic Server 12c: Administration I

Page: 2 / 4
Total 127 questions

You decide to use a database to store WebLogic Server transaction logs for a managed server.

Which two steps are required to configure this? (Choose two.)

A.

Under the managed server's Services configuration select “JDBC” as the type for the transaction log store.

B.

Under the managed server's Services configuration, select “Disable the Default Store”.

C.

Create a non-XA data source in the domain for the database transaction log.

D.

Create an XA data source in the domain for the database transaction log.

You are using the Embedded LDAP that is supplied by Oracle WebLogic Server. Which three statements are true? (Choose three.)

A.

The Embedded LDAP can be accessed by an external LDAP viewer

B.

The Embedded LDAP cannot be used in a production environment

C.

The Embedded LDAP uses the file system to store WebLogic security provider data

D.

The Embedded LDAP uses the database to store WebLogic security provider data

E.

The Embedded LDAP can be used to store user, group, security roles and security policies for the WebLogic security providers

You are troubleshooting why transactions are not being committed. After investigation, you realize that these transactions have enough time during the first phase of the two-phase commit, but not enough time during the second phase. Therefore, rather than committing, they are timing out and are being rolled back.

Which Java Transaction API (JTA) attribute needs a larger value?

A.

Timeout Seconds

B.

Abandon Timeout Seconds

C.

Before Completion Iteration Limit

D.

Checkpoint Interval Seconds

E.

Unregister Resource Grace Period

An online store web application is deployed to a WebLogic server cluster. User of this application frequently complain that the information in their shopping cart vanishes before they are able to complete an order. You use the Administration Console to monitor the web application.

Which metric is the most relevant to this problem?

A.

Average execution time

B.

Session timeout

C.

Current session count

D.

High session count

E.

Cookie domain

Which statement is true about stopping Node Manager?

A.

If you stop Node Manager, the managed servers it started will also stop.

B.

You may kill the Node Manager process by using operating system commands.

C.

Use the stopNodeManager.sh script so Node Manager stops gracefully.

D.

Using the administration console, select the appropriate machine and click Stop.

E.

The administration server goes into ADMIN mode if it can no longer communicate with Node Manager.

F.

The managed servers that Node Manager started go into ADMIN mode if they can no longer communicate with Node Manager.

An administrator in your organization says you do not need to back up the domain files on a machine which only managed servers run.

Select the best explanation for this statement.

A.

This is true because the domain files can be re-created with the pack and unpack utilities.

B.

This is true (with an exception) because the domain files can be re-created with the pack and unpack utilities. The exception is if your security realm uses the embedded LDAP system. Which is not included in the JAR file created by the pack utility.

C.

This is true (with an exception) because the domain files can be re-created with the pack and unpack utilities. The exception is for applications that are deployed to the managed server. Those files are not included in the JAR file created by the pack utility. If you back those up manually, then pack and unpack can be used.

D.

This is not true. You need to back up the domain files on a machine on which only managed servers run by using operating system commands (such as tar or zip).

The development group supplied you with the latest WAR file for the company web application. It has been thoroughly tested and needs to be placed into production. In the production file system, you copy over the previous WAR file with the new version. You log into the administration console and redeploy the application. Current uses continue to access the older version of the application, while new users are taken to the new version. Explain this scenario.

A.

This is only possible if the application is deployed to a cluster. Cluster deployments allow current users to continue to use the previous version of an application

B.

This is possible if the application is versioned by using the WebLogic Server feature called Production Redeployment.

C.

This is not possible. When an application is redeployed, it replaces the old version and all users then access the new version

D.

This is not possible. When an application is redeployed, all users continue to access the old version. Once all current users have exited the system, then all users from that point on access the new version

Which three statements are true about the default behavior of WebLogic Server proxy plug-ins? (Choose three.)

A.

The proxy will pin a client to a specific server if a session cookie is created.

B.

The proxy fails over to another server if a connection or request times out.

C.

The proxy distributes requests to cluster members based on their CPU usage.

D.

The proxy dynamically learns the latest locations of cluster members.

E.

The proxy always uses SSL, regardless of the client’s protocol.

F.

The proxy replicates session data to its backup proxy.

During a performance test, a server’s log includes several OutOfMemoryError messages. You are using the Administration Console.

How can you verify the amount of available heap in the server?

A.

Click the server ‘s Debug > Heap tab.

B.

Click the server’s Debug > Health tab.

C.

Click the server’s Monitoring > Health tab.

D.

Click the server’s Monitoring > Threads tab.

E.

Click the server ‘s Monitoring > Performance tab.

You are using the Configuration Wizard to create a new domain that will host an EJB application without a cluster. Remote EJB clients can therefore take advantage of WebLogic Server’s load balancing and failover capabilities.

However, a proxy server exists between the EJB clients and this new cluster.

Which cluster attribute should you modify in the Configuration Wizard to ensure that external EJB clients are routed correctly through the proxy?

A.

Messaging Mode

B.

Cluster Address

C.

Broadcast Channel

D.

Replication Channel

E.

Cluster Type