Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Oracle 1z0-134 - Oracle WebLogic Server 12c: Advanced Administrator II

Page: 1 / 4
Total 125 questions

You are analyzing the JMSDeliveryMode header field for all the messages for all the queues deployed to your JMSServer.

Which two values do you expect to find for this header? (Choose two.)

A.

PERSISTENT

B.

NON_PERSISTENT

C.

TRANSIENT

D.

PERMANENT

E.

MULTIMODE

F.

EXACTLY_ONCE

In order to leverage replication and high availability features of the underlying database, you have configured a JDBC TLOG to persist transaction logs in your database.

However, WebLogic Server cannot successfully connect to your database at start up.

Which outcome should you expect? (Choose the best answer.)

A.

The WebLogic Server instance will start without targeting the data source for your store.

B.

The WebLogic Server instance will start without a service for your store.

C.

The WebLogic Server instance will start without creating the data source for your store.

D.

The WebLogic Server instance will fail to start.

Examine the domain diagram:

You are asked to write a WLST script that will print the current available heap size for server04.

Assuming:

    all servers are running

    you have just started an offline, interactive WLST session

    a domain-scoped node manager is running on each machine, listening oт port :5556

    the username/password “weblogic/Welcome1” maps to a valid domain administrator and Node Manager client

Which two code options will accomplish this task? (Choose two.)

A.

connect(‘weblogic’,‘Welcome1’,‘host00.acme.com:7001’)domainRuntime()x = getMBean(‘/ServerRuntimes/server04/JVMRuntime/server04’)print x.getHeapFreeCurrent()

B.

connect(‘weblogic’,‘Welcome1’,‘host02.acme.com:7201’)serverRuntime()x = getMBean(‘/JVMRuntime/server04’)print x.getHeapFreeCurrent()

C.

connect(‘weblogic’,‘Welcome1’,‘host00.acme.com:7001’)serverRuntime()x = getMBean(‘/JVMRuntime/server04’)print x.getHeapFreeCurrent()

D.

nmConnect(‘weblogic’,‘Welcome1’,‘host02.acme.com:5556’)serverRuntimes()x=getMBean(‘/server04/JVMRuntime/server04’)print x.getHeapFreeCurrent()

E.

nmConnect(‘weblogic’,‘Welcome1’,‘host00.acme.com:5556’)domainRuntime()x=getMBean(‘/ServerRuntimes/server04/JVMRuntime/server04’)print x.getHeapFreeCurrent()

You need to ensure that when a failed admin server instance is restarted on another machine with a different IP address, the managed server is able to establish connection with the newly started instance.

Which technique will ensure that the connection can be made? (Choose the best answer.)

A.

Configure a DNS name for AdminServer which maps to multiple IP addresses and specify this DNS name during managed server startup.

B.

Specify multiple admin server IP addresses during managed server startup.

C.

Use WLST to update the AdminServer IP address for a running managed server.

D.

Update the host file for a running managed server instance.

In order to increase scalability and high availability you are configuring WebLogic clustering with JMS distributed destinations.

Which recommendation will ensure optimal load balancing of the message processing?

A.

The machines that host the cluster should have similar processing power, disk space, and memory.

B.

The cluster should include at least one configurable server.

C.

The cluster should use unicast communication.

D.

All servers in the cluster should be assigned to the same WebLogic machine.

A hardware load-balancer (HWLB) is positioned as the primary entry point into your WebLogic Server domain. Aspects of your application use SSL to protect data on the network from your clients to your domain.

Which configuration provides the best performance for your domain? (Choose the best answer.)

A.

Configure the HWLB to use an SSL hardware accelerator and terminate SSL.

B.

Configure the HWLB to use pass-through SSL, configure an SSL hardware accelerator on WebLogic, and terminate SSL.

C.

Configure the HWLB to delegate SSL handling to the WebLogic Proxy Plug-in and terminate SSL.

D.

Configure the HWLB to use pass through SSL to the WebLogic Server that it connects to, and terminate SSL.

You are tasked with doing a rolling upgrade of a production domain that will minimize service interruptions.

Which is a characteristic of a rolling update? (Choose the best answer.)

A.

All the managed servers and node managers need to be shut down.

B.

Configuration changes can be made during the rolling update process.

C.

An automated backup is part of the rolling update process.

D.

The machine hosting the Administration Server must be upgraded first.

E.

A major upgrade, for example 11g to 12c, can be accomplished with a rolling update.

I am configuring the security policy for my JMS module. I am specifying some security conditions for the module.

Which two security conditions are valid in this context? (Choose two.)

A.

The JMS module can be accessed only between 1 pm and 6 pm.

B.

The JMS module should throw a custom security exception on invalid access.

C.

The JMS module can process only 50 messages at a time.

D.

The JMS module can be accessed only by users belonging to the Operators group.

E.

The JMS module can be accessed in a receive-only mode.

You are configuring the principals needed to fulfill the security requirements of an application within a sandbox environment that uses the WebLogic Server-embedded LDAP server.

The given security requirements provided have outlined the following facts about some test principals:

One security requirement states that internal patient data can be viewed only by physicians who are employees.

What is an appropriate way to fulfill this security requirement from a principal perspective using the provided information?

A.

Create an authorization policy that grants access if a user is a member of the physicians group and their employee attribute is true,bypassing the use of a role entirely.

B.

Create an ACL that grants access if a user is a member of the physicians group and their employee attribute is true,bypassing the use of a role entirely.

C.

Create authorization policies for individual users whose employee attribute is true creating a constraint-only model,bypassing the use of a role entirely.

D.

Create an authorization policy that denies access if a user is a member of the physicians group and their employee attribute is false,bypassing the use of a role entirely.

What is the file extension for a domain extension template? (Choose the best answer.)

A.

.jar

B.

.zip

C.

.ext

D.

.tpl

E.

.war

F.

.ear