2Oracle Weblogic Server 11g System Administration I 1Z0-102

Description

Certificação Oracle Weblogic Quiz on 2Oracle Weblogic Server 11g System Administration I 1Z0-102, created by Dielly Rodrigues on 05/08/2014.
Dielly Rodrigues
Quiz by Dielly Rodrigues, updated more than 1 year ago
Dielly Rodrigues
Created by Dielly Rodrigues over 10 years ago
563
0

Resource summary

Question 1

Question
You monitor a running JMS topic with the console and note the following values: Consumers Current = 3 Message Current = 1 Message Pending = 0 These values do not change for several minutes. Which is the most plausible explanation?
Answer
  • A. Production on the topic has been paused.
  • B. A message arrived after a durable subscribe disconnected from the topic.
  • C. One of the consumers received a message but did not acknowledge it.
  • D. None of the consumers are durable subscribes.

Question 2

Question
Which statement best describes WebLog’s default application staging behavior?
Answer
  • A. The Administration Sever distributes application files when the application is first accessed by a client
  • B. The Administration Sever copied application files to a database that is shared with the Managed Servers.
  • C. The Managed Servers obtain application files from a disk that is shared with the Administration Server.
  • D. The Administration Sever distributes copied of application files over the network to the Managed Servers.

Question 3

Question
Indentify two valid elements that can belong in the weblogic-application.xml deployment descriptor.
Answer
  • A. <shared-library-reference>
  • B. <library-ref>
  • C. <app-scoped-ref>
  • D. <work-manager>

Question 4

Question
You create a system-wide JMS module named Payroll-JMS and set its default target to an existing cluster in your domain named PayrollCluster. Next, you add a standard JMS topic to Payroll-JMS. To which are you permitted to target this topic?
Answer
  • A. the entire PayrollCluster
  • B. any single JMS server in the domain
  • C. any combination of member servers in Payrollcluster
  • D. several JMS servers targeted to PayrollCluster

Question 5

Question
The project’s architect has provided you with a design diagram that identifies the key components of the new insurance system. From the diagram, you can clearly see that JMS will be used as the communication channel between several applications. Identify four tasks that you may need to perform to support this design.
Answer
  • A. Create a JMS server
  • B. Create a JMS message template
  • C. Add JMS destinations to a JMS module
  • D. Add a JMS module to a JMS factory
  • E. Target JMS destinations to JMS servers
  • F. Target a JMS server to a WebLogic Server
  • G. Target a JMS module to a JMS store

Question 6

Question
Which three statements are true about the Node Manager?
Answer
  • A. The Node Manager can restart the Managed Serves that have failed.
  • B. The Node Manager should be run as either a daemon or a service so that if the host computer is rebooted, the Node Manager will also be automatically started.
  • C. The Node Manager runs on a different host from the Managed Server it is controlling.
  • D. The Node Manager can start a Managed Server the first time the Managed Server starts if the Administration Server is unavailable because MSI mode is enabled by default.
  • E. The Node Manager allows you to start Managed Servers from the administration console.

Question 7

Question
You have made several changes to variable attributes on a managed server within a domain. You first locked the console, made some nondynamic changes, made some dynamic changes as well, and then activated your changes. Which statement is true?
Answer
  • A. All the changes that you made on the server will take effect immediately.
  • B. The dynamic changes that you made will take effect immediately and the changes that are nondynamic will take effect after the server is restarted.
  • C. The changes that you made on the server will not take effect until you restart the server.
  • D. You will receive an error because you cannot make dynamic and nondynamic changes to a server at the same time.

Question 8

Question
When you use the Embedded LDAP that is supplied by Oracle WebLogic Server, which three statements are true?
Answer
  • A. The Embedded LDAP can be used to store user, group, security roles and security policies for the WebLogic security providers.
  • B. The Embedded LDAP uses the file system to store Weblogic security provider data.
  • C. The Embedded LDAP can be accessed by an external LDAP viewer.
  • D. The Embedded LDAP cannot be used in a production environment
  • E. The Embedded LDAP can store Auditing Data.

Question 9

Question
An application is deployed to your domain and its manifest indicates version 1.1. You then perform an application update by using a manifest that indicates version 1.2. Indentify two outcomes of this scenario.
Answer
  • A. The existing 1.1 clients are redirected to the 1.2 application
  • B. The existing 1.1 clients are shown a warning message.
  • C. The existing 1.1 clients continue to use the 1.1 application.
  • D. New clients are asked which version they wish to use.
  • E. New clients use only use 1.2 application

Question 10

Question
You are logged in to the WebLogic Server administration console and you are editing the fields shown in exhibit. Which type of WebLogic Server resource are you currently editing?
Answer
  • A. JMS Server
  • B. Persistent Store
  • C. JDBC Data Source
  • D. Diagnostics Module
  • E. JMS Connection Factory

Question 11

Question
You have 10 cluster managed servers in a domain. Due to the maintenance tasks currently in progress, two of the managed servers are in a “Shutdown” status. You have been asked to deploy an application. As a default behavior of WebLogic Server, which two statements are true?
Answer
  • A. The application cannot be deployed until the two managed servers are available.
  • B. The application can be deployed while the two managed servers are in “Shutdown” status. C. The application will be deployed to the eight managed servers that are running. The two managed servers that are in the Shutdown state will eventually receive the deployment when they are started again.
  • D. The application deployment will fail and the application will not be deployed to any managed server in the cluster.
  • E. The application deployment will fail and the eight managed servers that are running will transition to “Admin” state.

Question 12

Question
An application fails. The exception indicates that the JDBC data source, jdbc-hr.HRDS, cannot be found. Identify two possible steps that you can perform to verify the data source’s availability.
Answer
  • A. Launch the JDBCDiagnostics utility.
  • B. Verify the Targets attribute of the application.
  • C. Verify the Dependencies attribute of the data source.
  • D. Verify the target server’s JNDI tree in the console.
  • E. Verify the Target attribute of the data source.

Question 13

Question
Indentify three ways to create a domain template.
Answer
  • A. Administration console
  • B. Domain Template Builder
  • C. unpack command
  • D. pack command
  • E. Node Manager
  • F. WLST
  • G. Configuration Wizard

Question 14

Question
What is the default Staging Mode for servers?
Answer
  • A. No-Stage
  • B. Stage
  • C. External Stage
  • D. Use the defaults defined by the deployment targets
  • E. Copy the application onto every target for me

Question 15

Question
When using the Install Application Assistant in the administrator console, what are the two options that may select for “Choose Targeting Style”?
Answer
  • A. Choosing “Install this deployment as a resource” will allow you to deploy any type of resource archive
  • B. Choosing “Install this deployment as a library” will allow you to deploy any archive, which can be referenced by other applications.
  • C. Choosing “Install this deployment as expanded format” allow expanded directories to be utilized.
  • D. Choosing “Install this deployment as an application” will allow you to deploy any archive or extended directory
  • E. Choosing “Install this deployment as a stand-alone library” will allow you to deploy a library, which can be used only by nonclustered servers.

Question 16

Question
You wish to provide failover for HTTP sessions within a cluster. However, you are limited by the following constraints: 1. While under load, your servers have very little free memory. 2. you do not have appropriate access rights to modify your company’s database. Which is the best option, given these restrictions?
Answer
  • A. in-memory replication
  • B. automatic migration
  • C. file persistence
  • D. JDBC persistence
  • E. replication groups

Question 17

Question
Indentify three tools that you can use to create a deployment plan.
Answer
  • A. administration console
  • B. weblogic.PlanGenerator
  • C. the /autodeploy folder that is locked in the domain directory
  • D. developer tools such as JDeveloper or Eclipse
  • E. the /plan subfolder that resides outside the application archive

Question 18

Question
While creating a new domain in the Configuration Wizard, there are two types of machines that may be configured. Indentify them.
Answer
  • A. Machine and Windows machine
  • B. administrator machine and managed machine
  • C. machine and Unix machine
  • D. stand-alone machine and cluster machine

Question 19

Question
You previously deployed an application but later decide to change various configuration parameters, such as timeouts. You access the application’s Configuration tab in the console and make your configurations, as shown in the Exhibit. In which file does WebLogic record these modifications?
Answer
  • A. config.xml
  • B. weblogic.xml
  • C. Application.xml
  • D. Plan.xml

Question 20

Question
Identify four features of the default administration console.
Answer
  • A. XML Editor
  • B. WLST Editor
  • C. Breadcrumbs
  • D. Change Center
  • E. Template Builder
  • F. Domain Structure
  • G. Configuration Wizard
  • H. WLST Script Recorder

Question 21

Question
You wish to restrict access to a JMS queue so that only specific accounts may receive messages from the queue. Identify two steps that, when performed together, implement this security requirement.
Answer
  • A. Create a policy for queue’s URL pattern.
  • B. Add a policy to the queue and associate it with a role.
  • C. Configure an identify assertion provider.
  • D. Acquire the domain configuration lock.
  • E. Create a global role and assign users to it.

Question 22

Question
A domain created based on the Basic WebLogic Server Domain product has start scripts called startWebLogic.sh and startManagedWebLogic.sh (.cmd in Windows). Which three statements are true?
Answer
  • A. startWebLogic.sh starts Node Manager.
  • B. startWebLogic.sh has a required parameter.
  • C. startManagedWebLogic.sh has a required parameter.
  • D. startWebLogic.sh starts the Administration Server of the domain.
  • E. startManagedWebLogic.sh can start any managed server in the domain.
  • F. Both scripts can start any WebLogic Server, but each has different default parameter values.

Question 23

Question
Which answer best describes how you can start the Java-based version of the Node Manager?
Answer
  • A. W1scontrol.sh (.cmd in Windows)
  • B. Wisifconfig.sh (.cmd in Windows)
  • C. startNodeManager.sh (.cmd in Windows)
  • D. startNM.sh (.cmd in Windows)

Question 24

Question
Which two statements are true about Log Filters?
Answer
  • A. Log Filters are created at the domain level.
  • B. You do not have to lock the configuration to create Log Filters.
  • C. You can apply a Log Filter to the server log, but not to standard out.
  • D. The administration console assists in the creation of Log Filter expressions

Question 25

Question
Consider a domain with an existing JDBC data source, which connects to an Oracle database. Your administrator requests that the JDBC connections to this database now specify a different username. Which data source attribute would you modify to implement this requirement?
Answer
  • A. Properties
  • B. Credentials
  • C. Initial Capacity
  • D. Test Table
  • E. URL

Question 26

Question
Which two are typically found in the WEB-INF folder of a Java web application?
Answer
  • A. the web application HTML and JSP files
  • B. the classes directory containing the compiled classes
  • C. the web.xml deployment descriptor
  • D. the weblogicserver.xml deployment descriptor

Question 27

Question
Which four tasks can be accomplished in the administration console only after the configuration is locked?
Answer
  • A. deploying an application
  • B. changing console preferences
  • C. creating a new JMS Server
  • D. monitoring the health of a server
  • E. enabling the Administrator Port
  • F. creating a new Managed Server
  • G. adding a new user to the default authentication provider

Question 28

Question
A web application called sales was deployed and is currently “Active”. It is targeted to managed1 and managed2. The developers have given you an upload WAR file and you have replaced the original WAR file with it. From the directory where the WAR file resides, you run the following weblogic.Deployer command: java weblogic.Deployer –adminurl t3://192.168.1.101:7001-username weblogic –password welcom1 –name sales –redeploy Which statement best describes what happens?
Answer
  • A. The command fails because no target was specified.
  • B. The application is deployed to the Administration Server because no target was specified.
  • C. The application is deployed to whichever server is running at 192.168.1.101:7001.
  • D. The application is deployed to managed1 and managed2 because that is where it is currently targeted.

Question 29

Question
When creating a new Managed Server using the administration console, which two points must be considered?
Answer
  • A. The Server Name must be unique within the domain.
  • B. After you assign a Listen Port value for the server, you cannot change it
  • C. The Listen Port value must be unique for ever server.
  • D. The Server Name cannot be changed after you have created the server.

Question 30

Question
Indentify two attributes of a JMS server.
Answer
  • A. Target
  • B. Persistent Store
  • C. Destination
  • D. Connection Factory
  • E. Store and Forward

Question 31

Question
The master Embedded LDAP has the capability to back up its data. Which statement is true?
Answer
  • A. The Managed Servers should be shut down when backups are being performed on the Embedded LDAP.
  • B. The backup feature is enabled by default.
  • C. The backup featureof the Embedded LDAP should be enabled for all the servers in the domain on a per-basis.
  • D. The backup is stored in a comma-separated variable format.

Question 32

Question
Indentify two requirements for in-memory session replication.
Answer
  • A. Clusters must contain an even number of members.
  • B. Web applications must be configured to use replication.
  • C. Web applications must be deployed as an archive file.
  • D. Cluster members must be started by using the Node Manager.
  • E. Web applications must be accessed via a proxy that supports session cookies

Question 33

Question
You are deploying an EAR by using the administration console. You are part way through the process. In the administration console, you see that the EAR has the State of “Prepared.” What can you do in the administration console to bring the deployment to the “Active” State?
Answer
  • A. Select it and click the Install button.
  • B. Select it, and then from the Install drop-down list, select “Servicing all requests”
  • C. Select it, and then from the update drop-down list, select “Servicing all requests”
  • D. Select it, and then from the Start drop-down list, select “Servicing all requests”
  • E. Select it, and then from the Start drop-down list, select “Servicing only administration requests”

Question 34

Question
Your domain includes a cluster of five servers, but only three are currently running. A colleague then uses the administration console to install and deploy a new EJB application to the cluster. By default, which outcome would you expect?
Answer
  • A. The application deploys successfully on the three servers that are running.
  • B. The deployment fails because the entire cluster is not running.
  • C. The deployment succeeds, but the application is not accessible.
  • D. The user is prompted to start the two unavailable servers before continuing.
  • E. The two unavailable servers are automatically removed from the cluster.

Question 35

Question
Consider an IT infrastructure comprising several web and EJB applications. Each application is expected to handle significantly different workloads, and therefore has different resource and scalability requirements. Which is the best solution for this scenario?
Answer
  • A. Configure a dedicated server for each application.
  • B. Configure a separate cluster for each application.
  • C. Configure a separate domain for each application.
  • D. Configure a separate proxy for each application.

Question 36

Question
Which two statements are true about cluster configuration?
Answer
  • A. A server must be running before it can be added to a cluster.
  • B. You cannot define cluster membership through the Configuration Wizard.
  • C. The console allows you to add new and existing servers to a cluster.
  • D. The console allows you to add an administration server to a cluster.
  • E. You cannot remove a server that is running from a cluster.

Question 37

Question
Which four statements are true about WLST?
Answer
  • A. You can create a domain with WLST.
  • B. WLST commands are case-insensitive.
  • C. You can shut down servers with WLST.
  • D. All WLST commands include parentheses.
  • E. WLST is based on the Perl scripting language.
  • F. You can connect to any server through WLST.
  • G. The Administration Server needs to be running to use WLST.

Question 38

Question
Indentify two server attributes that you must configure to communicate with the server via HTTPS.
Answer
  • A. SSL Listen Address
  • B. SSL Listen Port
  • C. SSL Listen Port Enabled
  • D. Production Mode Enabled
  • E. Startup Mode

Question 39

Question
Consider a cluster of four servers: ServerA, ServerB, ServerC, and ServerD. The cluster hosts a web application and is accessed using a proxy pug-in. This web application is configured to use in-memory session replication. A user is directed to ServerA. An HTTP session is established on ServerA and is also replicated to ServerC. If ServerA subsequently fails, which server will this user be redirected to?
Answer
  • A. none; the user will receive an error message
  • B. ServerB
  • C. ServerC
  • D. ServerD
  • E. Any other available server

Question 40

Question
Which three techniques can create a new WebLogic domain?
Answer
  • A. Configuration Wizard
  • B. Domain Template Builder
  • C. WLST
  • D. Administration console
  • E. Unpack command
  • F. Node Manager

Question 41

Question
Which four tasks are required to use database persistence for JMS messages?
Answer
  • A. Assign a data source to a JDBC store.
  • B. Configure a data source’s delivery mode.
  • C. Assign a JDBC store to a JMS server.
  • D. Create a JDBC data source.
  • E. Disable a server’s file store.
  • F. Create a JDBC store.

Question 42

Question
When describing a WebLogic domain, which three statements are true?
Answer
  • A. A domain may be set up in either Production Mode Production Mode or Development Mode.
  • B. All instances of WebLogic Server must be defined within a domain.
  • C. The domain configuration is stored in Oracle database by default.
  • D. Any instance of WebLogic Server may update the domain configuration
  • E. The security realm for a domain is optional.
  • F. A domain maybe created by using the Configuration Wizard.

Question 43

Question
You are responsible for configuration a WebLogic domain to support an order processing application. This application will communicate with multiple JDBC data sources to fulfill each customer order. To maintain data integrity across these databases, work will be performed within a global transaction. However, you have learned that one of the data sources in the transaction does not have an XA driver. Which option should you select on this non-XA data source to ensure that orders are still processed as global transactions?
Answer
  • A. Ignore Heuristics
  • B. Planned to Thread
  • C. Password Encrypted
  • D. Logging Last Resource
  • E. Test Connections on Reserve

Question 44

Question
You are installing Oracle WebLogic Server 11g for some new developers in the department. They have asked for a very generic installation for development and want you to ensure that the “MedRec” sample domain is included. What should you do to accomplish this?
Answer
  • A. Select the typical installation because the “MedRec” sample domain is included in it.
  • B. You won’t be able to do this, because all the samples were removed from the installer after 10g.
  • C. Select the custom installation and select Server Examples.
  • D. After installation, create a sample domain named “MedRec” by using the Configuration Wizard.

Question 45

Question
Consider the following excerpt from mod_wl_ohs.conf: <IfModule weblogic_module> WebLogicCluster 192.168.13.1:7001, 192.168.13.2:7001,192.168.13.2:7001 </IfModule> <Location /welcome> SetHandler weblogic-handler </Location> Assuming that this is a valid is a valid configuration, which two conclusions can you make?
Answer
  • A. A web application name “welcome” is configured to use session replication.
  • B. A web application that uses the paths “welcome” is targeted to the cluster.
  • C. The proxy server will ignore any requests that contain the name “welcome.”
  • D. The proxy server is listening on the host name “welcome.”
  • E. A cluster exists that consists of at least two managed servers.
  • F. All cluster members are running on the same machine.

Question 46

Question
Which two statements are true about data sources that have been created?
Answer
  • A. Data sources must be targeted to a server.
  • B. Data sources must be bound in the JDNI tree of a server.
  • C. Data sources are an Oracle WebLogic Server-specific feature.
  • D. Data sources are tied directly to a connection pool.
  • E. Data sources are required for a domain.
Show full summary Hide full summary

Similar

10 Basic English Questions - Quiz 1
Leo JC
Social Psychology, Milgram (1963)
Robyn Chamberlain
A Level: English language and literature technique = Dramatic terms
Jessica 'JessieB
Chemistry Module C1: Air Quality
James McConnell
Geography Coasts Questions
becky_e
Themes in Pride and Prejudice
laura_botia
AQA Biology B2 Questions
Bella Statham
GCSE AQA Chemistry - Unit 2
James Jolliffe
Health and Social Care Flashcards
Kelsey Phillips
Electrolysis
lisawinkler10
Core 1.3 Energy Generation, Storage and Use
T Andrews