You want to configure an LDAP authentication provider in your domain. Which three pieces of information must you obtain from your LDAP administrator? (Choose three.)
A. Under the managed server's Services configuration select “JDBC” as the type for the transaction log store.
A. name attribute for user objects
B. Under the managed server's Services configuration, select “Disable the Default Store”.
B. connection pool maximum size
C. Create a non-XA data source in the domain for the database transaction log.
C. base DN for group objects
D. Create an XA data source in the domain for the database transaction log.
D. realm name
E. host name and port
While using the Configuration Wizard to create a new domain, you do not set the Listen Address for the administration server and accept the default value. What is the result?
A. Option A
A. Server startup fails
B. Option B
B. The server binds to localhost
C. Option C
C. The server prompts for an address when it is started the first time
D. Option D
D. The server attempts to bind to all network interfaces on the host OS
E. Option E
Which two statements are characteristics of the Reconfiguration Wizard? (Choose two.)
A. Include the JAR file as an optional package
A. You can upgrade any domain that was created using WLS 9.2 and above
B. Deploy the JAR file as an EJB
B. The Reconfiguration Wizard allows you to change the domain mode
C. Deploy the JAR file as a shared library
C. The Reconfiguration Wizard allows you to select a different Java JDK
D. Place the JAR file in the lib folder of the domain
D. The Reconfiguration Wizard does not allow the reconfiguration of JDBC data sources
E. Deploy the JAR file to the administration server. All managed servers have access to their admin server
E. You can upgrade only a domain which is running WLS 10.3.x or later
F. Add the JAR file to the CLASSPATH of the domain servers by editing the domain’s seyDomainEnv.sh script
G. Deploy the JAR file as another web application
H. Deploy the JAR file as a web service.
Select two true statements about WebLogic Server’s role in transaction management. (Choose two.)
A. Data sources are targeted to a domain.
A. You can configure WebLogic Server JTA properties at the domain, cluster, and server level
B. Data sources are bound in the JNDI tree of a server.
B. WebLogic Server can act as the transaction manager for multiple transactional resource managers during a distributed transaction
C. Data sources are based on the JMS specification.
C. WebLogic Server supports transactional work managers
D. A data source contains a connection pool.
D. Starting with WebLogic Server 12c, you can create two kinds of clusters: the standard cluster, as in previous versions, and the new transactional cluster
E. A domain requires at least one data source.
E. WebLogic Server supports transactional Enterprise Java Beans
Consider a WebLogic Java EE application that uses a JDBC data source. Which three steps would the application developer typically write code to perform? (Choose three.)
A. Test the connection to verify the database’s availability
B. Add a new connection to the data source if none are available
C. Close the connection to return the connection to the data source
D. Request a connection from the data source
E. Look up the data source using the JNDI name
You successfully deployed an application on WebLogic 12c but notice that its deployment name is different than what you expected. After checking various places and making multiple deployment attempts, you decide to be on the safe side and just use the method that takes precedence over the others when setting the deployment name. Which method should you use to override the default deployment name?
A. Proxy plug-in or hardware load balancer
A. Define the name in the library’s manifest file
B. Configured or dynamic cluster
B. Configure the <module-name> element in web.xml
C. Replicated or persistent HTTP sessions
C. Run weblogic.Deployer with the –name option
D. Unicast or multicast communication
D. Set a computed name based on the deployment source file
E. Single or multiple domains
E. Set the <application-name> element in application.xml
The development group supplied you with the latest WAR file for the company web application. It has been thoroughly tested and needs to be placed into production. In the production file system, you copy over the previous WAR file with the new version. You log into the administration console and redeploy the application. Current uses continue to access the older version of the application, while new users are taken to the new version. Explain this scenario.
A. A server must be assigned a machine
A. This is only possible if the application is deployed to a cluster. Cluster deployments allow current users to continue to use the previous version of an application
B. A server must be assigned a listen port
B. This is possible if the application is versioned by using the WebLogic Server feature called Production Redeployment.
C. A server’s name cannot be changed after it is created
C. This is not possible. When an application is redeployed, it replaces the old version and all users than access the new version
D. A server can be associated with a server template
D. This is not possible. When an application is redeployed, all users continue to access the old version. Once all current users have exited the system, then all users from that point on access the new version
E. Servers can have duplicate names as long as they have unique ports
F. A server must be assigned a listen address
You are using the Embedded LDAP that is supplied by Oracle WebLogic Server. Which three statements are true? (Choose three.)
A. The Embedded LDAP can be accessed by an external LDAP viewer
B. The Embedded LDAP cannot be used in a production environment
C. The Embedded LDAP uses the file system to store WebLogic security provider data
D. The Embedded LDAP uses the database to store WebLogic security provider data
E. The Embedded LDAP can be used to store user, group, security roles and security policies for the WebLogic security providers
Over time your server log files have increased in size to over 500 MB. Identify three techniques to help decrease the size of these log files. (Choose three.)
A. You are using the Configuration Wizard to configure a script-based Node Manager.
A. Increase the severity level
B. The configuration Wizard prompts you to change the default Node Manager configuration values.
B. Redirect standard output to the log
C. The configuration Wizard bypasses all Node Manager Configuration.
C. Increase the rotation time
D. You are using the configuration Wizard to configure a Java-based Node Manager.
D. Create and use a custom log filter
E. You must manually copy the Node Manager files generated by the configuration Wizard into Node Manager home.
E. Decrease the rotation file size
The Configuration Wizard has a Node Manager option which, if selected, allows you to also configure a Node manager as you create your domain. Select two true statements about using the Configuration Wizard to configure Node Manager. (Choose two.)
A. Launch the JDBCDiagnostics utility.
A. You are required to enter the username and password for accessing Node Manager
B. Verify the Dependencies attribute of the data source.
B. You are allowed to choose the location of the Node Manager home
C. View the target server’s JNDI tree in the console.
C. You can select either the Java-based or script-based Node Manager
D. Verify that the application and data source have the same target.
D. After the Configuration Wizard creates the domain, it automatically starts the configured Node Manager
Consider a domain that includes a Node Manager home directory. One way to enroll each Node Manager with your domain is with the WLST command nmEnroll(). Select the two scenarios where you do not need to use this command to perform the same task? (Choose two.)
A. The Fast Connection Failover (FCF) pattern, which allows rapid failure detection, is enabled
A. The Node Manager is on the machine where the domain was created by using the Configuration Wizard
B. The more sophisticated runtime connection load balancing (RLCB) is used; without SCAN, load balancing reverts to a simple round-robin scheme
B. You create a managed server template by using the pack utility. Then create the domain by using the unpack utility on the new machine where Node Manager will run
C. SCAN is required for the GridLink data source to use an XA driver
C. Use the administration console. Select the machine, then the Configuration and Node Manager tabs. Select Enroll with the Domain. Save and activate your changes
D. The database URL is shorter because it contains one SCAN alias and port as opposed to a host and port for each RAC node
D. Use the script enrollNodeManager.sh found under the WEBLOGIC_HONE directory in server/bin
E. The data source configuration does not need to be updated when new nodes are added to the RAC cluster
You are responsible for installing and setting up WebLogic Server to support the development, testing, and production of an application. Each phase of the applications life cycle has different scalability, performance, and security requirements. How will you implement this?
A. Use WebLogic Administration Console > ”server2” link.
A. Create a single domain with three clusters
B. Use java weblogic.Deployer.
B. Create a single domain with three administration servers
C. You cannot, because attribute values are not inherited.
C. Create a single domain with three managed servers
D. Use WLST.
D. Create three domains
You start a managed server by running a start script at the command line. The server fails to start. To troubleshoot this failure, you look at the window in which the script ran. One of the messages form the server says: boot identity not valid. What do you do before running the script again?
A. Check the ownership and file system permissions of the start script
A. Add the option to the start script that allows servers to be started without credentials
B. Ensure you are currently logged in as a WebLogic Server administrator before running the script
B. Update the credentials in the boot identity file
C. Stop any running managed servers and then start the admin server
C. Update the credentials in the start script
D. After the restoration of a domain, you must start the admin by using WLST
D. Create a boot identity username and password by using the administration console
E. Be sure to start the admin server as the root user
E. The boot identity file does not exist. Create one.
You have been tasked with replacing an existing WebLogic domain with a brand new installation as part of a migration. The new server needs to use the previously created JDBC store that holds existing JMS messages. Which two configuration requirements do you need to comply with in order to make the transition successful? (Choose two.)
A. The channel is used for heartbeats so they do not interfere with replication communication
A. In Persistent Stores, create a new JDBC store and select the option “Use existing store”
B. Each server in the cluster must have this named replication channel configured on it
B. The new domain name needs to be the same as the old domain it’s replacing
C. If no replication channel is configured, then sessions are persisted to the file system or the database
C. Duplicate the JMS and persistent store configuration in the new domain
D. The channel can be used for stateful session bean replication
D. The storage needs to be file based and not JDBC based
E. The channel cannot use a secure protocol
E. Set the prefix for the JDBC store table to the domain name
You are running WebLogic Server under a 64-bit HotSpot JVM. You edit your domains setDomainEnc.sh script to update the minimum and maximum heap sizes as follows: USER_MEM_ARGS=-Xms32meg Xmx150meg Export USER_MEM_ARGS You try to start a managed server by running the domain start script at the command line. The server fails with the message: Invalid initial heap size: -Xms32meg Why does the server fail with that message?
A. You cannot do this from the admin console. You must use WLST or a JVM command- line tool.
A. The minimum heap size for a 64-bit JVM is 64 Megabytes
B. In the Monitoring > Performance tab, click Dump Thread Stacks.
B. For performance reasons, the minimum heap size and maximum heap size should be the same value
C. In the Monitoring > Threads tab, click Dump Thread Stacks.
C. The parameter value was entered incorrectly. The correct value is: “-Xms32m –Xmx150m”
D. In the Monitoring > Performance tab, click Garbage Collect.
D. The parameter value was entered incorrectly. You must enter memory parameter values in Kilobytes
E. In the Monitoring > Performance tab, click GC.
E. The parameter value was entered incorrectly. The correct value is: “-Xms:32meg – Xmx:150meg”