Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

1z0-133 Exam Dumps - Oracle WebLogic Server 12c: Administration I

Question # 4

Over time your server log files have increased in size to over 500 MB. Identify three techniques to help decrease the size of these log files. (Choose three.)

A.

Increase the severity level

B.

Redirect standard output to the log

C.

Increase the rotation time

D.

Create and use a custom log filter

E.

Decrease the rotation file size

Full Access
Question # 5

You are using the Administration Console to monitor a resource.

Which three techniques can you use to customize the monitoring output? (Choose three.)

A.

Sort the rows by a specific column.

B.

Limit the number of rows displayed.

C.

Change the order of the displayed columns.

D.

Views the rows from a specific time range.

E.

Combine (add) multiple columns together.

Full Access
Question # 6

Which two statements are true about Log Filters? (Choose two.)

A.

You do not have to lock the configuration to create Log Filters

B.

Log Filters are created at the domain level

C.

The administration console assists in the creation of Log Filter expressions

D.

You can apply a Log Filter to the server log, but not to standard out

Full Access
Question # 7

You plan to install WebLogic Server by using the generic JAR installer in silent mode.

What are two ways to create the required response file? (Choose two.)

A.

First install or deinstall graphically. There is an option to save a response file.

B.

Use the sample response file in the installation documentation as a template.

C.

First run the Repository Creation Utility. There is an option to save a response file.

D.

The response file is not required. You can answer questions interactively at the command line.

E.

The genetic JAR installer does not have a silent mode, so you do not need a response file when using this installer.

Full Access
Question # 8

You are in the process of planning a deployment in which a single WebLogic cluster will host a web application. There are several options to consider.

Which is not a valid decision?

A.

Proxy plug-in or hardware load balancer

B.

Configured or dynamic cluster

C.

Replicated or persistent HTTP sessions

D.

Unicast or multicast communication

E.

Single or multiple domains

Full Access
Question # 9

You have been tasked with replacing an existing WebLogic domain with a brand new installation as part of a migration. The new server needs to use the previously created JDBC store that holds existing JMS messages.

Which two configuration requirements do you need to comply with in order to make the transition successful? (Choose two.)

A.

In Persistent Stores, create a new JDBC store and select the option “Use existing store”

B.

The new domain name needs to be the same as the old domain it’s replacing

C.

Duplicate the JMS and persistent store configuration in the new domain

D.

The storage needs to be file based and not JDBC based

E.

Set the prefix for the JDBC store table to the domain name

Full Access
Question # 10

You are working for a software company that mostly dealt with creating and reusing C++ and .NET objects. There are many COM (Component Object Model) components that have been created over time that provide standardized functionalities. Recently, platform independence has become a major consideration for your organization and you have deployed WebLogic Server12c. But you would like to make use of some of your prebuilt COM objects for request processing. You need an interim solution before implementing web services.

Which artifact within WebLogic Server helps you achieve your objective?

A.

Messaging Bridge

B.

IDL Mapper

C.

jCOM

D.

XMLRegistry

E.

COM2Java

Full Access
Question # 11

Your domain’s security realm has two authentication provides: ldap1 and ldap2.

Consider these requirements:

• If authentication succeeds with ldap1, then skip ldap2.

• If authentication fails with ldap1, then authentication must succeed with ldap2.

Which control flag should you use for ldap1?

A.

Required

B.

Requisite

C.

Sufficient

D.

Optional

Full Access
Question # 12

In your WebLogic Server environment, applications will not access a single database server. Instead they will access a cluster of redundant database servers. This database product was purchased from a vendor other than Oracle. You want to provide transparent failover to the applications as they communicate with the database cluster. Which type of WebLogic data source should you create?

A.

generic data source

B.

multi data source

C.

GridLink data source

D.

parallel data source

Full Access
Question # 13

You are using the Embedded LDAP that is supplied by Oracle WebLogic Server. Which three statements are true? (Choose three.)

A.

The Embedded LDAP can be accessed by an external LDAP viewer

B.

The Embedded LDAP cannot be used in a production environment

C.

The Embedded LDAP uses the file system to store WebLogic security provider data

D.

The Embedded LDAP uses the database to store WebLogic security provider data

E.

The Embedded LDAP can be used to store user, group, security roles and security policies for the WebLogic security providers

Full Access
Question # 14

You are responsible for configuring a WebLogic domain to support an order processing application. This application will communicate with multiple JDBC data sources to fulfill each customer order. To maintain data integrity across these databases, work will be performed within a global transaction. However, you have learned that one of the data sources in the transaction does not have an XA driver.

Which option should you select on this non-XA data source to ensure that orders are still processed as global transactions?

A.

Ignore Heuristics

B.

Pinned to Thread

C.

One Phase Commit

D.

Logging Last Resource

E.

Test Connections on Reserve

Full Access
Question # 15

Consider a cluster of four servers: ServerA, ServerB, ServerC, and ServerD.

The cluster hosts a web application and is accessed using a proxy plug-in. This web application is configured to use in-memory session replication.

A user is directed to ServerA. An HTTP session is established on ServerA and also replicated to ServerC, but ServerA subsequently fails. Which server will this user be redirected to?

A.

ServerD

B.

ServerB

C.

none; the user will receive an error message

D.

ServerC

E.

any other available server

Full Access
Question # 16

To support a growing application workload, you need to scale out an existing (nondynamic) cluster. You power up the new hardware and install WebLogic server.

Which two changes are mandatory for you to make to your domain configuration? (Choose two.)

A.

Create a new deployment plan.

B.

Create a new machine.

C.

Create a new server.

D.

Add a server to the cluster.

E.

Add a server to the machine.

F.

Add the cluster to the machine.

Full Access
Question # 17

Your developers created Plain Old Java Objects (POJO) that provide useful functionality. The code is packaged in a JAR file. You want to make this code accessible from all the applications deployed to the managed servers in your domain. What are the four ways to accomplish this? (Choose four.)

A.

Include the JAR file as an optional package

B.

Deploy the JAR file as an EJB

C.

Deploy the JAR file as a shared library

D.

Place the JAR file in the lib folder of the domain

E.

Deploy the JAR file to the administration server. All managed servers have access to their admin server

F.

Add the JAR file to the CLASSPATH of the domain servers by editing the domain’s seyDomainEnv.sh script

G.

Deploy the JAR file as another web application

Full Access
Question # 18

Each domain has a directory called servers that contains subdirectories for each server in the domain. Your domain has a managed server named managed1.

When will the managed1 directory be created?

A.

When the managed1 server is defined in the Configuration Wizard

B.

When the domain is created

C.

When the Administration Server comes up for the first time

D.

When the managed1 server comes up for the first time

Full Access
Question # 19

The Configuration Wizard has a Node Manager option which, if selected, allows you to also configure a Node Manager as you create your domain. Select two true statements about using the Configuration Wizard to configure Node Manager. (Choose two.)

A.

You are required to enter the username and password for accessing Node Manager

B.

You are allowed to choose the location of the Node Manager home

C.

You can select either the Java-based or script-based Node Manager

D.

After the Configuration Wizard creates the domain, it automatically starts the configured Node Manager

Full Access