Which three statements are true about WebLogic clusters?
A. Clusters provide clients with transparent failover.
B. EJB applications can be targeted to entire cluster.
C. All cluster members must bind to the same port number.
D. Cluster members replicate application data by using heartbeats.
E. Cluster members can be associated with one or more domains.
F. Web applications require a proxy in order to be used in a cluster.
As part of troubleshooting an application, you need to analyze the HTTP session count and the server heap size over the past six hours. You are using the Administration console. You want to view both metrics together and correlate their values.
Which three steps should you take in the Administration console?
A. Create a custom view.
B. Start the JVM Runtime view.
C. Drag each metric onto two charts in the same view.
D. Access the Monitoring Dashboard.
E. Click the application's Monitoring tab.
You want to configure WebLogic server transactions to be recoverable when a nonclustered managed
server crashes, even if that crash is caused by an unrecoverable hardware failure. You want to run the
managed server on different hardware, and have it recover the transactions that were in-progress at the
time of the crash.
You also want to use the default store for transaction logs.
Which statement is true?
A. This scenario is not possible .You must use the JDBC store to recover transactions from a crashed server.
B. This scenario is not possible. You must use clustered managed servers to recover transactions from a crashed server.
C. This scenario is common , and so the default configuration of the default store works.
D. Before the crash ,you need to update the path to the default store for the managed server. The path should be to some shared storage location.
E. After the crash, obtain a copy of the managed server's default store from the administration server. Move it to the same relative location on the new hardware before starting the managed server there.
You are carrying out the RDBMS Security Store configuration using the configuration Wizard Which three actions can you perform with the Configuration Wizard during the process?
A. Create tables in the data store.
B. Execute SQL scripts in WebLogic server's server /1ib directory.
C. Populate the database tables with external LDAP users.
D. Test the connection to a back –end database.
E. Allocate tablespace for the data store.
You domain's security realm has two authentication provides :1dap1 and 1dap2.
Consider these requirements:
If authentication succeeds with 1dap1, then skip 1dap2.
If authentication fails with 1dap1, then authentication must succeed with 1dap2.
Which control flag should you use for 1dap1?
A. Required
B. Requisite
C. Sufficient
D. Optional
You create a new Work Manager to control how server threads are allocated to an application's increasing requests . You want to further configure the criteria of the Work manager by using a Request class.
Identify three valid Request classes that you can to a work manager.
A. Uniform Distribution Request class
B. Response Time request class
C. Max Throughput Request class
D. Fair share Request class
E. Context Request class
You want to restart a failed stand-alone managed server. Select the two true statements.
A. Before restarting a failed managed server you must always first use operating system commands to kill its old process.
B. The managed server can automatically be restarted on new hardware if server migration has been properly set up.
C. If the managed server was started by Node Manager, then Node Manager can be set to automatically restart the managed server.
D. If the managed server was started by a script, run the script again.
Over time your server log files have increased in size to over 500 MB. Identify three techniques to help decrease the size of these log files. (Choose three.)
A. Increase the severity level
B. Redirect standard output to the log
C. Increase the rotation time
D. Create and use a custom log filter
E. Decrease the rotation file size
You successfully deployed an application on WebLogic 12c but notice that its deployment name is different than what you expected. After checking various places and making multiple deployment attempts, you decide to be on the safe side and just use the method that takes precedence over the others when setting the deployment name. Which method should you use to override the default deployment name?
A. Define the name in the library's manifest file
B. Configure the
C. Run weblogic.Deployer with the –name option
D. Set a computed name based on the deployment source file
E. Set the
Which two statements are true when an Administration Server is compared to a Managed Server? (Choose two.)
A. An administration Server manages the domain configuration
B. A domain must have at least one of each type of server
C. An administration Server keeps a domain log, but a Managed Server does not
D. A Managed Server keeps a server log, but an Administration Server does not
E. Java EE applications are deployed only to a Managed Server