Identify two true statements about an Oracle WebLogic Server JMS Connection Factory.
A. A default JMS Connection Factory exists and is named weblogic.jms.connections
B. A Connection Factory can be targeted to only one WebLogic Server.
C. A JMS Connection Factory's Default Priority and Default Time-to-Live attribute cannot be modified after the Connection Factory is created.
D. A JMS Connection factory can be created as a system module resource within the administration console.
Your production JMS server and/or its consumers are not able to handle the incoming message workload. The number of messages on the server never stabilizes
and the server eventually becomes overload.
Which JMS server attribute will best help prevent the JMS server from being overloaded by producers?
A. Producer Pause High
B. Messages Threshold High
C. Reconnect Polity
D. Paging Directory
E. Pool Maximum Capacity
Identify two reasons for defining machines and assigning servers to them in Weblogic Server.
A. A machine can be the proxy to a cluster.
B. A machine definition is required to configure the Node Manager.
C. To reference an instance of WebLogic Server, you must know its machine and port.
D. Machine is a required organizational unit. A domain contains machines and machines contain servers.
E. WebLogic Server uses server machine assignments to help it choose servers in a cluster on which to replicate session state.
F. The machine's Cluster Weight attribute may be used by load balancers to help them determine how often to send requests to servers assigned to that machine.
Refer to the Exhibit What is the meaning of the yellow triangle icon next to Listen Address?
A. This attribute has no value.
B. The server must be running to change this attribute.
C. The server must be shut down to change this attribute.
D. The server must be restarted for a change to this attribute to take effect.
E. This attribute is read only and cannot be changed in the administration console
When you use the Embedded LDAP that is supplied by Oracle WebLogic Server, which three statements are true?
A. The Embedded LDAP can be used to store user, group, security roles and security policies for the WebLogic security providers.
B. The Embedded LDAP uses the file system to store Weblogic security provider data.
C. The Embedded LDAP can be accessed by an external LDAP viewer.
D. The Embedded LDAP cannot be used in a production environment
E. The Embedded LDAP can store Auditing Data.
View the exhibit.
You are logged in to the WebLogic Server administration console and you are editing the fields shown in exhibit. Which type of WebLogic Server resource are you currently editing?
A. JMS Server
B. Persistent Store
C. JDBC Data Source
D. Diagnostics Module
E. JMS Connection Factory
A domain created based on the Basic WebLogic Server Domain product has start scripts called startWebLogic.sh and startManagedWebLogic.sh (.cmd in Windows). Which three statements are true?
A. startWebLogic.sh starts Node Manager.
B. startWebLogic.sh has a required parameter.
C. startManagedWebLogic.sh has a required parameter.
D. startWebLogic.sh starts the Administration Server of the domain.
E. startManagedWebLogic.sh can start any managed server in the domain.
F. Both scripts can start any WebLogic Server, but each has different default parameter values.
Consider a domain with an existing JDBC data source, which connects to an Oracle database. Your administrator requests that the JDBC connections to this database now specify a different username. Which data source attribute would you modify to implement this requirement?
A. Properties
B. Credentials
C. Initial Capacity
D. Test Table
E. URL
You are deploying an EAR by using the administration console. You are part way through the process. In the administration console, you see that the EAR has the State of "Prepared." What can you do in the administration console to bring the deployment to the "Active" State?
A. Select it and click the Install button.
B. Select it, and then from the Install drop-down list, select "Servicing all requests"
C. Select it, and then from the update drop-down list, select "Servicing all requests"
D. Select it, and then from the Start drop-down list, select "Servicing all requests"
E. Select it, and then from the Start drop-down list, select "Servicing only administration requests"
Consider the following excerpt from mod_wl_ohs.conf:
WebLogicCluster 192.168.13.1:7001, 192.168.13.2:7001,192.168.13.2:7001
SetHandler weblogic-handler
Assuming that this is a valid is a valid configuration, which two conclusions can you make?
A. A web application name "welcome" is configured to use session replication.
B. A web application that uses the paths "welcome" is targeted to the cluster.
C. The proxy server will ignore any requests that contain the name "welcome."
D. The proxy server is listening on the host name "welcome."
E. A cluster exists that consists of at least two managed servers.
F. All cluster members are running on the same machine.