You are planning to use WebLogic JMS for implementing my enterprise messaging architecture. Which messaging paradigm is invalid in this context? (Choose the best answer.)
Which two statements are true about the role of cluster master in whole server migration? (Choose two.)
You are using the administration console to monitor messages in a queue.
Which three tasks can be performed while doing this monitoring? (Choose three.)
You are asked to create a WLST script to make live updates to a domain that has its administration server running. You want your script to mimic the actions of a WebLogic administrator by using the administration console and clicking the “Lock and Edit” button.
What commands would accomplish this?
Examine the domain diagram:
What is the correct path within the configuration hierarchy to the MBean that contains the log rotation parameters for server04? (Choose the best answer.)
You intend to introduce ordering in message processing for your JMS destination by creating a destination key.
Which statement is true about the JMS Destination Key configuration? (Choose the best answer.)
In order to increase scalability and high availability you are configuring WebLogic clustering with JMS distributed destinations.
Which recommendation will ensure optimal load balancing of the message processing?
You are required to configure a Coherence cluster for a WebLogic domain. Review the image below for the architecture of the WebLogic domain.
The configuration represents the following:
Based on this configuration, what is the typical configuration of a Coherence cluster for this domain?
You are creating a Domain Template to simplify the process of deploying a domain across multiple hosts.
Which five types of information can be included in a Domain Template? (Choose five.)
You are troubleshooting an application that uses a WebLogic server data source. You decide to execute a reset() operation on the corresponding JDBCDataSourceRuntimeMBean.
Which statement is true regarding the impact on the application that is using that data source? (Choose the best answer.)
Your development team is considering several different types of new applications. You have been asked to advise them concerning which types can be deployed in WebLogic Server leveraging the Production Redeployment feature.
Which application deployment type is NOT supported for Production Redeployment? (Choose the best answer.)
You are monitoring a WebLogic JDBC data source and have decided to drop some connections because an earlier peak usage condition has now ended. In addition, this data source has not been enabled for automatic shrinking.
What will occur once you execute the shrink() method on that JDBCDataSourceRuntimeMBean?
You are required to configure SSL for an instance of WebLogic Server in a production environment. You have already created your self-signed certificate within the myKeyStore.jks keystore. You must now obtain a new digital certificate from a trusted Certificate Authority.
Which command do you use to start the process? (Choose the best answer.)
You are using the WebLogic Diagnostic Framework (WLDF) to monitor your domain for certain scenarios based on runtime data of your running servers. Different groups are responsible for different aspects of the application.
As a result, your configuration must fulfill the following requirements:
How would you configure WLDF watches and notifications to achieve this result? (Choose the best answer.)
Some of the messages entering a JMS queue are expiring and are being removed from the queue. You need better insight regarding these expired messages.
Which mechanism helps achieve this? (Choose the best answer.)
I am sending a set of ten JMS messages. I want all of these messages to be sent successfully or none at all.
Which JMS Session feature is most suitable for implementing such a scenario? (Choose the best answer.)
In order to leverage replication and high availability features of your back-end database, among other benefits, you are configuring a JDBC TLOG store to persist transaction logs.
Since something went wrong during the setup of the TLOG, you are reviewing the configuration considerations for TLOG.
Which two guidelines are true for configuring JDBC TLOG stores? (Choose two.)
Even though your company has a thorough procedure for testing applications in a pre-production environment prior to production deployment, you have decided to conduct additional testing of a particular application after it is deployed. You choose to deploy the application in administration mode.
Which three statements are true? (Choose three.)
You are considering targeting your JMS servers to dynamic clusters to benefit from dynamic scaling. However, you have been advised to keep in mind some of the associated limitations.
What are two valid limitations and considerations for clustered JMS services? (Choose two.)
Which are three valid actions of the Post Domain Creation process? (Choose three.)
You are tasked with configuring a proxy tier for a WebLogic Server domain that has managed Coherence servers configured.
What must the Coherence cache configuration file include as part of this task? (Choose the best answer.)
Which two statements correctly describe the WLST nmGenBootStartupProps command? (Choose two.)
My JMS Server uses a persistent file store. I need to ensure that the size of the persistent store does not exceed 1GB.
Which option can I use to configure this? (Choose the best answer.)
In your production environment, you have deployed an application that is accessing a registered Java EE shared library as well as an application deployment plan. In addition, both the library and the application use annotations for some of their configuration properties. You are attempting to understand the current state of the properties that have been used in this deployment.
From greatest to least, what is the correct order of precedence that is used by WebLogic Server when applying configuration properties during deployment? (Choose the best answer.)
What is the file system location and command for starting the Domain Template Builder? (Choose the best answer.)
You are designing an application that uses JMS transactions to coordinate a group of messages for production and consumption, treating messages sent or received as an atomic unit.
What are two ways you can use transactions in JMS? (Choose two.)
Which three types of information can an Extension Template contain? (Choose three.)
Your WebLogic domain is experiencing a problem. You want to use the WebLogic Diagnostic Framework (WLDF) to diagnose the problem. You have a support case open with Oracle Support, and they have requested a diagnostic image of your server that is experiencing the problem.
The problem is not predictable or reproducible on-demand, but you noticed that the number of requests waiting to execute increases dramatically when the problem does occur. The problem also seems to occur at any time of the day or night.
How would you approach reliably capturing a diagnostic image that contains data that is relevant to the problem that is occurring?
The image below depicts a high-level diagram of configuration auditing within WebLogic Server. When Administrators make configuration changes to the WebLogic Server domain, those changes are sent to the audit provider for logging.
What task must be performed in order to make configuration audit messages in the log meaningful to an observer?
You are tasked with doing a rolling upgrade of a production domain that will minimize service interruptions.
Which is a characteristic of a rolling update? (Choose the best answer.)
Which three statements correctly describe a relationship between Node Manager and Administration Server? (Choose three.)