Black Friday Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

1z0-134 Sample Questions Answers

Questions 4

Examine the illustration:

Which best describes the above illustration?

Options:

A.

depicts an Active GridLink Data Source between WebLogic Server and an Oracle Database service that includes two RAC nodes

B.

depicts a FAN-disabled Data Source between WebLogic Server and an Oracle Database service that includes two RAC nodes

C.

depicts a Multi Data Source between WebLogic Server and an Oracle Database service that includes two RAC nodes

D.

depicts a Data Source using SCAN between WebLogic Server and an Oracle Database service that includes two RAC nodes

Buy Now
Questions 5

You are planning to use WebLogic JMS for implementing my enterprise messaging architecture. Which messaging paradigm is invalid in this context? (Choose the best answer.)

Options:

A.

Point to Point messaging

B.

Publish Subscribe messaging

C.

Datagram messaging

D.

Persistent messaging

Buy Now
Questions 6

Which two statements are true about the role of cluster master in whole server migration? (Choose two.)

Options:

A.

There is exactly one cluster master in the cluster at a given point of time.

B.

The cluster master must host all the pinned services in the cluster.

C.

Any managed server in the cluster can serve as the cluster master.

D.

A cluster master must always be different from a singleton master.

E.

The cluster master must always be started with the node manager.

Buy Now
Questions 7

You are using the administration console to monitor messages in a queue.

Which three tasks can be performed while doing this monitoring? (Choose three.)

Options:

A.

Create a new message in the queue.

B.

Duplicate a message.

C.

Monitor the content of a message.

D.

Delete the message from the queue.

E.

Merge two messages.

F.

Alter the ordering of the messages.

Buy Now
Questions 8

You are asked to create a WLST script to make live updates to a domain that has its administration server running. You want your script to mimic the actions of a WebLogic administrator by using the administration console and clicking the “Lock and Edit” button.

What commands would accomplish this?

Options:

A.

edit() followed by startEdit()

B.

lockDomain() followed by edit()

C.

domainConfig() followed by cd(‘Edit’)

D.

getLock(0) followed by edit()

E.

clearPending() followed by lockDomain()

F.

lockDomain() followed by editDomain()

Buy Now
Questions 9

Examine the domain diagram:

What is the correct path within the configuration hierarchy to the MBean that contains the log rotation parameters for server04? (Choose the best answer.)

Options:

A.

B. /server04/log/rotation

B.

C. /Cluster01/server04/log

C.

/Machine02/server04/log

D.

E. /Logs/server04

E.

/TestDomain/server04/log

F.

/server04/log

Buy Now
Questions 10

You intend to introduce ordering in message processing for your JMS destination by creating a destination key.

Which statement is true about the JMS Destination Key configuration? (Choose the best answer.)

Options:

A.

A JMS Destination Key cannot be specified using WLST.

B.

A JMS Destination Key cannot be used to sort messages in a Last In First Out order.

C.

A JMS Destination Key allows a user-defined sort key.

D.

A Destination Key can be applied to the message body.

Buy Now
Questions 11

In order to increase scalability and high availability you are configuring WebLogic clustering with JMS distributed destinations.

Which recommendation will ensure optimal load balancing of the message processing?

Options:

A.

The machines that host the cluster should have similar processing power, disk space, and memory.

B.

The cluster should include at least one configurable server.

C.

The cluster should use unicast communication.

D.

All servers in the cluster should be assigned to the same WebLogic machine.

Buy Now
Questions 12

You are required to configure a Coherence cluster for a WebLogic domain. Review the image below for the architecture of the WebLogic domain.

The configuration represents the following:

  • Two WebLogic clusters of n number of servers each
  • One cluster contains an EAR deployment that contains a WAR module and a GAR module
  • One cluster contains a GAR deployment
  • Application data flows into the cluster with the EAR deployment and then to the cluster with the standalone GAR deployment

Based on this configuration, what is the typical configuration of a Coherence cluster for this domain?

Options:

A.

Single Coherence cluster that includes both WebLogic clusters.EAR cluster is storage-disabled.GAR cluster is storage-enabled.

B.

Single Coherence cluster that includes both WebLogic clusters/EAR cluster is storage-enabled.GAR cluster is storage-disabled.

C.

A Coherence cluster for each WebLogic cluster.EAR and GAR clusters use a replicated topology with storage enabled.

D.

Single Coherence cluster that includes both WebLogic clusters.EAR and standalone GAR clusters are both storage-enabled.

Buy Now
Questions 13

You are creating a Domain Template to simplify the process of deploying a domain across multiple hosts.

Which five types of information can be included in a Domain Template? (Choose five.)

Options:

A.

domain configuration, those included in the config.xml file

B.

Java Enterprise Edition (Java EE) applications and shared libraries

C.

Windows and UNIX server start scripts

D.

Windows Start menu entries

E.

custom folders and files

F.

LDAP data

G.

JTA log

Buy Now
Questions 14

You are troubleshooting an application that uses a WebLogic server data source. You decide to execute a reset() operation on the corresponding JDBCDataSourceRuntimeMBean.

Which statement is true regarding the impact on the application that is using that data source? (Choose the best answer.)

Options:

A.

A Reset is the equivalent of a Shutdown followed by a Start.

B.

A Reset is the equivalent of a Force Suspend followed by a Resume.

C.

A Reset is the equivalent of a Suspend followed by a Resume.

D.

A Reset is the equivalent of a Force Shutdown followed by a Start.

Buy Now
Questions 15

Your development team is considering several different types of new applications. You have been asked to advise them concerning which types can be deployed in WebLogic Server leveraging the Production Redeployment feature.

Which application deployment type is NOT supported for Production Redeployment? (Choose the best answer.)

Options:

A.

enterprise applications (EAR) that contain a Coherence Grid Archive (GAR) module

B.

web service applications that are conversational or that use reliable messaging

C.

standalone Enterprise Java Bean (EJB) applications

D.

enterprise applications (EAR) that are accessed by inbound JMS messages

Buy Now
Questions 16

You are monitoring a WebLogic JDBC data source and have decided to drop some connections because an earlier peak usage condition has now ended. In addition, this data source has not been enabled for automatic shrinking.

What will occur once you execute the shrink() method on that JDBCDataSourceRuntimeMBean?

Options:

A.

The number of connections in the pool will be reduced to the greater of either the current number of connections in use or to the minCapacity property setting.

B.

The number of connections in the pool will be reduced to the current number of connections in use regardless of the minCapacity property setting.

C.

The number of connections in the pool will be reduced to the minCapacity property setting regardless of the current number of connections in use.

D.

The number of unused connections in the pool will be reduced by half.

Buy Now
Questions 17

You are required to configure SSL for an instance of WebLogic Server in a production environment. You have already created your self-signed certificate within the myKeyStore.jks keystore. You must now obtain a new digital certificate from a trusted Certificate Authority.

Which command do you use to start the process? (Choose the best answer.)

Options:

A.

keytool -gencert -alias myCertName -infile myCertName.csr -outfile myCertName.der

B.

keytool -certreq -alias myCertName -file myCertName.csr –keystore myKeyStore.jks

C.

keytool -printcertreq -alias myCertName -file myCertName.csr –keystore myKeyStore.jks

D.

keytool -genkeypair -alias myCertName –dname “CN=MyCert” –keystore myKeyStore.jks

Buy Now
Questions 18

You are using the WebLogic Diagnostic Framework (WLDF) to monitor your domain for certain scenarios based on runtime data of your running servers. Different groups are responsible for different aspects of the application.

As a result, your configuration must fulfill the following requirements:

  • Notifications must be sent only to the correct group that is responsible for the respective part of the application.
  • You must ensure that you can enable and disable monitoring for each level whenever it is needed.

How would you configure WLDF watches and notifications to achieve this result? (Choose the best answer.)

Options:

A.

Configure a single module with a watch for each area, and use a notification filter to send an email to the correct group for each area.

B.

Configure a module for each area with a watch that triggers a notification email for the group responsible for that area.

C.

Configure a single module with a watch for each area, and each watch triggers a notification email for the group responsible for that area.

D.

Configure a module for each area with a watch that uses a notification filter to send an email to the correct group for each area.

Buy Now
Questions 19

Some of the messages entering a JMS queue are expiring and are being removed from the queue. You need better insight regarding these expired messages.

Which mechanism helps achieve this? (Choose the best answer.)

Options:

A.

Set the “Log Expired Message” attribute to true for the queue.

B.

Associate an ExpirationEventHandler object for the queue.

C.

Enable Message Life Cycle logging for the JMS Queue.

D.

Configure an Expiration Event Handler for the JMS Queue which logs the expired message properties.

Buy Now
Questions 20

I am sending a set of ten JMS messages. I want all of these messages to be sent successfully or none at all.

Which JMS Session feature is most suitable for implementing such a scenario? (Choose the best answer.)

Options:

A.

Transacted Session

B.

Unit of Order

C.

Store and Forward

D.

Persistent Session

E.

Server affinity

Buy Now
Questions 21

In order to leverage replication and high availability features of your back-end database, among other benefits, you are configuring a JDBC TLOG store to persist transaction logs.

Since something went wrong during the setup of the TLOG, you are reviewing the configuration considerations for TLOG.

Which two guidelines are true for configuring JDBC TLOG stores? (Choose two.)

Options:

A.

Only one JDBC TLOG store can be configured per WebLogic Server.

B.

JDBC TLOG stores should only be configured for RAC databases.

C.

Only globally-scoped (not application-scoped) data sources can be targeted to a JDBC TLOG store.

D.

Multiple WebLogic Servers can share the same JDBC TLOG store.

Buy Now
Questions 22

Even though your company has a thorough procedure for testing applications in a pre-production environment prior to production deployment, you have decided to conduct additional testing of a particular application after it is deployed. You choose to deploy the application in administration mode.

Which three statements are true? (Choose three.)

Options:

A.

The application deployment must use the –redeploy option using a unique version string.

B.

You must configure an administration port for the entire domain, or an administration channel for the targeted server.

C.

The application must first be distributed to the targeted server prior to starting it in administration mode.

D.

The application cannot have any dependencies on any shared Java EE libraries.

E.

After testing, the application can be dynamically transitioned to start accepting all client requests.

Buy Now
Questions 23

You are considering targeting your JMS servers to dynamic clusters to benefit from dynamic scaling. However, you have been advised to keep in mind some of the associated limitations.

What are two valid limitations and considerations for clustered JMS services? (Choose two.)

Options:

A.

Store-and-Forward agents cannot be targeted to a cluster (dynamic or mixed).

B.

WLST in offline mode does not support the get and set commands to target JMS servers to a dynamic cluster.

C.

A sub-deployment cannot be targeted to a duster.

D.

Targeting a messaging bridge to a dynamic cluster is not supported.

Buy Now
Questions 24

Which are three valid actions of the Post Domain Creation process? (Choose three.)

Options:

A.

Import LDAP data from XML files.

B.

Run pack and unpack commands for managed servers on remote machines.

C.

Run any SQL scripts to generate database artifacts.

D.

Use WLST to run the postdomain.py script.

E.

Run the root.sh script.

F.

Assign DNS names to all the hosts.

G.

Run the RCU utility for each hosted application.

Buy Now
Questions 25

What are two differences between a group and a role? (Choose two.)

Options:

A.

Groups are static and roles are dynamic and conditional.

B.

Roles can be scoped to applications and groups are only global.

C.

Roles are static and groups are dynamic and conditional.

D.

Groups can be scoped to applications and roles are only global.

E.

Groups can contain roles but roles cannot contain groups.

Buy Now
Questions 26

You are tasked with configuring a proxy tier for a WebLogic Server domain that has managed Coherence servers configured.

What must the Coherence cache configuration file include as part of this task? (Choose the best answer.)

Options:

A.

connection properties to enable push replication between two Coherence clusters connected over a WAN

B.

connection properties to enable Coherence*Extend clients to connect to the cluster via TCP/IP

C.

HTTP proxy server settings to enable Coherence caching on the web server tier

D.

network connection settings to enable Coherence caching on the client’s web browser

Buy Now
Questions 27

Which two statements correctly describe the WLST nmGenBootStartupProps command? (Choose two.)

Options:

A.

The target root directory must be on the same machine on which Node Manager is running.

B.

The target root directory must be on the same machine on which the Administration Server is running.

C.

The name of a server must be supplied to the nmGenBootStartupProps command; otherwise, the command will fail.

D.

If you do not specify a server name using the servername argument, the argument defaults to myServer, which must match a server name in the domain or the command will fail.

E.

The nmGenBootStartupProps command generates the Node Manager properties files, boot.properties and startup.properties, for the specified server.

Buy Now
Questions 28

My JMS Server uses a persistent file store. I need to ensure that the size of the persistent store does not exceed 1GB.

Which option can I use to configure this? (Choose the best answer.)

Options:

A.

Set the weblogic.store.FileSize to 1GB.

B.

Set the weblogic.store.MaxFileSize to 1GB.

C.

Set the weblogic.store.TotalFileSize to 1GB.

D.

The file size limit must be configured at the operating system level.

Buy Now
Questions 29

In your production environment, you have deployed an application that is accessing a registered Java EE shared library as well as an application deployment plan. In addition, both the library and the application use annotations for some of their configuration properties. You are attempting to understand the current state of the properties that have been used in this deployment.

From greatest to least, what is the correct order of precedence that is used by WebLogic Server when applying configuration properties during deployment? (Choose the best answer.)

Options:

A.

Deployment Plan, Application descriptors, Library descriptors, Application annotations, Library annotations

B.

Deployment Plan, Application annotations, Library annotations, Application descriptors, Library descriptors

C.

Deployment Plan, Library descriptors, Application descriptors, Library annotations, Application annotations

D.

Deployment Plan, Application descriptors, Application annotations, Library descriptors, Library annotations

E.

Deployment Plan, Library descriptors, Library annotations, Application descriptors, Application annotations

Buy Now
Questions 30

is the Oracle home directory that you specified when installing WebLogic Server.

What is the file system location and command for starting the Domain Template Builder? (Choose the best answer.)

Options:

A.

\oracle_common\common\bin and config_builder.sh

B.

\oracle_common\common\bin and temp_builder.sh

C.

\oracle_common\bin and config_builder.sh

D.

\oracle_common\bin and temp_builder.sh

Buy Now
Questions 31

You are designing an application that uses JMS transactions to coordinate a group of messages for production and consumption, treating messages sent or received as an atomic unit.

What are two ways you can use transactions in JMS? (Choose two.)

Options:

A.

You create a JMS-transacted session if you are using only JMS in your transactions.

B.

You set various levels of control over message acknowledgement.

C.

Use message-driven beans if consumers are nondurable.

D.

Use a JTA user-transactions in a non-transacted JMS session.

Buy Now
Questions 32

Which three types of information can an Extension Template contain? (Choose three.)

Options:

A.

JMS

B.

JDBC

C.

sample applications

D.

servers

E.

clusters

F.

machines

G.

administration username and password

Buy Now
Questions 33

What is true about an extension template? (Choose the best answer.)

Options:

A.

can be created from an existing template

B.

can include security realm information

C.

can include Node Manager information

D.

can include administrator username and password

E.

can include administration server information

Buy Now
Questions 34

Your WebLogic domain is experiencing a problem. You want to use the WebLogic Diagnostic Framework (WLDF) to diagnose the problem. You have a support case open with Oracle Support, and they have requested a diagnostic image of your server that is experiencing the problem.

The problem is not predictable or reproducible on-demand, but you noticed that the number of requests waiting to execute increases dramatically when the problem does occur. The problem also seems to occur at any time of the day or night.

How would you approach reliably capturing a diagnostic image that contains data that is relevant to the problem that is occurring?

Options:

A.

Configure a WLDF watch that triggers a diagnostic image action when the number of requests waiting to execute exceeds a certain threshold.

B.

Configure WebLogic overload protection to automatically trigger a diagnostic image when the number of requests waiting to execute exceeds a certain threshold.

C.

Manually monitor the number of requests waiting to execute and create a diagnostic image when you see the number of requests waiting to execute exceeds a certain threshold.

D.

Configure the server health failure action to trigger a diagnostic image when the number of requests waiting to execute exceeds a certain threshold.

Buy Now
Questions 35

The image below depicts a high-level diagram of configuration auditing within WebLogic Server. When Administrators make configuration changes to the WebLogic Server domain, those changes are sent to the audit provider for logging.

What task must be performed in order to make configuration audit messages in the log meaningful to an observer?

Options:

A.

Define unique users for all administrators.

B.

Configure a persistent store for log messages.

C.

Configure the CONFIG severity level.

D.

Define the audit message listener for audit messages.

Buy Now
Questions 36

You are tasked with doing a rolling upgrade of a production domain that will minimize service interruptions.

Which is a characteristic of a rolling update? (Choose the best answer.)

Options:

A.

All the managed servers and node managers need to be shut down.

B.

Configuration changes can be made during the rolling update process.

C.

An automated backup is part of the rolling update process.

D.

The machine hosting the Administration Server must be upgraded first.

E.

A major upgrade, for example 11g to 12c, can be accomplished with a rolling update.

Buy Now
Questions 37

Which three statements correctly describe a relationship between Node Manager and Administration Server? (Choose three.)

Options:

A.

An Administration Server can be under Node Manager control: You can start it, monitor it, and restart it using Node Manager.

B.

An Administration Server can be a Node Manager client: When you start or stop Managed Servers from the Administration Console, you are accessing Node Manager using the Administration Server.

C.

An Administration Server supports the process of starting up a Managed Server with Node Manager: When you start a Managed Server with Node Manager, the Managed Server contacts the Administration Server to obtain outstanding configuration updates.

D.

By default, the Administration Server starts a Node Manager with the startNM script in the domain’s bin folder.

E.

By default, the Administration Server starts a Node Manager with the startNodeManager script in the domain’s config folder.

F.

Node Manager requires an Administration Server to be running before it can start any Managed Servers.

G.

A Node Manager can be a client of an Administration Server – When Node Manager needs to monitor Managed Servers, it uses the Administration Server’s runtime MBeans.

Buy Now
Exam Code: 1z0-134
Exam Name: Oracle WebLogic Server 12c: Advanced Administrator II
Last Update: Nov 20, 2024
Questions: 125
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 1z0-134