You monitor a running JMS topic with the console and note the following values:
Consumers Current = 3
Message Current = 1
Message Pending = 0
These values do not change for several minutes. Which is the most plausible explanation?
A. Production on the topic has been paused.
B. A message arrived after a durable subscribe disconnected from the topic.
C. One of the consumers received a message but did not acknowledge it.
D. None of the consumers are durable subscribes.
Which statement best describes WebLog’s default application staging behavior?
A. The Administration Sever distributes application files when the application is first accessed by a
B. The Administration Sever copied application files to a database that is shared with the
C. The Managed Servers obtain application files from a disk that is shared with the Administration
D. The Administration Sever distributes copied of application files over the network to the
Indentify two valid elements that can belong in the weblogic-application.xml deployment
You create a system-wide JMS module named Payroll-JMS and set its default target to an existing
cluster in your domain named PayrollCluster. Next, you add a standard JMS topic to Payroll-JMS.
To which are you permitted to target this topic?
A. the entire PayrollCluster
B. any single JMS server in the domain
C. any combination of member servers in Payrollcluster
D. several JMS servers targeted to PayrollCluster
The project’s architect has provided you with a design diagram that identifies the key components
of the new insurance system. From the diagram, you can clearly see that JMS will be used as the
communication channel between several applications. Identify four tasks that you may need to
perform to support this design.
A. Create a JMS server
B. Create a JMS message template
C. Add JMS destinations to a JMS module
D. Add a JMS module to a JMS factory
E. Target JMS destinations to JMS servers
F. Target a JMS server to a WebLogic Server
G. Target a JMS module to a JMS store
Which three statements are true about the Node Manager?
A. The Node Manager can restart the Managed Serves that have failed.
B. The Node Manager should be run as either a daemon or a service so that if the host computer
is rebooted, the Node Manager will also be automatically started.
C. The Node Manager runs on a different host from the Managed Server it is controlling.
D. The Node Manager can start a Managed Server the first time the Managed Server starts if the
Administration Server is unavailable because MSI mode is enabled by default.
E. The Node Manager allows you to start Managed Servers from the administration console.
You have made several changes to variable attributes on a managed server within a domain.
You first locked the console, made some nondynamic changes, made some dynamic changes as
well, and then activated your changes. Which statement is true?
A. All the changes that you made on the server will take effect immediately.
B. The dynamic changes that you made will take effect immediately and the changes that are
nondynamic will take effect after the server is restarted.
C. The changes that you made on the server will not take effect until you restart the server.
D. You will receive an error because you cannot make dynamic and nondynamic changes to a
server at the same time.
When you use the Embedded LDAP that is supplied by Oracle WebLogic Server, which three
statements are true?
A. The Embedded LDAP can be used to store user, group, security roles and security policies for
the WebLogic security providers.
B. The Embedded LDAP uses the file system to store Weblogic security provider data.
C. The Embedded LDAP can be accessed by an external LDAP viewer.
D. The Embedded LDAP cannot be used in a production environment
E. The Embedded LDAP can store Auditing Data.
An application is deployed to your domain and its manifest indicates version 1.1. You then perform
an application update by using a manifest that indicates version 1.2.
Indentify two outcomes of this scenario.
A. The existing 1.1 clients are redirected to the 1.2 application
B. The existing 1.1 clients are shown a warning message.
C. The existing 1.1 clients continue to use the 1.1 application.
D. New clients are asked which version they wish to use.
E. New clients use only use 1.2 application
You are logged in to the WebLogic Server administration console and you are editing the fields
shown in exhibit. Which type of WebLogic Server resource are you currently editing?
A. JMS Server
B. Persistent Store
C. JDBC Data Source
D. Diagnostics Module
E. JMS Connection Factory
You have 10 cluster managed servers in a domain. Due to the maintenance tasks currently in
progress, two of the managed servers are in a “Shutdown” status.
You have been asked to deploy an application.
As a default behavior of WebLogic Server, which two statements are true?
A. The application cannot be deployed until the two managed servers are available.
B. The application can be deployed while the two managed servers are in “Shutdown” status. C.
The application will be deployed to the eight managed servers that are running. The two managed
servers that are in the Shutdown state will eventually receive the deployment when they are
D. The application deployment will fail and the application will not be deployed to any managed
server in the cluster.
E. The application deployment will fail and the eight managed servers that are running will
transition to “Admin” state.
An application fails. The exception indicates that the JDBC data source, jdbc-hr.HRDS, cannot be
found. Identify two possible steps that you can perform to verify the data source’s availability.
A. Launch the JDBCDiagnostics utility.
B. Verify the Targets attribute of the application.
C. Verify the Dependencies attribute of the data source.
D. Verify the target server’s JNDI tree in the console.
E. Verify the Target attribute of the data source.
Indentify three ways to create a domain template.
A. Administration console
B. Domain Template Builder
C. unpack command
D. pack command
E. Node Manager
G. Configuration Wizard
What is the default Staging Mode for servers?
C. External Stage
D. Use the defaults defined by the deployment targets
E. Copy the application onto every target for me
When using the Install Application Assistant in the administrator console, what are the two options
that may select for “Choose Targeting Style”?
A. Choosing “Install this deployment as a resource” will allow you to deploy any type of resource
B. Choosing “Install this deployment as a library” will allow you to deploy any archive, which can
be referenced by other applications.
C. Choosing “Install this deployment as expanded format” allow expanded directories to be
D. Choosing “Install this deployment as an application” will allow you to deploy any archive or
E. Choosing “Install this deployment as a stand-alone library” will allow you to deploy a library,
which can be used only by nonclustered servers.
You wish to provide failover for HTTP sessions within a cluster. However, you are limited by the
1. While under load, your servers have very little free memory.
2. you do not have appropriate access rights to modify your company’s database.
Which is the best option, given these restrictions?
A. in-memory replication
B. automatic migration
C. file persistence
D. JDBC persistence
E. replication groups
Indentify three tools that you can use to create a deployment plan.
A. administration console
C. the /autodeploy folder that is locked in the domain directory
D. developer tools such as JDeveloper or Eclipse
E. the /plan subfolder that resides outside the application archive
While creating a new domain in the Configuration Wizard, there are two types of machines that
may be configured. Indentify them.
A. Machine and Windows machine
B. administrator machine and managed machine
C. machine and Unix machine
D. stand-alone machine and cluster machine
You previously deployed an application but later decide to change various configuration
parameters, such as timeouts. You access the application’s Configuration tab in the console and
make your configurations, as shown in the Exhibit.
In which file does WebLogic record these modifications?
Identify four features of the default administration console.
A. XML Editor
B. WLST Editor
D. Change Center
E. Template Builder
F. Domain Structure
G. Configuration Wizard
H. WLST Script Recorder
You wish to restrict access to a JMS queue so that only specific accounts may receive messages from the queue. Identify two steps that, when performed together, implement this security
A. Create a policy for queue’s URL pattern.
B. Add a policy to the queue and associate it with a role.
C. Configure an identify assertion provider.
D. Acquire the domain configuration lock.
E. Create a global role and assign users to it.
A domain created based on the Basic WebLogic Server Domain product has start scripts called
startWebLogic.sh and startManagedWebLogic.sh (.cmd in Windows). Which three statements are
A. startWebLogic.sh starts Node Manager.
B. startWebLogic.sh has a required parameter.
C. startManagedWebLogic.sh has a required parameter.
D. startWebLogic.sh starts the Administration Server of the domain.
E. startManagedWebLogic.sh can start any managed server in the domain.
F. Both scripts can start any WebLogic Server, but each has different default parameter values.
Which answer best describes how you can start the Java-based version of the Node Manager?
A. W1scontrol.sh (.cmd in Windows)
B. Wisifconfig.sh (.cmd in Windows)
C. startNodeManager.sh (.cmd in Windows)
D. startNM.sh (.cmd in Windows)
Which two statements are true about Log Filters?
A. Log Filters are created at the domain level.
B. You do not have to lock the configuration to create Log Filters.
C. You can apply a Log Filter to the server log, but not to standard out.
D. The administration console assists in the creation of Log Filter expressions
Consider a domain with an existing JDBC data source, which connects to an Oracle database.
Your administrator requests that the JDBC connections to this database now specify a different
username. Which data source attribute would you modify to implement this requirement?
C. Initial Capacity
D. Test Table
Which two are typically found in the WEB-INF folder of a Java web application?
A. the web application HTML and JSP files
B. the classes directory containing the compiled classes
C. the web.xml deployment descriptor
D. the weblogicserver.xml deployment descriptor
Which four tasks can be accomplished in the administration console only after the configuration is locked?
A. deploying an application
B. changing console preferences
C. creating a new JMS Server
D. monitoring the health of a server
E. enabling the Administrator Port
F. creating a new Managed Server
G. adding a new user to the default authentication provider
A web application called sales was deployed and is currently “Active”. It is targeted to managed1
and managed2. The developers have given you an upload WAR file and you have replaced the
original WAR file with it. From the directory where the WAR file resides, you run the following
java weblogic.Deployer –adminurl t3://192.168.1.101:7001-username weblogic –password
welcom1 –name sales –redeploy
Which statement best describes what happens?
A. The command fails because no target was specified.
B. The application is deployed to the Administration Server because no target was specified.
C. The application is deployed to whichever server is running at 192.168.1.101:7001.
D. The application is deployed to managed1 and managed2 because that is where it is currently
When creating a new Managed Server using the administration console, which two points must be
A. The Server Name must be unique within the domain.
B. After you assign a Listen Port value for the server, you cannot change it
C. The Listen Port value must be unique for ever server.
D. The Server Name cannot be changed after you have created the server.
Indentify two attributes of a JMS server.
D. Connection Factory
E. Store and Forward
The master Embedded LDAP has the capability to back up its data. Which statement is true?
A. The Managed Servers should be shut down when backups are being performed on the
B. The backup feature is enabled by default.
C. The backup featureof the Embedded LDAP should be enabled for all the servers in the domain
on a per-basis.
D. The backup is stored in a comma-separated variable format.
Indentify two requirements for in-memory session replication.
A. Clusters must contain an even number of members.
B. Web applications must be configured to use replication.
C. Web applications must be deployed as an archive file.
D. Cluster members must be started by using the Node Manager.
E. Web applications must be accessed via a proxy that supports session cookies
You are deploying an EAR by using the administration console. You are part way through the
process. In the administration console, you see that the EAR has the State of “Prepared.”
What can you do in the administration console to bring the deployment to the “Active” State?
A. Select it and click the Install button.
B. Select it, and then from the Install drop-down list, select “Servicing all requests”
C. Select it, and then from the update drop-down list, select “Servicing all requests”
D. Select it, and then from the Start drop-down list, select “Servicing all requests”
E. Select it, and then from the Start drop-down list, select “Servicing only administration requests”
Your domain includes a cluster of five servers, but only three are currently running. A colleague
then uses the administration console to install and deploy a new EJB application to the cluster.
By default, which outcome would you expect?
A. The application deploys successfully on the three servers that are running.
B. The deployment fails because the entire cluster is not running.
C. The deployment succeeds, but the application is not accessible.
D. The user is prompted to start the two unavailable servers before continuing.
E. The two unavailable servers are automatically removed from the cluster.
Consider an IT infrastructure comprising several web and EJB applications. Each application is expected to handle significantly different workloads, and therefore has different resource and scalability requirements. Which is the best solution for this scenario?
A. Configure a dedicated server for each application.
B. Configure a separate cluster for each application.
C. Configure a separate domain for each application.
D. Configure a separate proxy for each application.
Which two statements are true about cluster configuration?
A. A server must be running before it can be added to a cluster.
B. You cannot define cluster membership through the Configuration Wizard.
C. The console allows you to add new and existing servers to a cluster.
D. The console allows you to add an administration server to a cluster.
E. You cannot remove a server that is running from a cluster.
Which four statements are true about WLST?
A. You can create a domain with WLST.
B. WLST commands are case-insensitive.
C. You can shut down servers with WLST.
D. All WLST commands include parentheses.
E. WLST is based on the Perl scripting language.
F. You can connect to any server through WLST.
G. The Administration Server needs to be running to use WLST.
Indentify two server attributes that you must configure to communicate with the server via HTTPS.
A. SSL Listen Address
B. SSL Listen Port
C. SSL Listen Port Enabled
D. Production Mode Enabled
E. Startup Mode
Consider a cluster of four servers: ServerA, ServerB, ServerC, and ServerD.
The cluster hosts a web application and is accessed using a proxy pug-in. This web application is
configured to use in-memory session replication.
A user is directed to ServerA. An HTTP session is established on ServerA and is also replicated to
ServerC. If ServerA subsequently fails, which server will this user be redirected to?
A. none; the user will receive an error message
E. Any other available server
Which three techniques can create a new WebLogic domain?
A. Configuration Wizard
D. Administration console
E. Unpack command
F. Node Manager
Which four tasks are required to use database persistence for JMS messages?
A. Assign a data source to a JDBC store.
B. Configure a data source’s delivery mode.
C. Assign a JDBC store to a JMS server.
D. Create a JDBC data source.
E. Disable a server’s file store.
F. Create a JDBC store.
When describing a WebLogic domain, which three statements are true?
A. A domain may be set up in either Production Mode Production Mode or Development Mode.
B. All instances of WebLogic Server must be defined within a domain.
C. The domain configuration is stored in Oracle database by default.
D. Any instance of WebLogic Server may update the domain configuration
E. The security realm for a domain is optional.
F. A domain maybe created by using the Configuration Wizard.
You are responsible for configuration a WebLogic domain to support an order processing
application. This application will communicate with multiple JDBC data sources to fulfill each
customer order. To maintain data integrity across these databases, work will be performed within a
However, you have learned that one of the data sources in the transaction does not have an XA
driver. Which option should you select on this non-XA data source to ensure that orders are still
processed as global transactions?
A. Ignore Heuristics
B. Planned to Thread
C. Password Encrypted
D. Logging Last Resource
E. Test Connections on Reserve
You are installing Oracle WebLogic Server 11g for some new developers in the department. They
have asked for a very generic installation for development and want you to ensure that the
“MedRec” sample domain is included. What should you do to accomplish this?
A. Select the typical installation because the “MedRec” sample domain is included in it.
B. You won’t be able to do this, because all the samples were removed from the installer after
C. Select the custom installation and select Server Examples.
D. After installation, create a sample domain named “MedRec” by using the Configuration Wizard.
Consider the following excerpt from mod_wl_ohs.conf:
WebLogicCluster 192.168.13.1:7001, 192.168.13.2:7001,192.168.13.2:7001
Assuming that this is a valid is a valid configuration, which two conclusions can you make?
A. A web application name “welcome” is configured to use session replication.
B. A web application that uses the paths “welcome” is targeted to the cluster.
C. The proxy server will ignore any requests that contain the name “welcome.”
D. The proxy server is listening on the host name “welcome.”
E. A cluster exists that consists of at least two managed servers.
F. All cluster members are running on the same machine.
Which two statements are true about data sources that have been created?
A. Data sources must be targeted to a server.
B. Data sources must be bound in the JDNI tree of a server.
C. Data sources are an Oracle WebLogic Server-specific feature.
D. Data sources are tied directly to a connection pool.
E. Data sources are required for a domain.