Which two statements are true about multicast communication within a cluster?
A. Multicast can be used for cluster heartbeat messages.
B. Multicast is used to replicate session state between servers.
C. Multiple clusters can share the same multicast address and port.
D. You may disable multicast on individual cluster members.
E. Multicast traffic is often limited to a single subnet.
Your server includes an application that uses a generic JDBC data source to connect to a database. However, the network connection between the server and the database is not 100% reliable.
You wish to avoid scenarios in which the application fails due to a failed JDBC connection. Identify two data source attributes to help accomplish this.
A. Statement Cache
B. Pool Reserve Mode
C. Test Table Name
D. Test Connection Mode
E. Test Connections on Reserve
Identify two reasons for defining machines and assigning servers to them in Weblogic Server.
A. A machine can be the proxy to a cluster.
B. A machine definition is required to configure the Node Manager.
C. To reference an instance of WebLogic Server, you must know its machine and port.
D. Machine is a required organizational unit. A domain contains machines and machines contain servers.
E. WebLogic Server uses server machine assignments to help it choose servers in a cluster on which to replicate session state.
F. The machine's Cluster Weight attribute may be used by load balancers to help them determine how often to send requests to servers assigned to that machine.
You are logged in to the administration console for a domain that is running in Development Mode. The domain configuration, you select Production Mode, Save,
and then Activate Changes.
Which two statements are true?
A. All running servers must be restarted.
B. Only the Administration Server must be restarted.
C. Auto-deployment will no longer be available for this domain.
D. This change may be made only through the Administration Server's secure port.
E. If you decide to go back to Development Mode, uncheck Production Mode in the administrate console.
Which statement best describes WebLog's default application staging behavior?
A. The Administration Sever distributes application files when the application is first accessed by a client.
B. The Administration Sever copied application files to a database that is shared with the Managed Servers.
C. The Managed Servers obtain application files from a disk that is shared with the Administration Server.
D. The Administration Sever distributes copied of application files over the network to the Managed Servers.
You have 10 cluster managed servers in a domain. Due to the maintenance tasks currently in progress, two of the managed servers are in a "Shutdown" status.
You have been asked to deploy an application.
As a default behavior of WebLogic Server, which two statements are true?
A. The application cannot be deployed until the two managed servers are available.
B. The application can be deployed while the two managed servers are in "Shutdown" status.
C. The application will be deployed to the eight managed servers that are running. The two managed servers that are in the Shutdown state will eventually receive the deployment when they are started again.
D. The application deployment will fail and the application will not be deployed to any managed server in the cluster.
E. The application deployment will fail and the eight managed servers that are running will transition to "Admin" state.
View the Exhibit.
You previously deployed an application but later decide to change various configuration parameters, such as timeouts. You access the application's Configuration
tab in the console and make your configurations, as shown in the Exhibit.
In which file does WebLogic record these modifications?
A. config.xml
B. weblogic.xml
C. Application.xml
D. Plan.xml
You wish to restrict access to a JMS queue so that only specific accounts may receive messages from the queue. Identify two steps that, when performed together, implement this security requirement.
A. Create a policy for queue's URL pattern.
B. Add a policy to the queue and associate it with a role.
C. Configure an identify assertion provider.
D. Acquire the domain configuration lock.
E. Create a global role and assign users to it.
Which two statements are true about Log Filters?
A. Log Filters are created at the domain level.
B. You do not have to lock the configuration to create Log Filters.
C. You can apply a Log Filter to the server log, but not to standard out.
D. The administration console assists in the creation of Log Filter expressions
A web application called sales was deployed and is currently "Active". It is targeted to managed1 and managed2. The developers have given you an upload WAR file and you have replaced the original WAR file with it. From the directory where the WAR file resides, you run the following weblogic.Deployer command:
java weblogic.Deployer adminurl t3://192.168.1.101:7001-username weblogic password welcom1 name sales redeploy Which statement best describes what happens?
A. The command fails because no target was specified.
B. The application is deployed to the Administration Server because no target was specified.
C. The application is deployed to whichever server is running at 192.168.1.101:7001.
D. The application is deployed to managed1 and managed2 because that is where it is currently targeted.