You use a web browser to log in to a web application that is deployed to WebLogic Server. When you click link named "publish" on the site, an "Access Denied" message appears. Which two statements must be true about this server's security configuration?
A. The application is not associated with any security roles.
B. Multiple security realms are active at the same time.
C. Your user account is a member of a group.
D. Your user account exists in an authentication provider.
E. A security policy is attached to the "publish" link URL.
Correct Answer: DE
D: You were able to log in to the web application that is deployed through WebLogic. In WebLogic Server, Authentication providers are used to prove the identity
of users or system processes.
This implies that your account exists in an authentication provider.
E: Extra security is needed to use the publish link. This could be explained by a security policy attached the publish Link URL.
Reference: Developing Security Providers for WebLogic Server, Authentication Providers
Question 52:
View the following file excerpt, which configures HTTP session replication:
replicated
From which file is this excerpt taken?
A. weblogic-application.xml
B. weblogic.xml
C. session.xml
D. config.xml
E. web.xml
Correct Answer: B
To configure file-based persistent storage for sessions:
In the deployment descriptor file weblogic.xml, set the persistent-store-type parameter in the session-descriptor element in the weblogic.xml deployment descriptor file to file. See session- descriptor.
Set the directory where WebLogic Server stores the sessions.
Reference: Oracle Fusion Middleware Oracle WebLogic Server Administration Console Online Help 11g Release 1, Using File-based Persistent storage http://docs.oracle.com/cd/E15523_01/web.1111/e13712/sessions.htm ()
Question 53:
Identify three ways to create a domain template.
A. Administration console
B. Domain Template Builder
C. unpack command
D. pack command
E. Node Manager
F. WLST
G. Configuration Wizard
Correct Answer: BDF
There are three ways to create domain templates:
*
Domain Template Builder (config_builder.sh under WL_HOME/common/bin) Go to Start Menu->All programs->weblogic10gR3->Tools->Domain Template Builder
*
pack command The pack command creates a template archive (.jar) file that contains a snapshot of either an entire domain or a subset of a domain. You can use a template that contains a subset of a domain to create a Managed Server domain directory hierarchy on a remote machine.
*
WLST offline command line tool
Reference: Creating Domain Templates Using the Domain Template Builder Reference: Creating Domains Using WLST Offline
Question 54:
You run the following WLST script and it completes successfully. Which statement best describes what the script created?
A. A CMO named myserver with the listen address 192.168.1.102 and port 8008
B. A Managed Server named myserver with the listen address 192.168.1.102 and port 7001
C. A Managed Server named myserver with listen address 192.168.1.102 and port 8008
D. An Administration Server named myserver with the listen address 092.168.1.102 and port
Correct Answer: C
A managed server (not a CMO, not an administration server) is created.
Port is 8008.
Note: Listing: Creating a Managed Server
connect("username","password")
edit()
startEdit()
svr = cmo.createServer("managedServer")
svr.setListenPort(8001)
svr.setListenAddress("my-address")
save()
Reference: WebLogic Scripting Tool, Using WLST Online to Update an Existing Domain
Question 55:
You are logged in to the administration console for a domain that is running in Development Mode. The domain configuration, you select Production Mode, Save,
and then Activate Changes.
Which two statements are true?
A. All running servers must be restarted.
B. Only the Administration Server must be restarted.
C. Auto-deployment will no longer be available for this domain.
D. This change may be made only through the Administration Server's secure port.
E. If you decide to go back to Development Mode, uncheck Production Mode in the administrate console.
Correct Answer: AC
C: auto deployment is not allowed in production mode only development mode.
Note 1:
All servers in a domain run either in development mode or production mode. To configure all servers in a domain to run in production mode:
1.
If you have not already done so, in the Change Center of the Administration Console, click Lock and Edit .
In the left pane of the Console, under Domain Structure, select the domain name.
2.
Select Configuration > General and select the Production Mode check box.
3.
Click Save, and then, to activate these changes, in the Change Center, click Activate Changes.
4.
Shut down any servers that are currently running.
5.
Invoke the domain's startWebLogic script.
The Administration Server starts in the new mode.
6.
If the domain contains Managed Servers, start the Managed Servers.
Result
As each Managed Server starts, it refers to the mode of the Administration Server to determine its runtime mode.
Note 2: Once you have changed to production mode, whether by using a start command argument, the Console, or WLST, you cannot change back to development mode without restarting the server.
By default auto deployment is turned off in Production Mode (however it can be later turned on). Incorrect:
E: if you want to go back to development mode you must change the config.xml file and restart the admin server. The window shown below shows from
developemnt to production NOT production to development is allowed.
This is in development mode and you can change to production mode but in production mode this attribute states the word true.
Reference: Administration Console Online Help, Change to production mode
Question 56:
Refer to the Exhibit What is the meaning of the yellow triangle icon next to Listen Address?
A. This attribute has no value.
B. The server must be running to change this attribute.
C. The server must be shut down to change this attribute.
D. The server must be restarted for a change to this attribute to take effect.
E. This attribute is read only and cannot be changed in the administration console
Correct Answer: D
The server instance for which you configure the listen address does not need to be running. If it is running, you must restart it after you complete these steps. Reference: Administration Console Online Help, Configuring the Listen Address from the Administration Console
Question 57:
YCMJ are viewing the deployments in the administration console. A web application that is targeted to the Managed Server named server01 has a State of "Now." Which statement best explains this State?
A. Server01 is running and the application has been installed.
B. Sarver01 is shut down and the application has been installed.
C. Server01 is running and the application has not been installed.
D. Server01 is shut down and the application has not been installed.
E. Server01 is running and the application was installed for the first time.
F. Server01 is running and the application has been installed, but is not servicing requests.
Correct Answer: E
Question 58:
Which three tasks are required to use JDBC session persistence for a web application?
A. Enable automatic migration on each server.
B. Create the session database table.
C. Configure SSL on each server.
D. Edit the weblogic.xml descriptor.
E. Create a multi data source.
F. Create a JDBC data source.
Correct Answer: BDF
To specify JDBC-based persistent session storage for a Web application, follow these steps:
1.
(B) Create a table named wl_servlet_sessions in the database
2.
Assign a connection pool that has read/write permissions to the wl_servlet_sessions database table to your WebLogic cluster.
3.
Assign the connection pool's associated data source to the same cluster.
4.
(D) Edit the associated weblogic.xml file using an XML editor and set the value of thePersistentStoreType and PersistentStorePool parameters
Incorrect answer:
E: A multi data source is an abstraction around a group of data sources that provides load balancing or failover processing between the data sources associated with the multi data source.
Reference: Implementing Highly Available and Scalable Solutions Using the WebLogic Cluster, JDBC-Based Persistent Storage http://www.informit.com/articles/article.aspx?p=101737andseqNum=7
Question 59:
Which three statements are true about the default behavior of WebLogic Server proxy plug-ins?
A. The proxy will pin a client to a specific server if a session cookie is created.
B. The proxy fails over to another server if a connection or request times out.
C. The proxy distributes requests to cluster members based on their CPU usage.
D. The proxy dynamically learns the latest locations of cluster members.
E. The proxy always uses SSL, regardless of the client's protocol.
F. The proxy replicates session data to its backup proxy.
Correct Answer: ABD
A: When the HTTP client requests the servlet, HttpClusterServlet proxies the request to the WebLogic Server cluster. HttpClusterServlet maintains the list of all servers in the cluster, and the load balancing logic to use when accessing the cluster. In the above example, HttpClusterServlet routes the client request to the servlet hosted on WebLogic Server A. WebLogic Server A becomes the primary server hosting the client's servlet session. To provide failover services for the servlet, the primary server replicates the client's servlet session state to a secondary WebLogic Server in the cluster. This ensures that a replica of the session state exists even if the primary server fails (for example, due to a network failure). In the example above, Server B is selected as the secondary. The servlet page is returned to the client through the HttpClusterServlet, and the client browser is instructed to write a cookie that lists the primary and secondary locations of the servlet session state. If the client browser does not support cookies, WebLogic Server can use URL rewriting instead. Figure, Accessing Servlets and JSPs using a Proxy:
B: In clusters that utilize Web servers with WebLogic proxy plug-ins, the proxy plug-in handles failover transparently to the client. If a server fails, the plug-in
locates the replicated HTTP session state on a secondary server and redirects the client's request accordingly.
D: The WebLogic proxy plug-in maintains a list of WebLogic Server instances that host a clustered servlet or JSP, and forwards HTTP requests to those instances
on a round-robin basis.
Incorrect answers:
C: The WebLogic proxy plug-in maintains a list of WebLogic Server instances that host a clustered servlet or JSP, and forwards HTTP requests to those instances
on a round-robin basis. This load balancing method is described in Round Robin Load Balancing. The plug-in also provides the logic necessary to locate the
replica of a client's HTTP session state if a WebLogic Server instance should fail.
F: SSL Parameters for Web Server Plug-ins
Parameter: SecureProxy
Default: OFF
Description: Set this parameter to ON to enable the use of the SSL protocol for all communication between the plug-in and WebLogic Server.
Reference: Using WebLogic Server Clusters, Failover and Replication in a Cluster Reference: Using WebLogic Server Clusters, Load Balancing in a Cluster
Question 60:
You received a signed certificate from a Certificate Authority and you wish to use the keytool command-line utility to store it in your keystore. Which command of keytool would you us
A. genkey pair
B. import cert
C. gensockey
D. importkeystore
E. storepasswd
Correct Answer: B
B: keytool import Reads the certificate or certificate chain (where the latter is supplied in a PKCS#7 formatted reply) from the file cert_file, and stores it in the keystore entry identified by alias. If no file is given, the certificate or PKCS#7 reply is read from stdin. keytool can import X.509 v1, v2, and v3 certificates, and PKCS#7 formatted certificate chains consisting of certificates of that type.
Incorrect answers:
A: keytool --genkey generates a key pair (a public key and associated private key). Wraps the public key into an X.509 v1 self-signed certificate, which is stored as a single-element certificate chain. This certificate chain and the private key are stored in a new keystore entry identified by alias.
Description: Loads a trusted CA certificate into a keystore. If the keystore does not exist, it is created.
Reference: Configuring Identity and Trust, Commonly Used keytool Commands http://docs.oracle.com/cd/E11035_01/wls100/secmanage/identity_trust.html
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Oracle exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Z0-102 exam preparations and Oracle certification application, do not hesitate to visit our Vcedump.com to find your solutions here.