Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "0B0-108" Exam

BEA 9 Certified Administrator from ITCertkeys

 Question 1.
You have been asked to deploy a large application that is available on a shared directory structure using weblogic.Deployer. 

Which of the following techniques would you use?

A. Use a command similar to "java weblogic.Deployer ... -nostage -deploy myapp.ear"
B. Use a command similar to "java weblogic.Deployer ... -shared -deploy myapp.ear"
C. Use a command similar to "java weblogic.Deployer ... -external_stage –deploy myapp.ear"
D. Use a command similar to "java weblogic.Deployer ... -distribute -deploy myapp.ear"

Answer: A

Question 2.
Scenario: Consider a slow performing Web Logic cluster wherein the response time exceeds the SLA requirement of 12 milliseconds. The application consists of a web component implementing JSPs and a business component consisting of a stateless session EJB and an entity EJB accessing a back-end database.

If the configured JDBC connection pool had test-connections-on-reserve enabled and test table specified, this would imply that the Connection gets tested?

A. With a back-end database on used and unused connections on a timely basis.
B. With back-end database only once in the life time of a connection as soon it gets created.
C. Only when the time-stamp associated with the connection has expired (regarding Seconds To  
     Trust An Idle Pool Connection Setting) before allocating to client.
D. With SQL-query test randomly to make sure the connections in the pool stay healthy.

Answer: C

Question 3.
A domain configuration has been transferred from an old development server to a new machine.
It had been hoped that the domain files could just be transferred from one machine to another, but it is now understood that certain parameters are dependent on the local configuration. The Listen Address for the admin server is not valid for the new machine and needs to be changed before the admin server can be started.

You start WLST in off-line mode to rectify the problem.

Which WLST command will give you access to the current configuration, so that you can make the change?

A. connect
B. load Domain
C. read Domain
D. load Properties

Answer: C

Question 4.
Which statement is NOT true about restarting the Managed Servers?

A. Node Manager can start the Managed Server process which was killed via the "ctr+c"or "kill -9     
    "commands.
B. Node Manager can only restart a server that was started via Node Manager.
C. Node Manager can restart the Managed Server in Managed Server Independence (MSI)  
     mode.
D. By default, Node Manager automatically restarts the Managed Server instance under its  
     control that failed.

Answer: A

Question 5.
WLST life cycle commands are used to manage the life cycle of a server instance and its services. If the requirement is to use the migrate command, which of the following is INCORRECT?

A. Migrate command can be used to migrate a JMS server to another server within a cluster only.
B. For JTA migration, the source server has to be down for the migrate command to succeed.
C. For JMS Service, migration to another server can happen only on a running server.
D. The migration type server option can be used to migrate all services for a particular server.

Answer: C

Question 6.
Scenario: The Stock Control Application you are going to deploy to a cluster of Web Logic Managed Servers requires a JMS destination to asynchronously deliver the messages to the back-end Warehousing Application. To distribute the messages across the cluster, you decided to configure the distributed destination. Also the Warehousing Application is a legacy application written to implement a proprietary MQ API connecting an MQ-Series server. The Stock Control Application is implemented as a web application on a Web Logic cluster delivering the message to the distributed destination. 

The cluster has three Managed Servers hosted on two high powered machines and one low range/powered machine.

To distribute the physical destinations unevenly across the clustered Web Logic Managed Servers so that the high-powered machines can receive more messages than the low-powered machines, configure the distributed destination with:

A. "Allocate Members Uniformly" set to false and manually select more physical destinations from 
     the high-powered machines
B. "Uneven Distribution" set to true and select all the physical destinations
C. "Uniform Distribute Destination" set to true and select all the physical destinations from the 
     high-powered and low- powered machines
D. "Load Balancing Policy" set to Random and selects only the destination from the high-powered 
     machine

Answer: A

Question 7.
Scenario: You have made the decision to migrate all your operations onto Web Logic Server.

An application has been chosen from each department for the initial phase of migration one from each of Sales, Marketing, Accounts, and Customer Service. The applications will be deployed as individual EAR files to a cluster of Web Logic Server 9.x instances, each with a pool of connections to an Oracle 10g database that provides corporate and departmental data services.

The database team hopes to upgrade the database to use Oracle RAC (Real Application Clusters) shortly, which will require you to configure multiple sets of connections.

Connectivity to the existing Service Engineer Dispatch system is via a JMS message bridge.

When a service engineer calls in with a report, a message is sent via JMS to the Customer Service application deployed in Web Logic Server.

The customer record in the Customer Service database must be updated with details from the message.

It is important that the message is not lost because the call management system is not able to resend messages.

To address this, the Customer Service application is accessing a persistent JMS Queue using an XA compatible connection factory.

In the future, each department will have its own schema within the Oracle database and the developers are writing their code with this in mind. However, for now, it has been decided to store all data in a single, company-wide schema. 

Which of the following approaches will make a future move to multiple schema simple, while making the most efficient use of resources today?

Exhibit:

 

A. Deploy an application-scoped Data Source module with each application.
B. Deploy a Data Source system module and assign it multiple JNDI names.
C. Deploy each department's application to its own Web Logic server.
D. Deploy a Data Source system module for each department's application.

Answer: B

Question 8.
Which two of the following roles can you use the Web Logic SNMP agent for?

A. Respond to simple GET requests from an SNMP manager.
B. Allow SNMP managers themselves to set the values of managed objects or invoke 
    management operations.
C. Listen for specific log messages and send trap notifications to SNMP managers when Web 
     Logic Server generates them.
D. Use WLST scripts to poll Web Logic Server resources periodically and send trap notifications 
     to SNMP managers when the resources change in a way that you specify.

Answer: A, C

Question 9.
During an upgrade process, which one of the following is NOT converted to 9.x by the upgrade wizard?

A. User scripts
B. User file store persisted data
C. User tlog
D. User in-flight transactions

Answer: A

Question 10.
Web Logic store-and-forward service is used for:

A. Storing and forwarding the configuration reliably to all the Managed Servers in a cluster
B. Storing log messages and forwarding them to the administration server for creating the 
    Domain Log
C. Storing and delivering JMS messages reliably between applications across Web Logic Server 
    9.x instances
D. Storing

Question 11.
Scenario : While you are setting up a Web Logic Server domain for a fulfillment service application you have the following requirements: The Fulfillment application should be scalable and highly available; different users will use the application using a different DNS name. This application is also exposed to some business partners using other protocols in addition to HTTP and this site also needs to be configured for transport level security. Different certificates should be installed in the server for different clients (using different DNS names). Even the site should withstand hardware NIC failures too. 

How can Web Logic Server leverage the multiple physical NICs available on the hardware and be configured to withstand NIC failures so that customers will have high-availability for their applications?

A. By configuring HTTP Parameters for the server
B. By configuring network channels for different NICs
C. By deploying and targeting different applications on different NICs directly
D. By enabling the Managed Server Independence mode flag for the respective Web Logic 
     Server.

Answer: B

Question 12.
Which statement is true about SSL configuration?

A. SSL can be configured only at the domain level. All the servers in that domain use same SSL  
     configuration.
B. SSL can be configured at the server level. All the servers in the domain can be configured to 
     use their own SSL settings.
C. SSL can be configured at the cluster level. All the servers that are part of the clusters use the 
     same SSL configuration.
D. Once you configure SSL, the normal listen port will be disabled and cannot be used while the 
     SSL port is enabled.

Answer: B

Question 13.
Which of the following must have exactly ONE provider configured?

A. Authentication provider
B. Adjudication provider
C. Authorization provider
D. Role Mapper provider
E. Key store provider

Answer: B

Question 14.
Which of the following is NOT a state for a Web Logic Server instance?

A. RUNNING
B. STANDBY
C. PENDING
D. ADMIN

Answer: C

Question 15.
When configuring JMS Modules using the Web Logic Administration Console or WLST, the module information will be stored in:

A.  stanza in the weblogic-application.xml file.
B.  stanza in the config\config.xml file.
C. /config/jms/-jms.xml file
D. /servers//targets/jms/_.xml

Answer: C

Question 16.
What WLST best practice should you keep in mind before manipulating JMS MBeans?

A. Making sure that the Web Logic Domain is started before using WLST.
B. Use general, non-meaningful names.
C. Trap for Null MBean objects (such as servers, JMS Servers, modules).
D. Create your JMS sub-deployments before your JMS resources.

Answer: C

Question 17.
Configuration Auditing provides data that is primarily intended for

A. Creating a list of configuration changes.
B. Creating a command journal to rerun after a failure.
C. Producing debug logs of console actions.
D. Recording Web Logic Server console login attempts.

Answer: A

Question 18.
Scenario: Consider a production server deployment wherein the development team has no access to the production servers. The Administrative team owns the responsibility of deployments, upgrades and supporting the applications hosted on these servers. The decision was for a development and administrative team to use off-line and online WLST scripts to deploy and support the application.

During debugging, if there is a need for the development team to review and recreate a similar server configuration, which one of the following approaches would you adopt?

A. Create a WLST off-line script using duplicate Domain and send it to the development team to 
     recreate the server configuration.
B. Send all server configuration files and have them recreate the server configuration using 
     WLST parse scripts.
C. Create a Web Logic Server domain template using WLST and send it to the development team 
     to recreate the configuration.
D. Use the Web Logic admin console to save the domain configuration and send it to the 
     development team.

Answer: C

Question 19.
Scenario: Consider a b2b commerce application hosted on a Web Logic cluster with JMS messages being received, processed, and forwarded to external servers. The server log indicates a potential stuck thread problem where threads are continually getting stuck and JMX monitoring indicates a continuous backlog of pending messages that could be due to any of the in-flight messages, delayed messages, or messages being inhibited from delivery.

To prevent all threads from getting stuck, which of the following approaches would you adopt?

A. Increase the Stuck Threads Max Time setting and Stuck Thread Timer Interval to change stuck 
     thread monitoring parameters.
B. Configure a Work Manager shutdown trigger and have the server move to admin mode for 
     further debugging outside of production.
C. Create a new Work Manager for the application that reports stuck threads, to prevent the 
     default Work Manager from thread starvation.
D.  Write a cron job to monitor threads and restart threads using a timer.

Answer: B

Question 20.
Choose two recommended best practices when managing applications in a production environment:

A. Deploy applications and modules in an archive format (.ear, .jar, .war, and so forth).
B. Manage multiple deployment configurations using deployment plans, rather than multiple 
     versions of the Web Logic Server deployment descriptor files.
C. Enable the auto-deploy feature in a production mode running environment.
D. Deploy an application to an Administration Server in a multiple-server domain in production 
     mode.

Answer: A, B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 9L0-401 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "9L0-401" Exam

Mac OS X Support Essentials v10.4 Exam Practice Test

 Question 1.
Deborah installed a utility that downloads movies from her Mac OS X v10.4 computer to a digital video recorder (DVR), so she can play them on her television. But the DVR is only able to access the movies files on her computer while she has the firewall on the computer turned off. 

How can Deborah configure her system to allow the DVR to access movie files on her computer while the firewall is on?

A. Using a text editor, add the port numbers used by the movie sharing utility to /etc/firewall. list.
B. In the Firewall pane of Sharing preferences, create a new port definition with the port numbers 
    used by the movie sharing utility, then turn the port on in the firewall list of ports.
C. In the Firewall pane of Network preferences, enter the range of ports used by the movie 
    sharing utility in the Allow list.
D. Using the Firewall Manager utility, add the port numbers used by the sharing utility to 
    /etc/firewall. list, then enable the ports in the Firewall pane of Sharing preferences.

Answer: B

Question 2.
What are three ways to access the command line in Mac OS X v10.4? (Choose THREE.)

A. Launch Console.
B. Start up in single user mode.
C. Launch Network Utility.
D. Start up in verbose mode.
E. Launch Terminal.
F. Choose Command from the Apple menu.
G. Log in remotely using SSH.

Answer: B, E, G

Question 3.
In Mac OS X v10.4, how do you enable printing to a printer shared by a Windows computer?

A. In the Print dialog, choose the workgroup from the Windows Printer entry in the Printer pop-up 
    menu, then select the printer from the list.
B. From the Printing pane of Print & Fax preferences, choose Windows Printers in the pop-up 
    menu, then select the workgroup and printer.
C. In Printer Setup Utility, select the workgroup and printer from the Default Browser pane in the 
    Printer Browser window, and click Add.
D. In Printer Setup Utility, click More Printers in the Printer Browser window and choose Windows 
    Printing from the pop-up menu, then choose the workgroup, select the printer, and click Add.

Answer: D

Question 4.
Which two utilities can display information about a wide range of system components? (Choose TWO.).

A. Network Diagnostics
B. Internet Connect
C. Console
D. Setup Assistant
E. System Profiler

Answer: C, E

Question 5.
Mac OS X v10.4 supports which two types of VPN connections by default? (Choose TWO.)

A. PPTP
B. PPPoE
C. L2TP
D. P2P
E. NAT

Answer: A, C

Question 6.
In Mac OS X v10.4, changes to network configuration ________.

A. require administrator authentication
B. require you to create a new network location
C. are made in the Internet pane of System Preferences
D. are user-specific

Answer: A

Question 7.
Press Exhibit to view the image. You have set up a network as shown in the exhibit. Computer A has been configured to share its Internet connection from the cable modem with computers B and C over Ethernet. 

Why could this configuration be problematic?

A. Internet Sharing is incompatible with cable modems.
B. A computer running Mac OS X v10.4 can use Internet Sharing to share its Internet connection 
    with only one other computer on the network.
C. Internet Sharing must be enabled on all three computers in order to share the cable modem.
D. Receiving and sharing an Internet connection over the same Ethernet port on Computer A can 
    cause network problems for other ISP customers.

Answer: D

Question 8.
Which is NOT a valid reason to use the command line rather than the Finder in Mac OS X v10.4?

A. It is easier to execute undo at the command line than to undo commands in the Finder.
B. Some file system commands executed at the command line, like chown and chmod, have 
    options for which there are no equivalents in the Finder.
C. Commands executed at the command line can be combined for efficiency.
D. Commands executed at the command line can be executed from a different user account more 
    easily than their Finder equivalents.

Answer: A

Question 9.
Press Exhibit to view the image. In the Finder, Chris creates a folder in her home directory and sets the permissions as shown in the exhibit. In Terminal, Chris types: ls -l ~ and presses Return.

What permissions are shown for the new folder?

A. -rwx-wx-wx
B. drwx-wx-wx
C. drw--w--w-
D. -rw--wx-wx
E. drw--wx-wx

Answer: B

Question 10.
Authorization verifies ________.

A. a resource availability to a given user account
B. a user's name and password
C. a file's creator and type
D. a computer's membership in a computer list

Answer: A


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.