Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "0B0-108" Exam

BEA 9 Certified Administrator: System Administration Exam

 Question 1.
You have been asked to deploy a large application that is available on a shared directory structure using weblogic.Deployer. 

Which of the following techniques would you use?

A. Use a command similar to "java weblogic.Deployer ... -nostage -deploy myapp.ear"
B. Use a command similar to "java weblogic.Deployer ... -shared -deploy myapp.ear"
C. Use a command similar to "java weblogic.Deployer ... -external_stage –deploy myapp.ear"
D. Use a command similar to "java weblogic.Deployer ... -distribute -deploy myapp.ear"

Answer: A

Question 2.
Scenario: Consider a slow performing Web Logic cluster wherein the response time exceeds the SLA requirement of 12 milliseconds. The application consists of a web component implementing JSPs and a business component consisting of a stateless session EJB and an entity EJB accessing a back-end database.

If the configured JDBC connection pool had test-connections-on-reserve enabled and test table specified, this would imply that the Connection gets tested?

A. With a back-end database on used and unused connections on a timely basis.
B. With back-end database only once in the life time of a connection as soon it gets created.
C. Only when the time-stamp associated with the connection has expired (regarding Seconds To  
     Trust An Idle Pool Connection Setting) before allocating to client.
D. With SQL-query test randomly to make sure the connections in the pool stay healthy.

Answer: C

Question 3.
A domain configuration has been transferred from an old development server to a new machine.
It had been hoped that the domain files could just be transferred from one machine to another, but it is now understood that certain parameters are dependent on the local configuration. The Listen Address for the admin server is not valid for the new machine and needs to be changed before the admin server can be started.

You start WLST in off-line mode to rectify the problem.

Which WLST command will give you access to the current configuration, so that you can make the change?

A. connect
B. load Domain
C. read Domain
D. load Properties

Answer: C

Question 4.
Which statement is NOT true about restarting the Managed Servers?

A. Node Manager can start the Managed Server process which was killed via the "ctr+c"or "kill -9     
    "commands.
B. Node Manager can only restart a server that was started via Node Manager.
C. Node Manager can restart the Managed Server in Managed Server Independence (MSI)  
     mode.
D. By default, Node Manager automatically restarts the Managed Server instance under its  
     control that failed.

Answer: A

Question 5.
WLST life cycle commands are used to manage the life cycle of a server instance and its services. If the requirement is to use the migrate command, which of the following is INCORRECT?

A. Migrate command can be used to migrate a JMS server to another server within a cluster only.
B. For JTA migration, the source server has to be down for the migrate command to succeed.
C. For JMS Service, migration to another server can happen only on a running server.
D. The migration type server option can be used to migrate all services for a particular server.

Answer: C

Question 6.
Scenario: The Stock Control Application you are going to deploy to a cluster of Web Logic Managed Servers requires a JMS destination to asynchronously deliver the messages to the back-end Warehousing Application. To distribute the messages across the cluster, you decided to configure the distributed destination. Also the Warehousing Application is a legacy application written to implement a proprietary MQ API connecting an MQ-Series server. The Stock Control Application is implemented as a web application on a Web Logic cluster delivering the message to the distributed destination. 

The cluster has three Managed Servers hosted on two high powered machines and one low range/powered machine.

To distribute the physical destinations unevenly across the clustered Web Logic Managed Servers so that the high-powered machines can receive more messages than the low-powered machines, configure the distributed destination with:

A. "Allocate Members Uniformly" set to false and manually select more physical destinations from 
     the high-powered machines
B. "Uneven Distribution" set to true and select all the physical destinations
C. "Uniform Distribute Destination" set to true and select all the physical destinations from the 
     high-powered and low- powered machines
D. "Load Balancing Policy" set to Random and selects only the destination from the high-powered 
     machine

Answer: A

Question 7.
Scenario: You have made the decision to migrate all your operations onto Web Logic Server.

An application has been chosen from each department for the initial phase of migration one from each of Sales, Marketing, Accounts, and Customer Service. The applications will be deployed as individual EAR files to a cluster of Web Logic Server 9.x instances, each with a pool of connections to an Oracle 10g database that provides corporate and departmental data services.

The database team hopes to upgrade the database to use Oracle RAC (Real Application Clusters) shortly, which will require you to configure multiple sets of connections.

Connectivity to the existing Service Engineer Dispatch system is via a JMS message bridge.

When a service engineer calls in with a report, a message is sent via JMS to the Customer Service application deployed in Web Logic Server.

The customer record in the Customer Service database must be updated with details from the message.

It is important that the message is not lost because the call management system is not able to resend messages.

To address this, the Customer Service application is accessing a persistent JMS Queue using an XA compatible connection factory.

In the future, each department will have its own schema within the Oracle database and the developers are writing their code with this in mind. However, for now, it has been decided to store all data in a single, company-wide schema. 

Which of the following approaches will make a future move to multiple schema simple, while making the most efficient use of resources today?

Exhibit:

 

A. Deploy an application-scoped Data Source module with each application.
B. Deploy a Data Source system module and assign it multiple JNDI names.
C. Deploy each department's application to its own Web Logic server.
D. Deploy a Data Source system module for each department's application.

Answer: B

Question 8.
Which two of the following roles can you use the Web Logic SNMP agent for?

A. Respond to simple GET requests from an SNMP manager.
B. Allow SNMP managers themselves to set the values of managed objects or invoke 
    management operations.
C. Listen for specific log messages and send trap notifications to SNMP managers when Web 
     Logic Server generates them.
D. Use WLST scripts to poll Web Logic Server resources periodically and send trap notifications 
     to SNMP managers when the resources change in a way that you specify.

Answer: A, C

Question 9.
During an upgrade process, which one of the following is NOT converted to 9.x by the upgrade wizard?

A. User scripts
B. User file store persisted data
C. User tlog
D. User in-flight transactions

Answer: A

Question 10.
Web Logic store-and-forward service is used for:

A. Storing and forwarding the configuration reliably to all the Managed Servers in a cluster
B. Storing log messages and forwarding them to the administration server for creating the 
    Domain Log
C. Storing and delivering JMS messages reliably between applications across Web Logic Server 
    9.x instances
D. Storing

Question 11.
Scenario : While you are setting up a Web Logic Server domain for a fulfillment service application you have the following requirements: The Fulfillment application should be scalable and highly available; different users will use the application using a different DNS name. This application is also exposed to some business partners using other protocols in addition to HTTP and this site also needs to be configured for transport level security. Different certificates should be installed in the server for different clients (using different DNS names). Even the site should withstand hardware NIC failures too. 

How can Web Logic Server leverage the multiple physical NICs available on the hardware and be configured to withstand NIC failures so that customers will have high-availability for their applications?

A. By configuring HTTP Parameters for the server
B. By configuring network channels for different NICs
C. By deploying and targeting different applications on different NICs directly
D. By enabling the Managed Server Independence mode flag for the respective Web Logic 
     Server.

Answer: B

Question 12.
Which statement is true about SSL configuration?

A. SSL can be configured only at the domain level. All the servers in that domain use same SSL  
     configuration.
B. SSL can be configured at the server level. All the servers in the domain can be configured to 
     use their own SSL settings.
C. SSL can be configured at the cluster level. All the servers that are part of the clusters use the 
     same SSL configuration.
D. Once you configure SSL, the normal listen port will be disabled and cannot be used while the 
     SSL port is enabled.

Answer: B

Question 13.
Which of the following must have exactly ONE provider configured?

A. Authentication provider
B. Adjudication provider
C. Authorization provider
D. Role Mapper provider
E. Key store provider

Answer: B

Question 14.
Which of the following is NOT a state for a Web Logic Server instance?

A. RUNNING
B. STANDBY
C. PENDING
D. ADMIN

Answer: C

Question 15.
When configuring JMS Modules using the Web Logic Administration Console or WLST, the module information will be stored in:

A.  stanza in the weblogic-application.xml file.
B.  stanza in the config\config.xml file.
C. /config/jms/-jms.xml file
D. /servers//targets/jms/_.xml

Answer: C

Question 16.
What WLST best practice should you keep in mind before manipulating JMS MBeans?

A. Making sure that the Web Logic Domain is started before using WLST.
B. Use general, non-meaningful names.
C. Trap for Null MBean objects (such as servers, JMS Servers, modules).
D. Create your JMS sub-deployments before your JMS resources.

Answer: C

Question 17.
Configuration Auditing provides data that is primarily intended for

A. Creating a list of configuration changes.
B. Creating a command journal to rerun after a failure.
C. Producing debug logs of console actions.
D. Recording Web Logic Server console login attempts.

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for SY0-201 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "SY0-201" Exam

CompTIA Security + (2008 Edition) Exam

 Question 1.
Who is responsible for establishing access permissions to network resources in the DAC access control model?

A. The system administrator.
B. The owner of the resource.
C. The system administrator and the owner of the resource.
D. The user requiring access to the resource.

Answer: B

Question 2.
Why do security researchers often use virtual machines?

A. To offer an environment where new network applications can be tested
B. To offer a secure virtual environment to conduct online deployments
C. To offer a virtual collaboration environment to discuss security research
D. To offer an environment where malware can be executed with minimal risk to equipment and 
    software

Answer: D

Question 3.
Which access control system allows the system administrator to establish access permissions to network resources?

A. MAC
B. DAC
C. RBAC
D. None of the above.

Answer: A

Question 4.
You work as a network administrator for your company. Taking personal safety into consideration, what fire suppression substances types can effectively prevent damage to electronic equipment?

A. Halon
B. CO
C. Water
D. Foam

Answer: B

Question 5.
Which of the following access control models uses roles to determine access permissions?

A. MAC
B. DAC
C. RBAC
D. None of the above.

Answer: C

Question 6.
Given: John is a network administrator. He advises the server administrator of his company to implement whitelisting, blacklisting, closing-open relays and strong authentication techniques. Question: 

Which threat is being addressed?

A. Viruses
B. Adware
C. Spam
D. Spyware

Answer: C

Question 7.
Most current encryption schemes are based on

A. digital rights management
B. time stamps
C. randomizing
D. algorithms

Answer: D

Question 8.
Study the following items carefully, which one will permit a user to float a domain registration for a maximum of five days?

A. Spoofing
B. DNS poisoning
C. Domain hijacking
D. Kiting

Answer: D

Question 9.
Which of the following types of cryptography is typically used to provide an integrity check?

A. Public key
B. Asymmetric
C. Symmetric
D. Hash

Answer: D

Question 10.
The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates. 

The public key infrastructure is based on which encryption schemes?

A. Symmetric
B. Quantum
C. Asymmetric
D. Elliptical curve

Answer: C

Question 11.
How is access control permissions established in the RBAC access control model?

A. The system administrator.
B. The owner of the resource.
C. The role or responsibilities users have in the organization.
D. None of the above.

Answer: C

Question 12.
Which threat is increased by the availability of portable external storage such as USB hard drives to networks?

A. Increased loss business data
B. Introduction of material on to the network
C. Removal of sensitive and PII data
D. Introduction of rogue wireless access points

Answer: C



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.