Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

1z0-134 Questions and Answers

Question # 6

You are managing a WebLogic domain that has the default built-in diagnostic module configured for each server in the domain.

You have the following requirements:

  • You want to capture metrics that are not collected by any of the built-in diagnostic modules.
  • You want to continue capturing the metrics that are already captured by the existing built-in module.
  • You want your configuration to persist after the server is restarted.

What are two approaches you can apply to achieve this result? (Choose two.)

A.

Clone the built-in module, add now metrics to it, deactivate the existing module, and activate your new module.

B.

Leave the built-in module, create a new module and add metrics to it, and activate your new module alongside the built-in module.

C.

Leave the built-in module, create an external resource descriptor module and add metrics to it, and activate your new module alongside the built-in module.

D.

Remove the built-in module, create an external resource descriptor module and add built-in and new metrics to it, and activate your new module alongside the built-in module.

Full Access
Question # 7

What is the first action to take during a Rolling Update? (Choose the best answer.)

A.

Change the Startup Mode to Development; Production Mode is not supported.

B.

Remove all managed servers from any cluster and reassign them after the update.

C.

Do a Force Shutdown of all the servers, including the Administration Server.

D.

Back up your applications, database schema, other application data, and domains.

E.

Stop all Node Managers that support the domain to be updated.

Full Access
Question # 8

You are developing and managing distributed destination applications for which you do not need to create or designate destination members.

Which configuration steps in the Administration Console will help you to create and target a Uniform Distributed Topic so that you can rely on WLS to create the necessary members on the JMS servers to which a JMS module is already targeted? (Choose the best answer.)

A.

1. Expand Services > Messaging, select the JMS Module in which to configure the destination.2. Click New, select Distributed Topic, and click Next.3. Enter a Name, JNDI Name and set Destination Type to Uniform.4. Click Next, select the targeted server, and click Finish to finalize the creation of the topic.

B.

1. Expand Services > Messaging, select Destinations.2. Click New, select Distributed Topic, and click Next.3. Enter a Name, JNDI Name and set Destination Type to Uniform.4. Click Next, and select the JMS Module assigned to this topic.

C.

1. Expand Services > Messaging, select the JMS Module in which to configure the destination.2. Click New, select Distributed Queue, and click Next.3. Enter a Name, JNDI Name and set Destination Type to Uniform.4. Click Next, select the targeted server, and click Finish to finalize the creation of the queue.

D.

1. Expand Services > Messaging, select the JMS Module in which to configure the destination.2. Click New, select Distributed Topic, and click Next.3. Enter a Name, JNDI Name and expand Advanced Options.4. Set Destination Type to Uniform.5. Click Next, select the targeted server, and click Finish to finalize the creation of the topic.

E.

1. Expand Services > Messaging, select the JMS Module in which to configure the destination.2. Click New, select Uniform Distributed Topic, and click Next.3. Enter a Name, JNDI Name and click Next.4. Select the targeted server and click Finish to finalize the creation of the topic.

Full Access
Question # 9

What is true about an extension template? (Choose the best answer.)

A.

can be created from an existing template

B.

can include security realm information

C.

can include Node Manager information

D.

can include administrator username and password

E.

can include administration server information

Full Access
Question # 10

You are planning to use WebLogic JMS for implementing my enterprise messaging architecture. Which messaging paradigm is invalid in this context? (Choose the best answer.)

A.

Point to Point messaging

B.

Publish Subscribe messaging

C.

Datagram messaging

D.

Persistent messaging

Full Access
Question # 11

You are required to configure SSL for an instance of WebLogic Server in a production environment. You have already created your self-signed certificate within the myKeyStore.jks keystore. You must now obtain a new digital certificate from a trusted Certificate Authority.

Which command do you use to start the process? (Choose the best answer.)

A.

keytool -gencert -alias myCertName -infile myCertName.csr -outfile myCertName.der

B.

keytool -certreq -alias myCertName -file myCertName.csr –keystore myKeyStore.jks

C.

keytool -printcertreq -alias myCertName -file myCertName.csr –keystore myKeyStore.jks

D.

keytool -genkeypair -alias myCertName –dname “CN=MyCert” –keystore myKeyStore.jks

Full Access
Question # 12

Your application includes a message driven bean (MDB) that is listening to messages on a JMS Queue. You need to ensure that every message is processed exactly once by the MDB.

Which configuration allows you to achieve this requirement? (Choose the best answer.)

A.

Add an exception handler for the onMessage method in the MDB.

B.

Set the Redelivery Limit for the Queue to zero.

C.

Use container-managed transactions, so that messages are redelivered if unacknowledged.

D.

Set the MDB instance count to 1 in the deployment descriptor.

Full Access
Question # 13

Your application has an auditing requirement that says that all audit events that have a severity of FAILURE must be logged and a notification must be sent to the application’s monitoring tier. The monitoring tier is implemented as a stateless session bean that provides an entry point called auditlog. The development team has provided you with the code that calls the monitoring tier.

How can you meet this requirement using WebLogic Server auditing? (Choose the best answer.)

A.

Configure the default audit provider and configure the custom audit provider that calls the monitoring tier.

B.

Configure the default audit provider to call the custom audit provider, that calls the monitoring tier.

C.

Remove the default audit provider and configure the custom audit provider that calls the monitoring tier.

D.

Configure the default audit provider and configure it to use the plug-in class that calls the monitoring tier.

Full Access
Question # 14

I am configuring the security policy for my JMS module. I am specifying some security conditions for the module.

Which two security conditions are valid in this context? (Choose two.)

A.

The JMS module can be accessed only between 1 pm and 6 pm.

B.

The JMS module should throw a custom security exception on invalid access.

C.

The JMS module can process only 50 messages at a time.

D.

The JMS module can be accessed only by users belonging to the Operators group.

E.

The JMS module can be accessed in a receive-only mode.

Full Access
Question # 15

A Web Module needs specific tuning. The Development team fine tunes the module in the deployment descriptor (weblogic.xml) as follows:

Which two are true? (Choose two.)

A.

MyWorkManager is an application-scoped Work Manager.

B.

Add the line <wl-dispatch-policy>MyWorkManager before <work-manager> tags in weblogic.xml to make the Web Module use the Work Manager MyWorkManager.

C.

MyWorkManager is a Global Work Manager.

D.

MyWorkManager is a Default Work Manager.

E.

Once the application is deployed and started on a Managed WebLogic Server, MyWorkManager will appear under Environment/Work Managers on the WebLogic Console.

Full Access
Question # 16

Which two statements are true about the role of cluster master in whole server migration? (Choose two.)

A.

There is exactly one cluster master in the cluster at a given point of time.

B.

The cluster master must host all the pinned services in the cluster.

C.

Any managed server in the cluster can serve as the cluster master.

D.

A cluster master must always be different from a singleton master.

E.

The cluster master must always be started with the node manager.

Full Access
Question # 17

Some of the messages entering a JMS queue are expiring and are being removed from the queue. You need better insight regarding these expired messages.

Which mechanism helps achieve this? (Choose the best answer.)

A.

Set the “Log Expired Message” attribute to true for the queue.

B.

Associate an ExpirationEventHandler object for the queue.

C.

Enable Message Life Cycle logging for the JMS Queue.

D.

Configure an Expiration Event Handler for the JMS Queue which logs the expired message properties.

Full Access
Question # 18

You need to update a database accessed by an application that uses a WebLogic server data source. It has been decided that the data source on WLS should first be shut down.

You have been asked to advise as to whether they should execute a shutdown() or a forceShutdown() on the corresponding JDBCDataSourceRuntimeMBean.

Which two statements are true regarding the impact on the application that is using that data source? (Choose two.)

A.

The shutdown() operation will fail if there are any reserved connections in use.

B.

The forceShutdown() operation will allow 20 seconds for any reserved connections in use to complete prior to destroying the connection.

C.

The shutdown() operation will send an HTTP 503 status code to clients.

D.

The forceShutdown() operation will immediately cause any in-flight transaction to be rolled back.

E.

The shutdown() operation will allow 20 seconds for any reserved connections in use to complete, otherwise the operation will fail.

Full Access