You are configuring two-way SSL for a WebLogic Server domain. As a security professional, you realize that even if a client certificate is authentic, it is always possible for a valid certificate to become compromised.
Which two options can you configure for WebLogic Server to check if a certificate it receives has been compromised? (Choose two.)
My domain consists of an administration server and two managed servers. During runtime, my administration server has crashed and I wish to start the managed servers in MSI mode.
Which two files need to be copied from the admin server to the managed servers when starting them in this mode? (Choose two.)
My JMS file store size has grown very large and is using up a significant chunk of the disk. I need to reduce the file size during the maintenance window without impacting any relevant information.
Which utility enables me to do this? (Choose the best answer.)
You need to make sure that a JMS Message never expires.
What value should you set for the JMSExpiration header? (Choose the best answer.)
You created a user and group using the WebLogic Server default authentication provider.
Where are these principals stored? (Choose the best answer.)
Which three WebLogic Server entities can be set up for service level migration? (Choose three.)
You have an enterprise application that includes a resource adapter module. You are considering leveraging WebLogic Server’s Production Redeployment feature for this application. In preparation for deployment, you decide to create a checklist of items to discuss with the developers of the application.
Which item would you omit from your checklist as it is irrelevant to production Redeployment? (Choose the best answer.)
You are using the WebLogic Diagnostic Framework (WLDF) to monitor your domain for certain scenarios based on runtime data of your running servers. Different groups are responsible for different aspects of the application.
As a result, your configuration must fulfill the following requirements:
How would you configure WLDF watches and notifications to achieve this result? (Choose the best answer.)
You have been asked to assist developers with executing a partial redeployment of static files within a Java EE Web Application deployed to WebLogic Server. The Web Application has already been deployed as an exploded archive directory.
Which of the following represents the correct conditions for this to be successful? (Choose the best answer.)
You are tasked with creating an Extension Template for an existing domain.
What are three options that are presented during the extension creation process? (Choose three.)
You are tasked with configuring a proxy tier for a WebLogic Server domain that has managed Coherence servers configured.
What must the Coherence cache configuration file include as part of this task? (Choose the best answer.)
You are concerned with messages being received systematically. You designed Message-Driven beans (MDB) to guarantee the most reliable way to consume messages.
In which three scenarios would JMS always redeliver a message? (Choose three.)
Review the following WLST commands.
What happens when these commands are executed? (Choose the best answer.)
Which two statements correctly describe the WLST nmGenBootStartupProps command? (Choose two.)