Pre-Winter Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

1z0-133 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

1z0-133 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Oracle WebLogic Server 12c: Administration I
  • Last Update: Oct 8, 2024
  • Questions and Answers: 127
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

1z0-133 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

1z0-133 Practice Exam Questions with Answers Oracle WebLogic Server 12c: Administration I Certification

Question # 6

You are running WebLogic Server under a 64-bit HotSpot JVM.

You edit your domain’s setDomainEnv.sh script to update the minimum and maximum heap sizes as follows:

USER_MEM_ARGS=”-Xms32meg –Xmx150meg”

Export USER_MEM_ARGS

You try to start a managed server by running the domain start script at the command line. The server fails with the message:

Invalid initial heap size: -Xms32meg

Why does the server fail with that message?

A.

The minimum heap size for a 64-bit JVM is 64 Megabytes

B.

For performance reasons, the minimum heap size and maximum heap size should be the same value

C.

The parameter value was entered incorrectly. The correct value is: “-Xms32m –Xmx150m”

D.

The parameter value was entered incorrectly. You must enter memory parameter values in Kilobytes

E.

The parameter value was entered incorrectly. The correct value is: “-Xms:32meg – Xmx:150meg”

Full Access
Question # 7

You are setting up a GridLink Datasource.

What function will help you to seamlessly connect to a dynamic Oracle RAC installation

A.

Simple Connection Access Node

B.

Single Correlated Anonymous Network

C.

Simple Connection Address Name

D.

Single Client Access Name

Full Access
Question # 8

You are carrying out the RDBMS Security Store Configuration using the configuration Wizard

Which three actions can you perform with the Configuration Wizard during the process? (Choose three.)

A.

Create tables in the data store.

B.

Execute SQL scripts in WebLogic server’s server/lib directory.

C.

Populate the database tables with external LDAP users.

D.

Test the connection to a back-end database.

E.

Allocate tablespace for the data store.

Full Access
Question # 9

You want to configure WebLogic Server transactions to be recoverable when a nonclustered managed server crashes, even if that crash is caused by an unrecoverable hardware failure. You want to run the managed server on different hardware, and have it recover the transactions that were in-progress at the time of the crash.

You also want to use the default store for transaction logs.

Which statement is true?

A.

This scenario is not possible. You must use the JDBC store to recover transactions from a crashed server.

B.

This scenario is not possible. You must use clustered managed servers to recover transactions from a crashed server.

C.

This scenario is common, and so the default configuration of the default store works.

D.

Before the crash, you need to update the path to the default store for the managed server. The path should be to some shared storage location.

E.

After the crash, obtain a copy of the managed server’s default store from the administration server. Move it to the same relative location on the new hardware before starting the managed server there.

Full Access
Question # 10

Which two statements are true about Log Filters? (Choose two.)

A.

You do not have to lock the configuration to create Log Filters

B.

Log Filters are created at the domain level

C.

The administration console assists in the creation of Log Filter expressions

D.

You can apply a Log Filter to the server log, but not to standard out

Full Access
Question # 11

You are creating a domain by using the Configuration Wizard. In the wizard, you select to configure Node Manager. Under “Node Manager Type”, you select “Manual Node Manager Setup”.

What does this mean?

A.

You are using the Configuration Wizard to configure a script-based Node Manager.

B.

The configuration Wizard prompts you to change the default Node Manager configuration values.

C.

The configuration Wizard bypasses all Node Manager Configuration.

D.

You are using the configuration Wizard to configure a Java-based Node Manager.

E.

You must manually copy the Node Manager files generated by the configuration Wizard into Node Manager home.

Full Access
Question # 12

A WebLogic Server instance can have multiple network channels defined for it.

Each channel for the server must have a unique combination of two elements. Identify these two elements. (Choose two.)

A.

Tunneling enabled

B.

Listen address

C.

Listen port

D.

Outbound enabled

E.

Channel weight

Full Access
Question # 13

An application fails. The exception indicates that the JDBC data source cannot be found.

Identify two possible steps that you can perform to verify the data source’s availability. (Choose two.)

A.

Launch the JDBCDiagnostics utility.

B.

Verify the Dependencies attribute of the data source.

C.

View the target server’s JNDI tree in the console.

D.

Verify that the application and data source have the same target.

Full Access
Question # 14

Which three domain requirements can you implement with the Configuration Wizard? (Choose three.)

A.

Create a Node Manager and enroll it with the domain

B.

Create a domain using a custom template

C.

Assign virtual IP addresses to all servers

D.

Distribute domain files across multiple machines

E.

Create a dynamic cluster of five servers

Full Access
Question # 15

You use the Java-based Node Manager to start your managed servers. You want Node Manager to:

• Stop servers by using your custom stop script: mystopit.sh

• Restart servers when the hardware crashes

• Use SSL communication

• Check server heath once per second

Below are portions of the nodemanager.properties file. Select the one that configures Node Manager as described.

1z0-133 question answer

1z0-133 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 16

You have been tasked with replacing an existing WebLogic domain with a brand new installation as part of a migration. The new server needs to use the previously created JDBC store that holds existing JMS messages.

Which two configuration requirements do you need to comply with in order to make the transition successful? (Choose two.)

A.

In Persistent Stores, create a new JDBC store and select the option “Use existing store”

B.

The new domain name needs to be the same as the old domain it’s replacing

C.

Duplicate the JMS and persistent store configuration in the new domain

D.

The storage needs to be file based and not JDBC based

E.

Set the prefix for the JDBC store table to the domain name

Full Access
Question # 17

Which three statements are true about the default behavior of WebLogic Server proxy plug-ins? (Choose three.)

A.

The proxy will pin a client to a specific server if a session cookie is created.

B.

The proxy fails over to another server if a connection or request times out.

C.

The proxy distributes requests to cluster members based on their CPU usage.

D.

The proxy dynamically learns the latest locations of cluster members.

E.

The proxy always uses SSL, regardless of the client’s protocol.

F.

The proxy replicates session data to its backup proxy.

Full Access
Question # 18

You successfully deployed an application on WebLogic 12c but notice that its deployment name is different than what you expected.

After checking various places and making multiple deployment attempts, you decide to be on the safe side and just use the method that takes precedence over the others when setting the deployment name. Which method should you use to override the default deployment name?

A.

Define the name in the library’s manifest file

B.

Configure the element in web.xml

C.

Run weblogic.Deployer with the –name option

D.

Set a computed name based on the deployment source file

E.

Set the element in application.xml

Full Access
Question # 19

You are responsible for configuring a WebLogic domain to support an order processing application. This application will communicate with multiple JDBC data sources to fulfill each customer order. To maintain data integrity across these databases, work will be performed within a global transaction. However, you have learned that one of the data sources in the transaction does not have an XA driver.

Which option should you select on this non-XA data source to ensure that orders are still processed as global transactions?

A.

Ignore Heuristics

B.

Pinned to Thread

C.

One Phase Commit

D.

Logging Last Resource

E.

Test Connections on Reserve

Full Access
Question # 20

You are using the Configuration Wizard to create a new domain that will consist of a cluster of three managed servers along with an instance of WebLogic Server acting as HTTP proxy to distribute traffic to the cluster.

Which three steps should you perform with the Configuration Wizard? (Choose three.)

A.

Create one cluster.

B.

Install Oracle HTTP Server.

C.

Create one Coherence server.

D.

Create four managed servers.

E.

Assign three servers to a cluster.

F.

Specify a proxy port for the administration server.

Full Access
Question # 21

Consider an application that comprises both web and EJB components.

What are two benefits of implementing a multitier cluster architecture over a single-tier(basic) cluster architecture? (Chose two.)

A.

Dynamic clusters are only supported for the multitier architecture

B.

Remote EJB access is blocked

C.

Each cluster can be scaled independently

D.

Future web clusters can share the same EJB tier

E.

All servers can be managed (started/stopped) together

Full Access
Question # 22

Select two ways to start the Java-based Node Manager on a Linux machine. (Choose two.)

A.

Use the startNodeManager.sh script

B.

Use the administration console. Select the machine and then click the Start button.

C.

Have Node Manager start at system boot as a daemon

D.

Use the Oracle Process Manager and Notification Server (OPMN) to start Node Manager as a system process

E.

Set the appropriate environment variables. Then run the Java virtual machine with the class nodemanager.RunTime, passing the class the proper parameters.

Full Access
Question # 23

You require high availability for HTTP sessions in a web application. In addition, you have the following constraints:

• There is little free memory on the machines hosting the cluster.

• HA must be guaranteed even when multiple machines fail simultaneously.

• You are not allowed to update the production databases schema.

Which is the best session persistence option?

A.

Database persistence

B.

File persistence

C.

In-memory replication

D.

Whole-server migration

Full Access
Question # 24

A WebLogic Server (WLS) domain was recently updated from WLS 10.3.6 to WLS 12.1.12.

What is the mode of operation of the Node Manager after the update and what is needed to keep the same behavior as in WLS 10.3.6?

A.

Nothing, Node Manager runs and behaves the same on both WLS versions

B.

Node Manager runs in “per machine” mode and nothing is needed to keep the same behavior.

C.

Node Manager runs in “per domain” mode and requires manual steps to return to “per machine” mode, used in WLS 10.3.6.

D.

Node Manager mode of operating and behavior can be selected in Reconfiguration Wizard.

Full Access
Question # 25

You are troubleshooting Java Transaction API (JTA) transactions.

The WebLogic Server extension to JTA provides which optional transaction attribute to make troubleshooting easier?

A.

a name

B.

an ID

C.

the status of “marked for rollback”

D.

a status

Full Access
Question # 26

GridLink data sources are designed for use with an Oracle RAC database. By using the Fast Connection Failover (FCF) pattern, GridLink data sources can quickly react when a RAC node goes down.

Which two statements are true? (Choose two.)

A.

The Oracle Notification Service is used to notify the data source of changes to RAC nodes.

B.

The reaction is quick, because in using FCF all network timeouts are set very low.

C.

FCF is faster because it polls and tests connection, freeing the data source from these tasks.

D.

FCF requires the use and configuration of a database server in the GridLink data source.

E.

You can use any Oracle Thin database driver with a GridLink data source.

Full Access
Question # 27

To support a growing application workload, you need to scale out an existing (nondynamic) cluster. You power up the new hardware and install WebLogic server.

Which two changes are mandatory for you to make to your domain configuration? (Choose two.)

A.

Create a new deployment plan.

B.

Create a new machine.

C.

Create a new server.

D.

Add a server to the cluster.

E.

Add a server to the machine.

F.

Add the cluster to the machine.

Full Access
Question # 28

Examine the partial server log entry shown below:

####

<> < > < > < 1369013281005 >

Which two statements are true? (Choose two.)

A.

The server’s name is OracleDS1.

B.

The server’s machine name is host01.

C.

The transaction ID is 001129.

D.

The JDBC subsystem generated the message.

E.

The user’s identity is managed1.

F.

The severity level of the message is Critical.

Full Access
Question # 29

You decide to use a database to store WebLogic Server transaction logs for a managed server.

Which two steps are required to configure this? (Choose two.)

A.

Under the managed server's Services configuration select “JDBC” as the type for the transaction log store.

B.

Under the managed server's Services configuration, select “Disable the Default Store”.

C.

Create a non-XA data source in the domain for the database transaction log.

D.

Create an XA data source in the domain for the database transaction log.

Full Access
Question # 30

You access the Deployments page from the Administration Console. The targets and state of each application are displayed. One web application named web1 is targeted to server1 and is in the NEW state.

Which statement is true?

A.

web1 is available but has never been accessed

B.

server1 is in standby mode

C.

server1 is not running

D.

web1 is in the process of being deployed to server1

Full Access
Question # 31

Which statement is true about stopping Node Manager?

A.

If you stop Node Manager, the managed servers it started will also stop.

B.

You may kill the Node Manager process by using operating system commands.

C.

Use the stopNodeManager.sh script so Node Manager stops gracefully.

D.

Using the administration console, select the appropriate machine and click Stop.

E.

The administration server goes into ADMIN mode if it can no longer communicate with Node Manager.

F.

The managed servers that Node Manager started go into ADMIN mode if they can no longer communicate with Node Manager.

Full Access
Question # 32

During a performance test, a server’s log includes several OutOfMemoryError messages. You are using the Administration Console.

How can you verify the amount of available heap in the server?

A.

Click the server ‘s Debug > Heap tab.

B.

Click the server’s Debug > Health tab.

C.

Click the server’s Monitoring > Health tab.

D.

Click the server’s Monitoring > Threads tab.

E.

Click the server ‘s Monitoring > Performance tab.

Full Access
Question # 33

Consider a multiple node domain. On the administration server’s node, you edit setDomainEnv.sh in the bin directory and add a new JAR file to the CLASSPATH. You stop and restart all three WebLogic Server in the domain. Upon investigation, you discover that only applications deployed to one WebLogic Server are able to access the JAR file code. How do you explain this?

A.

You must also set the domain attribute “CLASSPATH Discovery Enabled.”

B.

Each machine that hosts WebLogic Servers has its own domain directories. The script must be modified there as well.

C.

Only the first server to receive the new configuration from the administration server gets the updated CLASSPATH

D.

The CLASSPATH is not for application code. It is for interval WebLogic Server code. So, only applications deployed to the administrative server can access code through the CLASSPATH

Full Access
Question # 34

Your server includes an application that users a generic JDBC data source to connect to a database. However, the network connection between the server and the database is not 100% reliable.

Identify two data source attributes that, if set properly can help avoid situations in which the application fails due to a failed JDBC connection. (Choose two.)

A.

Statement Cache Type

B.

Pool Reserve Mode

C.

Test Table Name

D.

Test Connection Mode

E.

Test Connections on Reserve

Full Access
Question # 35

Your developers created Plain Old Java Objects (POJO) that provide useful functionality. The code is packaged in a JAR file. You want to make this code accessible from all the applications deployed to the managed servers in your domain. What are the four ways to accomplish this? (Choose four.)

A.

Include the JAR file as an optional package

B.

Deploy the JAR file as an EJB

C.

Deploy the JAR file as a shared library

D.

Place the JAR file in the lib folder of the domain

E.

Deploy the JAR file to the administration server. All managed servers have access to their admin server

F.

Add the JAR file to the CLASSPATH of the domain servers by editing the domain’s seyDomainEnv.sh script

G.

Deploy the JAR file as another web application

Full Access
Question # 36

You are troubleshooting why transactions are not being committed. After investigation, you realize that these transactions have enough time during the first phase of the two-phase commit, but not enough time during the second phase. Therefore, rather than committing, they are timing out and are being rolled back.

Which Java Transaction API (JTA) attribute needs a larger value?

A.

Timeout Seconds

B.

Abandon Timeout Seconds

C.

Before Completion Iteration Limit

D.

Checkpoint Interval Seconds

E.

Unregister Resource Grace Period

Full Access
Question # 37

View the following file excerpt, which configures HTTP session replication:

replicated

From which file is this excerpt taken?

A.

weblogic-application.xml

B.

session.xml

C.

web.xml

D.

config.xml

E.

weblogic.xml

Full Access
Question # 38

Which two statements are true about WebLogic data sources? (Choose two.)

A.

Data sources are targeted to a domain.

B.

Data sources are bound in the JNDI tree of a server.

C.

Data sources are based on the JMS specification.

D.

A data source contains a connection pool.

E.

A domain requires at least one data source.

Full Access