Can’t cahnge application’s deployment targets
Can’t cahnge application’s security model
Can’t cahnge application’s node manager
Can’t cahnge application’s persistent store settings
第1题:
An enterprise has three nodes: -Node ’A’ is a production database, -Node ’B’ is a production Application server, and -Node ’C’ is a test and development node. Node ’C’ is used by six programmers to develop and the production application as business critical and would like to make it highly available with HACMP. Application development and testing is not business critical. Which of the following describes the best solution?()
第2题:
A user has an application server LPAR with a physical Ethernet adapter. They want to have a database LPAR also connected to the application LPAR via virtual Ethernet. Their security policies require a firewall between the application LPAR and database LPAR. Which of the following virtual Ethernet configurations satisfies the customer’s requirements?()
第3题:
Which of the following fragments might cause errors?()
第4题:
A customer claims that while redeploying a web application in the production system all their customers are having to log in again. What do you recommend? ()
第5题:
Which two of the following are the imposed restrictions to production redeployment in WebLogic Server ?()
第6题:
You use Microsoft .NET Framework 4 to create a Windows application. You plan to deploy the application by using Trusted Application Deployment. The application can only be installed by users who have elevated permissions. You need to ensure that users are not prompted for additional permissions when they install the application. Which two actions should you perform? ()
第7题:
/conf/web.xml
/WEB-INF/web.xml
/conf/server.xml
/META-INF/web.xml
/WEB-INF/rules.xml
/META-INF/server. Xml
第8题:
Disabling connections from named pipes or socket files (depending on the operating system of the server)
Enabling and using SSL for connections to the Mysql database
Installing Mysql on the application server, and running the database and application on the same server
Starting the server with – bind- address=0.0.0.0 specified
Running the server with – skip-networking specified
Limiting logins to originate from the application server or the server's subnet'
第9题:
String s = Gone with the wind;String t = good ;String k = s + t;
String s = Gone with the wind;String t;t = s[3] + one;
String s = Gone with the wind;String standard = s.toUpperCase();
String s = home directory;String t = s - directory;
第10题:
Can the application use Hot Swap Processor, Memory, and PCI-X technology?
Will the application benefit from larger disk cache and swap space?
Will the application run faster with Microsoft OLTP technology?
What is the application's maximum processor scaling capability?
第11题:
Can’t cahnge application’s deployment targets
Can’t cahnge application’s security model
Can’t cahnge application’s node manager
Can’t cahnge application’s persistent store settings
第12题:
Database client and database server
WebSphere Application Server and Database Server
WebSphere Commerce Server and WebSphere Application Server
Web server and WebSphere Application Server
第13题:
An enterprise has two nodes: -Node ’A’ runs a large relational database and ha six CPUs and 32GB of memory. -Node ’B’ is an application server with three CPU’s and 16GB of memory. During peak production periods, the CPU load for Node ’A’ is normally between 30% and 40%. For Node ’B’, the CPU load is 10% to 20% during peak production periods. Which of the following describes the best solution for an HACMP cluster?()
第14题:
Which path, relative to a web application’s root, identifies the web application’s deployment descriptor?()
第15题:
Which two statements are true about the WebLogic Server domains ? ()
第16题:
In a typical production environment, which server(s) hosts the application ?()
第17题:
What two statements are true about Oracle Enterprise Manager’s Java Diagnostic tool, which makes the tool suitable for production server diagnostics ?()
第18题:
In a two-tier configuration, it is recommended to put which of the following components on different nodes?()
第19题:
Authorization
Data integrity
Confidentiality
Authentication
第20题:
Use Oracle Upgrade Manager to create a new WebLogic domain template from an OAS/OC4J installation and redeploy the application.
Use SmartUpgrade to analyze the OAS/OC4J server configuration and create WebLogic configuration files.
Use SmartUpgrade to analyze the application archive (EAR/WAR/JAR) Source Directory or IDeveloper project and generate a report that describes the areas of the application that need to be updated.
Use the Configuration Wizard to extend an existing WebLogic domain with OAS/OC4J support libraries and redeploy the application.
Use SmartUpgrade to generate application artifacts and deployment descriptors that can be deployed to WebLogic.
第21题:
virtually zero overhead for application running in the JVM
no stalling of running JVM when taking a heap dump for memory analysis
no need of modification, changes, or instrumentation of the application since is uses Network Protocol Analysis (NPA technology)
provides Byte Code Instrumentation for Java
第22题:
The application server,firewall,and database server on the same VLAN
The application server and firewall on one VLAN,and the database server on a second VLAN
The application server on one VLAN,and the database server and firewall on a second VLAN
The application server and firewall on one VLAN,and the firewall and database server on a second VLAN
第23题:
Obfuscate the assemblies.
Configure the application as online only.
Enable User Account Control (UAC) on all client computers.
Sign the deployment manifest with the publisher's digital certificate.
Add the publisher of application to the trusted publisher's store on all client computers.
第24题:
Node Server
Administration Server
Managed Server
Configuration Server