Question: 1
When you use the Embedded LDAP that is supplied by Oracle WebLogic Server, which three statements are true?
A The Embedded LDAP can be used to store user, group, security roles and security policies for the WebLogic security providers.
B The Embedded LDAP uses the file system to store Weblogic security provider data.
C The Embedded LDAP can be accessed by an external LDAP viewer.
D The Embedded LDAP cannot be used in a production environment
E The Embedded LDAP can store Auditing Data.
A: The embedded LDAP server contains user, group, group membership, security role, security policy, and credential map information.
C: The credential (usually a password) used to connect to the embedded LDAP server. If this password has not been set, WebLogic Server generates a password at startup, initializes the attribute, and saves the configuration to the config.xml file. If you want to connect to the embedded LDAP server using an external LDAP browser and the embedded LDAP administrator account (cn=Admin), change this attribute from the generated value.
E: You can use either the WebLogic Auditing provider or a custom Auditing provider in a security realm. Although an Auditing provider is configured per security realm, each server writes auditing data to its own log file in the server directory. By default, all auditing information recorded by the WebLogic Auditing provider is saved in the following file:
WL_HOME\yourdomain\yourserver\DefaultAuditRecorder.log.
By writing a custom Auditing provider, however, you can send the records containing audit information to any one of various output repositories, such as an LDAP server, database, or a simple file.
Answer : A, C, E
Show Answer
Hide Answer
Question: 2
Over time you server log files have increased in size to over 500 MB.
Identify three technique to help decreased the size of these log files.
Question: 3
The development group supplied you with the latest WAR file for the company web application. It has been thoroughly tested and needs to be placed into production. In the production file system, you copy over the previous WAR file the new version. You log into the administration console and redeploy the application. Current users continue to access the older version of the application, while new users are taken to the new version.
Explain this scenario.
Question: 4
You successfully deployed an application on WebLogic 12c but notice that its deployment name is different than what you expected.
After checking various places and making deployment attempts, you decide to be on the safe side and just use the method that takes precedence over the others when setting the deployment name.
Which method should you use to override the default deployment name?
Question: 5
Consider a Weblogic Java EE application that uses a JDBC data source.
Which three steps would the application developer typically write code to perform?