WebLogic Interview and
Certification Questions
1) Oracle WebLogic Server 10.3.1 is
certified with JDK 1.6.
1. True
2. False
2. False
2) Net installer is
preferred over the package installer if you want to install select
components using only the Custom option and have access to the Internet.
1. True
2. False
2. False
3) Which JDK does
Oracle WebLogic Server 10.3.1 come bundled with for a Linux platform?
1. Sun SDK 1.6
2. JRockit SDK 1.6
3. Both
2. JRockit SDK 1.6
3. Both
4) Which directory
within a domain directory is used to maintain its configuration
repository?
1. /console
2. /cache
3. /config
4. /logs
5. /AdminServer
2. /cache
3. /config
4. /logs
5. /AdminServer
5) Invoke the Domain
Configuration Wizard by using _____.
1. config.sh under
/common/bin
2. config_builder.sh under/common/bin
2. config_builder.sh under
6) What is the main
configuration file for the domain called?
1. configuration.xml
2. wlsconfig.xml
3. wls.xml
4. config.xml
2. wlsconfig.xml
3. wls.xml
4. config.xml
7) You can use boot
identity files to start the following without being prompted for the administrator
username and password.
1. Managed servers
2. Administration server
3. Both
2. Administration server
3. Both
8 ) Which of the
following statements is NOT true?
1. Managed servers in
a domain may run a different OS version of Oracle WebLogic Server (for example,
Windows + Linux).
2. A domain comprises
only the administration server, only the managed server, or the administration
and managed servers.
3. The administration
server stores the configuration information and logs for a domain.
4. The administration
server in a domain must run the same or later version number of Oracle WebLogic
Server as the managed servers in the domain.
9) Where are all
users, groups, and roles stored by default?
1. Oracle Database
2. PointBase Database
3. Oracle Internet Directory
4. LDAP store of the administration server
2. PointBase Database
3. Oracle Internet Directory
4. LDAP store of the administration server
10) Invoke the
Template Configuration Wizard using _____.
1. config.sh under
/common/bin
2. config_builder.sh under/common/bin
2. config_builder.sh under
11) When you create a
new domain to automatically support Oracle WebLogic Server, which template is
it based on by default?
1. wlst.jar
2. ws.jar
3. web_server.jar
4. server.jar
5. wls.jar
2. ws.jar
3. web_server.jar
4. server.jar
5. wls.jar
12) Which of the
following can you use to create a domain template:
1. The pack command
2. config_temp.sh
3. The Administration Console
4. config_builder.sh
5. The WLST offline command-line tool
2. config_temp.sh
3. The Administration Console
4. config_builder.sh
5. The WLST offline command-line tool
13) Which link would
you click in the console to add or remove columns to or from a monitoring page?
1. Customize this
table
2. Change Monitoring View
3. Update Columns
4. Manage Preferences
2. Change Monitoring View
3. Update Columns
4. Manage Preferences
14) WLST communicates
with Oracle WebLogic Server’s ____ to retrieve and update resources on a
running server.
1. Templates
2. Logs
3. Mbeans
4. Scripts
2. Logs
3. Mbeans
4. Scripts
15) The ______ panel
in the Administration Console uses a tree to represent your domain resources.
1. Preferences
2. Domain Structure
3. How do I?
4. Change Center
2. Domain Structure
3. How do I?
4. Change Center
16) The Administration
Console is unavailable if the administration server is shut down.
1. True
2. False
2. False
17) Both the
administration server and the managed servers can be started by using the
Administration Console.
1. True
2. False
2. False
18) Using WLST’s _____
mode, you can supply commands one at a time and get immediate feedback.
1. Management
2. Operational
3. Sequential
4. Template
5. Interactive
2. Operational
3. Sequential
4. Template
5. Interactive
19) Under the servers
directory of WLS domain, there are subdirectories for administration and
managed servers. The servers directory contains one subdirectory for each
WebLogic Server instance in the domain. If you do not see the subdirectory for
each WebLogic Server instance in your domain, it means that:
1. The WebLogic Server
instance is not correctly configured.
2. The patch level is not correct.
3. The administration server is unable to communicate with the managed servers.
4. The WebLogic Server instance has not been started since it was created.
2. The patch level is not correct.
3. The administration server is unable to communicate with the managed servers.
4. The WebLogic Server instance has not been started since it was created.
20) Which of the
following will happen if you run startWebLogic.sh without any options?
1. It invokes java
weblogic.Server.
2. It starts the managed servers associated with the administration server.
3. It sets the environment using setDomainEnv.sh.
4. It starts the administration server.
2. It starts the managed servers associated with the administration server.
3. It sets the environment using setDomainEnv.sh.
4. It starts the administration server.
21) Which of the
following options would you use to create a managed server?
1. Domain
Configuration Wizard
2. Administration Console
3. Command line (WLST)
2. Administration Console
3. Command line (WLST)
22) Which of the
following is true when the administration server is down?
1. Domain log entries
are unavailable.
2. Managed servers can start in MSI mode.
3. The Administration Console and management tools are unavailable.
4. At boot time, managed servers read a local copy of config.xml, SerializedSystemIni.dat, and boot.properties (optional).
5. You cannot change the configuration of the managed servers that are running in MSI mode until communication with the administration server is restored.
6. The Node Manager can start the managed servers in MSI mode.
2. Managed servers can start in MSI mode.
3. The Administration Console and management tools are unavailable.
4. At boot time, managed servers read a local copy of config.xml, SerializedSystemIni.dat, and boot.properties (optional).
5. You cannot change the configuration of the managed servers that are running in MSI mode until communication with the administration server is restored.
6. The Node Manager can start the managed servers in MSI mode.
23) You can start a
managed server using WLST and without using a Node Manager.
1. True
2. False
2. False
24) Which of the
following statements is true?
1. There is one Node
Manager for each machine.
2. There is one Node Manager for each domain.
3. There is one Node Manager for each cluster.
2. There is one Node Manager for each domain.
3. There is one Node Manager for each cluster.
25) To start a managed
server using the Administration Console, a Node Manager must be configured on
the machine where the managed server resides.
1. True
2. False
2. False
26) Which is NOT a
standard severity level for Oracle WebLogic Server log messages?
1. Debug
2. Transaction
3. Info
4. Notice
5. Error
2. Transaction
3. Info
4. Notice
5. Error
27) Which environment
supports FastSwap?
1. Production mode,
archived files
2. Production mode, expanded files
3. Development mode, archived files
4. Development mode, expanded files
5. All of the above
2. Production mode, expanded files
3. Development mode, archived files
4. Development mode, expanded files
5. All of the above
28) What is the
web.xml tag indicating the test point for testing applications?
1.
2.
3.
4.
5.
2.
3.
4.
5.
29) It is possible to
deploy an exploded directory that contains JAR files.
1. True
2. False
2. False
30) A ____________ is
a reusable Oracle WebLogic Server application that can be referenced by other
deployed applications.
1. Java library
2. Shared library
3. Web library
4. Composite library
5. Reference library
2. Shared library
3. Web library
4. Composite library
5. Reference library
31) Which of the
following is NOT a supported type of application in Oracle WebLogic Server?
1. Enterprise
application
2. EJB application
3. Process application
4. Web service application
5. Web application
2. EJB application
3. Process application
4. Web service application
5. Web application
32) Which of the
following are valid Oracle WebLogic Server deployment descriptor files for
configuring applications?
1. weblogic-webapp.xml
2. weblogic-ejb-jar.xml
3. weblogic.xml
4. weblogic-application.xml
5. weblogic-library.xml
2. weblogic-ejb-jar.xml
3. weblogic.xml
4. weblogic-application.xml
5. weblogic-library.xml
33) Which of the
following is NOT true about the deployment plans in Oracle WebLogic Server?
1. Overrides values in
application descriptors
2. Can be created by Oracle WebLogic Server during deployment
3. Is packaged within an application archive
4. Is an XML file
5. Can be created with weblogic.PlanGenerator
2. Can be created by Oracle WebLogic Server during deployment
3. Is packaged within an application archive
4. Is an XML file
5. Can be created with weblogic.PlanGenerator
34) When an
application is in the ___________ state, it is distributed to the servers, but
is not yet available to clients:
1. Activated
2. Staged
3. Targeted
4. Prepared
5. Loaded
2. Staged
3. Targeted
4. Prepared
5. Loaded
35) Name four
techniques or tools that can be used to deploy new applications to Oracle
WebLogic Server.
1. Administration
Console
2. WLST
3. weblogic.PlanGenerator
4. weblogic.Deployer
5. JMS
6. Autodeployment
2. WLST
3. weblogic.PlanGenerator
4. weblogic.Deployer
5. JMS
6. Autodeployment
36) Which of the
following is NOT an available configuration attribute for a JDBC data source?
1. Host name
2. Queue size
3. Test frequency
4. Initial capacity
5. Capacity increment
2. Queue size
3. Test frequency
4. Initial capacity
5. Capacity increment
37) Which are the two
levels of data sources available in Oracle WebLogic Server?
1. Connection
2. Web
3. Application
4. Process
5. System
2. Web
3. Application
4. Process
5. System
38) Client
applications look up data sources from the local server’s ___________ tree:
1. Application
2. Web
3. LDAP directory
4. JNDI
5. System
2. Web
3. LDAP directory
4. JNDI
5. System
39) Which are the
correct messaging model and JMS destination type associations?
1. Queue:
Publish/Subscribe
2. Queue: Point-to-Point
3. Topic: Publish/Subscribe
4. Topic: Point-to-Point
2. Queue: Point-to-Point
3. Topic: Publish/Subscribe
4. Topic: Point-to-Point
40) Which are the
available resource types within an Oracle WebLogic Server JMS module?
1. Connection factory
2. Queue
3. Topic
4. Server
5. Store
2. Queue
3. Topic
4. Server
5. Store
41) Which of the
following is a benefit of multitier cluster architecture?
1. Requires fewer
servers compared to the basic architecture
2. Possibility to load-balance method calls to clustered EJBs
3. Easier security implementation
4. None
2. Possibility to load-balance method calls to clustered EJBs
3. Easier security implementation
4. None
42) In a multitier
cluster architecture where you want to load-balance EJB objects, you configure
them:
1. Within one cluster
2. In different clusters
3. Along with the Web-tier clients in the same server
4. In different domains
2. In different clusters
3. Along with the Web-tier clients in the same server
4. In different domains
43) Which of the
following is NOT an available configuration attribute associated with Oracle
WebLogic Cluster?
1. Messaging mode
2. Multicast TTL
3. Multicast port
4. Broadcast server
2. Multicast TTL
3. Multicast port
4. Broadcast server
44) Select all valid
values for the persistent store type element in weblogic.xml.
1. file
2. Replicated
3. Unicast
4. async-replicated-if-clustered
5. Jdbc
6. async-wan
2. Replicated
3. Unicast
4. async-replicated-if-clustered
5. Jdbc
6. async-wan
45) Which two Oracle
WebLogic Server features can be used to control the destination servers that
are used for in-memory replication?
1. Web service
2. Replication group
3. Data source
4. Node Manager
5. Machine
2. Replication group
3. Data source
4. Node Manager
5. Machine
46) Which of the
following terms is NOT associated with in-memory replication?
1. Cookie
2. Secondary
3. Session
4. Schema
5. Primary
6. Synchronous
2. Secondary
3. Session
4. Schema
5. Primary
6. Synchronous
47) Which types of
replication configuration are allowed for EJBs?
1. JDBC
2. File
3. InMemory
4. None
2. File
3. InMemory
4. None
48) The Hostname
Verifier is one measure for combating this type of attack:
1. Large buffer
2. Connection starvation
3. Man in the middle
4. User lockout
2. Connection starvation
3. Man in the middle
4. User lockout
49) To counter
connection starvation attacks, you can set:
1. Max Post Size
2. Post Timeout
3. Hostname Verifier
4. User lockout
2. Post Timeout
3. Hostname Verifier
4. User lockout
50) What mode must the
Middleware software be in to perform a full backup?
1. Online
2. Offline
3. Either online or offline
4. Neither. A full backup is technically impossible.
2. Offline
3. Either online or offline
4. Neither. A full backup is technically impossible.
51) What is another
name for an inconsistent backup?
1. Hot
2. Cold
3. Either online or offline
4. Broken. If it is inconsistent, there is something wrong with it.
2. Cold
3. Either online or offline
4. Broken. If it is inconsistent, there is something wrong with it.
52) When making a TAR
backup in UNIX, what is a key point to remember?
1. Make it from the
lowest directory possible, as far from root as practical.
2. Make sure that you perform the backup signed on as the owner of the Middleware Home directory.
3. Make sure that you preserve the original owner, group, and permissions.
4. Make sure that all Middleware processes are stopped.
2. Make sure that you perform the backup signed on as the owner of the Middleware Home directory.
3. Make sure that you preserve the original owner, group, and permissions.
4. Make sure that all Middleware processes are stopped.
53) The configuration
archive is enabled by default.
1. True
2. False
2. False
54) What happens if
you have a backup administration server?
1. You are allowed to
have only one administration server. If it fails, the managed servers run in
MSI mode until your one administration server comes back.
2. It runs simultaneously with the primary administration server in a load-sharing mode.
3. It can run in a warm standby keeping itself in sync with the main administration server.
4. It must be in cold standby and you have to sync it with the main administration server manually.
2. It runs simultaneously with the primary administration server in a load-sharing mode.
3. It can run in a warm standby keeping itself in sync with the main administration server.
4. It must be in cold standby and you have to sync it with the main administration server manually.
1) Name three
capabilities of Smart Update.
a. Update a domain’s
configuration.
b. Download a maintenance pack.
c. Apply a product patch.
d. Add a patch to the server classpath.
e. Create a domain from a template.
b. Download a maintenance pack.
c. Apply a product patch.
d. Add a patch to the server classpath.
e. Create a domain from a template.
2) What file is
responsible for including patch JAR files in the server classpath?
a.
nodemanager.properties
b. weblogic_patch.jar
c. maintenance.jar
d. setWLSEnv.sh
e. boot.properties
b. weblogic_patch.jar
c. maintenance.jar
d. setWLSEnv.sh
e. boot.properties
3) Which of the
following is NOT a feature of domain templates?
a. SQL scripts
b. Start menu entries
c. Email notifications
d. Variable replacement
b. Start menu entries
c. Email notifications
d. Variable replacement
4) Which two types of
domain resources are NOT included in an extension template?
a. Data Source
b. Cluster
c. Application
d. JMS Module
e. Server
b. Cluster
c. Application
d. JMS Module
e. Server
5) What tool is used
to create managed server templates?
a. Template Builder
b. Configuration Wizard
c. ConfigToScript
d. Pack
b. Configuration Wizard
c. ConfigToScript
d. Pack
6) What WLST command
is used to apply an extension template to an existing domain?
a. extendDomain
b. addTemplate
c. importToDomain
d. applyAll
b. addTemplate
c. importToDomain
d. applyAll
7) Which of the
following is NOT a use of network channels?
a. Entitle application
users
b. Open multiple ports on a single server
c. Dedicate a port to administration traffic
d. Maintain separate settings for multiple network interfaces
b. Open multiple ports on a single server
c. Dedicate a port to administration traffic
d. Maintain separate settings for multiple network interfaces
8 ) Name three
protocols that you can assign to a network channel.
a. ORCL
b. T3
c. HTTPS
d. VNC
e. ADMIN
b. T3
c. HTTPS
d. VNC
e. ADMIN
9) Which of the
following is a data source attribute associated with connection testing?
a. Test Statement
b. Test Capacity
c. Test Table Name
d. Test LLR
b. Test Capacity
c. Test Table Name
d. Test LLR
10) Name three
attributes used to configure a multi data source.
a. Statement Cache
Type
b. Logging Last Resource
c. Algorithm Type
d. Failover Request if Busy
e. JNDI Name
b. Logging Last Resource
c. Algorithm Type
d. Failover Request if Busy
e. JNDI Name
11) What data source
attribute affects the growth of the connection pool size at run time?
a. Capacity Increment
b. Algorithm Type
c. Cache Size
d. Pinned To Thread
b. Algorithm Type
c. Cache Size
d. Pinned To Thread
12) Name two values
that the Statement Cache Type attribute supports?
a. LRU
b. Shrink
c. Pinned
d. Fixed
b. Shrink
c. Pinned
d. Fixed
13) Name four JMS
management operations available in WLS.
a. View the contents
of a message
b. Encrypt the contents of a message
c. Add a message to a destination
d. Pause the production of messages of a destination
e. Move a message to another destination
b. Encrypt the contents of a message
c. Add a message to a destination
d. Pause the production of messages of a destination
e. Move a message to another destination
14) Name three types
of operations that can be individually paused on a JMS destination.
a. Insertion
b. Consumption
c. Presumption
d. Transaction
e. Production
b. Consumption
c. Presumption
d. Transaction
e. Production
15) Which of the
following is true about JDBC stores?
a. The store does not
require a separate data source.
b. Store DDL files must be placed in your domain.
c. Each store must use a dedicated table.
d. JMS connection factories must specify a client ID.
b. Store DDL files must be placed in your domain.
c. Each store must use a dedicated table.
d. JMS connection factories must specify a client ID.
16) Which two values
can the Delivery Mode message header be set to?
a. Non-persistent
b. At-most-once
c. Exactly-once
d. Persistent
b. At-most-once
c. Exactly-once
d. Persistent
17) Name the two types
of blocking policies for JMS quotas.
a. Preemptive
b. FIFO
c. Throttled
d. LRU
e. Acknowledge
b. FIFO
c. Throttled
d. LRU
e. Acknowledge
18) What WLS JMS
feature can be used to guarantee the sequence in which messages are consumed?
a. Imported
Destination
b. Quota Blocking Policy
c. Unit of Order
d. Scan Expiration Interval
b. Quota Blocking Policy
c. Unit of Order
d. Scan Expiration Interval
19) Which of the
following is NOT a type of resource associated with JMS store and forward?
a. Remote context Y
b. Imported destinations Y
c. Error handling Y
d. Agent Y
e. Adapter
b. Imported destinations Y
c. Error handling Y
d. Agent Y
e. Adapter
20) Which of these is
an available attribute for a Remote SAF Context resource?
a. Local JNDI Name
b. URL
c. Agent Type
d. Time-to-Live
b. URL
c. Agent Type
d. Time-to-Live
21) How many JMS
bridge adapters ship with WebLogic Server?
a. 0
b. 1
c. 2
d. 3
e. 4
b. 1
c. 2
d. 3
e. 4
22) Which of these is
an available Message Bridge attribute?
a. XA Enabled
b. Connection URL
c. Local JNDI Name
d. Quality of Service
b. Connection URL
c. Local JNDI Name
d. Quality of Service
23) Who in a cluster
is responsible for initiating an automatic whole server migration?
a. Node Manager
b. Database procedure
c. Cluster Master
d. Migratable target
b. Database procedure
c. Cluster Master
d. Migratable target
24) What type of
leasing basis does not employ a database?
a. Exactly-once
b. WAN
c. Migratable
d. Consensus
b. WAN
c. Migratable
d. Consensus
25) Name three types
of server resources that can be targeted to a migratable target.
a. Diagnostic module
b. Persistent store
c. Web application
d. SAF agent
e. JMS server
b. Persistent store
c. Web application
d. SAF agent
e. JMS server
26) Which of the
following is NOT taken into account when load balancing JMS clients?
a. Number of consumers
b. Server affinity
c. Migratable target
d. Transaction affinity
e. No persistent store
b. Server affinity
c. Migratable target
d. Transaction affinity
e. No persistent store
27) Which types of
WebLogic Server session persistence require a database?
a. Memory
b. MAN
c. WAN
d. Cookie
e. JDBC
b. MAN
c. WAN
d. Cookie
e. JDBC
28) Which of these is
a required cluster attribute for cross-cluster replication?
a. Remote Cluster
Address
b. Migration Basis
c. Client ID
d. Candidate Machines
b. Migration Basis
c. Client ID
d. Candidate Machines
29) Name four
authentication providers supplied with WebLogic Server.
a. LDAP Authenticator
b. Principal Authenticator
c. OpenLDAP Authenticator
d. SQL Authenticator
e. Custom DBMS Authenticator
f. Schema Authenticator
b. Principal Authenticator
c. OpenLDAP Authenticator
d. SQL Authenticator
e. Custom DBMS Authenticator
f. Schema Authenticator
30) Which of the
following is NOT an available authentication provider control flag?
a. SUFFICIENT
b. REQUISITE
c. OPTIONAL
d. ALWAYS
e. REQUIRED
b. REQUISITE
c. OPTIONAL
d. ALWAYS
e. REQUIRED
31) What two values
can the Group Membership Searching authentication provider attribute be set to?
a. Unlimited
b. Restricted
c. Limited
d. Subtree
b. Restricted
c. Limited
d. Subtree
32) Name three
components of the The Grinder tool.
a. Proxy
b. Agent
c. Profiler
d. Chunk
e. Console
b. Agent
c. Profiler
d. Chunk
e. Console
33) What term refers
to garbage collection algorithms that are based on object age?
a. Heaping
b. Timed
c. Generational
d. Precompiled
b. Timed
c. Generational
d. Precompiled
34) Which of the
following is NOT a type of work manager request class?
a. Context
b. Fair Share
c. Response Time
d. Cluster
b. Fair Share
c. Response Time
d. Cluster
35) Name four tools
that can be used to monitor WLS.
a. FMW Control
b. WLST
c. SWSS
d. WLDF
e. NMP
b. WLST
c. SWSS
d. WLDF
e. NMP
36) What WLST command
is necessary to monitor the health or performance of WLS resources?
a. serverConfig()
b. redeploy()
c. startEdit()
d. serverRuntime()
e. validate()
b. redeploy()
c. startEdit()
d. serverRuntime()
e. validate()
37) Which of the
following is NOT an available action for a WLDF monitor (instrumentation)?
a. Trap Destination
b. Stack Dump
c. Elapsed Time
d. Display Arguments
e. Thread Dump
b. Stack Dump
c. Elapsed Time
d. Display Arguments
e. Thread Dump
38) Which of the
following is NOT a configuration attribute for WLS SNMP agents?
a. Trap Version
b. Data Source
c. Community Prefix
d. Inform Enabled
e. Engine ID
b. Data Source
c. Community Prefix
d. Inform Enabled
e. Engine ID
No comments:
Post a Comment