Free 1Z0-134 Exam Braindumps

I am configuring the security policy for my JMS module. I am specifying some security conditions for the module.
Which two security conditions are valid in this context? (Choose two.)

  1. The JMS module can be accessed only between 1 pm and 6 pm.
  2. The JMS module should throw a custom security exception on invalid access.
  3. The JMS module can process only 50 messages at a time.
  4. The JMS module can be accessed only by users belonging to the Operators group.
  5. The JMS module can be accessed in a receive-only mode.

Answer(s): A,D

Explanation:

There are two security conditions:
* time-constrained
* By Group or User


Reference:

http://docs.oracle.com/html/E24401_02/taskhelp/jms_modules/modules/ConfigureJMSModuleSecurityPolicies.html



You are using the WebLogic Diagnostic Framework (WLDF) to monitor your domain for certain scenarios based on runtime data of your running servers. Different groups are responsible for different aspects of the application.

As a result, your configuration must fulfill the following requirements:

Notifications must be sent only to the correct group that is responsible for the respective part of the application.
You must ensure that you can enable and disable monitoring for each level whenever it is needed.

How would you configure WLDF watches and notifications to achieve this result? (Choose the best answer.)

  1. Configure a single module with a watch for each area, and use a notification filter to send an email to the correct group for each area.
  2. Configure a module for each area with a watch that triggers a notification email for the group responsible for that area.
  3. Configure a single module with a watch for each area, and each watch triggers a notification email for the group responsible for that area.
  4. Configure a module for each area with a watch that uses a notification filter to send an email to the correct group for each area.

Answer(s): C



As the WebLogic domain administrator, you have been asked to create a new cluster and to establish load balancing of JMS destinations across multiple servers for this cluster.

Which three configuration options will ensure load balancing of distributed destinations? (Choose three.)

  1. configuring a JMS server and targeting a WebLogic cluster
  2. configuring multiple JMS servers and targeting them to a WebLogic cluster
  3. configuring multiple JMS servers and targeting them to the configured WebLogic Servers
  4. configuring multiple JMS servers and targeting them to a set of migratable targets
  5. configuring a JMS server and targeting it to a set of migratable targets

Answer(s): B,D,E



You have been tasked to create a Domain Template.
Which four items can be included in the template? (Choose four.)

  1. Windows Start menu entries
  2. log files
  3. Java Enterprise Edition (JEE) applications and libraries
  4. config.xml and supporting configuration files
  5. embedded LDAP cached data
  6. proxy plug-ins
  7. server and services .lck files
  8. Unix and Windows start server scripts

Answer(s): A,D,E,H



Your architecture requires that you create 100 JMS Queues with similar, though not necessarily identical, configuration settings.

Which entity will help you carry out the task efficiently? (Choose the best answer.)

  1. JMS Distributed Destination
  2. JMS Foreign Server
  3. JMS Template
  4. JMS Destination Key

Answer(s): C