This preview shows page 1. Sign up to view the full content.
Unformatted text preview: nts will be
B. All currently running components will be stopped gracefully, and only those
components will be started.
C. All currently running components will be stopped gracefully, and all configured
components will be started.
D. All currently running components will be terminated, and only those components will
E. All currently running components will be terminated, and all configured components
will be started.
During an installation you need to be prepared to enter some information.
Which two are required for a successful Oracle9iAS Infrastructure installation? (Choose
A. The database administration password for the metadata repository.
B. The username and password to log on to Oracle9iAS Single Sign-On Server.
C. The location from which the Enterprise Manager daemon should be started.
D. The database character set that should be used for the metadata repository.
E. To specify which Oracle9iAS repositories should be stored in the metadata repository.
F. The unique name for the Oracle9iAS Infrastructure instance and the ias_admin
Answer: C, D
What are the four major steps you should perform to develop your security policy?
A. Implement security procedures.
B. Monitor any breaches of security.
C. Encrypt sensitive network traffic.
D. Develop security procedures and systems.
E. Select the people who should have input to the security policy.
Actualtests.com - The Power of Knowing 1Z0-301 Answer: A, B, C, D
You are managing a catalog Web site for your company. An important cacheable
document, sale_items.html, has been updated by the Web developers. The correct
version of this document needs to be presented to your many Web customers as quickly
as possible. You verify that the document is in the cache and the status is valid.
Using the Oracle9iAS Web Cache home page, what could be done to achieve this?
A. No action is necessary.
B. The updated document will automatically be reloaded the next time it is requested.
C. Use the content invalidation mechanism, enter the path, and remove it from the cache
so it will be reloaded the next time it is requested.
D. Select the old version of the document in the cache and click the Reload Now
E. Update the Cacheability Rules and mark the document as Not Cacheable, so that the
current version of the document will be read from the file system the next time it is
You set the Trusted Subnets in Oracle9iAS Web Cache Security to "This Machine
What is permitted?
A. All requests from the host machine only.
B. Caching content from applications running on the same host only.
C. All requests from the subnet in which the host machine is located.
D. Administration and invalidation requests from the host machine only.
Exhibit: Actualtests.com - The Power of Knowing 1Z0-301 You want to deploy a J2EE application to your remote application server machine. Your
J2EE application consists of Web modules and is packaged in the file Certkiller .ear, which
is stored locally on your PC. The application should be administered under the name
Certkiller -test and the application should be accessible as my Certkiller app.
Which three are necessary to deploy your J2EE application? (Choose three)
A. The Deployment Wizard walks you through several deployment specific tasks.
The two steps of the Deployment Wizard are not sufficient to deploy your J2EE
You have to go through all steps and enter the needed information.
B. The application has to be assembled correctly as an Enterprise Archive (EAR) file,
with all the needed application and module deployment descriptors.
C. The Deployment Wizard walks you through several deployment specific tasks but the
information given during those two steps of the Deployment Wizard is sufficient to
deploy your J2EE application.
D. It is not necessary that the application is assembled as an Enterprise Archive (EAR)
file with all the application and module deployment descriptors, because the
Deployment Wizard will detect this and assemble a valid EAR file automatically.
E. Enter the following at step 1 and 2 of the Deployment Wizard page:
J2EE Application: Enter the path to the Certkiller .ear file.
Application Name: Enter Certkiller -test.
Map to URL: Enter /my Certkiller app.
F. Copy the Certkiller .ear file to your application server machine.
Enter the following at step 1 and 2 of the Deployment Wizard page:
J2EE Application: Enter /my Certkiller app
Application Name: Enter the path to the simpl.ear.
Map to URL: Enter / Certkiller -test.
Answer: C, D, F
An application developer provides you with the LoginServlet.class file and informs you
that the servlet needs to connect to...
View Full Document
This document was uploaded on 03/08/2014.
- Fall '09