1Z0-301

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: nts will be started. B. All currently running components will be stopped gracefully, and only those components will be started. C. All currently running components will be stopped gracefully, and all configured components will be started. D. All currently running components will be terminated, and only those components will be started. E. All currently running components will be terminated, and all configured components will be started. Answer: A QUESTION 79: During an installation you need to be prepared to enter some information. Which two are required for a successful Oracle9iAS Infrastructure installation? (Choose two) A. The database administration password for the metadata repository. B. The username and password to log on to Oracle9iAS Single Sign-On Server. C. The location from which the Enterprise Manager daemon should be started. D. The database character set that should be used for the metadata repository. E. To specify which Oracle9iAS repositories should be stored in the metadata repository. F. The unique name for the Oracle9iAS Infrastructure instance and the ias_admin password. Answer: C, D Explanation: Reference: http://www.oracle.com/technology/obe/obe_as_10g/install/infra/infra.htm#p QUESTION 80: What are the four major steps you should perform to develop your security policy? (Choose four) A. Implement security procedures. B. Monitor any breaches of security. C. Encrypt sensitive network traffic. D. Develop security procedures and systems. E. Select the people who should have input to the security policy. Actualtests.com - The Power of Knowing 1Z0-301 Answer: A, B, C, D QUESTION 81: You are managing a catalog Web site for your company. An important cacheable document, sale_items.html, has been updated by the Web developers. The correct version of this document needs to be presented to your many Web customers as quickly as possible. You verify that the document is in the cache and the status is valid. Using the Oracle9iAS Web Cache home page, what could be done to achieve this? A. No action is necessary. B. The updated document will automatically be reloaded the next time it is requested. C. Use the content invalidation mechanism, enter the path, and remove it from the cache so it will be reloaded the next time it is requested. D. Select the old version of the document in the cache and click the Reload Now command button. E. Update the Cacheability Rules and mark the document as Not Cacheable, so that the current version of the document will be read from the file system the next time it is requested. Answer: B QUESTION 82: You set the Trusted Subnets in Oracle9iAS Web Cache Security to "This Machine Only". What is permitted? A. All requests from the host machine only. B. Caching content from applications running on the same host only. C. All requests from the subnet in which the host machine is located. D. Administration and invalidation requests from the host machine only. Answer: D QUESTION 83: Exhibit: Actualtests.com - The Power of Knowing 1Z0-301 You want to deploy a J2EE application to your remote application server machine. Your J2EE application consists of Web modules and is packaged in the file Certkiller .ear, which is stored locally on your PC. The application should be administered under the name Certkiller -test and the application should be accessible as my Certkiller app. Which three are necessary to deploy your J2EE application? (Choose three) A. The Deployment Wizard walks you through several deployment specific tasks. The two steps of the Deployment Wizard are not sufficient to deploy your J2EE application. You have to go through all steps and enter the needed information. B. The application has to be assembled correctly as an Enterprise Archive (EAR) file, with all the needed application and module deployment descriptors. C. The Deployment Wizard walks you through several deployment specific tasks but the information given during those two steps of the Deployment Wizard is sufficient to deploy your J2EE application. D. It is not necessary that the application is assembled as an Enterprise Archive (EAR) file with all the application and module deployment descriptors, because the Deployment Wizard will detect this and assemble a valid EAR file automatically. E. Enter the following at step 1 and 2 of the Deployment Wizard page: J2EE Application: Enter the path to the Certkiller .ear file. Application Name: Enter Certkiller -test. Map to URL: Enter /my Certkiller app. F. Copy the Certkiller .ear file to your application server machine. Enter the following at step 1 and 2 of the Deployment Wizard page: J2EE Application: Enter /my Certkiller app Application Name: Enter the path to the simpl.ear. Map to URL: Enter / Certkiller -test. Answer: C, D, F QUESTION 84: An application developer provides you with the LoginServlet.class file and informs you that the servlet needs to connect to...
View Full Document

This document was uploaded on 03/08/2014.

Ask a homework question - tutors are online