网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You deploy more than one application to the same WebLogic container. The security is set on JavaEE level and all deployed JavaEE applications use the same security roles.    What is your recommendation for an architecture with those requirement?()
A

Combine all applications into a single one.

B

Define global roles on the WebLogic Domain level.

C

Use Ms Active Directory to keep the roles there. 

D

Use Oracle Identity and Access Management solution to simplify the management.

E

Keep role mapping in the external WebLogic Role Mapped developed for that solution.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You deploy more than one application to the same WebLogic container. The security is set on JavaEE level and all deployed JavaEE applications use the same security roles.    What is your recommendation for an architecture with those requirement?()A Combine all applications into a single one.B Define global roles on the WebLogic Domain level.C Use Ms Active Directory to keep the roles there. D Use Oracle Identity and Access Management solution to simplify the management.E Keep role mapping in the external WebLogic Role Mapped developed for that solution.” 相关考题
考题 When your WebLogic Server solution needs to be scaled out with additional capacity and you  Don’t want to add additional hardware, which three techniques should you us?()A、Assign more than one managed server to a physical hardware that allows better CPU  utilizationB、Assign more than one application to one managed server to better utilize threads within a single JVM processC、Assign the same application to more than one managed server to load balance requests  between serversD、Assign the same heap size to the managed server across the cluster for easier control of  memory footprint  E、Create a virtualized environment with hypervisor for an easier solution

考题 You deploy two different applications to the WebLogic container. One application use Xerces parser version A and the other application uses Xerces parser version B. Both these versions are different from the parser version that the WebLogic server uses internally. You want to use the Filtering Classloader feature to solve this problem. What action would you take to generate proper filtering Classloader entries?() A、Modify the applications to use the same version that WebLogic uses internally.B、Based on available examples of Filtering Classloader entries, try to modify get the proper  entries.C、Deploy and use the Classloader Analyzing Tool to resolve all conflicts with conflicting libraries.  This tool will generate all proper entries.D、Split the application into separate WebLogic containers and use different WLS versions of  Xerces but identical that applications require.E、Look for a WebLogic release that uses the same version of Xerces that the applications use.

考题 You established access to menu modules using roles. While testing the application, you need access to all the menus in the SALES form module for all the roles. Which method will override the Menu Module Roles property to allow you to access all the menu items?()A、Disable the values for the Menu Module Roles property. B、Set the Use Security value in the form module Property Palette to 'True'. C、Set the Use Security value in the form module Property Palette to 'False'. D、Set the Use Security value in the menu module Property Palette to 'True'. E、Set the Use Security value in the menu module Property Palette to 'False'. 

考题 An application that needs to use a shared library has a deployment descriptor that only specifies the Specification-Version and Extension-Name of the shared library. When the application is deployed, which shared library will be used?()A、The application will go into an ADMIN state and fail to deploy because the Implementation- Version is required.B、The application will be deployed but the classes in the shared library will not be available.C、If you are using the WebLogic Admin Console, you will be prompted for the version you want to  use; otherwise, the application will fail to deploy.D、If there are multiple versions of the shared library deployed, WebLogic will use the one with the highest Implementation-Version.E、If there are multiple versions of the shared library deployed, WebLogic will use the one that was  deployed most recently.

考题 When you enable port security on an interface that is also configured with a voice VLAN,  what is the maximum number of secure MAC addresses that should be set on the port?()A、No more than one secure MAC address should be set.B、The default will be set.C、The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D、No value is needed if the switchport priority extend command is configured. E、No more than two secure MAC addresses should be set.

考题 If an application issues the same query more than once in the same Unit of Work, which isolation level will not permit this application to see additional rows inserted by other applications?()A、Read Stability (RS)B、Repeatable Read (RR)C、Uncommitted Read (UR)D、Cursor Stability (CS)

考题 Identify three unique integration features of Spring and WebLogic Server.()A、ability to automatically convert Spring application to JavaEE 6 frameworkB、ability to export the WebLogic Container feature to another Spring enabled JavaEE serverC、ability to extend the WebLogic Server console with some Spring-related pagesD、official support of Spring apps inside WebLogic by Oracle SupportE、support for injection of WebLogic MBeans and Resources into Spring applications

考题 You deploy more than one application to the same WebLogic container. The security is set on JavaEE level and all deployed JavaEE applications use the same security roles.    What is your recommendation for an architecture with those requirement?()A、Combine all applications into a single one.B、Define global roles on the WebLogic Domain level.C、Use Ms Active Directory to keep the roles there. D、Use Oracle Identity and Access Management solution to simplify the management.E、Keep role mapping in the external WebLogic Role Mapped developed for that solution.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()A、 Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B、 Apply the Application.inf template and then the Hisecws.inf template.C、 Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D、 Apply the Setup security.inf template and then the Application.inf template.

考题 You create Microsoft Windows-based applications.  You create an application that requires users to be authenticated by a domain controller.  The application contains a series of processor intensive method calls that require different database connections. A bug is reported during testing.  The bug description states that the application hangs during one of the processor-intensive calls more than 50 percent of the times when the method is executed.  Your unit test for the same method was successful.You need to reproduce the bug.   Which two factors should you ascertain from the tester?()A、 Security credentials of the logged on userB、 Code access security settingsC、 Hardware settingsD、 Network settingsE、 Database settings

考题 Your company uses Windows Update to download and install security updates on client computers. When Microsoft releases a security update, you have the following requirements:   Establish which client computers require the security update.   Identify what changes will occur as a result of the security update.  Identify which applications might be affected by the security update.    You need to select the appropriate tool to detect application-compatibility issues.   What should you do?()A、Use the Inventory Collector.B、Use the Setup Analysis Tool.C、Use the Update Compatibility Evaluator.D、Use the Windows Compatibility Evaluator.

考题 You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department.   On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()A、Use Secedit.exe to import the security settings from the .inf file to the computers in the sales department.B、Use a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.C、Create an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.D、Create an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.

考题 You have a single Active Directory directory service forest with one domain. You have an existing  top-level organizational unit (OU) named Sales. You are planning to create a new top-level OU named  Training. The Sales and Training OUs must have the same security and auditing settings. You need to  identify the security permissions and audit settings for the Sales OU so that you can delegate the same  permissions for the Training OU.  What should you do first?()A、 Use the Delegation of Control Wizard.B、 Use the Security Configuration Wizard.C、 Run the dsacls command.D、 Run the xcacls command.

考题 A user named Marie uses a Windows 2000 Professional computer named Client1 to process payroll records. Marie reports that she can no longer run her financial applications. You determine that file permissions have been applied incorrectly to her computer. You want to configure Client1 to have the same security configuration and file permission settings that were applied when the computer was installed.  What should you do?()A、Grant usersFull Controlpermission to the C drive and all child foldersB、Use the Recovery Console to restore system filesC、Use Security Configuration and Analysis to apply the Secure security template to Client1D、Use Security Configuration and Analysis to apply the Default security template to Client 1

考题 Your company has an Active Directory domain. You have a server that runs Windows Server 2008. The Terminal Services role is installed on the server.  The company security policy does not allow users to copy and paste information to a local computer during a Terminal Services session.  You deploy the remote application named APP1.  You need to configure Terminal Services to meet the security requirement. What should you do?()A、Enable the Use temporary folders per session option.B、Change the Security Encryption Level to FIPS Compliant.C、Deselect the Clipboard option in the RDP Settings for the published application.D、Disable the Drive option in the RDP-Tcp Client Setting properties for the server.

考题 You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new application by using the ClickOnce deployment technology.  The application is signed by using a certificate obtained from a trustworthy authority. You need to ensure that the application can be deployed as a trusted application to Windows Vista client computers on a corporate network.What should you do?()A、Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.B、Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.C、Create a new certificatetrust list (CTL).Install the CTL on the server that has the ClickOnce application published.D、Create a new certificate trust list (CTL).Request the network administrator to deploy the CTL by using Group Policy.

考题 单选题Your company has an Active Directory domain. You have a server that runs Windows Server 2008. The Terminal Services role is installed on the server.  The company security policy does not allow users to copy and paste information to a local computer during a Terminal Services session.  You deploy the remote application named APP1.  You need to configure Terminal Services to meet the security requirement. What should you do?()A Enable the Use temporary folders per session option.B Change the Security Encryption Level to FIPS Compliant.C Deselect the Clipboard option in the RDP Settings for the published application.D Disable the Drive option in the RDP-Tcp Client Setting properties for the server.

考题 单选题An application that needs to use a shared library has a deployment descriptor that only specifies the Specification-Version and Extension-Name of the shared library. When the application is deployed, which shared library will be used?()A The application will go into an ADMIN state and fail to deploy because the Implementation- Version is required.B The application will be deployed but the classes in the shared library will not be available.C If you are using the WebLogic Admin Console, you will be prompted for the version you want to  use; otherwise, the application will fail to deploy.D If there are multiple versions of the shared library deployed, WebLogic will use the one with the highest Implementation-Version.E If there are multiple versions of the shared library deployed, WebLogic will use the one that was  deployed most recently.

考题 多选题Identify three unique integration features of Spring and WebLogic Server.()Aability to automatically convert Spring application to JavaEE 6 frameworkBability to export the WebLogic Container feature to another Spring enabled JavaEE serverCability to extend the WebLogic Server console with some Spring-related pagesDofficial support of Spring apps inside WebLogic by Oracle SupportEsupport for injection of WebLogic MBeans and Resources into Spring applications

考题 单选题You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new application by using the ClickOnce deployment technology.  The application is signed by using a certificate obtained from a trustworthy authority. You need to ensure that the application can be deployed as a trusted application to Windows Vista client computers on a corporate network.What should you do?()A Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.B Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.C Create a new certificatetrust list (CTL).Install the CTL on the server that has the ClickOnce application published.D Create a new certificate trust list (CTL).Request the network administrator to deploy the CTL by using Group Policy.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.   The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.   The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.   You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.   What should you do? ()A  Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B  Apply the Application.inf template and then the Hisecws.inf template.C  Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D  Apply the Setup security.inf template and then the Application.inf template.

考题 单选题You established access to menu modules using roles. While testing the application, you need access to all the menus in the SALES form module for all the roles. Which method will override the Menu Module Roles property to allow you to access all the menu items?()A Disable the values for the Menu Module Roles property. B Set the Use Security value in the form module Property Palette to 'True'. C Set the Use Security value in the form module Property Palette to 'False'. D Set the Use Security value in the menu module Property Palette to 'True'. E Set the Use Security value in the menu module Property Palette to 'False'. 

考题 单选题You have a single Active Directory directory service forest with one domain. You have an existing  top-level organizational unit (OU) named Sales. You are planning to create a new top-level OU named  Training. The Sales and Training OUs must have the same security and auditing settings. You need to  identify the security permissions and audit settings for the Sales OU so that you can delegate the same  permissions for the Training OU.  What should you do first?()A  Use the Delegation of Control Wizard.B  Use the Security Configuration Wizard.C  Run the dsacls command.D  Run the xcacls command.

考题 单选题When you enable port security on an interface that is also configured with a voice VLAN,  what is the maximum number of secure MAC addresses that should be set on the port?()A No more than one secure MAC address should be set.B The default will be set.C The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D No value is needed if the switchport priority extend command is configured. E No more than two secure MAC addresses should be set.

考题 多选题You create Microsoft Windows-based applications.  You create an application that requires users to be authenticated by a domain controller.  The application contains a series of processor intensive method calls that require different database connections. A bug is reported during testing.  The bug description states that the application hangs during one of the processor-intensive calls more than 50 percent of the times when the method is executed.  Your unit test for the same method was successful.You need to reproduce the bug.   Which two factors should you ascertain from the tester?()ASecurity credentials of the logged on userBCode access security settingsCHardware settingsDNetwork settingsEDatabase settings

考题 单选题You deploy more than one application to the same WebLogic container. The security is set on JavaEE level and all deployed JavaEE applications use the same security roles.    What is your recommendation for an architecture with those requirement?()A Combine all applications into a single one.B Define global roles on the WebLogic Domain level.C Use Ms Active Directory to keep the roles there. D Use Oracle Identity and Access Management solution to simplify the management.E Keep role mapping in the external WebLogic Role Mapped developed for that solution.

考题 单选题You deploy two different applications to the WebLogic container. One application use Xerces parser version A and the other application uses Xerces parser version B. Both these versions are different from the parser version that the WebLogic server uses internally. You want to use the Filtering Classloader feature to solve this problem. What action would you take to generate proper filtering Classloader entries?()A Modify the applications to use the same version that WebLogic uses internally.B Based on available examples of Filtering Classloader entries, try to modify get the proper  entries.C Deploy and use the Classloader Analyzing Tool to resolve all conflicts with conflicting libraries.  This tool will generate all proper entries.D Split the application into separate WebLogic containers and use different WLS versions of  Xerces but identical that applications require.E Look for a WebLogic release that uses the same version of Xerces that the applications use.

考题 单选题If an application issues the same query more than once in the same Unit of Work, which isolation level will not permit this application to see additional rows inserted by other applications?()A Read Stability (RS)B Repeatable Read (RR)C Uncommitted Read (UR)D Cursor Stability (CS)