What is a resource agent?
A. It is a JMX-based monitoring tool that is accessible using Documentum Administrator.
B. It is a feature of Application Builder, used to help manage lifecycles.
C. It is a process used in conjunction with the Index Server to provide full-text indexing.
D. It is a feature of WDK which allows administrators to more easily deploy components given to them by a developer.
Your employer asks you to rename the custom folder for your WDK application to “datasink.” Which XML entry represents the correct means of changing the custom folder’s name?
<param-value extends=”webtop/custom”>datasink</param-value> </app-param>
<param-value inherits=”webtop/custom”>datasink</param-value> </context-param>
Which statement is true about the object model?
A. dmr_content is not a sub-type of dm_sysobject although sysobject contents are stored as dmr_content objects.
B. dm_acl objects are stored in the System cabinet.
C. Not all sysobjects can have associated permissions.
D. Virtual documents are objects of type dm_relation that describe a parent/child relationship between objects.
Oracle Web Services Manager uses an agent-based approach to providing Web Services security. Where are these agents deployed?
A. In any IPv4 of Later network firewall
B. In the Oracle WebLogic Server Web Service request Interceptors
C. In the Oracle Service Bus proxy pipeline
D. In the Oracle Access Manager web gate
E. In the Oracle WebLogic Server access gate
APIs for dynamically registering servlets and filters can be called at:
A. Context initialization time
B. Any time
C. There is no way to dynamically register servlets and filters
D. Context destruction time
E. Injected into a servlet context
The developer has defined the following entity class office:
Which of the following attributes will be in corresponding generated static metamodel class for the rooms’ field?
A. Public static volatile CollectionAttribute<Room> rooms;
B. Public static volatile ListAttribute<Room> rooms;
C. Public static volatile ListAttribute<Office, Room> rooms;
D. Public static volatile SingleAttribute<Room> rooms;
Which of the following WS-Security token profiles is not supported in Metro?
A. X509 Token Profile
B. Kerberos Token Profile
C. SAML Token Profile
D. SOAP with Attachments (SWA) profile
E. Right Expression Language (REL) Token Profile
You are writing a client that sends a message to a JMS queue.
What two statements are true?
A. You cannot use resource injection to access a JMS destination from a Java EE application client.
B. You can use resource injection to access a JMS destination from a servlet.
C. You must use a JNDI lookup to access a JMS destination from a standalone Java class.
D. You cannot use a JNDI lookup to access a JMS destination from a session bean.
B:In addition to injecting a connection factory resource into a client program, you usually inject a destination resource. Unlike connection factories, destinations are specific to one domain or the other.
*A destination is the object a client uses to specify the target of messages it produces and the source of messages it consumes. In the PTP messaging domain, destinations are called queues. In the pub/sub messaging domain, destinations are called topics.
* In addition to looking up a connection factory in a client program, you usually look up a destination. Unlike connection factories, destinations are specific to one domain or the other. To create an application that allows you to use the same code for both topics and queues, you castand assign the destination to a Destination object. To preserve the semantics of queues and topics, however, you cast and assign the object to a destination of the appropriate type. For example, the following line of code performs a JNDI lookup of the previously created topic jms/MyTopic and casts and assigns it to a Destination object:
Destination myDest = (Destination) ctx.lookup(“jms/MyTopic”); The following line of code looks up a queue named jms/MyQueue and casts and assigns it to a Queue object:
Queue myQueue = (Queue) ctx.lookup(“jms/MyQueue”);
A system administrator has received the Java ES distribution as a two-CD set, and wishes to configure an NFS server to use as an install server for Sun Cluster 3.2. What is the correct procedure?
A. Mount and share each CD from a separate server.
B. This is NOT possible, only the DVD distribution can be used in this case.
C. Create a working directory, share it using NFS, and combine the contents of both CDs into it using the cpio command.
D. Mount the first CD and share it using NFS. When prompted by the installer, unshare and unmount the CD, and repeat the process with the second CD.
A security administrator has a requirement to deploy the Solaris Security Toolkit onto all Solaris servers in the department. In this environment, there are a variety of platforms and operating system versions deployed. Onto which two platforms and operating system combinations can the Solaris Security Toolkit be deployed in a supported configuration? (Choose two.)
A. x86, Solaris 2.4
B. x64, Solaris 9
C. x86, Solaris 10
D. SPARC, Solaris 2.6
E. SPARC, Solaris 8
Company A owns, and is authoritative, for the domain aco.com. Company A is in the process of consolidating systems as a result of the purchase of Company B. As part of this transition effort, network administrators have configured Company A’s DNS server zone files to include and become authoritative for Company B’s bco.com domain. The administrators want to turn off Company B’s DNS servers. Which two steps should be completed prior to this shutdown? (Choose two.)
A. initiate zone transfer to A.root-servers.net
B. create an aco.com to bco.com reverse zone configuration file
C. reduce the TTL value for the aco.com domain
D. require hosts on bco.com to update the IP address used for DNS resolution
E. update the .com Top-Level name server entries for bco.com
You need to create a Flash Archive of a master server. You want to set the following characteristics of the archive:
The archive will be stored as /export/flash/flash_archive, but do not include the /export/flash directory in the archive
The archive description will be root_archive.
The archive must be compressed
The archive will be rooted at the root (/) directory admin is the author of the archive
Do not include Sizing information flash_root is the name of the Flash archive
Based on the above information, which command will you use to create the Flash Archive?
A. flar create -n flash_root -C -R / -d root_archive \
B. flar create -f flash_root -c -R / -d root_archive \
C. flar create -c -R / -x /export/flash \
D. flar create -n flash_root -c -R / -e root_archive \
Only local system files are used during the boot process to configure the system for local Ethernet LAN connectivity.
Immediately after reboot the ifconfig -a command displays:
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1 inet
127.0.0.1 netmask ff000000
Which local network configuration file is missing?
Your x86-based server will not boot Solaris 10 OS. You discover that you need to restore your pboot and boot block on the / (root) slice located on disk c0d0. You first boot off of the CD-ROM or DVD into single user mode. What commands should you run to restore the pboot and boot block on the slice?
A. # cd /usr/lib/ufs# installboot /dev/rdsk/c0d0s0
B. # cd /usr/platform/`uname -m`/lib/fs/ufs # install -bootblock -pboot /dev/rdsk/c0d0s0
C. # cd /usr/platform/`uname -m`/lib/# install-pboot /dev/rdsk/c0d0s2 -b bootblock /dev/rdsk/c0d0s2
D. # cd /usr/platform/`uname -m`/lib/fs/ufs # installboot /usr/platform/`uname -i`/lib/fs/ufs/pboot \ /usr/platform/`uname -i`/lib/fs/ufs/bootblk /dev/rdsk/c0d0s2
Click the Exhibit button. The exhibit shows information about data in Jane’s home directory. Which answer describes where the directory named dir1 is stored within the file system?
A. In the inode associated with directory dir1
B. In the directory file called dir1
C. In the ACL associated with dir1
D. In the directory file called widgets
E. In the inode associated with directory widgets
F. In the ACL associated with widgets