Combine all applications into a single one.
Define global roles on the WebLogic Domain level.
Use Ms Active Directory to keep the roles there.
Use Oracle Identity and Access Management solution to simplify the management.
Keep role mapping in the external WebLogic Role Mapped developed for that solution.
第1题:
When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?()
第2题:
Identify three unique integration features of Spring and WebLogic Server.()
第3题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003. The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings. The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings. You need to plan the deployment of the new security design. You need to ensure that all security settings for the application servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements. What should you do? ()
第4题:
Your company uses Windows Update to download and install security updates on client computers. When Microsoft releases a security update, you have the following requirements: Establish which client computers require the security update. Identify what changes will occur as a result of the security update. Identify which applications might be affected by the security update. You need to select the appropriate tool to detect application-compatibility issues. What should you do?()
第5题:
You have a single Active Directory directory service forest with one domain. You have an existing top-level organizational unit (OU) named Sales. You are planning to create a new top-level OU named Training. The Sales and Training OUs must have the same security and auditing settings. You need to identify the security permissions and audit settings for the Sales OU so that you can delegate the same permissions for the Training OU. What should you do first?()
第6题:
Your company has an Active Directory domain. You have a server that runs Windows Server 2008. The Terminal Services role is installed on the server. The company security policy does not allow users to copy and paste information to a local computer during a Terminal Services session. You deploy the remote application named APP1. You need to configure Terminal Services to meet the security requirement. What should you do?()
第7题:
Enable the Use temporary folders per session option.
Change the Security Encryption Level to FIPS Compliant.
Deselect the Clipboard option in the RDP Settings for the published application.
Disable the Drive option in the RDP-Tcp Client Setting properties for the server.
第8题:
ability to automatically convert Spring application to JavaEE 6 framework
ability to export the WebLogic Container feature to another Spring enabled JavaEE server
ability to extend the WebLogic Server console with some Spring-related pages
official support of Spring apps inside WebLogic by Oracle Support
support for injection of WebLogic MBeans and Resources into Spring applications
第9题:
Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.
Apply the Application.inf template and then the Hisecws.inf template.
Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.
Apply the Setup security.inf template and then the Application.inf template.
第10题:
Use the Delegation of Control Wizard.
Use the Security Configuration Wizard.
Run the dsacls command.
Run the xcacls command.
第11题:
Security credentials of the logged on user
Code access security settings
Hardware settings
Network settings
Database settings
第12题:
Modify the applications to use the same version that WebLogic uses internally.
Based on available examples of Filtering Classloader entries, try to modify get the proper entries.
Deploy and use the Classloader Analyzing Tool to resolve all conflicts with conflicting libraries. This tool will generate all proper entries.
Split the application into separate WebLogic containers and use different WLS versions of Xerces but identical that applications require.
Look for a WebLogic release that uses the same version of Xerces that the applications use.
第13题:
If an application issues the same query more than once in the same Unit of Work, which isolation level will not permit this application to see additional rows inserted by other applications?()
第14题:
You deploy more than one application to the same WebLogic container. The security is set on JavaEE level and all deployed JavaEE applications use the same security roles. What is your recommendation for an architecture with those requirement?()
第15题:
You create Microsoft Windows-based applications. You create an application that requires users to be authenticated by a domain controller. The application contains a series of processor intensive method calls that require different database connections. A bug is reported during testing. The bug description states that the application hangs during one of the processor-intensive calls more than 50 percent of the times when the method is executed. Your unit test for the same method was successful.You need to reproduce the bug. Which two factors should you ascertain from the tester?()
第16题:
You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department. On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()
第17题:
A user named Marie uses a Windows 2000 Professional computer named Client1 to process payroll records. Marie reports that she can no longer run her financial applications. You determine that file permissions have been applied incorrectly to her computer. You want to configure Client1 to have the same security configuration and file permission settings that were applied when the computer was installed. What should you do?()
第18题:
You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new application by using the ClickOnce deployment technology. The application is signed by using a certificate obtained from a trustworthy authority. You need to ensure that the application can be deployed as a trusted application to Windows Vista client computers on a corporate network.What should you do?()
第19题:
The application will go into an ADMIN state and fail to deploy because the Implementation- Version is required.
The application will be deployed but the classes in the shared library will not be available.
If you are using the WebLogic Admin Console, you will be prompted for the version you want to use; otherwise, the application will fail to deploy.
If there are multiple versions of the shared library deployed, WebLogic will use the one with the highest Implementation-Version.
If there are multiple versions of the shared library deployed, WebLogic will use the one that was deployed most recently.
第20题:
Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.
Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.
Create a new certificatetrust list (CTL).Install the CTL on the server that has the ClickOnce application published.
Create a new certificate trust list (CTL).Request the network administrator to deploy the CTL by using Group Policy.
第21题:
Disable the values for the Menu Module Roles property.
Set the Use Security value in the form module Property Palette to 'True'.
Set the Use Security value in the form module Property Palette to 'False'.
Set the Use Security value in the menu module Property Palette to 'True'.
Set the Use Security value in the menu module Property Palette to 'False'.
第22题:
No more than one secure MAC address should be set.
The default will be set.
The IP phone should use a dedicated port, therefore only one MAC address is needed per port.
No value is needed if the switchport priority extend command is configured.
No more than two secure MAC addresses should be set.
第23题:
Combine all applications into a single one.
Define global roles on the WebLogic Domain level.
Use Ms Active Directory to keep the roles there.
Use Oracle Identity and Access Management solution to simplify the management.
Keep role mapping in the external WebLogic Role Mapped developed for that solution.
第24题:
Read Stability (RS)
Repeatable Read (RR)
Uncommitted Read (UR)
Cursor Stability (CS)