You are working for a software company that mostly dealt with creating and reusing C++ and .NET objects. There are many COM (Component Object Model) components that have been created over time that provide standardized functionalities. Recently, platform independence has become a major consideration for your organization and you have deployed WebLogic Server12c. But you would like to make use of some of your prebuilt COM objects for request processing. You need an interim solution before implementing web services.
Which artifact within WebLogic Server helps you achieve your objective?
Consider a domain that includes a Node Manager home directory. One way to enroll each Node Manager with your domain is with the WLST command nmEnroll().
Select the two scenarios where you do not need to use this command to perform the same task? (Choose two.)
Your developers created Plain Old Java Objects (POJO) that provide useful functionality. The code is packaged in a JAR file. You want to make this code accessible from all the applications deployed to the managed servers in your domain. What are the four ways to accomplish this? (Choose four.)
You are using the Configuration Wizard to create a new domain that will host an EJB application without a cluster. Remote EJB clients can therefore take advantage of WebLogic Server’s load balancing and failover capabilities.
However, a proxy server exists between the EJB clients and this new cluster.
Which cluster attribute should you modify in the Configuration Wizard to ensure that external EJB clients are routed correctly through the proxy?
You need to scale out an existing domain to include a new machine. You install WebLogic Server on the new machine. Which three steps are required to create the domain directory on the new machine? (Choose three.)
Select two ways to start the Java-based Node Manager on a Linux machine. (Choose two.)
Which two statements are true about multicast communication within a cluster? (Choose two.)
Which three statements are true about the default behavior of WebLogic Server proxy plug-ins? (Choose three.)
You use a web browser to log in to a web application that is deployed to WebLogic Server. When you click a link named “publish” on the site, an “Access Denied” message appears.
Which two statements are true about this server’s security configuration? (Choose two.)