You are configuring the principals needed to fulfill the security requirements of an application within a sandbox environment that uses the WebLogic Server-embedded LDAP server.
The given security requirements provided have outlined the following facts about some test principals:
One security requirement states that internal patient data can be viewed only by physicians who are employees.
What is an appropriate way to fulfill this security requirement from a principal perspective using the provided information?
Security policies replace access control lists (ACLs) and answer the question 'Who has access to a WebLogic resource?'.
You assign security policies to any of the defined WebLogic resources (for example, an EJB resource or a JNDI resource) or to attributes or operations of a particular instance of a WebLogic resource (an EJB method or a servlet within a Web application). If you assign a security policy to a type of WebLogic resource, all new instances of that resource inherit that security policy. Security policies assigned to individual resources or attributes override security policies assigned to a type of WebLogic resource.
You are creating a new domain with WLST.
Identify three parameters that can be customized with the setOption command. (Choose three.)
setOption sets options related to a domain creation or update.
Syntax: setOption(optionName, optionValue)
Option names include:
* JavaHome---Home directory for the JVM to be used when starting the server. The default for this option depends on the platform on which you install WebLogic Server. Update JavaHome to point to the jre directory for the JDK that you are using for WebLogic Server.
* DomainName---Name of the domain.
* ServerStartMode---Mode to use when starting the server for the newly created domain. This value can be dev (development) or prod (production). This option defaults to dev.
Your development team is considering several different types of new applications. You have been asked to advise them concerning which types can be deployed in WebLogic Server leveraging the Production Redeployment feature.
Which application deployment type is NOT supported for Production Redeployment? (Choose the best answer.)
Your development team has created a GAR deployment that enables Coherence caching for an application. The GAR file is configured to work within both storage-enabled and storage-disabled nodes.
How would you package your GAR as part of the WebLogic Server deployment process for your application? (Choose the best answer.)
Managed Coherence servers are distinguished by their role in the cluster. A best practice is to use different managed server instances (and preferably different WebLogic Server clusters) for each cluster role.
* storage-enabled -- a managed Coherence server that is responsible for storing data in the cluster. Coherence applications are packaged as Grid ARchives (GAR) and deployed on storage-enabled managed Coherence servers.
* storage-disabled -- a managed Coherence server that is not responsible for storing data and is used to host Coherence applications (cache clients). A Coherence application GAR is packaged within an EAR and deployed on storage-disabled managed Coherence servers.
Examine the domain diagram:
Assume all servers are up and running and you have just started an offline WLST interactive session. Assume further that the username/password ''weblogic/Welcome1'' maps to a valid administrator.
You type two lines of WLST code:
connect('weblogic','Welcome1','host02.acme.com:7101')
print cmo.getType() + ':' + cmo.getName()
What will be printed? (Choose the best answer.)
Example: The following example displays information about the current MBean, cmo.
wls:/mydomain/serverConfig> cmo.getType()
'Domain'