I am configuring the security policy for my JMS module. I am specifying some security conditions for the module.
Which two security conditions are valid in this context? (Choose two.)
The JMS module can be accessed only between 1 pm and 6 pm.
The JMS module should throw a custom security exception on invalid access.
The JMS module can process only 50 messages at a time.
The JMS module can be accessed only by users belonging to the Operators group.
The JMS module can be accessed in a receive-only mode.
Correct answer: AD
Explanation:
There are two security conditions:* time-constrained * By Group or User Reference: http://docs.oracle.com/html/E24401_02/taskhelp/jms_modules/modules/ConfigureJMSModuleSecurityPolicies.html
Based on what the certificate contains, which statement is true? (Choose the best answer.)
It is a self-signed digital certificate with no certification chain.
It is an authentic digital certificate with a valid certification chain.
It is a digital certificate for a private key with a valid certification chain.
It is an authentic root CA certificate with a valid certification chain.
Correct answer: A
Explanation:
Incorrect Answers:C: This is 512-bit Public Key, not a private key.Note: The subject key identifier extension provides a means of identifying certificates that contain a particular public key.
Incorrect Answers:
C: This is 512-bit Public Key, not a private key.
Note: The subject key identifier extension provides a means of identifying certificates that contain a particular public key.
Question 3
You want to create a WebLogic Server (WLS) Work Manager with a Response Time Request Class of one second. You start to create the following WLST script:
Which two can replace the missing sequence to finish this script? (Choose two.)