104 questions
Number: 1z0-807
Passing Score: 800
Time Limit: 120 min
File Version: 5.8
http://www.gratisexam.com/
Oracle 1z0-807
Java EE 6 Enterprise Architect Certified Master Exam
The best site that provides all types of notes and preparation material online
This dumps is valid and awesome, I passed by just 2 days practice.
After using it my results were great and i got great score as well all thanks.
It guided me step by step through the course. After studying for a month using it I achieved the highest in the whole city.
It was one and only which took me towards the biggest success without finding too much issues or worries in any way.
http://www.gratisexam.com/
Exam A
QUESTION 1
Your company requires all its developers to use a well-specified set of exception classes to model several common error conditions, many of the which are specific
to its business. These exception classes are centrally maintained and come packaged in a library (a JAR file). The application you are developing needs to report a
number of error conditions covered by this library to remote clients.
Which paring of component type and remote access technology enables client applications to use the predefined exceptions as part of their natural programming
model?
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
correct answer.
QUESTION 2
While analyzing an existing web application, you observe the following issues in the source code:
- Duplicate control code is scattered throughout various view.
- Business and presentation logic are mixed within these view.
The next phase of the project involves refactoring the existing code to address these two issues.
Which design pattern, if employed in the refactoring exercise, would most directly address the two issues?
A.
B.
C.
D.
Service to Worker
Dispatcher view
DAO
Composite View
Correct Answer: A
Section: (none)
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Reference: http://www.vincehuston.org/j2ee/corepatterns.html (see `service to worker')
QUESTION 3
You are using an open source integration framework in your project. However, key interfaces do not explicitly define several strange conditions you have repeatedly
seen while testing.
Which option is the name given to the anti pattern described above?
A.
B.
C.
D.
Composite View
Leaky Abstraction
Asynchronous Interaction
Golden Hammer
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation: All non-trivial abstractions, to some degree, are leaky. An abstraction that works most of the time, but where a detail of the underlying complexity
cannot be ignored, thus leaking complexity out of the abstraction back into the software that uses the abstraction.
QUESTION 4
Which two statements are true about security strategies at the message level?
http://www.gratisexam.com/
A.
B.
C.
D.
E.
Messages are secured during transport and after arrival at their destination
Each portion of a compound message is secured.
SSL is required to ensure authenticity, integrity, and confidentiality.
Message attachments are secured without the need for a dedicated API.
Security is dependent on the application environment or the transport protocol.
http://www.gratisexam.com/
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
appropriate answer.
QUESTION 5
Which two features are supported by the Java Authentication and Authorization Service (JAAS) API?
A.
B.
C.
D.
E.
Single sign on
Secure network connections
Configurable access control policies
Web services security
Message encryption and key generation
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 6
Your development team wants to use Google Guice. A previous architect assigned this request a low priority, citing the complexity of integration and no compelling
benefits statements from the requesting team.
The team claims that their colleagues have achieved the integration using a pattern. This pattern reduced the level of difficulty and risk and did not require vendor
support.
Which pattern fits this description?
A.
B.
C.
D.
Context Holder
Service Starter
Dependency Injection Extender
Bean Locator
Correct Answer: C
http://www.gratisexam.com/
Section: (none)
Explanation
Explanation/Reference:
Reference: https://code.google.com/p/peaberry/
QUESTION 7
Which statements are true about Java integration technologies?
A.
B.
C.
D.
Remote Method Invocation (RMI) helps to connect subsystems in a loosely coupled manner.
Java Message Service (JMS) helps in synchronous messaging between Java and non-Java systems.
JMS helps to broadcast messages to multiple Java-based receivers.
Java Connector Architecture (JCA) helps to integrate with heterogeneous legacy enterprise information systems.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 8
A travel company re-architects its application from a two-tier to a three-tier architecture. To see what impact the new architecture has on its non-functional
requirements (NFR), the company intends to build a prototype based on the new architecture.
The company compares the NFR metrics associated with the new prototype against the metrics from their original two-tier solution.
Which option is an advantage of the original two-tier solution?
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
genuine answer.
http://www.gratisexam.com/
QUESTION 9
Which two statements describe the contact between an Enterprise JavaBeans (EJB) container and the EJBs that it hosts?
A.
B.
C.
D.
The container provides automatic logging of all exceptions and errors generated by EJB code.
The container provides a transparent scaling mechanism to handle spikes in demand.
An EJB can extend its services, such as security, to improve performance.
The container has a well defined lifecycle model for each EJB type.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 10
What are two consequences of using the Composite View pattern?
A.
B.
C.
D.
E.
Improves performance
Avoids duplicate content
Forces a whole-part dependency
Allows tables to be reused in multiple locations
Restricts all sub views to have a consistent view technology
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 11
Which option describes the design relationship between session beans and entity beans?
http://www.gratisexam.com/
http://www.gratisexam.com/
A.
B.
C.
D.
E.
Aggregation
Separation of concerns
Common reuse principle
Liskov substitution principle
Interface segregation principle
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 12
Which three web applications work best when they are designed to be server-push enabled?
A.
B.
C.
D.
E.
A news feed used for providing users with frequently updated news content
A web chat that allows users to communicate using easily accessible web interfaces
A live sporting event application, used to deliver current results during matches
An auction system that provides users with live online bidding
A graphics rendering application that generates visuals in an orderly fashion
A manufacturing company has a large investment in a legacy Inventory Management System (IMS) developed with third-party technologies. You have been asked
to design a Java EE application that interacts with it.
You would like to ensure the following:
- Minimal application code is required to parse the communication messages.
- Communication is asynchronous and stateless.
- Performance import of the existing system is minimal.
Which two technologies combined would meet these requirements?
A.
B.
C.
D.
E.
XML
JSON
RMI
JAX-RS
JAX-WS
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
real answer
QUESTION 14
Which is an objective of the Strategy pattern?
A.
B.
C.
D.
E.
F.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Explanation:
QUESTION 15
You need to restrict access to the administration screens in your website.
Which two techniques test a user's permissions before granting access to a particular screen?
A.
B.
C.
D.
E.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 16
A company is extending is successful social networking site to support the following channels:
instant messaging (IM), email messaging and text messaging/SMS. At present, the site has scaled 400% in one year using a standard MVC Web framework the
application experiences large surges or spikes in demand and also periods of inactivity. Notification delivery to the three channels does not need to be guaranteed.
Which solutions extends the current architecture and best meets the company's requirements?
A.
B.
C.
D.
Send the notification inline, that is, within the normal HTTP request-response cycle.
Place messaging on a Java messaging Service (JMS) queue and use message-driven beans (MDBs) to create and send notifications.
Insert the messages into a database and use plain old Java Objects (POJOs) to read the messaging using JDBC and send notifications.
Insert the messages into a database and use entity beans to read the messages using JDBC and send notifications.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
QUESTION 17
A company must honor a service-level agreement (SLA) for its application, which states all database requests must execute within three seconds.
Users complain that some requests take longer than five seconds to complete. You have been contracted to fix the problem.
Which course of action do you recommend?
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 18
Your CMC wants to move several web based search applications to an AJAX model, hoping to improve user engagement with a browser experience that feels
smaller and more responsive.
Which identifies a drawback to consider when adopting an AJAX model to improve user experience?
A.
B.
C.
D.
E.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
best suitable answer.
QUESTION 19
http://www.gratisexam.com/
A company has been soiling a desktop based billing application that has Character User Interface (CUI) application developed by using Java. The company would
like to release the next version of this application with the following features: a GUI with a pluggable look- and-feel capability and the flexibility to support multiple
database vendors.
Which two technologies would you use in the new version?
A.
B.
C.
D.
E.
Swing
JDBC
JPA
CMP
AWT
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Reference: http://en.wikipedia.org/wiki/Java_Platform,_Standard_Edition (see javax.swing and java.sql)
QUESTION 20
An online library wants to introduce a feature where an email notification is generated whenever a book becomes available for circulation. This notification must be
sent to only those members who have expressed interest in that book.
Which design pattern would you use to implement this requirement?
A.
B.
C.
D.
E.
Observer
Payload Extractor
Asynchronous Resource Integrator
Web Service Broker
Service Starter
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 21
You are designing a new subsystem to store and scratch for user commands in a fashion company's website. On class, CommentManager, is responsible for
http://www.gratisexam.com/
accessing comment data and providing read-only access to other objects in the subsystem.
Which two implementation details are necessary for the Cementmanager class?
A.
B.
C.
D.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 22
You are the architect for a patient management system with an HTMLUI. Currently, it is used by ward nurses who access the system using dockable tablet
computers. The application uses the HttpSession object to store information.
In phase two of the implementation, nurses will also have access through smart phones. These phones will use a native client rather than HTML, and will access
the same business logic using a Web service.
Which two are optimal methods to manage conversational state in the new version of the system?
A.
B.
C.
D.
E.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 23
http://www.gratisexam.com/
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
choice of answer is good.
QUESTION 24
Which two actions limit the consequences of a network based attack?
http://www.gratisexam.com/
A.
B.
C.
D.
E.
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
QUESTION 25
You are implementing an online music that will store and play a user's collection of songs. You want users to rate their songs and view the top songs from friends.
All queries must complete in four seconds or less.
Which approach would meet the response time requirement with minimal overhead?
A.
B.
C.
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
updated answer.
QUESTION 26
You are the architect of a JEE-based product that customers can configure to meet their own security requirements. You want to enforce basic without sacrificing
customers ability to customize the product.
Which is the best method to support both requirements?
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 27
You are the operations architect for a large online retailer. During peak times, your set of monitored applications exhibits non-reproducible errors. The data center is
growing at 50% per annum, while your team headcount remains constant.
http://www.gratisexam.com/
Use the Visitor pattern to collect per-JVM statistics and store them centrally.
Use the Strategy pattern to encapsulate collection logic for each JVM.
Use the Thread Tracker to monitor the JVMs directly.
Use the Observer pattern to monitor each JVM directly.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 28
You are consulting with a team that has maintained several legacy database for years. They have reviewed the JPA spec and are wondering if the technology would
offer benefits over this current SQL base.
Which statement identifies a risk of adopting JPA?
A.
B.
C.
D.
E.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 29
Which two functions are essential parts of a service oriented architecture (SOA) infrastructure?
A. The service provider, which executes business logic in a stateless fashion
B. The service consumer, which accesses services from the service repository
C. The service repository, which stores software component metadata
http://www.gratisexam.com/
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 31
Which three principles are best practices when implementing a logging strategy for an enterprise application?
A.
B.
C.
D.
E.
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 32
Which two are primary concerns for a service-oriented architecture (SOA)?
http://www.gratisexam.com/
A.
B.
C.
D.
Low cohesion
Loose coupling
Session handling
Well defined contracts
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 33
Your company is considering migrating a persistence module, originally implemented as CMP entity beans, to now use JPA.
Which two statements are true?
A.
B.
C.
D.
E.
Each CMP entity bean can be mapped to a single JPA entity class.
The client code that accesses the CMP entity beans does not have to change.
IPA cannot capture all the kinds of relationships supported by CMP entity beans.
The resulting IPA persistence module can be used on both the client and the server.
The JNDI name of a JPA entity class can be customized to match that of the corresponding CMP entity bean.
http://www.gratisexam.com/
F. Remote clients of the CMP entity beans must start using web services to access the JPA entity classes on the server.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
updated answer.
QUESTION 34
Your application produces messages by client applications. The number of clients interested in the messages varies continuously at run time. Any client can
process any message, but a message must be processed exactly once.
How should the messages be delivered to the clients?
A.
B.
C.
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 35
Which two security threats are negated by encrypting network transactions with Transport Layer Security (TLS)?
A.
B.
C.
D.
E.
SQL injection
Session hijacking
Man in the middle
Cross-site scripting
Denial of service
Correct Answer: BC
Section: (none)
Explanation
http://www.gratisexam.com/
Explanation/Reference:
properly answered.
QUESTION 36
Which two kinds of applications benefit from the adoption of service oriented architecture (SOA) inspired patterns and practices?
A.
B.
C.
D.
An application that retains legacy systems while evolving to accommodate future business demands
An application with tightly coupled services that enable messages to flow easily
An application that utilizes fine-grained interfaces to provide communication to the object of a service
An application in which the communication between services and the business process are platform independent.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 37
Your company provides a marketplace for industrial chemicals. You are required to offer accurate pricing and quantities to all marketplace users.
Marketplace users are globally distributed.
What is the most appropriate technology to use to satisfy this requirement?
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 38
Which two statements are true about delegation as an Object-Oriented Design technique?
http://www.gratisexam.com/
A.
B.
C.
D.
E.
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 39
A company provides call center support for corporations world-wide. Each agent in the call center can be assigned to multiple call center customers. All the
company's customers use Windows based user interfaces and it has Just signed a new customer that uses a Java EE back end and wants a rich interface.
The company is developing a user interface for the new customer with the following requirements:
- Customer service representatives (CSRs) must be able to work with minimal training on the application.
- CSRs must be able to switch between call center systems quickly.
- Screens must have a windows look and feel.
- 2000 agents spread across four locations must be able to use the system.
Which recommendation would you make to this company about the user interface (UI)?
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
QUESTION 40
Which two use cases are best suited to the RPC style of messaging using Simple Object Access Protocol (SOAP)?
A.
B.
C.
D.
E.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 41
Your company has decided to expose a set of business operations through an API so that clients can access them remotely. These operations, which are modeled
as methods on a stateless session bean component, act as building blocks for complex state-changing activities that need to possess atomicity,, consistency,
isolation and durability (ACID) semantics.
Select the best technology to implement the API.
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
accurate answer.
QUESTION 42
Which two measures are most effective in protecting websites from cross site scripting (XSS) attacks?
A. Escape "<" and ">" parameters that displayed or evaluated by the JavaScript interpreter.
http://www.gratisexam.com/
B.
C.
D.
E.
URL-encode "<" and ">"parameters so they will never be evaluated by the JavaScript Interpreter.
Ensure that the session cookie is sent only on UTTPS connections.
Treat all user-supplied input as unsafe, and white list known good characters
Execute all user-supplied scripts in a server-side sandbox.
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 43
You are the architect at ACME, a large a large global retailer of festival and holiday accessories. ACME wants to launch a new shopping portal for the holiday
shopping session, allowing two months from project inception to going live. The portal must contain in-house and third-party stock to attack customers.
Fast response times are also critical so users remain engaged and sticky to the portal.
What would you recommend to the ACME project team to deliver this project?
A.
B.
C.
D.
Access all third party content using JSONP to dynamically load it from the browser.
Access as much content with bulk-loading as possible; use JSONP to access the remainder.
Access all content regardless of source using the HTML 5 XML parsing capabilities of the browser
Access all third party content using JSON to dynamically load it from the browser.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 44
You are the lead technical designer for a new B2C retail application. A key goal is to minimize design and build complexity in order to maximize speed to market.
Which three features of JPA make it the most appropriate technology to use in building the persistence layer of the application?
A. JPA ensures thread safe semantics
B. JPA ensures optimal database access logic
http://www.gratisexam.com/
C.
D.
E.
F.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
sophisticated answer.
QUESTION 46
You are contracted to improve the performance of an application.
While analyzing the application, you observe the following issues:
- Tight coupling between client and business objects
- Too many remote method Invocations between client and server
Which design pattern is best suited to improving performance?
http://www.gratisexam.com/
A.
B.
C.
D.
E.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: http://www.oracle.com/technetwork/java/sessionfacade-141285.html (see the problem and then the solution)
QUESTION 47
Which two types of applications benefit from using JavaServer Faces (JSF)?
A.
B.
C.
D.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 48
Which two statements are true about transport-layer security?
A.
B.
C.
D.
Correct Answer: AD
Section: (none)
http://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
QUESTION 49
Your company has been using the ACME database vendor for many years. Recently, it started considering a migration to the XYZ database vendor, who uses
different SQL dialed. The SQL engines in ACME and XYZ have significant differences in performance when executing the same SQL queries?
Which is the best persistence technology for database migration?
A.
B.
C.
D.
JPA
JDBC
CMP entity bean
JDBC row set XML serialization
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
fine answer.
QUESTION 50
Upper management has announced a change in a company's primary hardware supplier for the next year, the timing of this change coincides with key purchases
that line of business department has to make in support of its Java EE application upgrade/redesign project.
http://www.gratisexam.com/
You are asked to help outline a strategy to preserve the project timeline and keep hardware training costs contained.
Which recommendation will you make?
A. Add new hardware to create a heterogeneous environment.
B. Request another year of sales and support with the existing vendor.
http://www.gratisexam.com/
C. Request more time to consider the total cost of change to your project and to modify your budget.
D. Use new hardware on the web tier and redeploy existing hardware to the other tiers.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 51
Which two statements are true about java Cryptography Architecture (JCA)?
A.
B.
C.
D.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 52
Which three actions represent best practices when implementing an exception handling strategy for an application?
A.
B.
C.
D.
E.
Create a custom checked exception if an alternative action can be taken to resolve the exception.
Create a custom unchecked exception if the action to resolve the exception cannot be defined.
Always log the specific exception before re-throwing a wrapped exception.
Always throw exceptions in methods that are designed for exception handling.
Always include information specific to the error when logging an exception.
Explanation:
QUESTION 53
Which four services are guaranteed to be present in a specification compliant Java EE container?
A.
B.
C.
D.
E.
F.
G.
H.
Security
Persistence
Naming and messaging
Remote connectivity
Failover
Lifecycle management
Multithreading handling
Load balancing
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Explanation:
QUESTION 55
Which two are objectives of the Abstract Factory pattern?
A.
B.
C.
D.
E.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
answer is valid.
QUESTION 56
Which statement is true about the use of security-related annotations in an enterprise bean?
A.
B.
C.
D.
E.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 57
Your application uses web services extensively and frequently to distribute large XML objects over HTTP. In addition, the application has been set particularly
demanding performance and scalability service level agreements (SLAs).
Which java API is best suited for your application?
http://www.gratisexam.com/
A.
B.
C.
D.
STAX
DOM
JAXB
JAXR
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 58
StockTeller is a Java-based application designed to retrieve the current market for a portfolio of publicly listed stocks. You have been tasked to design a bolt on
module for StockTeller called EBroker, a Java E-based online application that needs to asynchronously communicate with StockTeller to retrieve market prices for
securities in a secure manner.
Which web service technology would you choose to integrate StockTeller into the EBroker application?
A.
B.
C.
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 59
While analyzing an application, you observe that it contains numerous Interfaces for complex domain logic. Completing a business Function currently requires
calling several of these interfaces in an order that is understood by system experts.
Which design pattern would you suggest to refactor the code?
A. Faade
http://www.gratisexam.com/
B.
C.
D.
E.
MVC
DAO
Adapter
Decorator
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
well executed answer.
QUESTION 60
During a security audit, it is noted that your application is vulnerable to SQL Injection attacks.
Which two action would you perform to address this vulnerability?
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 61
ABC Travel offers a night reservation service, exposed as a web service. XYZ Stays offers a hotel reservation service, also exposed as a web service. ABC and
XYZ will not change their web service. A startup company has contacted you for advice about designing a new service that combines flight and hotel reservations,
which they will offer as a web service.
The startup company plans to provide their service by implementing a portable Java EE solution that aggregates the two services offered by ABC Travel and XYZ
Stays, a combined reservation succeeded.
Only if both the flight reservation and the hotel reservation succeed
http://www.gratisexam.com/
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 63
You are integrating with a single legacy Enterprise Information System. You are interested in the transaction management capabilities of Java Connector
Architecture. This new system needs the capability to invoke multiple operations against this single legacy system. these operations succeeded together or fail
together as a group.
http://www.gratisexam.com/
To which minimum level of transaction management do you set your resource adapter?
A.
B.
C.
D.
No transaction
Local transaction
Distributed transaction
Container-managed transaction
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
perfectly answered.
QUESTION 64
Your company is creating a Java EE corporate wide workflow system in winch significant internal business events are consumed by multiple applications. Due to
multi-year development plans, many of these applications do not exist yet, even at the design stage. IT has defined standard data formats for these events in the
form of small XML documents. Also, the rules for how an application filters and processes events are not fixed In advance and can change over the life or the
application.
Which combination of technologies is best for distributing and consuming these events throughout the company?
A.
B.
C.
D.
E.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 65
YourDocs is an application that retrieves PDF documents of selected topics from both trusted and untrusted websites. It has been developed using a non-Java
technology. You are designing your Mlearn, a mobile-based e-learning application, which will be implemented in Java. You plan to integrate YourDocs with your
http://www.gratisexam.com/
application.
Which web service technology would you choose to Integrate YourDocs into the YourMLearn application?
A.
B.
C.
D.
JAX-WS
JAX-WS with REST
JAX-RPC
JAX-RS
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
good answer.
QUESTION 66
You are the architect of an existing project. Making changes to one component frequently requires making changes to many other components.
Which action would reduce future maintenance costs?
A.
B.
C.
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 67
You are using an open source integration framework in your project. However, key interfaces do not explicitly define several strange conditions you have repeatedly
seen while testing.
Which option is the name given to the anti pattern described above?
http://www.gratisexam.com/
A.
B.
C.
D.
Composite View
Leaky Abstraction
Asynchronous Interaction
Golden Hammer
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation: All non-trivial abstractions, to some degree, are leaky. An abstraction that works most of the time, but where a detail of the underlying complexity
cannot be ignored, thus leaking complexity out of the abstraction back into the software that uses the abstraction.
QUESTION 68
You are the lead technical designer for a new B2C retail application. A key goal is to minimize design and build complexity in order to maximize speed to market.
Which three features of JPA make it the most appropriate technology to use in building the persistence layer of the application?
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
JMS
JDBC
JCA
JAX-WS
JAX-RS
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 70
A company that sells avatar skins tor virtual reality environments has a static website for advertising their wares. The website was built using What You See Is What
You Get (WYSIWYG) html editor and also contains a lot of JavaScript. The company now wants to add server side processing capabilities developing a shopping
application, the company is considering using JavaServer Faces (JSF)
Which statement is true?
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 71
During a security audit, it is noted that your application is vulnerable to SQL Injection attacks.
Which two action would you perform to address this vulnerability?
http://www.gratisexam.com/
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
best answer.
QUESTION 72
An investment company has purchased a number of small online business referral systems that appeal to various niche demographics. The company wants to
bring these networks together in hopes of finding a broad, single theme and brand image for these groups before they can do that, they need to get the users
communicating with outside their current networks.
Which Web Services pattern would you recommend they consider in building a scheme to accommodate this communication?
A.
B.
C.
D.
Asynchronous Interactions
PAOS Interactions
Web Services Broker
JMS Bridge
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 73
A Hot Potato anti pattern can arise from misuse of which technology combination?
A. Bean Validation with JSF Managed Beans
B. Messaging in the Business Tier
http://www.gratisexam.com/
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 75
Your consulting company has been asked to enhance an existing application. The current application is a two-tier system in which all the business logic is located in
thick clients. You are considering a solution that would involve moving the business logic into the server's database In the form of stored procedures.
Which statement is an expected outcome of your proposed solution?
A.
B.
C.
D.
Correct Answer: B
http://www.gratisexam.com/
Section: (none)
Explanation
Explanation/Reference:
reliable answer.
QUESTION 76
A company manufactures widgets for sale to distribution. Distributors call this company when they want to order more widgets. The company wants the distributors
to send orders using XML documents over the Internet to reduce the number of data entry personnel needed. It has no control over the distributors technologies.
The company does not want the Orders to impact the performance of other users. You have been assigned the task of designing a new API.
Which method do you use?
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 77
You have been recruited by an online retailer of footwear to conduct a review of their online systems. Your primary Finding is that the development team has
implemented duplicated complex business logic as Java scripts directly into the JSPs, causing performance, scalability, and maintainability issues.
http://www.gratisexam.com/
Which two design patterns would you select to improve the current code base?
A. View Helper
B. From Controller
http://www.gratisexam.com/
C. Composite View
D. Service-to-Worker
E. Business Delegate
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 78
A successful web application is used by over two hundred thousand users. Due to this substantial load, the database is over bridged and fails frequently. All data,
included critical user records and temporary session data, is stored in the database. Because of resource constraints, a new database system cannot be installed.
Which change will reduce the load on the database?
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 79
MedLabML is a startup firm that moves patient data between different care providers to provide a "single patient view". They use a B2B system to exchange
electronic business document with their key suppliers. They are seeking your advice about standards to review for improving their message-level security.
Which standard or API would you recommend they read?
A.
B.
C.
D.
SAML 1.1
Web Service Interoperability Technology
XML Signature
SSL
http://www.gratisexam.com/
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
fine answer.
QUESTION 80
You have been tasked with improving the availability of an existing three tier application.
What is your first stop in evaluating what changes should be made to the architecture to achieve the goal?
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 81
Your development team wants to use Google Guice. A previous architect assigned this request a low priority, citing the complexity of integration and no compelling
benefits statements from the requesting team.
The team claims that their colleagues have achieved the integration using a pattern. This pattern reduced the level of difficulty and risk and did not require vendor
support.
Which pattern fits this description?
A.
B.
C.
D.
Context Holder
Service Starter
Dependency Injection Extender
Bean Locator
Correct Answer: C
http://www.gratisexam.com/
Section: (none)
Explanation
Explanation/Reference:
Reference: https://code.google.com/p/peaberry/
QUESTION 82
A company has been soiling a desktop based billing application that has Character User Interface (CUI) application developed by using Java. The company would
like to release the next version of this application with the following features: a GUI with a pluggable look- and-feel capability and the flexibility to support multiple
database vendors.
Which two technologies would you use in the new version?
A.
B.
C.
D.
E.
Swing
JDBC
JPA
CMP
AWT
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Reference: http://en.wikipedia.org/wiki/Java_Platform,_Standard_Edition (see javax.swing and java.sql)
QUESTION 83
Which two statements are true about RESTful web services?
A.
B.
C.
D.
E.
Correct Answer: BC
Section: (none)
Explanation
http://www.gratisexam.com/
Explanation/Reference:
choice of answer is good.
QUESTION 84
Which two statements are true about the timer service of a business component container?
A.
B.
C.
D.
E.
Timed notifications for all types of session beans can be scheduled by using this service.
When the server is shut down, the timer is persisted automatically and becomes active again when the server is restarted.
Each instance of message driven beans has unique timers.
When stateful session bean instance is removed, the container detaches the timers associated with the instance and allocates them to the new instance.
When a transaction is rolled hark, the timer creation within the transaction is also rolled back.
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
reliable answer.
QUESTION 85
Which three statements are true about inheritance?
A.
B.
C.
D.
E.
http://www.gratisexam.com/
B.
C.
D.
E.
The service consumer, which accesses services from the service repository
The service repository, which stores software component metadata
The service broker, which delivers well-defined service-level agreements
The service look-up facility, which provides a central resource for naming and access
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
fine answer.
QUESTION 87
Which two security threats are negated by encrypting network transactions with Transport Layer Security (TLS)?
A.
B.
C.
D.
E.
SQL injection
Session hijacking
Man in the middle
Cross-site scripting
Denial of service
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
properly answered.
QUESTION 88
Which two use cases are best suited to the RPC style of messaging using Simple Object Access Protocol (SOAP)?
A.
B.
C.
D.
E.
Correct Answer: BC
http://www.gratisexam.com/
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 89
Which two statements apply to unsigned applets?
A.
B.
C.
D.
E.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 90
You are the architect of a web application that uses javaServer Faces (JSF) as a presentation tier for business processes coded as stateless session beans. When
you add new code to the stateless session beans to address new accounting requirements, without changing the interface, you discover that the new business
processes are being ignored by some of the JSF components.
What might be the cause of this problem?
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Explanation:
QUESTION 91
Your company uses a payroll application that was developed using Java technologies. The company has acquired another company and plans to integrate its
payroll process in existing application. You have been asked to implement this integration. You observe that the business logic adopted to calculate the payroll is
different in both companies.
Which design pattern would be most appropriate to use in this integration?
A.
B.
C.
D.
E.
Strategy
Payload Extractor
Fly Weight
Composite
Service Locator
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 92
Which two are significant advantages of developing web applications with JavaServer Faces (JSF)?
A.
B.
C.
D.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation: D: JSF is often used together with Ajax, a Rich Internet application technology. Because JSF supports multiple output formats, Ajax-enabled
components can easily be added to enrich JSF-based user interfaces. The JSF 2.0 specification provides built in support for Ajax by standardizing the Ajax request
lifecycle, and providing simple development interfaces to Ajax events, allowing any event triggered by the client to go through proper validation, conversion, and
finally method invocation, before returning the result to the browser via an XML DOM update.
http://www.gratisexam.com/
Note:
* JavaServer Faces technology is a user interface framework for building web applications.
* The following features support the GUI components:
/ Input validation
/ Event handling
/ Data conversion between model objects and components / Managed model object creation
/ Page navigation configuration
All this functionality is available using standard Java APIs and XML-based configuration files.
QUESTION 93
Which two statements are true about the timer service of a business component container?
A.
B.
C.
D.
E.
Timed notifications for all types of session beans can be scheduled by using this service.
When the server is shut down, the timer is persisted automatically and becomes active again when the server is restarted.
Each instance of message driven beans has unique timers.
When stateful session bean instance is removed, the container detaches the timers associated with the instance and allocates them to the new instance.
When a transaction is rolled hark, the timer creation within the transaction is also rolled back.
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
reliable answer.
QUESTION 94
Which three actions restrict the ability of a web application to scale in response to load as additional computing resources are made available to it?
A.
B.
C.
D.
E.
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
QUESTION 95
Which type of application would benefit from using the Singleton pattern?
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 96
You are conducting a security audit for a web application that uses URL rewriting. The application does not allow for user-generated content and is accessible only
via secured VPN.
Which two security threats would you prioritize in your audit?
A.
B.
C.
D.
E.
SQL injection
Cross-site scripting
Parameter-site manipulating
Session hijacking
Denial-of-service attacks
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 97
http://www.gratisexam.com/
A company wants to design an internal website for the purpose of managing its numerous social events. The site will not have heavy traffic, but will require state to
be persisted in a database. You have been tasked to complete this action item in your spare time.
Which two Java EE-based approaches are best suited for quick development?
A.
B.
C.
D.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
definite answer.
QUESTION 98
Which three statements are true about inheritance?
A.
B.
C.
D.
E.
http://www.gratisexam.com/
A.
B.
C.
D.
E.
JMS
JCA
XML over HTTPS
RMI over IIOP
JBI
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 100
You are the architect for XYZ bank. XYZ is redesigning their online banking offering and you need to ensure that the new design follows security best practices for
the JEE platform.
Select three security best practices for JEE applications.
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
JMS
JDBC
JCA
JAX-WS
JAX-RS
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 102
You are asked to propose a software deployment strategy that will reduce a client will also make deploying and testing their software stack more efficient.
Which element would you include in your proposal?
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
absolute answer.
QUESTION 103
The integration team has reported a problem in testing a few deployed MDBs. By design, each MDB listens to one of four named queues. Two producers write
messages to each queue. The test issues messages of the same payload type that each producer will send, but varies the number or size of these messages to
measure the messaging server's performance.
http://www.gratisexam.com/
The team has noticed that the utilization remains at the same high rate any time the test writes messages destined for the third MDB. The message server log does
not reveal any failure in sending messages to this MDB. Which anticipation expresses cause for this condition?
A.
B.
C.
D.
Hot Potato
Leaky Abstraction
Cache less Cow
Golden Hammer
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 104
A company that sells avatar skins tor virtual reality environments has a static website for advertising their wares. The website was built using What You See Is What
You Get (WYSIWYG) html editor and also contains a lot of JavaScript. The company now wants to add server side processing capabilities developing a shopping
application, the company is considering using JavaServer Faces (JSF)
Which statement is true?
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
http://www.gratisexam.com/
http://www.gratisexam.com/