Beruflich Dokumente
Kultur Dokumente
Page 1 of 42
You have been tasked to create an architecture which has EJB making calls on legacy services. The legacy services all run on UNIX machines and provide Java network APIs. Each invocation on the EJB must be in a transaction. How can the EJB transaction adhere to the ACID properties when making a legacy service call? A. make sure the EJB is an entity bean and have the state automatically managed B. mark the EJB as Container Managed Transaction and have the bean demarcate the transaction C. let the EJB container manage the transaction D. have the EJB monitor the service call completion and roll back the EJB state if necessary Answer: D
Answer: C
QUESTION NO: 3
Which three aspects of an application are most likely to be determined at runtime based on the user's declared nationality or locale? (Choose three.) A. server host names and/or addresses B. textual output messages C. network protocols D. currency formats E. calculations and/or algorithms Answer: B,D,E
QUESTION NO: 4
Be
IT
er
A. Pooling entity beans can increase extensibility. B. Pooling entity beans can increase reliability. C. Pooling entity beans can increase scalability. D. Pooling entity beans has no effect on scalability or reliability.
tif
ie
d.
co
Which statement describes a normal default security restriction applied to untrusted classes by a Java-enabled browser? A. Untrusted classes cannot initiate any network connections. B. Untrusted classes cannot read data from arbitrary files. C. Untrusted classes cannot make unrestricted use of CPU power. D. Untrusted classes cannot write sensitive data to the screen. E. Untrusted classes cannot read sensitive data from the keyboard. Answer: B
Page 2 of 42
QUESTION NO: 5 A toy company is building an enterprise system to allow the sales staff to place customer orders over an intranet. All orders must be placed using a legacy system running MQSeries. You must create an architecture to interact with that legacy system. How would you encapsulate interaction with that legacy system?
Answer: A
QUESTION NO: 6
The requirements for a shopping application are: It must support millions of customers. The invocations must be transactional. The shopping cart must be persistent. When an order is placed, it is queued and a remote system is notified. Due to the load on the remote system, it must be able to process the order at its convenience. Which two technologies are required to support these requirements? (Choose two.) A. JNI B. JMX
Be
IT
A. with a Java class that uses JMS to send asynchronous messages to the legacy system B. with a distributed CORBA object that uses IIOP to message the legacy system C. with an EJB entity bean that uses container-managed persistence to encapsulate the legacy system D. with an EJB session bean that uses a screen scraping tool
er
tif
ie
d.
co
Page 3 of 42
QUESTION NO: 7 The current architecture has servlets making calls to EJB. The system has grown to over 200 servlets causing development and configuration problems. Because the system is still evolving, the APIs to the EJB have changed quite often. This has caused the servlet writers to adapt to the new APIs every time a change is made. Which two statements about this problem are true? (Choose two.) A. Having the servlets communicate with EJB using JMS will prevent changing servlet code every time an EJB API changes. B. Introducing a configuration control system will fix the problem. C. This problem can be corrected by converting all entity EJB to stateless session EJB. D. This is an example of brittle code dependencies and tight coupling. E. Introducing a session bean, in front of all EJB, which mimics the EJB APIs will prevent changing servlet code every time an EJB API changes. F. Introducing a client-side abstraction which sits between the servlet and EJB will break the tight coupling. Answer: D,F
QUESTION NO: 8
Click the Exhibit button. Then click the Tile Button. The exhibit shows the communication between four EJBs. Which two changes to the existing architecture will increase performance? (Choose two.)
Be
IT
er
tif
ie
d.
co
A. have each EJB hold a reference to the EJB it calls, instead of calling findByPrimaryKey() B. use bean-managed persistence for each entity bean C. convert all entity beans to stateless session beans D. have Customer call Account, Order, and ShoppingCart directly Answer: A,D
Page 4 of 42
QUESTION NO: 9 Which two items provide the ability to convert data between Locale specific 8 bit data and Unicode text? (Choose two.) A. the java.util.Locale class B. the java.io.OutputStreamWriter class C. the java.text package D. the java.util.ResourceBundle class E. the java.io.InputStreamReader class Answer: B,E
The following statement is true about which type of EJB? "All bean instances are equivalent when they are not involved in serving a client-invoked method." A. entity bean with bean-managed persistence B. stateful session bean C. entity bean with container-managed persistence D. stateless session bean Answer: D
QUESTION NO: 11 Which design pattern is represented by the EJB Home interface? A. Visitor B. Abstract Factory C. Proxy D. Facade
Be
IT
er
QUESTION NO: 10
tif
ie
d.
co
Page 5 of 42
QUESTION NO: 12 Your client is a bank that wants to allow its customers to access their bank accounts over the Internet. Given the following requirements, which protocol communicates with the Web browsers? Confidential information must be protected. Customers will access their account using only a simple Web browser with no extensions. A. IIOP B. HTTP C. SNMP D. HTTPS Answer: D
QUESTION NO: 13
The following statement is true about which type of EJB? "All bean instances are equivalent when they are not involved in serving a client-invoked method." A. entity bean with bean-managed persistence B. stateless session bean C. stateful session bean D. entity bean with container-managed persistence Answer: B
QUESTION NO: 14 Your supply chain software currently runs as a standalone application which communicates to the backend services using IIOP. The new requirements for the software are: The client software must run as an applet. The user's firewall will only allow port 80 and 443 traffic through its firewall. All the backend services will be CORBA-based. A Web server sits in front of the CORBA services. The backend Web server runs on port 80 and 443.
Be
IT
er
tif
ie
d.
co