Which two use cases are best suited to the RPC style of messaging using Simple Object Access Protocol (SOAP)?
Which two measures are most effective in protecting websites from cross site scripting (XSS) attacks?
You are consulting with a team that has maintained several legacy database for years. They have reviewed the JPA spec and are wondering if the technology would offer benefits over this current SQL base.
Which statement identifies a risk of adopting JPA?
The integration team has reported a problem in testing a few deployed MDBs. By design, each MDB listens to one of four named queues. Two producers write messages to each queue. The test issues messages of the same payload type that each producer will send, but varies the number or size of these messages to measure the messaging server’s performance.
The team has noticed that the utilization remains at the same high rate any time the test writes messages destined for the third MDB. The message server log does not reveal any failure in sending messages to this MDB. Which anticipation expresses cause for this condition?
A business application that runs in an Enterprise JavaBeans (EJB) container must communicate with a transactional third-party service. The communication technology must allow changing service providers without changing the application’s business model.
Which technology would meet these requirements?
Your web page design company is designing websites for all the stores in a local mall. Your company must create a consistent "look and feel" for these sites.
After this "look and feel- project has gone through demonstration, enhancement and approval iterations with the mall's .lions, you job is complete and the development of the actual B2C (Business –to-Client) system will be handled by a different firm
Which architecture is most appropriate for your prototype project?
During a security audit, it is noted that your application is vulnerable to SQL Injection attacks.
Which two action would you perform to address this vulnerability?
You are integrating with a single legacy Enterprise Information System. You are interested in the transaction management capabilities of Java Connector Architecture. This new system needs the capability to invoke multiple operations against this single legacy system. these operations succeeded together or fail together as a group.
To which minimum level of transaction management do you set your resource adapter?
A travel company re-architects its application from a two-tier to a three-tier architecture. To see what impact the new architecture has on its non-functional requirements (NFR), the company intends to build a prototype based on the new architecture.
The company compares the NFR metrics associated with the new prototype against the metrics from their original two-tier solution.
Which option is an advantage of the original two-tier solution?
A company must honor a service-level agreement (SLA) for its application, which states all database requests must execute within three seconds.
Users complain that some requests take longer than five seconds to complete. You have been contracted to fix the problem.
Which course of action do you recommend?
Which three actions represent best practices when implementing an exception handling strategy for an application?
Which two statements are true about Java Cryptography Architecture (JCA)?
What are two consequences of using the Composite View pattern?