Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Oracle 1z0-807 Java EE 6 Enterprise Architect Certified Master Exam Exam Practice Test

Demo: 13 questions
Total 89 questions

Java EE 6 Enterprise Architect Certified Master Exam Questions and Answers

Question 1

Which two use cases are best suited to the RPC style of messaging using Simple Object Access Protocol (SOAP)?

Options:

A.

Processing large sized communication messages

B.

B. Implementing line grained services

C.

C. Validating custom data types

D.

Implementing asynchronous web services

E.

Executing long running multi-part processes

Question 2

Which two measures are most effective in protecting websites from cross site scripting (XSS) attacks?

Options:

A.

Escape “<” and “>” parameters that displayed or evaluated by the JavaScript interpreter.

B.

URL-encode “<” and “>”parameters so they will never be evaluated by the JavaScript Interpreter.

C.

C. Ensure that thesession cookie is sent only onHTTPSconnections.

D.

Treat all user-supplied input as unsafe, and white list known good characters

E.

E. Execute all user-supplied scripts in aserver-side sandbox.

Question 3

You are consulting with a team that has maintained several legacy database for years. They have reviewed the JPA spec and are wondering if the technology would offer benefits over this current SQL base.

Which statement identifies a risk of adopting JPA?

Options:

A.

JPA only works with well-known data models.

B.

JPA may be able to model every table as a class.

C.

JPA could render code that requires extensive SQL tuning to perform well.

D.

JPA’s query languagerelies on a container to manage the persistence layer.

E.

JPA doesn’t provides ACID semantics.

Question 4

The integration team has reported a problem in testing a few deployed MDBs. By design, each MDB listens to one of four named queues. Two producers write messages to each queue. The test issues messages of the same payload type that each producer will send, but varies the number or size of these messages to measure the messaging server’s performance.

The team has noticed that the utilization remains at the same high rate any time the test writes messages destined for the third MDB. The message server log does not reveal any failure in sending messages to this MDB. Which anticipation expresses cause for this condition?

Options:

A.

Hot Potato

B.

Leaky Abstraction

C.

Cache less Cow

D.

Golden Hammer

Question 5

A business application that runs in an Enterprise JavaBeans (EJB) container must communicate with a transactional third-party service. The communication technology must allow changing service providers without changing the application’s business model.

Which technology would meet these requirements?

Options:

A.

Java Message Service

B.

Remote Method Invocation

C.

Simple Object Access Protocol

D.

Java Connector Architecture

E.

Java Business Integration

Question 6

Your web page design company is designing websites for all the stores in a local mall. Your company must create a consistent "look and feel" for these sites.

After this "look and feel- project has gone through demonstration, enhancement and approval iterations with the mall's .lions, you job is complete and the development of the actual B2C (Business –to-Client) system will be handled by a different firm

Which architecture is most appropriate for your prototype project?

Options:

A.

Two tier, web-centric

B.

Three, web-centric

C.

Three-tier, enterprise-centric

D.

Three-tier, application-centric

Question 7

During a security audit, it is noted that your application is vulnerable to SQL Injection attacks.

Which two action would you perform to address this vulnerability?

Options:

A.

B. Add a text input validation filter to check user-supplied data.

B.

Configure user permissions in the deployment descriptor.

C.

Configure security roles in the deployment descriptor.

D.

Deploy the Internet facing nodes in a well defined demilitarized zone (DMZ) layer.

E.

Use parameterized stored procedures with the principle of least privilege.

Question 8

You are integrating with a single legacy Enterprise Information System. You are interested in the transaction management capabilities of Java Connector Architecture. This new system needs the capability to invoke multiple operations against this single legacy system. these operations succeeded together or fail together as a group.

To which minimum level of transaction management do you set your resource adapter?

Options:

A.

No transaction

B.

B. Local transaction

C.

Distributed transaction

D.

Container-managed transaction

Question 9

A travel company re-architects its application from a two-tier to a three-tier architecture. To see what impact the new architecture has on its non-functional requirements (NFR), the company intends to build a prototype based on the new architecture.

The company compares the NFR metrics associated with the new prototype against the metrics from their original two-tier solution.

Which option is an advantage of the original two-tier solution?

Options:

A.

It has better manageability because each client has its own copy of the application.

B.

It has better performance because each client must use its own set of domain objects.

C.

It has better scalability because each client can access the database independently of other clients.

Question 10

A company must honor a service-level agreement (SLA) for its application, which states all database requests must execute within three seconds.

Users complain that some requests take longer than five seconds to complete. You have been contracted to fix the problem.

Which course of action do you recommend?

Options:

A.

Modify the program to implement multi threading and an event-driven design.

B.

Add servers to distribute the load.

C.

Upgrade the application server and the operating system.

D.

Define a plan for isolating the bottleneck, and define indicators that will measure performance under a test load.

Question 11

Which three actions represent best practices when implementing an exception handling strategy for an application?

Options:

A.

B. Create a customuncheckedexception if the action to resolve the exception cannot be defined.

B.

Always log the specific exception before re-throwing a wrapped exception.

C.

Always throw exceptions in methods that are designed for exception handling.

D.

E. Always include information specific to the error when logging an exception.

Question 12

Which two statements are true about Java Cryptography Architecture (JCA)?

Options:

A.

Any JCA provider must implement each supported category of algorithms.

B.

Exactly one Implementation of each category of cryptographic algorithms must be provided.

C.

C. Implementations of cryptographic algorithms can be plugged in to a JVM after it has been installed and at run time.

D.

D. Categories of algorithms supported by JCA include message digests, signatures encryption, management, and random number generation.

Question 13

What are two consequences of using the Composite View pattern?

Options:

A.

Improves performance

B.

B. Avoids duplicate content

C.

Forces a whole-part dependency

D.

D. Allows tables to be reused in multiple locations

E.

Restricts all sub views to have a consistent view technology

Demo: 13 questions
Total 89 questions