Java EE 6 Enterprise Architect Certified Master Exam v7.2 (1z0-807)

Page:    1 / 6   
Total 90 questions

Your company has decided to expose a set of business operations through an API so that clients can access them remotely. These operations, which are modeled as methods on a stateless session bean component, act as building blocks for complex state-changing activities that need to possess atomicity,, consistency, isolation and durability (ACID) semantics.
Select the best technology to implement the API.

  • A. Remote Method Invocation (RMI)
  • B. Java Message Service (JMS)
  • C. XML over HTTP
  • D. Java Connector Architecture (JCA)


Answer : A

Which two measures are most effective in protecting websites from cross site scripting
(XSS) attacks?

  • A. Escape “<” and “>” parameters that displayed or evaluated by the JavaScript interpreter.
  • B. URL-encode < and >parameters so they will never be evaluated by the JavaScript Interpreter.
  • C. Ensure that the session cookie is sent only on UTTPS connections.
  • D. Treat all user-supplied input as unsafe, and white list known good characters
  • E. Execute all user-supplied scripts in a server-side sandbox.


Answer : C,E

You are the architect at ACME, a large a large global retailer of festival and holiday accessories. ACME wants to launch a new shopping portal for the holiday shopping session, allowing two months from project inception to going live. The portal must contain in-house and third-party stock to attack customers.
Fast response times are also critical so users remain engaged and sticky to the portal.
What would you recommend to the ACME project team to deliver this project?

  • A. Access all third party content using JSONP to dynamically load it from the browser.
  • B. Access as much content with bulk-loading as possible; use JSONP to access the remainder.
  • C. Access all content regardless of source using the HTML 5 XML parsing capabilities of the browser
  • D. Access all third party content using JSON to dynamically load it from the browser.


Answer : A

You are the lead technical designer for a new B2C retail application. A key goal is to minimize design and build complexity in order to maximize speed to market.
Which three features of JPA make it the most appropriate technology to use in building the persistence layer of the application?

  • A. JPA ensures thread safe semantics
  • B. JPA ensures optimal database access logic
  • C. JPA does not require an FJB container
  • D. JPA provides vendor-neutral database access
  • E. JPA provides ACID semantics
  • F. JPA provides transparent scalability


Answer : C,D,E

You are the architect of an application that reads from and writes to multiple systems. The application must participate in an existing transaction to update a database using JDBC, and also invoke a transactional method on a remote system as part of the same transaction.
Which two technologies would you suggest, to access remote system, for this application?

  • A. Java Connector Architecture (JCA)
  • B. java Message Service (JMS)
  • C. Remote Method Invocation (RMI)
  • D. Simple Object Access Protocol (SOAP)


Answer : A,C

You are contracted to improve the performance of an application.
While analyzing the application, you observe the following issues:
-> Tight coupling between client and business objects
-> Too many remote method Invocations between client and server
Which design pattern is best suited to improving performance?

  • A. Web Service Broker
  • B. Session Façade
  • C. Value List Handler
  • D. Data Access Object
  • E. Service Activator


Answer : B

Reference: http://www.oracle.com/technetwork/java/sessionfacade-141285.html (see the problem and then the solution)

Which two types of applications benefit from using JavaServer Faces (JSF)?

  • A. An application with a customizable UI skin
  • B. An application that implements access control on each action based on user role.
  • C. An application in which type conversion of the values of UI components is implemented only in Java classes.
  • D. An application that sets specific database validation listeners on a UI component


Answer : C,D

Which two statements are true about transport-layer security?

  • A. It applies to both a message body and its attachments.
  • B. It is loosely coupled with the transport-layer protocol.
  • C. It is an end-to-end security mechanism.
  • D. It prevents the captured data from being replayed at a later time.


Answer : A,D

Your company has been using the ACME database vendor for many years. Recently, it started considering a migration to the XYZ database vendor, who uses different SQL dialed. The SQL engines in ACME and XYZ have significant differences in performance when executing the same SQL queries?
Which is the best persistence technology for database migration?

  • A. JPA
  • B. JDBC
  • C. CMP entity bean
  • D. JDBC row set XML serialization


Answer : A

Upper management has announced a change in a company's primary hardware supplier for the next year, the timing of this change coincides with key purchases that line of business department has to make in support of its Java EE application upgrade/redesign project.
You are asked to help outline a strategy to preserve the project timeline and keep hardware training costs contained.
Which recommendation will you make?

  • A. Add new hardware to create a heterogeneous environment.
  • B. Request another year of sales and support with the existing vendor.
  • C. Request more time to consider the total cost of change to your project and to modify your budget.
  • D. Use new hardware on the web tier and redeploy existing hardware to the other tiers.


Answer : A

Which two statements are true about java Cryptography Architecture (JCA)?

  • A. Any JCA provider must implement each supported category of algorithms.
  • B. Exactly one Implementation of each category of cryptographic algorithms must be provided.
  • C. Implementations of cryptographic algorithms can be plugged in to a JVM after it has been installed and at run time.
  • D. Categories of algorithms supported by JCA include message digests, signatures encryption, management, and random number generation.


Answer : C,D

You are the architect for XYZ bank. XYZ is redesigning their online banking offering and you need to ensure that the new design follows security best practices for the JEE platform.
Select three security best practices for JEE applications.

  • A. Schedule regular penetration testing.
  • B. Log all security related application events.
  • C. Implement an exception-handling strategy.
  • D. Encrypt data, both on the wire and at rest.
  • E. Use both programmatic and declarative security.
  • F. Treat users as untrusted even when authenticated.


Answer : B,C,E

Oasis Corporation has decided to develop a single Instance multi-tiered application with its existing EIS resources. You are the technical lead for the Integration team responsible for providing the following:
-> A common Interface that can easily access the heterogeneous EIS resources
-> Generic transaction mechanism support for EIS resource managers
-> A connection pool to legacy EIS resources
Which two technologies would you use to meet these requirements?

  • A. JMS
  • B. JDBC
  • C. JCA
  • D. JAX-WS
  • E. JAX-RS


Answer : B,C

You are asked to propose a software deployment strategy that will reduce a client will also make deploying and testing their software stack more efficient.
Which element would you include in your proposal?

  • A. Vertically scalable platform
  • B. Horizontally scalable platform
  • C. Virtualized platform
  • D. Standard unit testing software


Answer : C

The integration team has reported a problem in testing a few deployed MDBs. By design, each MDB listens to one of four named queues. Two producers write messages to each queue. The test issues messages of the same payload type that each producer will send, but varies the number or size of these messages to measure the messaging servers performance.
The team has noticed that the utilization remains at the same high rate any time the test writes messages destined for the third MDB. The message server log does not reveal any failure in sending messages to this MDB. Which anticipation expresses cause for this condition?

  • A. Hot Potato
  • B. Leaky Abstraction
  • C. Cache less Cow
  • D. Golden Hammer


Answer : A

Page:    1 / 6   
Total 90 questions