A typical service-oriented enterprise architecture specification can encompass:
Answer : B
A common XML-based technology used to apply the Data Model Transformation pattern is:
Answer : D
Which of the following statements is false?
Answer : C
Even though atomic service transactions can be used to ensure that all services within the transaction either succeed or fail, in larger transactions involving multiple services, the amount of required memory consumption can ___________.
Answer : A
The Service Fa?ade pattern is often applied in order to separate the ___________ from the underlying service implementation so that they can evolve independently.
Answer : B
Which of the following statements is false?
Answer : B
Which of the following statements is true?
Answer : A
The application of the Contract Centralization pattern requires that runtime access policies be implemented.
Answer : B
Protocol bridging features are a common part of enterprise service bus products and can be provided through the use of adapters.
Answer : A
Which of the following statements about compensating service transactions and compensation logic is true?
Answer : D
Which of the following represent common types of logic that can be placed within a service fa?ade component?
Answer : A,B,C,D
The scope and size of different service inventory architectures can vary.
Answer : A
The Invoice service in an accounting firm is heavily reused by different service compositions. The owners of the service decide to protect its integrity by disallowing access to any part of its underlying implementation and further want to avoid the risk of having this service create a single point of failure. Which two patterns should they apply in order to accomplish this goal?
Answer : D
The application of the Rules Centralization pattern achieves the ___________ of business rules data within an inventory, but it also ___________ business logic associated with business-centric services.
Answer : D
Which of the following statements are true?
Answer : B,C