New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Oracle 1z0-807 Dumps Questions Answers

Page: 1 / 3
Total 89 questions

Java EE 6 Enterprise Architect Certified Master Exam Questions and Answers

Question 1

While analyzing an application, you observe that it contains numerous Interfaces for complex domain logic. Completing a business Function currently requires calling several of these interfaces in an order that is understood by system experts.

Which design pattern would you suggest to refactor the code?

Options:

A.

Façade

B.

MVC

C.

DAO

D.

Adapter

E.

Decorator

Buy Now
Question 2

While analyzing an existing web application, you observe the following issues in the source code:

  • Duplicatecontrol code is scattered throughout various view.
  • Businessand presentationlogicare mixed within these view.

The next phase of the project involves refactoring the existing code to address these two issues.

Which design pattern, if employed in the refactoring exercise, would most directly address the two issues?

Options:

A.

Service to Worker

B.

Dispatcher view

C.

DAO

D.

Composite View

Question 3

Your development team wants to use Google Guice. A previous architect assigned this request a low priority, citing the complexity of integration and no compelling benefits statements from the requesting team.

The team claims that their colleagues have achieved the integration using a pattern. This pattern reduced the level of difficulty and risk and did not require vendor support.

Which pattern fits this description?

Options:

A.

Context Holder

B.

Service Starter

C.

DependencyInjectionExtender

D.

Bean Locator

Question 4

Which three actions represent best practices when implementing an exception handling strategy for an application?

Options:

A.

B. Create a customuncheckedexception if the action to resolve the exception cannot be defined.

B.

Always log the specific exception before re-throwing a wrapped exception.

C.

Always throw exceptions in methods that are designed for exception handling.

D.

E. Always include information specific to the error when logging an exception.

Question 5

A manufacturing company has a large investment in a legacy Inventory Management System (IMS) developed with third-party technologies. You have been asked to design a Java EE application that interacts with it.

You would like to ensure the following:

  • Minimalapplicationcodeisrequired to parsethe communicationmessages.
  • Communication isasynchronousandstateless.
  • Performance import of the existing system is minimal.

Which two technologies combined would meet these requirements?

Options:

A.

XML

B.

JSON

C.

RMI

D.

JAX-RS

E.

JAX-WS

Question 6

A company wants to design an internal website for the purpose of managing its numerous social events. The site will not have heavy traffic, but will require state to be persisted in a database. You have been tasked to complete this action item in your spare time.

Which two Java EE-based approaches are best suited for quick development?

Options:

A.

Use JPAin the web tier only.

B.

Use message-driven beans to manage the posting of events.

C.

Useyourdomain modelcomponents as JavaServer Faces (JSF) managed beans.

D.

Use an Enterprise javaBeans (EJB) container to service-inject the domain model and support a JPA deployment.

Question 7

Upper management has announced a change in a company's primary hardware supplier for the next year, the timing of this change coincides with key purchases that line of business department has to make in support of its Java EE application upgrade/redesign project.

You are asked to help outline a strategy to preserve the project timeline and keep hardware training costs contained.

Which recommendation will you make?

Options:

A.

Add new hardware to create a heterogeneous environment.

B.

Request another year of sales and support with the existing vendor.

C.

Request more time to consider the total cost of change to your project and to modify your budget.

D.

Use new hardware on the web tier and redeploy existing hardware to the other tiers.

Question 8

A company has been soiling a desktop based billing application that has Character User Interface (CUI) application developed by using Java. The company would like to release the next version of this application with the following features: a GUI with a pluggable look- and-feel capability and the flexibility to support multiple database vendors.

Which two technologies would you use in the new version?

Options:

A.

Swing

B.

JDBC

C.

JPA

D.

CMP

E.

AWT

Question 9

Which three statements are true about inheritance?

Options:

A.

B. It should be possible to substitute the derived class for its base class.

B.

C. Inheritance allows you to modify the behavior of objects.

C.

Inheritance promotes encapsulation better than interfaces.

D.

The derived class must override all methods of the base class.

Question 10

Which three web applications work best when they are designed to be server-push enabled?

Options:

A.

B. A web chat that allows users to communicate using easily accessible web interfaces

B.

A live sporting event application, used to deliver current results during matches

C.

D. An auction system that provides users with live online bidding

D.

A graphics rendering application that generates visuals in an orderly fashion

Question 11

Which three actions restrict the ability of a web application to scale in response to load

as additional computing resources are made available to it?

Options:

A.

B.Implementing corebusinesslogic in the web tier

B.

Implementing core business logic using stateless session beans

C.

Storing users' session state in a database

D.

E.Maintaining users' session state by usingstatefulsession beans

Question 12

Which two statements are true about security strategies at the message-level?

Options:

A.

Each portion of a compound message is secured.

B.

C. SSL is required to ensure authenticity, integrity, and confidentiality.

C.

Message attachments are secured without the need for a dedicated API.

D.

Security is dependent on the application environment or the transport protocol.

Question 13

Which type of application would benefit from using the Singleton pattern?

Options:

A.

An application that interacts with external systems in parallel fashion.

B.

A clustered application that can support 200 concurrent users.

C.

D. An application that requires remote monitoring capabilities

Page: 1 / 3
Total 89 questions