Exam Code: 1Z0-864 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Java Enterprise Edition 5 Enterprise Architect Certified Master Exam (Step 1 of 3)
Certification Provider: Oracle
Free Today! Guaranteed Training- Pass 1Z0-864 Exam.

2021 May 1Z0-864 Study Guide Questions:

Q61. A company is deploying a real-time Java EE purchase order processing system. This system will use an external application to access a customer's account status as part of the purchase order approval process. This external application is deployed on the same hardware as the purchase order processing system, but it is not written in the Java programming language. Which technology should be used to retrieve the account status from the external system?

A. A JMS topic

B. A JMS queue

C. A synchronous web service

D. An asynchronous web service

Answer: C


Q62. A developer builds a Java EE application that supports distributed transactions. The application must participate in an existing transaction to update a database using JDBC and invoke a transactional method on a remote system. Which two technologies could the developer choose to access the remote system? (Choose two.)

A. Java Connector Architecture

B. Java Message Service (JMS)

C. Remote Method Invocation (RMI)

D. Simple Object Access Protocol (SOAP)

Answer: AC


Q63. SOAP was selected as an integration technology for the flexibility of messaging styles it supports (in particular, how an XML payload can be presented in a SOAP message). Which message-style statement is correct?

A. The body of an RPC-style SOAP message cannot be a literal message.

B. The XML payload for a document-style message cannot be an encoded message.

C. The XML payload for RPC and document-style messages guarantee XML payload delivery.

D. An RPC-style message has the XML payload wrapped inside an operation element in a SOAP body.

Answer: D


1Z0-864  exam

Abreast of the times 1Z0-864 free practice exam:

Q64. You have refactored your legacy Java application into a three-tiered architecture. Your Security Audit group is concerned that your architecture may be vulnerable to security threats in the separate tiers. Which two methods can you use to reduce those threats? (Choose two.)

A. Programmatic security in the EJB Entities

B. Intercepting Filters between the view and the controller

C. Intercepting Filters between the controller and the model

D. Role-based security for the EJBs in the deployment descriptor

Answer: BD


Q65. A company that sells footwear hired a junior-level developer to create their order-entry workflow using JSPs. The developer hard coded all the business logic into scriptlet-intensive JSPs. The resulting spaghetti code became too much for the developer to maintain. The company then hired a Sun Certified Enterprise Architect (SCEA) to help fix the problem. Which design pattern would be best for the order-entry workflow?

A. View Helper

B. Front Controller

C. Composite View

D. Service to Worker

E. Business Delegate

Answer: D


Q66. A teenage fashion web site, includes a set of pages for displaying and browsing their catalog, as well as pages for making fashion suggestions that also display tables of catalog entries.

Currently, the JSP code uses scriptlets that perform database SELECT statements and format the results in HTML tables. You have been hired to help reduce the maintenance overhead when either the look is modified or the database schema changes. Which two patterns, used together, do you apply to reduce this maintenance overhead? (Choose two.)

A. View Helper

B. Front Controller

C. Composite View

D. Data Access Object

Answer: AD


2passeasy.com

Vivid 1Z0-864 software:

Q67. What is an advantage of XML over HTTP, as compared to SOAP over HTTP, for web services?

A. Guaranteed delivery

B. More security options

C. Smaller message size

D. Strongly typed parameters

Answer: C


Q68. With which two is the service-oriented architecture concerned? (Choose two.)

A. low cohesion

B. loose coupling

C. XML web services

D. stateful session handling

E. well-defined contracts

Answer: BE


Q69. Your web application requires access to several different services, so you created a Service Locator class to be used by the UI developers on the team. New services with different interfaces are occasionally added. Unfortunately, the caching benefits of the Service Locator class are NOT being realized because a new instance of this class is being created in every backing bean method that requires a service. Which pattern should you apply to eliminate this problem?

A. Bridge

B. Singleton

C. Prototype

D. Factory Method

E. Business Delegate

Answer: B


Q70. A Java EE application starts a transaction, attempts a database insert using JDBC, and sends a message to an MDB over a transactional JMS Queue. Upon receipt of a message, the MDB attempts an insert in a different database using JDBC. What is NOT a possible result after attempting to commit the application's transaction?

A. The application performs an insert and the MDB performs an insert.

B. The application performs an insert and the MDB does NOT perform an insert.

C. The application does NOT perform an insert and the MDB performs an insert.

D. The application does NOT perform an insert and the MDB does NOT perform an insert.

Answer: C