Exam Code: 1Z0-864 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Java Enterprise Edition 5 Enterprise Architect Certified Master Exam (Step 1 of 3)
Certification Provider: Oracle
Free Today! Guaranteed Training- Pass 1Z0-864 Exam.

2021 Jun 1Z0-864 Study Guide Questions:

Q31. Which two statements are true only when implementing rich client applications, and NOT when implementing web browser-based clients that support only HTML? (Choose two.)

A. Information can be sent to the client by the server, without client polling.

B. Information can be encrypted prior to delivering it to the client and decrypted when received to the client.

C. Information can be compressed prior to delivering it to the client and decompressed when received to the client.

D. Information can be delivered to the client incrementally, without requiring that the server deliver all the information to be presented to the client on each update.

Answer: AD

Q32. An application needs to invoke a service on a remote system over a low latency connection, and then wait for a response. Which two are best for this type of invocation? (Choose two.)

A. JMS topic

B. JMS queue

C. RMI over IIOP

D. synchronous web service

E. asynchronous web service

Answer: CD

Q33. Your company is going through an extensive security audit and it has been identified that your Internet-facing web site is vulnerable to SQL injection from authenticated users. Which two are appropriate for mitigating this threat? (Choose two.)

A. Using security roles in the deployment descriptor

B. In stored procedures called with prepared statements

C. Adding an Intercepting Validation filter to your system

D. Requiring SSL in the deployment descriptor transport guarantee

Answer: BC

1Z0-864  testing engine

Renewal 1Z0-864 free draindumps:

Q34. As part of your SOA infrastructure, you are interested in implementing a client that can request information about businesses worldwide from a UDDI registry. Which Java EE API provides interfaces for gathering data about these businesses?





Answer: D

Q35. You are architecting a web service-based system that wraps existing remote business objects. The object interactions are complex, fine-grained, and expose proprietary business processes. Which pattern do you use to provide external access to these business objects?

A. Adapter

B. Session Facade

C. Application Controller

D. Model View Controller

E. Chain of Responsibility

Answer: B


Click the Task button.



Free 1Z0-864 practice:

Q37. What are two aspects of the Strategy pattern? (Choose two.)

A. Provides a way to configure a class with one of many behaviors

B. Defines an object that encapsulates how a set of objects interact

C. Defines the skeleton of an algorithm, deferring some steps to subclasses

D. Decouples an abstraction from its implementation so that the two can vary independently

E. Defines a family of algorithms, encapsulates each one, and makes them interchangeable

F. Allows subclasses to redefine certain steps of an algorithm without changing the algorithm's structure

Answer: AE

Q38. What are two consequences of using the Observer pattern? (Choose two.)

A. The source is loosely coupled with the observer.

B. Changes in a source are broadcast to all observers.

C. The observer must be tightly coupled with the source.

D. An observer is restricted to observing only one source.

E. An adaptor is needed when subclasses of the source are added.

Answer: AB

Q39. A company is a startup that aggregates the product catalogs from several vendors and provides an online shopping experience. Vendors maintain the company's catalog and product inventory in vendor-unique relational databases that it hosts. The company has the following non-functional requirement priorities for a new system: scalability, availability, and reliability. Which logical tier map will maximize the non-functional requirement priorities as set forth by this company?

A. Presentation/business logic tier - database

B. Presentation tier - business logic tier - database

C. Presentation tier - business logic tier - resource tier - database

D. Presentation tier - database (business logic in stored procedures)

Answer: C

Q40. A company is required by law to log and store comprehensive information on all access requests made to its business logic API. Which design pattern is most suitable to provide this information with a minimum of disruption to the existing servlet-based implementation?

A. Business Object

B. Session Facade

C. Intercepting Filter

D. Dispatcher View

Answer: C