Exam Code: 1Z0-864 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Java Enterprise Edition 5 Enterprise Architect Certified Master Exam (Step 1 of 3)
Certification Provider: Oracle
Free Today! Guaranteed Training- Pass 1Z0-864 Exam.
2021 Jun 1Z0-864 Study Guide Questions:
Q51. You are writing a utility that searches for existing web services provided by large companies through UDDI. Your web site allows the user to input search criteria using event-driven, state managed GUI screens, performs the search, and displays them in a formatted HTML page. Which technologies would you use for this application?
A. JSP and JAXB
B. JSF and JAXR
C. JSF and JAX-WS
D. JSP and JAX-WS
Answer: B
Q52. You need to restrict access to the administration screens in your web site. In which two locations can you determine whether a user is authorized to access a particular screen? (Choose two.)
A. An EJB entity
B. An intercepting filter
C. A custom tag library
D. Stored procedures
E. A deployment descriptor
F. Custom JavaScript in JSP
Answer: BE
Q53. You are architecting a new Internet-deployed application and you want to restrict access to parts of the system for security purposes. Which three security restrictions can be specified in the deployment descriptor according to the servlet API specification standards? (Choose three.)
A. On page forwarding
B. On encryption methods
C. Based on the role name
D. Based on the user name
E. Based on the URL pattern
F. Based on the HTTP method
Answer: CEF

Refresh 1Z0-864 exam guide:
Q54. Which three statements are guaranteed to be true about an ORM-centric approach to data persistence, regardless of the specific implementation chosen? (Choose three.)
A. ORM implementations can be supported by tool vendors to improve developer productivity.
B. ORM implementations typically trade off a small decrease in raw performance in return for greatly improved developer productivity.
C. ORM implementations can optimize persistence strategies to scale in both single (one server) and clustered (multiple servers) scenarios.
D. ORM implementations provide the same level of data access and manipulation semantics, as provided by accessing the underlying datastore directly.
E. ORM frameworks are verifiably correct in applying ACID (atomicity, consistency, isolation, durability) to database access, which is an advantage over JDBC.
Answer: ABC
Q55. As an architect, you need a design pattern with the following capabilities: decouples storage implementation details provides a uniform API to access various external resources encapsulates proprietary features to facilitate maintainability Which design pattern should you choose?
A. Composite
B. Resource Tier
C. Data Access Object
D. Resource Controller
Answer: C
Q56. A company acts as a clearinghouse for credit card transactions. Certain bits of information inside individual transactions must be kept encrypted at all times to limit the potential for fraudulent transactions by untrustworthy merchants. Examples of data that must be kept confidential include the full credit card number and the CVV2 code associated with a card. Additionally, to limit the risk for tampering with transaction information, the company requires that information about a transaction travels as one data packet with the associated digital signature. You have been entrusted with developing the entry point into the system, that is, the component that needs to accept data for an individual transaction and start processing it. Which technology best satisfies the company's requirements?
A. Stateless session bean with RMI interface
B. CMP entity bean generated from a database table
C. Message-driven bean attached to a persistent JMS queue
D. Stateless session bean with a RPC-style web service interface
Answer: C

Validated 1Z0-864 testing software:
Q57. What is a major design characteristic of the Service To Worker pattern?
A. Control of transactions
B. Separation of concerns
C. Control of network traffic
D. Integration of legacy systems
Answer: B
Q58. Which two statements describe the advantages of inheritance as compared to coding to an interface? (Choose two.)
A. The reuse of existing code implementations.
B. Allows you to use one object in place of another.
C. Inheritance allows you to restrict the behavior of objects.
D. Inheritance promotes encapsulation better than interfaces.
E. Only through inheritance can an object be of multiple types.
Answer: AC
Q59. Your company is a startup that created an application to support a local insurance company. Insurance forms have a complicated object model with several levels of whole-part relationships.
Currently, the code to create insurance forms is complex and embedded in object model classes.
Your company has just won a bid from a major insurance corporation that handles clients across multiple countries, and each country has its own rules about how insurance forms are constructed. You need to separate the model creation from the model classes and support different construction rules. Which two patterns should you apply? (Choose two.)
A. State
B. Proxy
C. Builder
D. Strategy
E. Prototype
Answer: CD
Q60. A company that sells avatar skins for virtual reality environments has hired an architect consultant to determine why their system runs slowly. The consultant finds that the business logic that processes orders has been embedded into all of their JSPs using scriptlets. During load testing, the responsiveness of the system is slow, but the CPU and VM-free memory utilization remain at a low level. Which two are most likely causes of the problem? (Choose two.)
A. User requests are deadlocked.
B. The servlet instances are locked on every request.
C. The Java Virtual Machine is NOT configured properly.
D. Database connection pooling is NOT configured properly.
Answer: BD