Exam Code: 1Z0-864 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Java Enterprise Edition 5 Enterprise Architect Certified Master Exam (Step 1 of 3)
Certification Provider: Oracle
Free Today! Guaranteed Training- Pass 1Z0-864 Exam.

2021 Jun 1Z0-864 Study Guide Questions:

Q81. A new security feature has been requested for an existing web application with the following requirements:

All requests must be logged to a secure database.

Each request must be time-stamped with the start and completion times.

Each request must contain the IP address of the client that made the request. Which pattern is most applicable for this new feature?

A. Strategy

B. Front Controller

C. Abstract Factory

D. Intercepting Filter

E. Model View Controller

Answer: D


Q82. Which design pattern is useful for hiding the construction and implementation details of an object?

A. Flyweight

B. Singleton

C. Abstract Factory

D. Chain of Command

Answer: C


Q83. A travel company re-architected their application from a two-tier to a three-tier architecture. To see what impact the new architecture would have on its non-functional requirements (NFRs), the company built a prototype based on this new architecture. When they profiled it during testing, the company noticed that clients often share domain objects and leverage some of each other's work. Which characteristic of the prototype could improve based on their observation?

A. Security

B. Flexibility

C. Availability

D. Performance

Answer: D


1Z0-864  simulations

Avant-garde 1Z0-864 rapidshare:

Q84. A bank designed its first-generation web-based banking system around a Java technology rich client application that interacts with server-side service objects implemented as stateful session beans in a portable Java EE application. For their second-generation system, the company wants to open the architecture to other types of clients. The company is considering exposing its existing stateful session bean service as a web service. Which statement is true?

A. Session beans cannot be exposed as web services.

B. Stateful session beans cannot be exposed as web services.

C. Stateful session beans are automatically exposed as web services.

D. Stateful session beans annotated with @WebService are exposed as web services.

Answer: B


Q85. Security restrictions in a use-case require that the behavior of an EJB business method vary according to the role of the user. How should this be achieved?

A. The deployment descriptor is written using the roles determined by the programmer.

B. The programmer determines a role reference and uses it in the code. This is mapped to a role in the deployment descriptor.

C. The business method determines the role of the user using JNDI and configuration information in the deployment descriptor.

D. The business method determines the role of the user using JAAS and configuration information in the deployment descriptor.

Answer: B


Q86. A company is considering re-architecting their application from a two-tier to a three-tier architecture. To see what impact the new architecture would have on their non-functional requirements (NFRs), they created a prototype. When they tested the prototype based on their three-tier architecture they noticed, contrary to expectations, that the prototype was less scalable than the original two-tier solution. Which two statements explain the result? (Choose two.)

A. Clients end up competing for CPU cycles on the common business logic tier.

B. Clients end up competing for resources on the back-end database used by the application.

C. Clients did NOT share interest in any domain objects, but the business tier spent too much time coordinating among clients anyway.

D. Clients did NOT share interest in any domain objects and the business tier ran out of memory to represent all domain objects required by the clients.

Answer: AD


2passeasy.com

Approved 1Z0-864 bootcamp:

Q87. As the architect for a corporation, you are focused on how best to design the persistence layer of the in-house stock inventory application. Key operations that must be supported, in addition to insert, read, update and delete are: bulk updates and deletes, complex queries including sub queries, JOINs and dynamic queries. Ease of development and a future-proof approach is important, but you realize that ease of development is academic if the approach selected does NOT meet the core technical requirements. What is the best approach to architecting the persistence layer for the application?

A. Use entity beans, accessed by a session bean layer to provide unit-of-work, security and transaction semantics

B. Use JDBC-based layer, accessed by a session bean layer to provide unit-of-work, security, and transaction semantics

C. Do NOT provide a logically distinct persistence layer, but rather use session beans to access the database directly using JDBC

D. Use a JPA-based persistence layer, accessed by a session bean layer to provide unit-of- work, security, and transaction semantics

Answer: D


Q88. What is a purpose of the Web Services Metadata for the Java Platform specification (JSR-181)?

A. to simplify development of web services from JSPs

B. to simplify development of web services from POJOs

C. to simplify development of web services from JMS destinations

D. to simplify development of web services from MDB components

Answer: B


Q89. A travel company decides to re-architect their two-tier application (where each client ran its own copy of the application against a shared database) and hires you as their lead architect. You suggest they re-architect their application as a browser-based, three-tier solution: presentation, business logic, and persistence. You also suggest they deploy each of the three tiers on its own computer. Why is the three-tier solution more scalable than the two-tier solution?

A. Every client runs its own GUI application. Clients do not compete for resources for presentation purposes.

B. Clients share the same business logic tier. Client-specific objects can be stored centrally, optimizing access.

C. Every client shares the same business logic tier. Each client competes with each other for resources on that JVM.

D. Clients share the same business logic tier. Duplicate effort can be avoided by sharing objects, reducing the load on the database.

Answer: D


Q90. A Java EE application needs to receive XML documents and send back synchronous responses. The incoming XML documents are validated by the application against one of three distinct XML schemas. What is the simplest mechanism with the least overhead to accomplish this task?

A. RMI over IIOP

B. XML over HTTP

C. JAVA IDL/CORBA

D. a SOAP web service

Answer: B