Actual of 1Z0-864 brain dumps materials and bundle for Oracle certification for IT engineers, Real Success Guaranteed with Updated 1Z0-864 pdf dumps vce Materials. 100% PASS Java Enterprise Edition 5 Enterprise Architect Certified Master Exam (Step 1 of 3) exam Today!

2021 Jun 1Z0-864 Study Guide Questions:

Q91. You are the architect for an in-house application used by a consulting corporation to schedule internal resources to staff client engagements. The application will be used only by a well-defined user group (the in-house HR team) and so will not be exposed to large spikes in demand. Two phase commit semantics are not required, and the simple security model is addressed by integration with the company's LDAP server at the presentation layer. The company does have a 36-month roadmap for their intranet which calls for incremental development of the application over time. What is the best solution for implementing the business logic tier?

A. JSPs accessing the database directly is sufficient.

B. An MVC web framework with no persistence tier is sufficient.

C. An MVC web framework accessing session beans to access the persistence tier is sufficient.

D. Any standard web framework implementing the MVC model accessing the persistence tier is sufficient.

Answer: D

Q92. Your company is starting its first project using EJB 3. The developers are familiar with developing web applications using servlets and MVC web frameworks. Which argument supports the decision of using EJB 3 on the project?

A. EJB 3 session beans are POJO classes.

B. EJB 3 session beans use the same threading model that servlets use.

C. Database resources are available to every EJB 3 session bean without any developer intervention.

D. EJB 3 session beans can be defined directly inside a WAR file, without requiring a separate EJB JAR file.

Answer: A

Q93. The requirements state that a new system must use encryption to prevent data theft. Passwords must be stored using a one-way encryption algorithm so that they can never be accidentally displayed. Social security numbers must be stored in the database using a symmetrical algorithm so that they can be output on reports when necessary. Which three encryption methods can you use? (Choose three.)

A. Passwords can be stored using MD5.

B. Passwords can be stored using RC4.

C. Passwords can be stored using 3DES.

D. Social security numbers can be stored using SHA.

E. Social security numbers can be stored using 3DES.

F. Social security numbers can be stored using Blowfish.

Answer: AEF

Renew 1Z0-864 book:

Q94. A hospital has a patient management system. Currently it is used by nurses who access the system using tablet computers with a browser-based interface. The application uses HttpSession objects to store state information. In phase two of the implementation, nurses will also have access through PDAs. These PDAs will use a rich client and access the business logic using a web service. What are two ways to manage conversational state in the new version of the system? (Choose two.)

A. All clients use HttpSession objects.

B. All clients use stateful session beans.

C. All clients use stateless session beans.

D. Web clients use HttpSession objects and rich clients build a session management framework.

Answer: BD

Q95. An online footwear retailer wants to deploy a blogging web site about the footwear industry to help generate more traffic to its e-Commerce web site. The company wants to create the blogging site using Java EE technologies to make sure that every blog entry is indexed by search engines. Which Java EE technology should the company use to create its blogging site?

A. A JSF-oriented application using EJBs and JPA for persistence

B. A JSP-oriented application using EJBs and JPA for persistence

C. A web-centric JSF-oriented application using JPA for persistence

D. A web-centric JSP-oriented application using JPA for persistence

Answer: D

Q96. A travel company wants to outsource the credit card processing functionality needed by their online flight reservations system. The company wants their application to support the ability to swap third-party vendors without impacting their application's business model. The credit card processing operation must participate in transactions, to ensure business constraints are obeyed. Which Java EE technology would most easily support this requirement?



C. Web Services

D. Java Connector Architecture (JCA)

Answer: D

Exact 1Z0-864 preparation labs:

Q97. What describes the design relationship between session beans and entity beans?

A. Aggregation

B. Separation of concerns

C. Common reuse principle

D. Liskov substitution principle

E. Interface segregation principle

Answer: B

Q98. Over the years your company has developed a large set of EJB 2.1 components. Having upgraded its servers to an EJB 3 implementation, your company is ready to develop EJB 3 components for the first time in order to use the new development features. Which two can be implemented without upgrading an existing EJB 2.1 module to version 3, which would require repackaging and retesting the module? (Choose two.)

A. EJB 2.1 stateless session bean using an EJB 3 interceptor

B. EJB 3 stateless session bean invoking an EJB 2.1 stateless session bean

C. EJB 3 stateless session bean replacing an existing EJB 2.1 stateless session bean

D. EJB 3 stateless session bean sharing a timer with a EJB 2.1 stateless session bean

Answer: BC

Q99. A relational data model has three tables (Customer, Address, and Purchase). You are comparing modeling these tables with CMP entity beans and JPA using an ORM tool. Which two statements are true? (Choose two.)

A. The JPA version contains fewer classes and interfaces.

B. The CMP version contains fewer classes and interfaces.

C. The JPA entity classes can be instantiated with the "new" statement.

D. In JPA entity classes, data are accessed using abstract getter methods.

E. Both CMP entity beans and JPA entity classes can be directly used as DAO classes.

Answer: AC

Q100. What are two capabilities of the Decorator pattern? (Choose two.)

A. Provides a unified interface to a subsystem

B. Converts the interface of a class into another interface

C. Is used when the base class is unavailable for subclassing

D. Promotes loose coupling by keeping objects from referring to each other

E. Modifies responsibilities to individual objects dynamically and transparently

Answer: CE