Proper study guides for Refresh Oracle Java Enterprise Edition 5 Enterprise Architect Certified Master Exam (Step 1 of 3) certified begins with Oracle 1Z0-864 preparation products which designed to deliver the Precise 1Z0-864 questions by making you pass the 1Z0-864 test at your first time. Try the free 1Z0-864 demo right now.

2021 Jul 1Z0-864 rapidshare

Q121. A Java web component, EJB component, or another web service can be a client to a web service. Which Java API can the client use to access the web service through a Service Endpoint Interface?





Answer: D

Q122. In EJB 3, annotations are embedded in compiled class files. Application assemblers, deployers and administrators do not have the option of modifying them directly. They do, however, have the option of modifying or creating deployment descriptors. Which two statements are true? (Choose two.)

A. Deployers can override all of the information specified by application assemblers.

B. Application assemblers can override all of the information specified by developers.

C. Deployers can override some but not all of the information specified by application assemblers.

D. Application assemblers can override some but not all of the information specified by developers

Answer: AD

Q123. A software company developed an SaaS application written in Java EE using JSPs, stateless session beans, entity beans, and DAOs. The application allows a customer to track employee training and certifications. Customers have been complaining about the amount of data entry, because they must enter the information about the training and certifications. The company wants to create a web service that allows training companies to send training information about a student, so customers do NOT have to enter the information. You have been contracted to advise the company on the creation of the web service.

What is your advice to this company?

A. Write a new entity bean implementing JAX-WS

B. Do nothing because the company has a JSP that can take input

C. Place @WebService on the stateless session bean that takes the training input

D. Place @WebService on the JSPs that accept the data entry for a training class

Answer: C

Q124. You have a web portal system that interfaces to a web service endpoint on an unsecured communication channel. Evil Hacker X is intercepting the message between the two endpoints.

What kind of security threat is this?

A. Session theft

B. Man in the Middle

C. Cross-site scripting

D. Broken authentication

E. Distributed Denial of Service

Answer: B

Q125. In order to handle your n-tier application's persistence requirements directly from web-tier components, which three statements about your application should be true? (Choose three.)

A. Your application will NOT need to use DAOs.

B. Your application has no need for an LDAP server.

C. Your application is such that scalability is NOT a concern.

D. Your application has no need for concurrency management.

E. Your application has no need for container managed transactions.

Answer: CDE

1Z0-864  exam fees

Replace 1Z0-864 practice exam:

Q126. With the release of a new product line, there has been a significant increase in the volume of transactions on your web site. You need to scale your application and manage session failover.

What is the best option for scalability?

A. Add additional web servers and application servers

B. Introduce a High Availability pair and utilize sticky sessions

C. Add additional application servers and implement DNS round robin

D. Add additional application servers and use clustered HttpSession

Answer: D

Q127. A stock trading company is writing a new application for stock market forecasting. A significant portion of the work required by the business logic involves navigating through the persistent object model. As lead architect on this project, you have chosen JPA over EJB2 entity beans to implement these persistent objects. You have done this to maximize performance when navigating through the model. Why does JPA offer better performance for this task?

A. JPA guarantees referential integrity at the object level.

B. JPA allows the application to specify lazy or eager retrievals.

C. JPA simplifies the source code that implements the object model.

D. The guaranteed referential integrity in EJB2 entity beans is expensive.

Answer: B

Q128. What is a benefit of using the Transfer Object pattern?

A. Reduces requests across the network

B. Avoids the overhead of using EJB finder methods for large searches

C. Separates the business state and related behavior from the rest of the application

D. Implements parent-child relationships efficiently when implementing Business Objects

Answer: A

Q129. A company manufactures widgets for sale to distributors. Distributors call this company when they want to order more widgets. The company wants the distributors to send orders using XML documents over the Internet to reduce the number of data entry personnel needed. It has no control over the distributor's technologies. The company does not want the orders to impact the performance of the other users. You have been assigned the task of designing the new API.

Which approach do you take?

A. design the API as a JMS queue

B. design the API as an RMI interface

C. design the API as a synchronous web service

D. design the API as an asynchronous web service

Answer: D

Q130. A travel company re-architected its application from a two-tier to a three-tier architecture. To see what impact the new architecture would have on its non-functional requirements (NFR), the company intends to build a prototype based on the new architecture. The company compared the NFR metrics associated with the new prototype against the metrics from their original two-tier solution. What is an advantage of the original two-tier solution?

A. It has better availability because it has fewer single points of failure.

B. It has better manageability because each client has its own copy of the application.

C. It has better performance because each client must use its own set of domain objects.

D. It has better scalability because each client can access the database independently of other clients.

Answer: A