Accurate of 1Z0-864 answers materials and questions pool for Oracle certification for IT professionals, Real Success Guaranteed with Updated 1Z0-864 pdf dumps vce Materials. 100% PASS Java Enterprise Edition 5 Enterprise Architect Certified Master Exam (Step 1 of 3) exam Today!

2021 May 1Z0-864 Study Guide Questions:

Q11. You are a client of an XML over HTTP web service. You need a Java API that can enable your application to parse and transform XML documents independent of a particular XML processing implementation. Which Java API can you use?

A. SAAJ

B. JAXP

C. JAXR

D. JAX-RPC

Answer: B


Q12. An application must send information to a remote system using SOAP. According to the application requirements only the SOAP headers contain sensitive information and need to be encrypted. It is a requirement that the sensitive information is encrypted during both transmission and storage. What is the best way to implement this messaging system?

A. using WS-Security

B. using XML over HTTPS

C. using SOAP over HTTPS

D. using Container-managed security

Answer: A


Q13. DRAG DROP

Click the Task button.


Answer: 


1Z0-864  answers

Regenerate 1Z0-864 study guide:

Q14. You are integrating with a single legacy Enterprise Information System. You are interested in the transaction management capabilities of the Java Connector Architecture. This new system needs the capability to invoke multiple operations against this single legacy system. These operations succeed together or fail together as a group. To which minimum level of transaction management are you going to set your resource adapter?

A. No transaction

B. Local transaction

C. Distributed transaction

D. Container Managed transaction

Answer: B


Q15. A travel company is designing an application to allow customers to browse for information on any flights operating domestically and to place new reservations on any of those flights. The company makes the following assumptions: significant read volume, in terms of operations the customers will perform significant overlap, in the search criteria of customers simple processing of each customer browse/update request What advice can you give this company?

A. use a two-tier architecture (rich client directly accessing the database) because running copies of the business logic in each client provides significant advantages in terms of processing time per request

B. use a three-tier architecture (thin client -> application server -> database) because executing business logic remotely on a central location results in better performance per request

C. use a three-tier architecture (thin client -> application server -> database) because the shared business server allows them to cache information with high likelihood of cache hits, which reduces the load on the database

D. use a two-tier architecture (rich client directly accessing the database) because each client can operate on its own business objects, independently of others, which provides significant advantages from reduced latency due to synchronization

Answer: C


Q16. A company has committed to support a non-functional requirement (NFR) that states it must process all requests within 3 seconds. The company's customers are complaining that the system is not meeting the NFR and you have been contracted to fix the system. The company is not sure whether its customers are meeting the NFR. What is the most appropriate course of action?

A. Modify the architecture to implement threading of requests

B. Add another server to spread the load across more servers

C. Establish measurements, implement the measurements, move the code to production, and determine a go-forward plan

D. Establish measurements, implement the measurements, load test in the test environment, and determine a go-forward plan

Answer: D


2passeasy.com

Certified 1Z0-864 courses:

Q17. A company is in the business of distributing hard candies. The distribution of these candies is automated and the system that helps track information about candy distribution is written in Java technology. The business unit for the company has been asking the IT group to provide a flexible reporting system to track detailed information. A large amount of data about candy is stored using a DAO layer, but little is used. What is the best solution for the IT group to implement to provide the most flexibility for the business unit?

A. refactor the DAOs to include additional static queries to pull information and export a spreadsheet for the business unit to review

B. Implement an ad-hoc query tool exposed using JSF that allows business units to create queries and produce results in a given format

C. Provide a JSP page, which has scriptlets that expose pre-defined queries for the business unit to execute and display in HTML

D. Create a web service that exposes fixed queries invoked by a JSP client that can pull data from the database and export in a given format

Answer: B


Q18. What are two characteristics of object-oriented design? (Choose two.)

A. scalability

B. manageability

C. encapsulation

D. polymorphism

E. cross-cutting concerns

Answer: CD


Q19. In which two ways does the Value List Handler pattern support separation of concerns? (Choose two.)

A. It centralizes business logic and state.

B. It encapsulates access to business services.

C. It uses DAOs to encapsulate access to persistence.

D. It helps focus list management logic in the business tier.

Answer: CD


Q20. Your company requires all its developers to use a well-specified set of exception classes to model a number of common error conditions, many of which are specific to its business. These exception classes are centrally maintained and come packaged in a library (a JAR file). The application you are developing needs to report a number of error conditions covered by this library to remote clients. Which pairing of component type and remote access technology enables client applications to use the predefined exceptions as part of their natural programming model?

A. servlet accessed using HTTP

B. entity bean accessed using web services

C. stateless session bean accessed using RMI

D. message-driven bean accessed using a JMS queue

Answer: C