Exam Code: 1Z0-868 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Java Enterprise Edition 5 Enterprise Architect Certified Master Upgrade Exam
Certification Provider: Oracle
Free Today! Guaranteed Training- Pass 1Z0-868 Exam.

2021 Jun 1Z0-868 Study Guide Questions:

Q31. A mortgage company is building a system that allows customers to apply for a mortgage using a web application. A mortgage typically takes several days to process, so the customers receive results through an email message. When a customer completes the mortgage form, the customer must click the Submit button. When the Submit button is clicked, the application sends the mortgage data to an external system for processing and displays a JSP indicating that the application has been accepted. Because the company's core business is mortgages, the architecture must guarantee the delivery of mortgage data between the web application and the external processing system. In this situation, which technology should the web application use to send the mortgage data to the external processing system? 

A. a JMS queue 

B. XML over HTTP 

C. a synchronous web service 

D. an asynchronous web service 

Answer: A 

Q32. You are architecting a new Internet-deployed application and you want to restrict access to parts of the system for security purposes. Which three security restrictions can be specified in the deployment descriptor according to the servlet API specification standards? (Choose three.) 

A. on page forwarding 

B. on encryption methods 

C. based on the role name 

D. based on the user name 

E. based on the URL pattern 

F. based on the HTTP method 

Answer: C,E,F 

Q33. Your application accepts documents from unknown third parties over an encrypted connection. The documents are accompanied by a digital signature that attests to the origin of the document. Which aspect of the system limits the degree of confidence you can have in the origin of any given document if the implementation of all software is flawless? 

A. the strength of the signature algorithm 

B. the number of bits used in the signature 

C. the strength of encryption used to hide the conversation 

D. the certification practices associated with the certificate 

Answer: D 

1Z0-868  exam guide

Refresh 1Z0-868 exam answers:

Q34. You are building a subsystem that has several complex components, but you want to hide that complexity from the client code. Which pattern can you apply to hide this complexity? 

A. Proxy 

B. Bridge 

C. Adaptor 

D. Facade 

E. Decorator 

Answer: D 

Q35. You are writing a utility that searches for existing web services provided by large companies through UDDI. Your web site allows the user to input search criteria using event-driven, state- managed GUI screens, performs the search, and displays them in a formatted HTML page. Which technologies would you use for this application? 

A. JSP and JAXB 

B. JSF and JAXR 

C. JSF and JAX-WS 

D. JSP and JAX-WS 

Answer: B 

Q36. A company architected and developed a Java EE application and now they are having problems with the scalability of the system. The application uses JSPs and servlets deployed to a web container, and stateless session beans and DAOs deployed to an EJB container. The application's non-functional requirement for scalability is to support 500 concurrent users during peak hours of operation. The application can currently support 500 concurrent users, but the response time is 200 percent of what it is acceptable. You have been hired as an architect and have been assigned to help resolve this problem. The company's management is concerned with the hardware budgeting. What initial advice would you give to the company? 

A. add another web server 

B. start a new project to re-architect the application 

C. monitor the application to determine the potential problem areas 

D. add more memory and processors to the hardware hosting the EJB container 

Answer: C 


Precise 1Z0-868 :

Q37. An existing web application uses JSPs to communicate directly to a database. Small changes to the database result in business logic changes to many JSPs. The single JSP developer, who was also the graphic artist, has just quit the project. In addition, the company needs to add a web services-based interface to the application. You have been hired as the architect to refactor the web application. Which two changes should you make to accomplish this? (Choose two.) 

A. introduce a separate presentation layer with different views for HTML and XML 

B. add an abstraction layer between the database and JSPs to encapsulate business logic 

C. develop a DAO layer to encapsulate the database access that can be used by all the JSPs 

D. add new JSPs for the XML and use <jsp:include> to incorporate the existing business logic 

Answer: A,B 

Q38. A company has defined an XML-based document format that its business partners need to use to submit order information. To guarantee confidentiality and information integrity at a fine level in the presence of multiple processing steps, the company wants to take advantage of technologies such as WS-Security and XML Digital Signatures. These technologies define SOAP headers that can be used to sign and encrypt fragments of documents. Your task is to implement the web service that accepts and processes the orders. Which component type should be used for the web service endpoint? 

A. stateless session bean with RMI interface 

B. message-driven bean with web service interface 

C. stateful session bean with web service interface 

D. stateless session bean with access to the SOAP body 

E. stateless session bean with access to the SOAP envelope 

Answer: E 

Q39. A company is designing a customer relationship management (CRM) system. All data is to be stored in a relational database and accessed by multiple applications using a single persistence layer. The data model includes complex relationships between tables. Application requirements include disconnected operations to benefit the sales force in the field, complex queries to discover under-served customer segments, and the ability to perform bulk updates on data as corporate clients relocate or are acquired by former competitors. Which persistence technology best supports these requirements? 


B. CMP entity bean 

C. BMP entity bean with JPA persistence layer 

D. BMP entity bean with JDBC persistence layer 

Answer: A 

Q40. Your competitor is trying to crash your web site by using various Denial of Service attacks. Which two flaws should you protect against for this specific threat? (Choose two.) 

A. SQL injection 

B. buffer overflow 

C. Man in the Middle 

D. session hijacking 

E. weak password exploits 

Answer: A,B