SCEA_Questions

These are few questions from SCEA 1.5 exam:

1.    What are the three primary roles in a web service interaction? (Choose three.)
A. Broker
B. Facade
C. Provider
D. Decorator
E. Requestor
F. Interceptor
Correct: A C E

2.A stock trading company is writing a new application for stock market forecasting. A significant portion of the work required by the business logic involves navigating through the persistent object model. As lead architect on this project, you have chosen JPA over EJB2 entity beans to implement these persistent objects. You have done this to maximize performance when navigating through the model. Why does JPA offer better performance for this task?
A. JPA guarantees referential integrity at the object level.
B. JPA allows the application to specify lazy or eager retrievals.
C. JPA simplifies the source code that implements the object model.
D. The guaranteed referential integrity in EJB2 entity beans is expensive.
Correct: B

As part of ejb2.0 we are using EntityBeans for to access the database. But as part of ejb3.0 we are using the JPA(Java Persistance API) for to access the database and some portability issues.  EJB2.0 has Deployment descriptors but in EJB3.0 has no Deployment Descriptors. EJB2.0 we have to write Home and Remote Interfaces But in EJB3.0 No need to write Home and remote interfaces.


3.A developer creates a Java web service to be used by consumers in an SOA. This SOA uses a UDDI service registry. How can the developer make the new service available to consumers?

A. deploy to the registry using JAXR
B. publish to the registry using JAXR
C. query the registry using JAXRPC
D. target the registry using JAXRPC
Correct: B
The Java API for XML Registries (JAXR) gives you a uniform way to use business registries that are based on open standards (such as ebXML) or industry consortium-led specifications (such as UDDI).


4.With the release of a new product line, there has been a significant increase in the volume of transactions on your web site. You need to scale your application and manage session failover. What is the best option for scalability?
A. add additional web servers and application servers
B. introduce a High Availability pair and utilize sticky sessions
C. add additional application servers and implement DNS round robin
D. add additional application servers and use clustered HttpSession
Correct: D

5.You are asked to architect an SOA solution that leverages Java web services. The architecture needs to be flexible and allow for the SOAP 1.1, SOAP 1.2, and REST implementations. Which JavaEE technology should you use?
A.JAXP
B.JAXB
C.JAXWS
D.JAXRPC
Correct: C

The Java API for XML Web Services (JAX-WS) is a Java programming language API for creating web services. It is part of the Java EE platform. Like the other Java EE APIs, JAX-WS uses annotations, introduced in Java SE 5, to simplify the development and deployment of web service clients and endpoints. JAX-WS 2.0 replaced the JAX-RPC API in Java Platform, Enterprise Edition 5. The name change reflected the move away from RPC-style and toward document-style web services.

6. You are architecting an online ordering application with these requirements: Users access the system over the Internet using HTML. An email message is sent to the user confirming the order.
Users must log in and are validated using LDAP. The product catalog is stored in a relational database. All orders are logged to the internal fulfillment system. Orders must not be lost.

Which Java EE technology should be used to send orders to the fulfillment system?
A.JNDI
B.JMS
C.JAXWS
D.RMI IIOP

Correct: B

7.An online sporting goods store's web application uses HTTPSession to store shopping carts. When the application is initially deployed, the business plan predicts only a few customers will access the site. Over time, the store projects a steady increase in volume. The deployment plan calls for a single web container in the initial deployment. As demand increases, the plan calls for multiple web containers on separate hardware with clustered HTTPSession objects. Which two principles will help the application meet the requirements and optimize performance? (Choose two.)

A. The application should store as much as possible in HTTPSession objects.
B. The application should NOT make frequent updates to HTTPSession objects.
C. The application should make coarse grained updates to HTTPSession objects.
D. The application should create new HTTPSession objects instead of updating existing objects.

Correct: B C

8.You are writing a utility that searches for existing web services provided by large companies through UDDI. Your web site allows the user to input search criteria using event driven, state managed GUI screens, performs the search, and displays them in a formatted HTML page. Which technologies would you use for this application?

A.JSP and JAXB
B.JSF and JAXR
C.JSF and JAXWS
D.JSP and JAXWS

Correct: B

9.A company has a web service that provides the most recent price for stocks, mutual funds, and commodities. The company has the only web service that allows a person to check prices on all three financial assets with one call. Its system does not store this information but sends individual calls to each of the primary vendors for an asset and then aggregates the response to the requester. The company has committed to support a nonfunctional requirement (NFR) for performance that states it must process all requests within three seconds and each of the three vendors is obligated to support the NFR as dictated by the company.

Where, in the message flow, is it appropriate to measure whether all the NFRs are met?
A. when a request is received and a response is sent to the requester
B. when a request is received, first call to vendor, last response from vendors, response is sent to a requester
C. when a requester sends a request, the request is received, each call to vendor, each response from vendor, requester receives response
D. when a request is received, each call to vendor, each response from a vendor, a response is sent to a requester

Correct: D

10.A Java web component, EJB component, or another web service can be a client to a web service. Which Java API can the client use to access the web service through a Service Endpoint Interface?

A.JAXB
B.JAXR
C.JDBC
D.JAXWS

Correct: D

11.Which three are parts of a SOAP message? (Choose three.)

A.SOAP body
B.SOAP endpoint
C.SOAP headers
D.SOAP handlers
E.SOAP attachments

Correct: A C E

12.You are integrating with a single legacy Enterprise Information System. You are interested in the transaction management capabilities of the Java Connector Architecture. This new system needs the capability to invoke multiple operations against this single legacy system. These operations succeed together or fail together as a group. To which minimum level of transaction management are you going to set your resource adapter?

A. No transaction
B. Local transaction
C. Distributed transaction
D. Container Managed transaction

Correct:B

13.What is an advantage of XML over HTTP, as compared to SOAP over HTTP, for web services?

A. guaranteed delivery
B. more security options
C. smaller message size
D. strongly typed parameters

Correct: C

14.An application needs to invoke a service on a remote system over a low latency connection, and then wait for a response. Which two are best for this type of invocation? (Choose two.)

A. JMS topic
B. JMS queue
C. RMI over IIOP
D. synchronous web service
E. asynchronous web service

Correct: C D

15.Your new architecture needs to access the business logic of an Enterprise Information Solution(EIS). What are three benefits of using the Java Connector Architecture to connect to EIS instead of implementing a proprietary solution? (Choose three.)

A. security
B. performance
C. loose coupling
D. connection pooling
E. Common Client Interface

Correct: A D E

16.Your web application requires access to several different services, so you created a Service  Locator class to be used by the UI developers on the team. New services with different interfaces are occasionally added. Unfortunately, the caching benefits of the Service Locator class are NOT being realized because a new instance of this class is being created in every backing bean method that requires a service.

Which pattern should you apply to eliminate this problem?
A. Bridge
B. Singleton
C. Prototype
D. Factory Method
E. Business Delegate

Correct: B

17.What are two benefits of using the Value List Handler pattern? (Choose two.)

A. improves network performance
B. facilitates exposing existing services
C. provides an alternative to potentially inefficient EJB finders
D. facilitates post processing across heterogeneous requests
E. provides a mechanism to support shared elements of composite views

Correct: A C

18.What are two capabilities of the Abstract Factory pattern? (Choose two.)

A. creates whole part hierarchies
B. creates families of related objects
C. enforces dependencies between concrete classes
D. specifies the types of objects to create using a sample instance
E. separates the construction of a complex object from its representation

Correct: B C

19.A teenage fashion web site, includes a set of pages for displaying and browsing their catalog, as well as pages for making fashion suggestions that also display tables of catalog entries. Currently, the JSP code uses scriptlets that perform database SELECT statements and format the results in HTML tables. You have been hired to help reduce the maintenance overhead when either the look is modified or the database schema changes.

Which two patterns, used together, do you apply to reduce this maintenance overhead? (Choose two.)
A. View Helper
B. Front Controller
C. Composite View
D. Data Access Object

Correct: A D

20.A new security feature has been requested for an existing web application with the following requirements: All requests must be logged to a secure database. Each request must be time stamped with the start and completion times. Each request must contain the IP address of the client that made the request.

Which pattern is most applicable for this new feature?

A. Strategy
B. Front Controller
C. Abstract Factory
D. Intercepting Filter
E. Model View Controller

Correct: D

21.Which two are benefits of using the Intercepting Filter pattern? (Choose two.)

A. allows the recombination of filters
B. provides efficient data sharing between filters
C. facilitates creating a generic command interface
D. facilitates common processing across heterogeneous requests
E. helps to minimize coupling between the presentation and business tiers

Correct: A D

22.You are building a subsystem that has several complex components, but you want to hide that complexity from the client code.

Which pattern can you apply to hide this complexity?

A. Proxy
B. Bridge
C. Adaptor
D. Facade
E. Decorator

Correct: D

23.Some media players use a virtual proxy for image loading.

What is the benefit of using a virtual proxy?
A. It controls access to the original object.
B. It defers creation of expensive objects until necessary.
C. It provides a local representation for an object in a different address space.
D. It is a replacement for a bare pointer that performs additional actions when an object is accessed.

Correct: B

24.Your company's web site is supported with a cluster of load balanced web servers and a database server. To reduce expenses, your company must replace your current cluster of web servers with a single web server. All servers under consideration have the same specification.

Which three items will be negatively impacted by this re-architecture?(Choose three.)
A. security
B. reliability
C. scalability
D. availability
E. manageability
F. maintainability

Correct: B C D

25. A company manufactures widgets for sale to distributors. Distributors call this company when they want to order more widgets. The company wants the distributors to send orders using XML documents over the Internet to reduce the number of data entry personnel needed. It has no control over the distributor's technologies. The company does not want the orders to impact the performance of the other users. You have been assigned the task of designing the new API.

Which approach do you take?
A. design the API as a JMS queue
B. design the API as an RMI interface
C. design the API as a synchronous web service
D. design the API as an asynchronous web service

Correct: D

26.You have been tasked with improving the availability of an existing three tier application. What is your first step in evaluating what changes should be made to the architecture to achieve the goal?

A. monitor network traffic between tiers
B. separate presentation from business logic
C. identify and document all single points of failure
D. cluster the presentation tier without session replication

Correct: C

27.Which nonfunctional requirement is a disadvantage for a two tier architecture?

A. security
B. reliability
C. availability
D. manageability

Correct: D

28.A travel company is designing an application to allow customers to browse for information on any flights operating domestically and to place new reservations on any of those flights. The company makes the following assumptions: significant read volume, in terms of operations the customers will perform significant overlap, in the search criteria of customers simple processing of each customer browse/update request .

What advice can you give this company?
A. use a two tier architecture (rich client directly accessing the database) because running copies of the business logic in each client provides significant advantages in terms of processing time per request
B. use a three tier architecture (thin client >application server >database) because executing business logic remotely on a central location results in better performance per request
C. use a three tier architecture (thin client >application server >database) because the shared business server allows them to cache information with high likelihood of cache hits, which reduces the load on the database
D. use a two tier architecture (rich client directly accessing the database) because each client can operate on its own business objects, independently of others, which provides significant advantages from reduced latency due to synchronization

Correct: C

29.A company provides call center support for corporations worldwide. Each agent in the call center can be assigned to multiple call center customers. All of the company's customers use Windows based user interfaces and it has just signed a new customer that uses a Java EE backend and wants a rich interface. The company is developing a user interface for the new customer with the following requirements: Customer service representatives (CSRs) must be able to work with minimal training on the application. CSRs must be able to switch between call center systems quickly. Screens must have a Windows "look and feel." 2000 agents spread across four locations must be able to use the system.

What advice would you give this company on the user interface (UI)?
A. write the UI using JSP and JSTL
B. write the UI using JSPs with embedded scriptlets
C. write the UI using Ajax, accessing Servlets directly
D. write the UI using Java Swing and distribute using JNLP

Correct: D

30.A travel company decides to re-architect their two tier application (where each client ran its own copy of the application against a shared database) and hires you as their lead architect. You suggest they re-architect their application as a browser based, three tier solution: presentation, business logic, and persistence. You also suggest they deploy each of the three tiers on its own computer.

Why is the three tier solution more scalable than the two tier solution?
A. Every client runs its own GUI application. Clients do not compete for resources for presentation purposes.
B. Clients share the same business logic tier. Client specific objects can be stored centrally, optimizing access.
C. Every client shares the same business logic tier. Each client competes with each other for resources on that JVM.
D. Clients share the same business logic tier. Duplicate effort can be avoided by sharing objects, reducing the load on the database.

Correct: D

 

31. Which two can be used to maintain conversational state ? (Choose two.)

A. Entity beans
B. Http session
C. Stateful session beans
D. message-driven beans
E. stateless session beans

Correct B,C

32. You are the architect of a project that will provide an external, low latency, scalable, and highly-available service for handling string transactions. Each request consists of a short string ID and language key, limited to "EN", "FR", "ES", "DE", and "JP". Each response is a simple Unicode string averaging 256 bytes in size, and there will be no more than 50,000 records for each language. All the records have already been translated and changes to the records will be rare.

What should you do to ensure that your service will scale and perform well as new clients are added ?
A - store all the records in an LDAP server and use JNDI to access them from the web tier
B - deploy a standard 3-tier solution that is supported by a fast and reliable relational database
C - deploy a single service on many servers in the web tier, each storing all the records in memory
D - store all of the records in a network attached file system so they can be served directly from the file system

Correct: C

33.You are the architect of a web application that uses JSF as a presentation tier for business processes coded as stateless session beans. When you add new code to the stateless session beans to address new accounting requirements, without changing the interface, you discover that the new business processes are being ignored by some of the JSF components.

Which might be the cause of this problem?
A - The presentation tier is relying on validation logic in the business tier.
B - The browser is caching out-of-date versions of the JSF components.
C - The business processes are not rigorously encapsulated in the session beans.
D - The new session beans have been deployed incorrectly, and proper deployment will resolve the problem.

Correct: C

34. You have refactored your legacy Java application into a three-tiered architecture. Your security audit group is concerned that your architecture may be vulnerable to security threats in the separate tiers. Which two methods can you use to reduce those threats? (Choose two).

A - programmatic security in the EJB entities
B - intercepting filters between the view and the controller
C - intercepting filters between the controller and the model
D - role-based security for the EJBs in the deployment descriptor

Correct: B,D

36. The current architecture of a fashion website consists of one web server, three application servers, and a database. You, as the lead architect, recommend adding more web servers. What are two valid justifications for new architecture? (Choose two.)

A. New web servers will decrease latency for I/O-bound requests.
B. Adding multiple web servers will have a positive impact on scalability.
C. Adding new web servers will increase the overall availability of the web site.
D. New web servers will increase the number of user accounts that can be supported.

Correct: B,C

 

37. Which three statements are true about delegation as on OO design technique? (Choose three.)

A. It is applied to a system only at compile time.
B. It is an essential element of the State pattern.
C. It is an essential element of the Singleton pattern.
D. It allows you to replace inheritance with composition.
E. In Java technology, it is always implemented through the use of generics.
F. It always requires that at least two objects are involved in handling a request.

Correct: B, D, F

 

38. Which two statements are true about the Flyweight pattern? (Choose two.)

A. It allows a single instance of a class to virtually represent many instances.
B. When used approximately it can reduce memory demands on your servers.
C. It allows for many instances of a class to be controlled by a single instance.
D. It allows many tightly related, homogeneous objects to each maintain their own state.

Correct: A, B

 

39. Which two techniques can be used to provide polymorphic behavior? (Choose two.)

A. extending a class and adding a new method
B. implementing two interfaces in the same class
C. extending a class and overriding an existing method
D. implementing an interface with several different classes

 

Correct: C, D


40. As a project architect, you are selecting technologies for a complex, n-tier web application's virtual platform. At this stage in the project, which two technologies should be of primary consideration? (choose two.)

 

A. RMI
B. Linux
C. JDBC
D. Firefox
E. Tomcat

 

Correct: A, C

  • 1
    点赞
  • 3
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值