An investment company has purchased a number of small online business referral systems that appeal to various niche demographics. The company wants to bring these networks together in hopes of finding a broad, single theme and brand image for these groups before they can do that, they need to get the users communicating with outside their current networks.
Which Web Services pattern would you recommend they consider in building a scheme to accommodate this communication?
A. Asynchronous Interactions
B. PAOS Interactions
C. Web Services Broker
D. JMS Bridge
MedLabML is a startup firm that moves patient data between different care providers to provide a "single patient view". They use a B2B system to exchange electronic business document with their key suppliers. They are seeking your advice about standards to review for improving their message-level security.
Which standard or API would you recommend they read?
A. SAML 1.1
B. Web Service Interoperability Technology
C. XML Signature
D. SSL
Which option describes the design relationship between session beans and entity beans?
A. Aggregation
B. Separation of concerns
C. Common reuse principle
D. Liskov substitution principle
E. Interface segregation principle
A company is extending is successful social networking site to support the following channels:
instant messaging (IM), email messaging and text messaging/SMS. At present, the site has scaled 400% in one year using a standard MVC Web framework the application experiences large surges or spikes in demand and also periods of
inactivity. Notification delivery to the three channels does not need to be guaranteed.
Which solutions extends the current architecture and best meets the company's requirements?
A. Send the notification inline, that is, within the normal HTTP request-response cycle.
B. Place messaging on a Java messaging Service (JMS) queue and use message-driven beans (MDBs) to create and send notifications.
C. Insert the messages into a database and use plain old Java Objects (POJOs) to read the messaging using JDBC and send notifications.
D. Insert the messages into a database and use entity beans to read the messages using JDBC and send notifications.
Which two statements apply to unsigned applets?
A. They can access the client file system.
B. They can connect to third-party servers.
C. They can connect to the originating host.
D. They can invoke public methods of applets on a page.
E. They can load native libraries.
Which three statements are true about inheritance?
A. Inheritance helps to reuse existing code implementations.
B. It should be possible to substitute the derived class for its base class.
C. Inheritance allows you to modify the behavior of objects.
D. Inheritance promotes encapsulation better than interfaces.
E. The derived class must override all methods of the base class.
Which three principles are best practices when implementing a logging strategy for an enterprise application?
A. Never print log messages to the console window.
B. Use the appropriate logger level for logging information.
C. Log messages for every method entry and exit.
D. Include programmer-specific data in the log messages.
E. Include the thread name and Java class name in log messages. 100% Real QandAs | 100% Real Pass
Which two types of applications benefit from using JavaServer Faces (JSF)?
A. An application with a customizable UI skin
B. An application that implements access control on each action based on user role.
C. An application in which type conversion of the values of UI components is implemented only in Java classes.
D. An application that sets specific database validation listeners on a UI component
You are the architect for XYZ bank. XYZ is redesigning their online banking offering and you need to ensure that the new design follows security best practices for the JEE platform.
Select three security best practices for JEE applications.
A. Schedule regular penetration testing.
B. Log all security related application events.
C. Implement an exception-handling strategy.
D. Encrypt data, both on the wire and at rest.
E. Use both programmatic and declarative security.
F. Treat users as untrusted even when authenticated. 100% Real QandAs | 100% Real Pass
Which two are objectives of the Abstract Factory pattern?
A. To create whole-part hierarchies
B. To create families of related objects
C. To enforce dependencies between concrete classes
D. To specify the types of objects to create by using a sample instance
E. To separate the construction of a complex object from its representation 100% Real QandAs | 100% Real Pass