Vcehome > Oracle > Oracle Java > 1Z0-807 > 1Z0-807 Online Practice Questions and Answers

1Z0-807 Online Practice Questions and Answers

Questions 4

A successful web application is used by over two hundred thousand users. Due to this substantial load, the database is over bridged and fails frequently. All data, included critical user records and temporary session data, is stored in the database. Because of resource constraints, a new database system cannot be installed.

Which change will reduce the load on the database?

A. Creating more entity beans to optimize interaction wild the database

B. Refactoring the web application to use DAOs to communicate with the database

C. Refactoring the web application to store temporary session data on the web servers

D. Adding more web servers to the web tier to distribute the load and reduce the number of transactions on the database.

Browse 90 Q&As
Questions 5

Which two statements describe the contact between an Enterprise JavaBeans (EJB) container and the EJBs that it hosts?

A. The container provides automatic logging of all exceptions and errors generated by EJB code.

B. The container provides a transparent scaling mechanism to handle spikes in demand.

C. An EJB can extend its services, such as security, to improve performance.

D. The container has a well defined lifecycle model for each EJB type.

Browse 90 Q&As
Questions 6

Which two statements are true about the timer service of a business component container?

A. Timed notifications for all types of session beans can be scheduled by using this service.

B. When the server is shut down, the timer is persisted automatically and becomes active again when the server is restarted.

C. Each instance of message driven beans has unique timers.

D. When stateful session bean instance is removed, the container detaches the timers associated with the instance and allocates them to the new instance.

E. When a transaction is rolled hark, the timer creation within the transaction is also rolled back.

Browse 90 Q&As
Questions 7

You are conducting a security audit for a web application that uses URL rewriting. The application does not allow for user-generated content and is accessible only via secured VPN.

Which two security threats would you prioritize in your audit?

A. SQL injection

B. Cross-site scripting

C. Parameter-site manipulating

D. Session hijacking

E. Denial-of-service attacks

Browse 90 Q&As
Questions 8

You are the operations architect for a large online retailer. During peak times, your set of monitored applications exhibits non-reproducible errors. The data center is growing at 50% per annum, while your team headcount remains constant.

Which method would you use to implement an affective monitoring strategy?

100% Real QandAs | 100% Real Pass

A. Use the Visitor pattern to collect per-JVM statistics and store them centrally.

B. Use the Strategy pattern to encapsulate collection logic for each JVM.

C. Use the Thread Tracker to monitor the JVMs directly.

D. Use the Observer pattern to monitor each JVM directly.

Browse 90 Q&As
Questions 9

A business application that runs in an Enterprise JavaBeans (EJB) container must communicate with a transactional third-party service. The communication technology must allow changing service providers without changing the application's business model.

Which technology would meet these requirements?

A. Java Message Service

B. Remote Method Invocation

C. Simple Object Access Protocol

D. Java Connector Architecture

E. Java Business Integration

Browse 90 Q&As
Questions 10

A company provides call center support for corporations world-wide. Each agent in the call center can be assigned to multiple call center customers. All the company's customers use Windows based user interfaces and it has Just signed a new customer that uses a Java EE back end and wants a rich interface.

The company is developing a user interface for the new customer with the following requirements: Customer service representatives (CSRs) must be able to work with minimal training on the application.

CSRs must be able to switch between call center systems quickly.

Screens must have a windows look and feel.

2000 agents spread across four locations must be able to use the system.

Which recommendation would you make to this company about the user interface (UI)?

A. Write the UI using JSP and JSTL.

B. Write the UI using JSPs with embedded script lets.

C. Write the UI using AJAX, Accessing servlets directly.

D. Write the UI using Java Swing and describe using JNLP.

Browse 90 Q&As
Questions 11

Which two use cases are best suited to the RPC style of messaging using Simple Object Access Protocol (SOAP)?

100% Real QandAs | 100% Real Pass

A. Processing large sized communication messages

B. Implementing line grained services

C. Validating custom data types

D. Implementing asynchronous web services

E. Executing long running multi-part processes

Browse 90 Q&As
Questions 12

You are asked to propose a software deployment strategy that will reduce a client will also make deploying and testing their software stack more efficient.

Which element would you include in your proposal?

A. Vertically scalable platform

B. Horizontally scalable platform

C. Virtualized platform

D. Standard unit testing software

Browse 90 Q&As
Questions 13

StockTeller is a Java-based application designed to retrieve the current market for a portfolio of publicly listed stocks. You have been tasked to design a bolt on module for StockTeller called EBroker, a Java E- based online application that needs to asynchronously communicate with StockTeller to retrieve market prices for securities in a secure manner.

Which web service technology would you choose to integrate StockTeller into the EBroker application?

A. JAX-WS using HTTP

B. JAX-WS using HTTPS

C. JAX-RPC using HTTP

D. JAX-RS using HTTPS

Browse 90 Q&As
Exam Code: 1Z0-807
Exam Name: Java EE 6 Enterprise Architect Certified Master
Last Update:
Questions: 90 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99