Exam Code: 1Z0-864 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Java Enterprise Edition 5 Enterprise Architect Certified Master Exam (Step 1 of 3)
Certification Provider: Oracle
Free Today! Guaranteed Training- Pass 1Z0-864 Exam.

2016 Sep 1Z0-864 pdf exam

Q121. A bank designed its first-generation web-based banking system around a Java technology rich client application that interacts with server-side service objects implemented as stateful session beans in a portable Java EE application. For their second-generation system, the company wants to open the architecture to other types of clients. The company is considering exposing its existing stateful session bean service as a web service. Which statement is true?

A. Session beans cannot be exposed as web services.

B. Stateful session beans cannot be exposed as web services.

C. Stateful session beans are automatically exposed as web services.

D. Stateful session beans annotated with @WebService are exposed as web services.

Answer: B

Q122. A company's backend system is implemented as a set of stateless session bean components.

Traditionally, it was accessed only by a web-based UI, developed in-house. Responding to strong customer demand, the company now wants to expose a programmatic way to access its system from other applications. Their customer base uses a variety of operating systems and deployment environments, with technologies ranging from C/C++ to Perl to Java. The company's customers place particular importance on the ready availability of tooling to make client development as painless as possible. Which remoting technology best meets the customer's requirements?



C. web services

D. XML over HTTP

Answer: C

Q123. A Java web component, EJB component, or another web service can be a client to a web service. Which Java API can the client use to access the web service through a Service Endpoint Interface?





Answer: D

Q124. You have refactored your legacy Java application into a three-tiered architecture. Your Security Audit group is concerned that your architecture may be vulnerable to security threats in the separate tiers. Which two methods can you use to reduce those threats? (Choose two.)

A. Programmatic security in the EJB Entities

B. Intercepting Filters between the view and the controller

C. Intercepting Filters between the controller and the model

D. Role-based security for the EJBs in the deployment descriptor

Answer: BD

Q125. What describes the design relationship between session beans and entity beans?

A. Aggregation

B. Separation of concerns

C. Common reuse principle

D. Liskov substitution principle

E. Interface segregation principle

Answer: B


Renew 1Z0-864 practice exam:

Q126. A company hired a web designer to create a fresh look for their web applications. The designer created several new UI components that require a complex interaction between HTML and the JavaScript language. The architect needs to choose a combination of server-side technologies to accommodate these new components. Which two technology combinations, used independently, satisfy this requirement? (Choose two.)

A. JSP with tag files

B. servlets with custom filters

C. JSF with custom components

D. JSF with the Expression Language

E. servlets with the Expression Language

Answer: AC

Q127. Which two statements are true when comparing JPA to EJB 2.x? (Choose two.)

A. JPA implementations are more scalable than EJB 2.x CMP or BMP entity beans.

B. Developers can use JPA to construct persistence models that map closely to business domain models including inheritance and polymorphism.

C. JPA implementations are faster than EJB 2.x CMP or BMP entity beans.

D. Developers using the JPA need to implement fewer interfaces than in EJB 2.x.

Answer: BD

Q128. Which three statements are true about delegation as an OO design technique? (Choose three.)

A. It is applied to a system only at compile time.

B. It is an essential element of the State pattern.

C. It is an essential element of the Singleton pattern.

D. It allows you to replace inheritance with composition.

E. In Java technology, it is always implemented through the use of generics.

F. It always requires that at least two objects are involved in handling a request.

Answer: BDF

Q129. Which two techniques can be used to provide polymorphic behavior? (Choose two.)

A. Extending a class and adding a new method

B. Implementing two interfaces in the same class

C. Extending a class and overriding an existing method

D. Implementing an interface with several different classes

Answer: CD

Q130. Your company is starting its first project using EJB 3. The developers are familiar with developing web applications using servlets and MVC web frameworks. Which argument supports the decision of using EJB 3 on the project?

A. EJB 3 session beans are POJO classes.

B. EJB 3 session beans use the same threading model that servlets use.

C. Database resources are available to every EJB 3 session bean without any developer intervention.

D. EJB 3 session beans can be defined directly inside a WAR file, without requiring a separate EJB JAR file.

Answer: A