New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following 1z0-807 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

1z0-807 Exam Dumps - Java EE 6 Enterprise Architect Certified Master Exam

Go to page:
Question # 9

A company manufactures widgets for sale to distribution. Distributors call this company when they want to order more widgets. The company wants the distributors to send orders using XML documents over the Internet to reduce the number of data entry personnel needed. It has no control over the distributors technologies. The company does not want the Orders to impact the performance of other users. You have been assigned the task of designing a new API.

Which method do you use?

A.

Design the API as a Java Message Service (JMS) queue.

B.

Design the API as an Remote Method Invocation (RMI) interface.

C.

Design the API as a synchronous web service.

D.

Design the API as an asynchronous web service.

Full Access
Question # 10

Your development team wants to use Google Guice. A previous architect assigned this request a low priority, citing the complexity of integration and no compelling benefits statements from the requesting team.

The team claims that their colleagues have achieved the integration using a pattern. This pattern reduced the level of difficulty and risk and did not require vendor support.

Which pattern fits this description?

A.

Context Holder

B.

Service Starter

C.

DependencyInjectionExtender

D.

Bean Locator

Full Access
Question # 11

Which two statements are true about Java integration technologies?

A.

Remote Method Invocation (RMI) helps to connect subsystems in a loosely coupled manner.

B.

Java Message Service (JMS) helps in synchronous messaging between Java and non-Java systems.

C.

C. JMS helps to broadcast messages to multiple Java-based receivers.

D.

D. Java Connector Architecture (JCA) helps to integrate with heterogeneous legacy enterprise information systems.

Full Access
Question # 12

Which two statements are true about transport-layer security?

A.

It is loosely coupled with the transport-layer protocol.

B.

It is an end-to-end security mechanism.

C.

D. It prevents the captured data from being replayed at a later time.

Full Access
Question # 13

StockTeller is a Java-based application designed to retrieve the current market for a portfolio of publicly listed stocks. You have been tasked to design a bolt on module for StockTeller called EBroker, a Java E-based online application that needs to asynchronously communicate with StockTeller to retrieve market prices for securities in a secure manner.

Which web service technology would you choose to integrate StockTeller into the EBroker application?

A.

JAX-WS using HTTP

B.

JAX-WS using HTTPS

C.

JAX-RPC using HTTP

D.

JAX-RS using HTTPS

Full Access
Go to page: