An investment company has purchased a number of small online business referral systems that appeal to various niche demographics. The company wants to bring these networks together in hopes of finding a broad, single theme and brand image for these groups before they can do that, they need to get the users communicating with outside their current networks.
Which Web Services pattern would you recommend they consider in building a scheme to accommodate this communication?
A. Asynchronous Interactions
B. PAOS Interactions
C. Web Services Broker
D. JMS Bridge
You have been recruited by an online retailer of footwear to conduct a review of their online systems. Your primary Finding is that the development team has implemented duplicated complex business logic as Java scripts directly into the JSPs, causing performance, scalability, and maintainability issues.
Which two design patterns would you select to improve the current code base?
A. View Helper
B. From Controller
C. Composite View
D. Service-to-Worker
E. Business Delegate
Which is an objective of the Strategy pattern?
A. To provide a way to configure a class with one of many behaviors
B. To define an object that encapsulates how a set of objects interacts
C. To define the skeleton of an algorithm, deferring some steps to subclasses
D. To decouple an abstraction horn its implementation so that the two can vary independently
E. To define a family of algorithms, encapsulate each one, and make them interchangeable
F. To allow subclasses to redefine certain steps of an algorithm without changing the algorithm's structure
A company has been soiling a desktop based billing application that has Character User Interface (CUI) application developed by using Java. The company would like to release the next version of this application with the following features: a GUI with a pluggable look- and-feel capability and the flexibility to support multiple database vendors.
Which two technologies would you use in the new version?
A. Swing
B. JDBC
C. JPA
D. CMP
E. AWT
You are the architect for a patient management system with an HTMLUI. Currently, it is used by ward nurses who access the system using dockable tablet computers. The application uses the HttpSession object to store information. In phase two of the implementation, nurses will also have access through smart phones. These phones will use a native client rather than HTML, and will access the same business logic using a Web service.
Which two are optimal methods to manage conversational state in the new version of the system?
A. The HTML UI and native clients both use HttpSession objects.
B. The HTML UI and native clients both use stateful session beans.
C. The HTML UI and native clients both use stateless session beans.
D. The HTML UI uses an HttpSession object, native clients create a session management object.
E. The HTML UI and native clients both use singleton beans.
Which two statements apply to unsigned applets?
A. They can access the client file system.
B. They can connect to third-party servers.
C. They can connect to the originating host.
D. They can invoke public methods of applets on a page.
E. They can load native libraries.
Which two security threats are negated by encrypting network transactions with Transport Layer Security (TLS)?
A. SQL injection
B. Session hijacking
C. Man in the middle
D. Cross-site scripting
E. Denial of service
A company provides call center support for corporations world-wide. Each agent in the call center can be assigned to multiple call center customers. All the company's customers use Windows based user interfaces and it has Just signed a new customer that uses a Java EE back end and wants a rich interface.
The company is developing a user interface for the new customer with the following requirements: Customer service representatives (CSRs) must be able to work with minimal training on the application.
CSRs must be able to switch between call center systems quickly.
Screens must have a windows look and feel.
2000 agents spread across four locations must be able to use the system.
Which recommendation would you make to this company about the user interface (UI)?
A. Write the UI using JSP and JSTL.
B. Write the UI using JSPs with embedded script lets.
C. Write the UI using AJAX, Accessing servlets directly.
D. Write the UI using Java Swing and describe using JNLP.
You are contracted to improve the performance of an application.
While analyzing the application, you observe the following issues: Tight coupling between client and business objects
Too many remote method Invocations between client and server
Which design pattern is best suited to improving performance?
A. Web Service Broker
B. Value List Handler
C. Data Access Object
D. Service Activator
During a security audit, it is noted that your application is vulnerable to SQL Injection attacks.
100% Real QandAs | 100% Real Pass
Which two action would you perform to address this vulnerability?
A. Use parameterized stored procedures with the embedded parameters.
B. Add a text input validation filter to check user-supplied data.
C. Configure user permissions in the deployment descriptor.
D. Configure security roles in the deployment descriptor.
E. Deploy the Internet facing nodes in a well defined demilitarized zone (DMZ) layer.
F. Use parameterized stored procedures with the principle of least privilege.