1.
Your company requires all its developers to use a well-specified set of exception classes to model several common error conditions, many of the which are specific
to its business. These exception classes are centrally maintained and come packaged in a library (a JAR file). The application you are developing needs to report a
number of error conditions covered by this library to remote clients.
Which paring of component type and remote access technology enables client applications to use the predefined exceptions as part of their natural programming
model?
2.
While analyzing an existing web application, you observe the following issues in the source code:
- Duplicate control code is scattered throughout various view.
- Business and presentation logic are mixed within these view.
The next phase of the project involves refactoring the existing code to address these two issues.
Which design pattern, if employed in the refactoring exercise, would most directly address the two issues?
3.
You are using an open source integration framework in your project. However, key interfaces do not explicitly define several strange conditions you have repeatedly
seen while testing. Which option is the name given to the anti pattern described above?
4.
Which two statements are true about security strategies at the message level?
5.
Which two features are supported by the Java Authentication and Authorization Service (JAAS) API?
6.
Your development team wants to use Google Guice. A previous architect assigned this request a low priority, citing the complexity of integration and no compelling
benefits statements from the requesting team.
The team claims that their colleagues have achieved the integration using a pattern. This pattern reduced the level of difficulty and risk and did not require vendor
support.
Which pattern fits this description?
7.
Which statements are true about Java integration technologies?
8.
A travel company re-architects its application from a two-tier to a three-tier architecture. To see what impact the new architecture has on its non-functional
requirements (NFR), the company intends to build a prototype based on the new architecture.
The company compares the NFR metrics associated with the new prototype against the metrics from their original two-tier solution.
Which option is an advantage of the original two-tier solution?
9.
Which two statements describe the contact between an Enterprise JavaBeans (EJB) container and the EJBs that it hosts?
10.
What are two consequences of using the Composite View pattern?