You are designing a bank application in which automated email reminders are sent to customers every 24 hours, starting from five days prior to a payment due date
until the payment is made?
Which type of beans most closely match the implementation needs for this requirement?
You are integrating with a single legacy Enterprise Information System. You are interested in the transaction management capabilities of Java Connector
Architecture. This new system needs the capability to invoke multiple operations against this single legacy system. these operations succeeded together or fail
together as a group.
To which minimum level of transaction management do you set your resource adapter?
Your company is creating a Java EE corporate wide workflow system in winch significant internal business events are consumed by multiple applications. Due to
multi-year development plans, many of these applications do not exist yet, even at the design stage. IT has defined standard data formats for these events in the
form of small XML documents. Also, the rules for how an application filters and processes events are not fixed In advance and can change over the life or the
application.
Which combination of technologies is best for distributing and consuming these events throughout the company?
YourDocs is an application that retrieves PDF documents of selected topics from both trusted and untrusted websites. It has been developed using a non-Java
technology. You are designing your Mlearn, a mobile-based e-learning application, which will be implemented in Java. You plan to integrate YourDocs with your
application.
Which web service technology would you choose to Integrate YourDocs into the YourMLearn application?
You are the architect of an existing project. Making changes to one component frequently requires making changes to many other components.
Which action would reduce future maintenance costs?
You are using an open source integration framework in your project. However, key interfaces do not explicitly define several strange conditions you have repeatedly
seen while testing.
Which option is the name given to the anti pattern described above?
You are the lead technical designer for a new B2C retail application. A key goal is to minimize design and build complexity in order to maximize speed to market.
Which three features of JPA make it the most appropriate technology to use in building the persistence layer of the application?
Oasis Corporation has decided to develop a single Instance multi-tiered application with its existing EIS resources. You are the technical lead for the Integration
team responsible for providing the following:
- A common Interface that can easily access the heterogeneous EIS resources
- Generic transaction mechanism support for EIS resource managers
- A connection pool to legacy EIS resources
Which two technologies would you use to meet these requirements?
A company that sells avatar skins tor virtual reality environments has a static website for advertising their wares. The website was built using What You See Is What
You Get (WYSIWYG) html editor and also contains a lot of JavaScript. The company now wants to add server side processing capabilities developing a shopping
application, the company is considering using JavaServer Faces (JSF)
Which statement is true?
During a security audit, it is noted that your application is vulnerable to SQL Injection attacks.
Which two action would you perform to address this vulnerability?