Java EE 6 Enterprise Architect Certified Master Exam: 1Z0-807 Exam
1Z0-807 Questions & Answers
Exam Code: 1Z0-807
Exam Name: Java EE 6 Enterprise Architect Certified Master Exam
Q & A: 95 Q&As
Which two statements are true about security strategies at the message level?
A. Messages are secured during transport and after arrival at their destination
B. Each portion of a compound message is secured.
C. SSL is required to ensure authenticity, integrity, and confidentiality.
D. Message attachments are secured without the need for a dedicated API.
E. Security is dependent on the application environment or the transport protocol.
Which two features are supported by the Java Authentication and Authorization Service (JAAS)
A. single sign on
B. secure network connections
C. configurable access control policies
D. web services security
E. message encryption and key generation
Your development team wants to use Google Guice. A previous architect assigned this request a
low priority, citing the complexity of integration and no compelling benefits statements from the
The team claims that their colleagues have achieved the integration using a pattern. This pattern
reduced the level of difficulty and risk and did not require vendor support.
Which pattern fits this description?
A. Context Holder
B. Service Starter
C. Dependency Injection Extender
D. Bean Locator
Which statements are true about Java integration technologies?
A. Remote Method Invocation (RMI) helps to connect subsystems in a loosely coupled manner.
B. Java Message Service (JMS) helps in synchronous messaging between Java and non-Java systems.
C. JMS helps to broadcast messages to multiple Java-based receivers.
D. Java Connector Architecture (JCA) helps to integrate with heterogeneous legacy enterprise information
A travel company re-architects its application from a two-tier to a three-tier architecture. To see
what impact the new architecture has on its non-functional requirements (NFR), the company
intends to build a prototype based on the new architecture.
The company compares the NFR metrics associated with the new prototype against the metrics
from their original two-tier solution.
Which option is an advantage of the original two-tier solution?
A. It has better availability because it has fewer single points of failure.
B. It has better manageability because each client has its own copy of the application.
C. It has better performance because each client must use its own set of domain objects.
D. It has better scalability because each client can access the database independently of other clients.
Which two statements describe the contact between an Enterprise JavaBeans (EJB) container
and the EJBs that it hosts?
A. The container provides automatic logging of all exceptions and errors generated by EJB code.
B. The container provides a transparent scaling mechanism to handle spikes in demand.
C. An EJB can extend its services, such as security, to improve performance.
D. The container has a well defined lifecycle model for each EJB type.
What are two consequences of using the Composite View pattern?
A. Improves performance
B. Avoids duplicate content
C. Forces a whole-part dependency
D. Allows tables to be reused in multiple locations
E. Restricts all sub views to have a consistent view technology
Which option describes the design relationship between session beans and entity beans?
B. Separation of concerns
C. Common reuse principle
D. Liskov substitution principle
E. Interface segregation principle
Which three web applications work best when they are designed to be server-push enabled?
A. A news feed used for providing users with frequently updated news content
B. A web chat that allows users to communicate using easily accessible web interfaces
C. A live sporting event application, used to deliver current results during matches
D. An auction system that provides users with live online bidding
E. A graphics rendering application that generates visuals in an orderly fashion
A manufacturing company has a large investment in a legacy Inventory Management System
(IMS) developed with third-party technologies. You have been asked to design a Java EE
application that interacts with it.
You would like to ensure the following:
– Minimal application code is required to parse the communication
– Communication is asynchronous and stateless.
– Performance import of the existing system is minimal.
Which two technologies combined would meet these requirements?
…go to http://www.lead2pass.com/1z0-807.html to download the full version Q&As.