Which two features are supported by the Java Authentication and Authorization Service (JAAS) API?
A. Single sign on
B. Secure network connections
C. Configurable access control policies
D. Web services security
E. Message encryption and key generation
A travel company re-architects its application from a two-tier to a three-tier architecture. To see what impact the new architecture has on its non-functional requirements (NFR), the company intends to build a prototype based on the new architecture.
The company compares the NFR metrics associated with the new prototype against the metrics from their original two-tier solution.
Which option is an advantage of the original two-tier solution?
A. It has better availability because it has fewer single points of failure.
B. It has better manageability because each client has its own copy of the application. 100% Real QandAs | 100% Real Pass
C. It has better performance because each client must use its own set of domain objects.
D. It has better scalability because each client can access the database independently of other clients.
Which two statements apply to unsigned applets?
A. They can access the client file system.
B. They can connect to third-party servers.
C. They can connect to the originating host.
D. They can invoke public methods of applets on a page.
E. They can load native libraries.
Which type of application would benefit from using the Singleton pattern?
A. An application that interacts with external systems in serial fashion.
B. An application that interacts with external systems in parallel fashion.
C. A clustered application that can support 200 concurrent users.
D. An application that requires remote monitoring capabilities
Which two kinds of applications benefit from the adoption of service oriented architecture (SOA) inspired
100% Real QandAs | 100% Real Pass patterns and practices?
A. An application that retains legacy systems while evolving to accommodate future business demands
B. An application with tightly coupled services that enable messages to flow easily
C. An application that utilizes fine-grained interfaces to provide communication to the object of a service
D. An application in which the communication between services and the business process are platform independent.
You are the architect of an application that reads from and writes to multiple systems. The application must participate in an existing transaction to update a database using JDBC, and also invoke a transactional method on a remote system as part of the same transaction. Which two technologies would you suggest, to access remote system, for this application?
A. Java Connector Architecture (JCA)
B. java Message Service (JMS)
C. Remote Method Invocation (RMI)
D. Simple Object Access Protocol (SOAP)
You are contracted to improve the performance of an application.
While analyzing the application, you observe the following issues: Tight coupling between client and business objects
Too many remote method Invocations between client and server
Which design pattern is best suited to improving performance?
A. Web Service Broker
B. Value List Handler
C. Data Access Object
D. Service Activator
A company that sells avatar skins tor virtual reality environments has a static website for advertising their wares. The website was built using What You See Is What You Get (WYSIWYG) html editor and also contains a lot of JavaScript. The company now wants to add server side processing capabilities developing a shopping application, the company is considering using JavaServer Faces (JSF)
Which statement is true?
A. The JavaScrip code has to be rewritten to conform to JSF standards.
B. JSF tags cannot be integrated into the HTML generated by WYSIWYG editors. 100% Real QandAs | 100% Real Pass
C. The web pages cannot be previewed accurately with a generic WYSIWYG HIML editor.
D. The web pages must be converted into Face lets.