1Z0-807 | Most up-to-date Oracle 1Z0-807 exam


Q1. You are the architect of an application that reads from and writes to multiple systems. The application must participate in an existing transaction to update a database using JDBC, and also invoke a transactional method on a remote system as part of the same transaction.

Which two technologies would you suggest, to access remote system, for this application?

A. Java Connector Architecture (JCA)

B. java Message Service (JMS)

C. Remote Method Invocation (RMI)

D. Simple Object Access Protocol (SOAP)

Answer: AC

Q2. You are the architect of a web application that uses javaServer Faces (JSF) as a presentation tier for business processes coded as stateless session beans. When you add new code to the stateless session beans to address new accounting requirements, without changing the interface, you discover that the new business processes are being ignored by some of the JSF components.

What might be the cause of this problem?

A. The presentation tier is relying on validation logic in the business tier.

B. The browser is caching out-of-date versions of the JSF components.

C. The business processes are not rigorously encapsulated in the session beans.

D. The new session beans have been deployed incorrectly, and proper deployment will resolve the problem.

Answer: C

Q3. Which two use cases are best suited to the RPC style of messaging using Simple Object Access Protocol (SOAP)?

A. Processing large sized communication messages

B. Implementing line grained services

C. Validating custom data types

D. Implementing asynchronous web services

E. Executing long running multi-part processes

Answer: BC

Q4. Your company is creating a Java EE corporate wide workflow system in winch significant internal business events are consumed by multiple applications. Due to multi-year development plans, many of these applications do not exist yet, even at the design stage.

IT has defined standard data formats for these events in the form of small XML documents.

Also, the rules for how an application filters and processes events are not fixed In advance and can change over the life or the application.

Which combination of technologies is best for distributing and consuming these events throughout the company?

A. Relational database and JDBC

B. HTTP client library and servlets

C. Remote Method Invocation (RMI) and stateless session beans

D. Java Message Service (JMS) topics and message-driven beans

E. JMS queues and message-driven beans

Answer: D

Q5. Which three web applications work best when they are designed to be server-push enabled?

A. A news feed used for providing users with frequently updated news content

B. A web chat that allows users to communicate using easily accessible web interfaces

C. A live sporting event application, used to deliver current results during matches

D. An auction system that provides users with live online bidding

E. A graphics rendering application that generates visuals in an orderly fashion

Answer: BCD

Q6. Which two statements describe the contact between an Enterprise JavaBeans (EJB) container and the EJBs that it hosts?

A. The container provides automatic logging of all exceptions and errors generated by EJB code.

B. The container provides a transparent scaling mechanism to handle spikes in demand.

C. An EJB can extend its services, such as security, to improve performance.

D. The container has a well defined lifecycle model for each EJB type.

Answer: BD

Q7. While analyzing an existing web application, you observe the following issues in the source code:

Duplicate control code is scattered throughout various view.

Business and presentation logic are mixed within these view.

The next phase of the project involves refactoring the existing code to address these two issues.

Which design pattern, if employed in the refactoring exercise, would most directly address the two issues?

A. Service to Worker

B. Dispatcher view

C. DAO

D. Composite View

Answer: A

Q8. You are the architect of an existing project. Making changes to one component frequently requires making changes to many other components.

Which action would reduce future maintenance costs?

A. Redesign the configuration and deployment.

B. Add an abstraction layer between the servlets and the EJB components.

C. Convert all stateful EJB components to stateless EJB components.

D. Expose the existing EJB components as web services.

Answer: B

Q9. You are conducting a security audit for a web application that uses URL rewriting. The application does not allow for user-generated content and is accessible only via secured VPN.

Which two security threats would you prioritize in your audit?

A. SQL injection

B. Cross-site scripting

C. Parameter-site manipulating

D. Session hijacking

E. Denial-of-service attacks

Answer: CD

Q10. You are the architect for XYZ bank. XYZ is redesigning their online banking offering and you need to ensure that the new design follows security best practices for the JEE platform.

Select three security best practices for JEE applications.

A. Schedule regular penetration testing.

B. Log all security related application events.

C. Implement an exception-handling strategy.

D. Encrypt data, both on the wire and at rest.

E. Use both programmatic and declarative security.

F. Treat users as untrusted even when authenticated.

Answer: BCE