1Z0-807 | The Secret of Oracle 1Z0-807 exam


Q21. Which statement is true about the use of security-related annotations in an enterprise bean?

A. They can be used to specify permissions only on business methods.

B. They can be used to specify permissions on a class or its business methods.

C. They can be used to change an authentication mechanism.

D. They can be used to acquire a secure connection using SSL.

E. They can be inherited from a parent abstract class.

Answer: B

Q22. Which two features are supported by the Java Authentication and Authorization Service (JAAS) API?

A. Single sign on

B. Secure network connections

C. Configurable access control policies

D. Web services security

E. Message encryption and key generation

Answer: AC

Q23. An investment company has purchased a number of small online business referral systems that appeal to various niche demographics. The company wants to bring these networks together in hopes of finding a broad, single theme and brand image for these groups before they can do that, they need to get the users communicating with outside their current networks.

Which Web Services pattern would you recommend they consider in building a scheme to accommodate this communication?

A. Asynchronous Interactions

B. PAOS Interactions

C. Web Services Broker

D. JMS Bridge

Answer: A

Q24. Your web page design company is designing websites for all the stores in a local mall. Your company must create a consistent "look and fool" for these sites.

After this "look and feel- project has gone through demonstration, enhancement and approval iterations with the mall's .lions, you job is complete and the development of the actual B2C (Business –to-Client) system will be handled by a different firm

Which architecture is most appropriate for your prototype project?

A. Two tier, web-centric

B. Three, web-centric

C. Three-tier, enterprise-centric

D. Three-tier, application-centric

Answer: A

Q25. Which two functions are essential parts of a service oriented architecture (SOA) infrastructure?

A. The service provider, which executes business logic in a stateless fashion

B. The service consumer, which accesses services from the service repository

C. The service repository, which stores software component metadata

D. The service broker, which delivers well-defined service-level agreements

E. The service look-up facility, which provides a central resource for naming and access

Answer: AC

Q26. Which two statements apply to unsigned applets?

A. They can access the client file system.

B. They can connect to third-party servers.

C. They can connect to the originating host.

D. They can invoke public methods of applets on a page.

E. They can load native libraries.

Answer: CD

Q27. You are contracted to improve the performance of an application.

While analyzing the application, you observe the following issues:

Tight coupling between client and business objects

Too many remote method Invocations between client and server

Which design pattern is best suited to improving performance?

A. Web Service Broker

B. Session Façade

C. Value List Handler

D. Data Access Object

E. Service Activator

Answer: B

Q28. You are the architect at ACME, a large a large global retailer of festival and holiday accessories. ACME wants to launch a new shopping portal for the holiday shopping session, allowing two months from project inception to going live. The portal must contain in-house and third-party stock to attack customers.

Fast response times are also critical so users remain engaged and sticky to the portal. What would you recommend to the ACME project team to deliver this project?

A. Access all third party content using JSONP to dynamically load it from the browser.

B. Access as much content with bulk-loading as possible; use JSONP to access the remainder.

C. Access all content regardless of source using the HTML 5 XML parsing capabilities of the browser

D. Access all third party content using JSON to dynamically load it from the browser.

Answer: A

Q29. YourDocs is an application that retrieves PDF documents of selected topics from both trusted and untrusted websites. It has been developed using a non-Java technology. You are designing your Mlearn, a mobile-based e-learning application, which will be implemented in Java. You plan to integrate YourDocs with your application.

Which web service technology would you choose to Integrate YourDocs into the YourMLearn application?

A. JAX-WS

B. JAX-WS with REST

C. JAX-RPC

D. JAX-RS

Answer: D

Q30. Which two are objectives of the Abstract Factory pattern?

A. To create whole-part hierarchies

B. To create families of related objects

C. To enforce dependencies between concrete classes

D. To specify the types of objects to create by using a sample instance

E. To separate the construction of a complex object from its representation

Answer: BC