Sample Questions
Q)You are architecting the layers for a complex n-tier web application. Which two pairs of technologies do NOT exhibit direct dependencies? (Choose two.)
a)EJB to RMI
b) Linux to JDBC
c) HTML to Firefox
d) SunFire E20k server to Java EE
Q) You are architecting a complex multi-tiered web application. Within each tier you have designed layers, the lowest being the hardware layer and the highest being the application layer. Which statement is true?
a) Generally, a given layer in one tier of this application should be concerned with the technology used in the same layer of adjacent tiers.
b) To maximize separation of concerns, a given layer in a tier of this application should only have knowledge of the adjacent layer in that tier.
c) For any given tier, separation of concerns is fulfilled when a given layer in that tier knows or needs to know little or nothing of the layers below it.
d) If the layers in one tier of the application have been designed to achieve separation of concerns, then the remaining tiers also achieve separation of concerns by default.
Q) You are the architect on a project to build a bridge between the legacy customer service tool, an outdated VT100 terminal server, and a company's new Java EE web application. You do NOT have access to the terminal server and cannot deploy any code to it. Which approach should you use to integrate the systems?
a) use a DAO wrapped around a JDBC connection to query the legacy system
b) deploy a CORBA server to the legacy system and use RMI-over-IIOP to communicate to it
c) develop a session bean that wraps a screen-scraping tool to interact with the legacy system
d) develop a web services-based service and use XML to communicate with the terminal server
Q) What are two characteristics of object-oriented design? (Choose two.)
a) scalability
b) manageability
c) encapsulation
d) polymorphism
Q) Security restrictions in a use-case require that the behavior of an EJB business method vary according to the role of the user. How should this be achieved?
a) The deployment descriptor is written using the roles determined by the programmer.
b) The programmer determines a role reference and uses it in the code. This is mapped to a role in the deployment descriptor.
c) The business method determines the role of the user using JNDI and configuration information in the deployment descriptor.
d) The business method determines the role of the user using JAAS and configuration information in the deployment descriptor.