|
Question 1. On an NFS server, which commands can you use to determine which clients have mounted exported file systems? (Select two.) A. more /etc/rmtab B. mount -v C. showmount -a D. more /etc/mounts E. more /etc/nfstab Answer: A, C Question 2. What is the main script that controls the start up of system services? A. /sbin/preinitrc B. /sbin/ioinitrc C. /sbin/bcheckrc D. /sbin/rc Answer: D Question 3. Which features are enabled by the HP-UX WBEM (Web-Based Enterprise Management) provider instrumentation? (Select three.) A. HP Systems Insight Manager (HP SIM) user configuration B. HP SIM and SMH display of system health and properties C. HP Systems Insight Manager (HP SIM) inventory reports D. HP Systems Management Homepage (SMH) display of component health E. Management processor display of health of the server it is managing F. HP System Management Homepage (SMH) configuration snapshots and inventory reports G. HP-UX Software Assistant capabilities Answer: B, C, D Question 4. Which Ignite command makes a recovery tape of all files in vg00? A. make_tape_recovery -x inc_entire=/dev/vg00 -a /dev/rmt/1mn B. make_recovery -x inc_entire=/dev/vg00 -a /dev/rmt/1mn C. make_tape_recovery -x inc_vg00=all -a /dev/rmt/1mn D. make_net_recovery -x inc=/dev/vg00 -d /dev/rmt/1mn Answer: A Question 5. What does the pvcreate command create? A. the physical links B. a hard partition C. the lvm disk resident structures D. a physical volume device file Answer: C Question 6. Which protocol is used to assign an IP address to hosts? A. DNS B. DHCP C. BOOTP D. BIND Answer: B Question 7. On an NFS client, which configuration file is used to name the local mount point when mounting a file system from an NFS server during system boot? A. nfs.conf B. fstab C. exports D. nfstab Answer: B Question 8. Why do you use the HP-UX System Management Homepage (SMH) and its functional areas? (Select three.) A. to manage a small number of systems in your environment B. to see the health of the system and its components C. to configure the HP-UX Event Monitoring System D. to perform HP-UX management tasks such as configuration E. to run inventory reports and snapshot comparisons on the HP-UX system F. to manage Web-Based Enterprise Management subscriptions and view events on the system Answer: B, D, F Question 9. Which statements are true regarding threads and processes? (Select two.) A. A thread is a component of a process. B. A process is a container for a set of instructions that carry out a task of the program. C. A thread forces the entire process to run on a single set of resources. D. Threads and processes have nothing to do with each other. E. A process is a component of a thread. Answer: A, B Question 10. What do physical volume links provide in HP-UX 11i v2? A. access to a spare disk B. an alternate path to a disk C. automatic load balancing D. improved RAID performance Answer: B
|
Question 1. Given the following stateful session bean: 10. @Stateful 11. @TransactionAttributefJransactionAttributeType. SUPPORTS) 12. public class VideoBean implements Video { 13. // insert code here 14. public void methodAO {} 15.} Assuming no other transaction-related metadata, which code can be added at Line 13 to guarantee that business method methodA will execute only if invoked with an active transaction? A. @TransactionAttributefJ B. @TransactionManagement(TransactionAttributeType. CONTAINER) C. @TransactionAttribute(TransactionAttributeType. MANDATORY) D. @TransactionAttributeO"ransactionAttributeType.REQUIRES_NEW) Answer: C Question 2. Given the following client-side code that makes use of the session bean Foo: 10. @EJB Foo beanl; 11. @EJB Foo bean2; //more code here 20. booleantestl = beanl.equals(beanl); 21. booleantest2 = beanl.equals(bean2); Which two statements are true? (Choose two.) A. If Foo is stateful, testl is true, and test2 is true. B. If Foo is stateful, testl is true, and test2 is false. C. If Foo is stateless, testl is true, and test2 is true. D. If Foo is stateful, testl is false, and test2 is false. E. If Foo is stateless, testl is true, and test2 is false. F. If Foo is stateless, testl is false, and test2 is false. Answer: B, C Question 3. Which statement about entity manager is true? A. A container-managed entity manager must be a JTA entity manager. B. An entity manager injected into session beans can use either JTA or resource-local transaction control. C. An entity manager created by calling the Entity Manager Factory. create Entity Manager method always uses JTA transaction control. D. An entity manager obtained through resource injection in a stateful session bean can use a resource-local EntityTransaction for transaction control Answer: A Question 4. Which statement is true about the use of a persist operation in a transaction? A. If a user persists a detached object it always becomes managed. B. The persist operation on an entity always cascades to its related entities. C. If a user persists a new entity with an existing primary key the transaction will fail. D. If a user persists a managed entity an exception may be thrown by the persist operation. Answer: C Question 5. A developer writes a stateless session bean with one local business interface and with container managed transactions. All business methods have transaction attribute REQUIRED. The bean has an injected field sessionCtx of the type SessionContext. Which two operations are allowed in a business method of the bean? (Choose two.) A. sessionCtx. getEJBObject B. sessionCtx.setRollbackOnly C. sessionCtx. getMessageContext D. sessionCtx. getBusinessObject E. sessionCtx. getEJBLocalObject Answer: B, D Question 6. A developer implements a session bean with a method doStuff which behaves differently depending on the caller's security role. Only users in security roles "ADMIN" and "USER" are allowed to call the method. Assume that there is no security-related metadata in the deployment descriptor. Which two, taken in combination, are appropriate to accomplish this? (Choose two.) A. Annotate method doStuff with @PermitAII. B. Annotate method doStuff with @RolesAllowed({"ADMIN","USER"}) C. If EJBContext.getCallerPrincipal returns role "ADMIN", implement the behavior for users in role ADMIN. D. If EJBContext.isCallerlnRole("ADMIN") returns true, implement the behavior defined for users In role "ADMIN". Answer: B, D Question 7. Which Java Persistence query uses the aggregate function correctly, assuming that chairs field is of type int? A. SELECT ANY(r. chairs) FROM Room r B. SELECT NEW Integer(MAX(r. chairs)) FROM Room r C. SELECT r FROM Room r WHERE r.chairs > AVG(r.chairs) D. SELECT c FROM Chair c WHERE LOCATE (c.type, lazyboy) > -1 Answer: B Question 8. Given: 11. ©Entity public class X{ 12. @ld int id; 13. Y y; 14.} A public class Y with NO Java Persistence annotations is defined in the same package. Which statement is correct about these classes if NO other annotations and mapping descriptors are provided? A. Class Y must be serializable. B. Class Y must be marked as an entity. C. The entity X is not defined correctly.The field y must be marked as @Lob. D. Class Y must be accessed by a persistence application through a public interface. Answer: A Question 9. A developer creates a stateless session bean. This session bean needs data from a remote system. Reading this data takes a long time. Assume that the data will NOT change during the lifetime of the bean and that the information to connect to the remote system is defined in JNDI. Which statement describes how to manage the data correctly? A. Read the data in the bean's constructor. B. The data can only be read in the bean's business methods. C. Read the data in a method which is annotated with @PrePassivate. D. Read the data in a method which is annotated with @Post Activate. E. Read the data in a method which is annotated with (5)PostConstruct. Answer: E Question 10. An enterprise bean has security permissions set up using declarative security features. Under which two conditions can a client be guaranteed to have permission to invoke a business method on the enterprise bean? (Choose two.) A. The Application Assembler has marked the enterprise bean method as unchecked. B. The client's principal has been assigned a security role with permission to invoke the method. C. The Application Assembler has set the security-identity deployment descriptor to run-as. D. The Application Assembler has mapped all security role references using the role-link element. Answer: A, B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.