|
Question 1. Which two must be in an ejb-jar file, either by inclusion of reference? (Choose two.) A. an enterprise archive(.ear)file B. a deployment descriptor in the format defined by the EJB 2.0 specification C. the class files for the classes that implement the home and remote interfaces. D. The class files for the interfaces and super interfaces used by the bean, except J2SE or J2EE interfaces E. The class files for the stub classes of the EJBHome and EJOBject interfaces, if remote interfaces are deployed for the bean Answer: B, D Question 2. Exhibit: *MISSING* All beans involved use container-managed transactions and all methods are marked as Required. At runtime, methodB is unable to communicate with its resource and calls the setRollback Only method. What is the result? A. JMS message redelivery semantics will apply. B. The rollback will propagate to the sender of the massage. C. The bean’s onMassage method will reattempt the sequence. D. Transactions started by the onMassage method will always commit. Answer: A Question 3. Which exception can be thrown by the findByPrimaryKey method of a remotely called entity bean using container-managed persistence? A. Required B. Supports C. Mandatory D. RequiresNew Answer: C Question 4. Which exception can be thrown by the findByPRkimaryKey method of a remotely called entity bean using container-managed persistence? A. javax.ejb.EJBException B. javax.ejb.DuplicateKeyException C. javax.ejb.NoSuchEntityException D. javax.ejb.ObjectNOtFoundException Answer: D Question 5. Given: 8.9. 10. 11. 12. Which two elements must be included in the tag? (Choose two.) A. B. C. resource-env-ref> D. Answer: A, B Question 6. Which is a Bean Provider’s security-related responsibility? A. assigns principals to roles in the application server B. declares the role-link element in the deployment descriptor C. declares the security-role client in the deployment descriptor D. declares the security-role-ref element in the deployment descriptor Answer: D Question 7. Which two statements about a client’s to a reference to a session bean’s remote home interface are true? (Choose two.) A. The reference can be passed as a methods argument. B. The reference provides the client with the IP address of the bean instance. C. The reference provides the client with access to a least one create method. D. A new home reference must be obtained for each new reference to remote component interface. Answer: A, C Question 8. Which method form javax.ejb.EJB Context returns an object that allows a Bean provider to demarcate transactions? A. begin() B. get.AutoCommity() C. getTransaction() D. begin Transaction() E. getUserTransaction() Answer: E Question 9. Which statement is true about a session bean’s lifecycle? A. Session beans cannot receive re-entrant loopback calls. B. A stateless session bean’s home interface can have overloaded create methods. C. Stateless session beans can implement javax.cjb.SessionSynchyronization. D. The EJB 2.0 container can make concurrent calls to any stateful session beend instance. Answer: A Question 10. Which method can b found in BOTH the EJBHome and EJBLocalHome interface? A. getHOmeHandle() B. getEJBMetaData() C. remover(Handle handle) D. remove(Object primaryKey) Answer: D Question 11. Which two are valid types for persistent fields in a.CMO.2.0 entity bean? (Choose two.) A. Java primitive B. entity bean local interfaces C. classes implementing java.io.Serializable D. either java.util.Collection or java.util.Set Answer: A, C Question 12. Which two are required to properly implement a CMP entity bean class? (Choose two.) A. Declare variable for all persiwsten fields. B. Provide constructors to initalize the CMP fields. C. Do not implement the ejbFind methods. D. Provide implementation code for get and set methods to store and retrieve the persistent fields. E. Implement ejbCreaate methods for all home interface create methods. Answer: C, E Question 13. Which statement about EJ B QL is true? A. An EJB QL query must contain the ORDER BY clause. B. An EJB QL query is statically defined in the ejb-jar.xml deployment descriptor. C. Duplicate values are always removed form EJB QL query results by the container. D. It is legal to use an input parameter in the FROM clause or the SELECT clause of an EJB QL query. Answer: B Question 14. What two statements are true about EJB 2.0 container crashes? (Choose two.) A. Entities will survive. B. An entity bean’s primary key will survive C. Massage-driven bean instances will service. D. Stateful session bean instances will survive E. Crashes are guaranteed to be transparent to client using entity beans. Answer: A, B Question 15. Which is feature of EJB 2.0? A. It provides synchronous massage handling through message driven beans. B. It provides support for both local and remote client views for session beans. C. It provides support for both local and remote client views for message driven beans. D. It guarantees that all services represented by an object will have conversational state. Answer: B Question 16. Which if a capability guaranteed by all EJB 2.0 containers? A. JTA support B. Server failover C. Load balancing D. Servlet support E. Server clustering Answer: A Question 17. Which accurately describes a characteristic of EJB 2.0? A. EJB 2.0 is an example of a web-based component model. B. EJB 2.0 components must be directly accessible via HTTP. C. EJB 2.0 is an example of a component model for GUI applications. D. EJB 2.0 applications an link to legacy systems using a J2EE connector. Answer: D Question 18. Which two APls are provided to the Bean Provider by an EJB 2.0 container? (Choose two.) A. JTA B. JMX C. JSP D. JDO E. JAXP Answer: A, E Question 19. Which two are guaranteed to a Bean Provider using an EJB 2.0 container? (Choose two.) A. access to the JCE API B. access to JavaMail API C. access to the JXTA API D. access to the JAXP API Answer: B, D Question 20. What is the purpose of the file command? A. The file command is used to transfer files between file systems. B. The file command attempts to classify the file type based on the file’s content. C. The file command reports on file size, file ownership, and access permissions. D. The file command is used to search binary data streams for reference to readable ASCII files. Answer: B
|
Question 1. Which of the following protocols are in the WAN? A. X.25 B. Ethernet-II C. LAPB D. Frame-Relay E. ATM F. PPP Answer: A, C, D, E, F Question 2. When designing the frame relay network, which is the most economic means to backup PVC? A. Use ATM link to backup B. Use the dual-PVC project and the sub interface technology. C. X.25 technology D. Adopt DCC (Dial Control Center) technology Answer: D Question 3. Which of the following can guarantee the network security? A. Data encryption B. Authentication technology C. Security attribute of the computer D. Data compression technology Answer: A, B, C Question 4. Which of the following route types is adopted for the Stub domain in OSPF network to be connected with the backbone area? A. Floating static routing B. Dynamic routing C. The default routing automatically generated by the router D. Static routing Answer: C Question 5. Which of the following items can be used to select the path of the network layer? A. Routed protocol B. Routing protocol C. STP(Spanning tree protocol) D. Frame relay protocol Answer: B Question 6. Which of the following descriptions of the frame relay network and the X.25 network are true? A. X.25 network is based on the circuit switching technology, while the frame delay network is based on the packet switching technology. B. Although X.25 network is of high reliability and costs less, it has a bigger delay and small bandwidth occupation. It is often replaced by the frame relay network. C. The DLCI number of the frame relay network is only locally significant. D. X.25 network commits data transmission rate Answer: B, C Question 7. Which of the following technologies can be adopted by BGP4 to aggregate multiple Class C routes into one route? A. EBGP B. VLSM C. IBGP D. CIDR Answer: D Question 8. PRI refers to. A. 23B+D (European standard) B. 30B+D (North American standard) C. 23B+D (North American standard) D. 30B+D (European standard) Answer: C, D Question 9. Which of the following addresses stands for all the routers and hosts participating in the multicast in the subnet? A. 224.0.0.1 B. 224.0.0.2 C. 224.0.0.3 D. 224.0.0.9 Answer: A Question 10. For a switching network composed of the equipments of multiple manufacturers including Huawei, the tag of the VLAN should be defined by. A. IEEE 802.1Q B. ISL C. VLT D. All the above items are OK. Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.