Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "310-051" Exam

Sun Certified Enterprise Architect for J2EE Technology

 Question 35.
ITCertKeys 's application uses several entity beans accessing each other for information. The company found the architecture to be low in flexibility because they embedded entity relationships in the entity beans.

What is an alternative solution?

A. Use a stateful session bean as a Mediator to the entity beans.
B. Use a stateful session bean as a Façade to other session beans.
C. Use a servlet to give clients direct access to data in a database table.
D. Use a stateless session bean to access the database directly instead of using entity beans.

Answer: A

Question 36.
A client makes a transactionless method call to an EJB that has a transaction attribute of Required in the deployment descriptor.

Which statement is true?

A. The container creates a new transaction.
B. The EJB throws an EJBException since it requires transaction context.
C. The EJB throws a RemoteException since it requires a transaction context.
D. The container throws a RemoteException since the EJB must have a transaction context.

Answer: A

Question 37.

Which two statements about stateless session beans are true? (Choose two)

A. They provide a generic service.
B. They maintain a cached state on behalf of a specific client.
C. They maintain a conversational state on behalf of several clients.
D. They may provide high performance by being available for multiple clients.

Answer: A, D

Question 38.
You are creating an architecture for an online ordering system with the following requirements:

• Users will order products over the Internet.
• Business objects will reside on a local application server.
• All product information is stored in a local RDBMS.
• Credit card information must be validated by an external system.
• All local systems will be secured behind a firewall.
• All communications with the external systems must be secure.

Which two design decisions will increase the flexibility of the system? (Choose two)

A. Using an entity bean to track the user's shopping cart.
B. Using an entity bean to encapsulate product information.
C. Using a stateless session bean to validate user ID and password.
D. Using an entity bean to encapsulate the external credit card system.

Answer: B, C

Question 39.
The following statement is true about which type of EJB?
"All bean instances are equivalent when they are not involved in serving a client-invoked method".

A. Stateful session bean
B. Stateless session bean
C. Entity bean with bean-managed persistence
D. Entity bean with container-managed persistence

Answer: B

Question 40.
Your client is a bank that wants to allow its customers to access their bank accounts over the Internet.

Given the following requirements, which protocol communicates with the Web browser?

• Confidential information must be protected.
• Customers will access their accounts using only a simple Web browser with no extension.

A. IIOP
B. HTTP
C. SNMP
D. HTTPS

Answer: D

Question 41.
A department of ITCertKeys Inc uses entity beans with bean-managed persistence to access an RDBMS.

The entity beans contain the code to access the database directory. ITCertKeys decides that other departments can reuse the business logic to access their database, which include an OODBMS and a different type of RDBMS.

Which statement best describes how ITCertKeys can integrate their departmental business logic to access the various databases, and to ensure that the entity bean code is easy to read?

A. Use session beans to access an entity bean through a data access object.
B. Move the data-access code out of the entity beans into a data-access object.
C. Distribute the data-access code among several entity beans to access different databases.
D. Use session beans to access several entity beans that represents the data in all three 
    databases.

Answer: B

Question 42.
ITCertKeys Grapes, a vineyard, is developing an online ordering system to sell wine online. Because of local sales restrictions, the vineyard is working with local wine stored to deliver wine to the customers. The requirements for the system are:

• Customers keep their choices in a "wine list".
• Requests are fulfilled as the vintage become available.
• Local wine shops track wines that have been ordered by customers in their area.
• All order and product data is stored in an RDBMS.
• Both customers and local wine shops use the Internet to access the system.
• The system must be scalable and secure.

Which two interactions must be secure? (Choose two)

A. Customers adding wine to their wine list.
B. The application server generating a sales report.
C. The application server updating the order information into the DB.
D. The local wine stop checking what wines have been ordered locally.

Answer: A, D

Question 43.
Which pattern provides a means to access the elements on an aggregate object sequentially without exposing the underlying structure?

A. Proxy
B. Iterator
C. Strategy
D. Observer
E. Singleton

Answer: B

Question 44.
You have determined that the interactions between objects in a system are complex, and that the objects are tightly coupled. Furthermore, additional functionality would require the modification of many objects in the system.

Which pattern will solve this problem?

A. Façade
B. Mediator
C. Template
D. Prototype
E. Command

Answer: B

Question 45.
What are two benefits of the Façade pattern? (Choose two)

A. It hides complex subsystems from clients.
B. It allows objects to masquerade as different objects.
C. It decouples the object interface from the implementation.
D. It encourages weak coupling between the client and the subsystem.

Answer: A, D

Question 46.
Which design pattern is represented by the EJB Home interface?

A. Proxy
B. Visitor
C. Façade
D. Abstract Factory

Answer: D

Question 47.
What are three benefits of design patterns? (Choose three)

A. They act as a learning aid.
B. They provide standard code libraries.
C. They provide a common design vocabulary.
D. They standardize the way designs are developed.
E. They describe an object-oriented development process.

Answer: A, C, D

Question 48.
What are two clear advantages to using message services in an application? (Choose two)

A. Provides scalability
B. Provides secure communication services.
C. Allows loose coupling between components.
D. Allows clients and servers to communicate directly.

Answer: A, C

Question 49.
The requirements for an online shopping application are:
• It must support millions of customers.
• The invocation must be transactional.
• The shopping cart must be persistent.

Which technology is required to support these requirements?

A. JNI
B. JMS
C. EJB
D. JMX

Answer: C

Question 50.
Which two statements about JMS are true? (Choose two)

A. JMS supports Publish/Subscribe.
B. JMS uses JNDI to find the destination.
C. JMS enhances access to email services.
D. JMS uses JMX to create a connectionFactory.

Answer: A, B

Question 51.
Which statement describes a normal default security restriction applied to untrusted classes by a Javaenabled browser?

A. Untrusted classes cannot read data from arbitrary files.
B. Untrusted classes cannot initiate any network connections.
C. Untrusted classes cannot write sensitive data to the screen.
D. Untrusted classes cannot make unrestricted use of CPU power.
E. Untrusted classes cannot read sensitive data from the keyboard.

Answer: A

Question 52.
These are the requirements for your new system:

• All current business logic is in the form of database-stored procedures.
• All current and new business logic is to be migrated to EJB.
• The system is an online, Web-based system. The UI is HTML-based.
• There are three EJBs: Customer, Order, and Account. There is one Java object, ShoppingList, which holds the current list of ordered items.

• Only account and order data are stored in the database.
• The Customer EJB maintains a reference to the ShoppingList.

Which three architectural decisions adhere to the requirements? (Choose three)

A. Make Order and Account an entity EJB.
B. Make Customer a stateful-session EJB.
C. Make Customer a stateless-session EJB.
D. Make Customer an entity EJB and put business logic in it.
E. Make Customer a session EJB and put business logic in it.
F. Use the Container Managed Persistence policy for the Customer session EJB.

Answer: A, B, E

Question 53.
You are developing an HR application with the following requirements:

• Users access the systems over an intranet, using a standard Web browser.
• Organization information is stored in LDAP.
• Benefits information is stored in an RDBMS.
• Complaints are sent directly to a third-party system for compliance.

Which J2EE technology would allow the system to interact with the LDAP server?

A. EJB
B. JSP
C. JMS
D. JTA
E. JNDI
F. JDBC

Answer: E


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-741 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-741" Exam

Implementing Cisco Unified Wireless Voice Networks (IUWVN)

 Question 1.
Which protocol is used by multicast to prevent loops?

A. OSPF
B. RIP
C. RPF
D. BGP
E. EIGRP

Answer: C

Question 2.
What frame type is used to signal TSPEC reservation from a client?

A. RSVP
B. ADDTS
C. 802.11 association information elements
D. WMM capabilities exchange

Answer: B

Question 3.
Which two statements are correct if IGMP snooping is enabled on a Cisco WLC? (Choose two.)

A. The router IGMP table is updated with the IP address of the wireless clients as the last 
    reporter.
B. The IGMP packets from the wireless clients are forwarded to the router without modifications.
C. The IGMP packets from the wireless clients are received at the Cisco WLC, which in turn 
    generates a query for the client.
D. The IGMP packets from the wireless clients are received at the WLC and are used to update 
    the router via Cisco Group Management Protocol update from the Cisco WLC.
E. The router IGMP table is updated with the IP address of the Cisco WLC as the last reporter.

Answer: C, E

Question 4.
Which two messages can carry the TSPEC from client to the AP? (Choose two.)

A. Probe request
B. Association request
C. Authentication request
D. Reassociation request

Answer: B, D

Question 5.
Which two statements are correct regarding multicast implementation using a WLAN controller (v5.2) and AP? (Choose two.)

A. Multicast traffic is sent out on Cisco APs at the highest mandatory data rate.
B. Multicast traffic is sent out on Cisco APs at the highest supported data rate.
C. On Cisco APs, multicast traffic and beacons are sent out at the same data rates to maintain a 
    common cell size for normal data as well as multicast data.
D. If there is more than one mandatory data rate, multicast traffic will be sent at the highest 
    mandatory rate and beacons will be sent at the lowest mandatory rate.
E. On Cisco APs, multicast traffic will be sent out at the highest data rate that a client can 
    Maintain with the AP.

Answer: A, D

Question 6.
What must be true about the client before upstream traffic stream metrics can be displayed on the Cisco WLC?

A. Must be Cisco Compatible Extensions version 2
B. Must be Cisco Compatible Extensions version 3
C. Must be Cisco Compatible Extensions version 4
D. Must be associated to a PlatinumQoS WLAN
E. Must be associated to an access point on a Cisco WLC with code version 5.0 or newer

Answer: C

Question 7.
On the Cisco Aironet Access Points connected to a Cisco Unified Wireless LAN controller, which TCLAS queue transmits RTP packets with correct 802.11e QoS markings?

A. UP
B. VO
C. VI
D. BK
E. BE

Answer: B

Question 8.
Which statement describes the WLCv5.2 delivery of a multicast packet from a wired PC source on VLAN_X to a respective wireless client using SSID_X, using a WLAN controller enabled for multicast?

A. A packet is delivered to Cisco WLC and forwarded via multicast to all of its associated APs, 
    And finally to all wireless clients of that Cisco WLC, via wireless multicast.
B. A packet is delivered to Cisco WLC and forwarded viaunicast to all of its associated APs, and 
    finally to all wireless clients of that Cisco WLC, via wireless unicast.
C. A packet is delivered to Cisco WLC and forwarded via multicast to all of its associated APs, 
    discarded at APs without SSID_X joined wireless clients, and forwarded at APs with SSID_X 
    joined wireless clients via wireless multicast.
D. A packet is delivered to Cisco WLC and forwarded viaunicast to all of its associated APs, 
    discarded at APs without SSID_X joined wireless clients, and forwarded at APs with SSID_X 
    joined wireless clients via wireless multicast.
E. A packet is delivered to Cisco WLC and forwarded via multicast to all of its associated APs, 
    discarded at APs without SSID_X joined wireless clients, and forwarded at APs with SSID_X 
    joined wireless clients via wirelessunicast.
F. A packet is delivered to Cisco WLC and forwarded viaunicast to all of its associated APs, 
    discarded at APs without SSID_X joined wireless clients, and forwarded at APs with SSID_X 
    joined wireless clients via wireless unicast.

Answer: C

Question 9.
Which statement is correct for both the LWAPP and CAPWAP AP upstream 802.1Q tagged wired QoS priority for a non-WMM-associated client frame that is H-REAP locally switched running v5.2?

A. Wireless client WMM UP classification is translated to a wired DSCP priority.
B. Wireless client 802.11p classification is translated to a wired DSCP priority.
C. Wireless client WMM UP classification is translated to a wired 802.1pCoS priority.
D. Wireless client 802.11p classification is translated to a wired 802.1pCoS priority.
E. WLAN configuredQoS level is used to set the wired DSCP priority.
F. Wired 802.1pCoS priority is not set.

Answer: F

Question 10.
What two benefits result from Cisco WLC configuration of DCA for 5-GHz VoWLAN deployments? (Choose two.)

A. Avoid channels with microwave oven noise.
B. Manually remove channels not supported by theVoWLAN clients.
C. Avoid 802.11n 40-MHz wide channels.
D. Automatically avoid nearby radar.

Answer: B, D


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.