1Z0-807 Java EE 6 Enterprise Architect Certified Master

Exam Title: Java EE 6 Enterprise Architect Certified Master
Exam Number: 1Z0-807
Exam Price: $245.00 More on exam pricing
Format:  Multiple Choice
Duration: 150 minutes
Number of Questions:  60
Passing Score: 71%
Validated Against: This exam has been validated against Java EE 6.

Take Recommended Training Courses

Complete one of the courses below to prepare for your exam (optional):
Architect Enterprise Applications with Java EE
Java Design Patterns
Object-Oriented Analysis and Design Using UML
Developing Applications for the Java EE 6 Platform

Additional Preparation and Information
A combination of Oracle training and hands-on experience (attained via labs and/or field experience) provides the best preparation for passing the exam.

References for Exam 807: Oracle Certified Master, Java EE 6 Enterprise Architect
Oracle Courseware:
Architect Enterprise Applications with Java EE
Java Design Patterns
Object-Oriented Analysis and Design Using UML
Developing Applications for the Java EE 6 Platform
Other Documentation:
The Java EE 6 Tutorial
Oracle Technology Network Article
Java ™ Cryptography Architecture(JCA) Reference Guide for JavaTM Platform Standard Edition 6
Real World Java EE Patterns-Rethinking Best Practices by Adam Bien

Application Design Concepts and Principles
Identify the effects of an object-oriented approach to system design including the effect of encapsulation, inheritance, and use of interfaces.
Identify how the Separation of Concerns principle applies to the component model of a Java EE application; including client, the web and business component containers, and the integration and resource layers.
Identify the correct interpretation of Separation of Concerns as it applies to the Java EE service layers, including component APIs, run-time containers, the operating system, and hardware resources.
Identify non-functional and quality-of-service requirements that influence application design, including trade-offs in performance, availability, and serviceability.

Integration and Messaging
Identify the APIs available for a Java EE technology-based system to communicating with external resources, including JPA, JDBC, RMI, Web Services, JMS, and JCA. Outline the benefits and drawbacks of each approach.
Describe the technologies used to integrate business components with Web Services, including XML over HTTP, JSON, SOAP and REST.
Identify and detail the technologies used to integrate business components with external resources, including JMS and JCA.
Identify how a Service Oriented Architecture (SOA) facilitates system integration and best practices.

Web Tier Technologies
Identify the benefits and drawbacks of using URL rewriting and cookies to manage HTTP session state.
Identify appropriate uses for JSP and Servlet technology, and JavaServer Faces in a given Java EE application.
Identify the benefits of using an EJB container with a web container instead of a web container alone.
Identify the differences between client pull and server push architectures.
Identify the benefits and drawbacks of using a browser to access asynchronous, lightweight processes on the server.

Security
Identify elements of the security model in the Java SE environment for remote clients, including Web Start, applets and the role of the SecurityManager class.
Select appropriate locations to implement Java EE security technologies or features in a UML component and deployment diagram.
Classify security threats to an enterprise application select measures an architect can propose to mitigate them.
Identify techniques associated with declarative and programmatic security, including the use of annotations, deployment descriptors, and JAAS technology.
Identify the security technologies that apply to an application’s code, messaging and transport layers

Common Architectures
Identify the appropriate strategy for deploying client applications to desktop and mobile platforms, the principles for designing a user interface and the benefits of applying client-tier patterns.
Identify best practices for exception handling, logging, and business tier patterns.
Identify design patterns that address specific challenges in the web tier, including authentication, authorization, and scaling and clustering to meet demand.
Identify Java EE technologies, including JMS, JCA and Web Services, and design patterns that address specific challenges in enterprise integration.
Identify the challenges in integrating enterprise resources, the Java EE technologies that address them (including JPA and JDBC), and the communication protocols that support tier-to-tier communication (including RMI, IIOP, and CORBA).

Business Tier Technologies
Identify the correct EJB technology to apply for a given scenario, including entity classes, session beans, message-driven beans, timers, interceptors, and POJOs.
Identify benefits and drawbacks of different persistence technologies such as BMP, CMP, and JPA, including ease of development, performance, scalability, extensibility, and security.
Identify the benefits and drawbacks of implementing Web Services in the EJB component container.
Select the appropriate use of JPA and JPQL in a given scenario.

Design Patterns
Demonstrate knowledge of Java EE design patterns including: Service Starter, Singleton, Bean Locator, Resource Binder, Dependency Injection, Payload Extractor, Context Holder, and Thread Tracker.
Select an appropriate pattern for a given application challenge from the following: Facade, Strategy, Observer, Composite, and Abstract Factory.
Identify a design pattern, using a description of its features, from the following: Facade, Strategy, Observer, Composite, and Abstract Factory.
Identify the use of the law of leaky abstractions or a specific anti-pattern in a given scenario.

Assume the following:
Missing package and import statements: If sample code do not include package or import statements, and the question does not explicitly refer to these missing statements, then assume that all sample code is in the same package, or import statements exist to support them.
No file or directory path names for classes: If a question does not state the file names or directory locations of classes, then assume one of the following, whichever will enable the code to compile and run:
All classes are in one file
Each class is contained in a separate file, and all files are in one directory
Unintended line breaks: Sample code might have unintended line breaks. If you see a line of code that looks like it has wrapped, and this creates a situation where the wrapping is significant (for example, a quoted String literal has wrapped), assume that the wrapping is an extension of the same line, and the line does not contain a hard carriage return that would cause a compilation failure.
Code fragments: A code fragment is a small section of source code that is presented without its context. Assume that all necessary supporting code exists and that the supporting environment fully supports the correct compilation and execution of the code shown and its omitted environment.
Descriptive comments: Take descriptive comments, such as “setter and getters go here,” at face value. Assume that correct code exists, compiles, and runs successfully to create the described effect.

Question: 1
Your company requires all its developers to use a well-specified set of exception classes to model
several common error conditions, many of the which are specific to its business. These exception
classes are centrally maintained and come packaged in a library (a JAR file). The application you are
developing needs to report a number of error conditions covered by this library to remote clients.
Which paring of component type and remote access technology enables client applications to use
the predefined exceptions as part of their natural programming model?

A. Servlet accessed using HTTP
B. Entity bean accessed using web services
C. Stateless session bean accessed using Remote Method Invocation (RMI)
D. Message-driven bean accessed using Java Message Service (JMS) queue

Answer: C

Question: 2
An investment company has purchased a number of small online business referral systems that
appeal to various niche demographics. The company wants to bring these networks together in
hopes of finding a broad, single theme and brand image for these groups before they can do that,
they need to get the users communicating with outside their current networks.
Which Web Services pattern would you recommend they consider in building a scheme to
accommodate this communication?

A. Asynchronous Interactions
B. PAOS Interactions
C. Web Services Broker
D. JMS Bridge

Answer: A

Question: 3
A Hot Potato anti pattern can arise from misuse of which technology combination?

A. Bean Validation with JSF Managed Beans
B. Messaging in the Business Tier
C. JNDI Lookups with Global Java Naming
Questions & Answers PDF P-3
D. JPA with the Web Tier

Answer: B

Question: 4
You are the architect of an existing project. Making changes to one component frequently requires making changes to many other components.
Which action would reduce future maintenance costs?

A. Redesign the configuration and deployment.
B. Add an abstraction layer between the servlets and the EJB components.
C. Convert all stateful EJB components to stateless EJB components.
D. Expose the existing EJB components as web services.

Answer: B

Question: 5
Your consulting company has been asked to enhance an existing application. The current application
is a two-tier system in which all the business logic is located in thick clients.
You are considering a solution that would involve moving the business logic into the server’s database In the form of stored procedures.
Which statement is an expected outcome of your proposed solution?

A. It will improve the scalability of the system.
B. It will improve the manageability of the system.
C. It will recline the amount of traffic on the network.
D. It will, in effect, turn the application into a three-tier system.

Answer: B

Click here to view complete Q&A of 1Z0-807 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best Oracle 1Z0-807 Certification, Oracle 1Z0-807 Training at certkingdom.com

 

Click to rate this post!
[Total: 0 Average: 0]

Comments |0|

Legend *) Required fields are marked
**) You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>