|Exam Name||:||Sun Certified Enterprise Architect for J2EE 5|
|Questions and Answers||:||320 Q & A|
|Updated On||:||September 22, 2017|
|PDF Download Mirror||:||310-052 Brain Dump|
|Get Full Version||:||Pass4sure 310-052 Full Version|
combination of ANSI SQL-99 syntax coupled with some company-specific extensions. Performance of queries is important to both the company's management and its customers. It has a team of 20 developers who are considered experts in the data warehouse. What is the optimal architecture to use when accessing the data warehouse?
Session beans using ORM
Session beans using a JDBC connection pool
Session beans using EJB 2.x CMP entity beans
Session beans using EJB 2.x BMP entity beans with JPA
You are designing the next-generation purchase order processing system at your company. Although the presentation and business logic tiers will be designed and built using the Java platform, the existing relational database will be re-used, because its design has proven to be fast, scalable, and reliable. Ease and speed of development is an important consideration. What is the most appropriate server-side component to use when providing read-write access to the existing database schema in the new application?
stateless session beans using JDBC directly
Java Persistence API (JPA) accessed using a DAO layer
message-driven beans using a JMS queue and a DAO layer
stateful session beans coupled with a thread per concurrent request
bean-managed persistence (BMP) entity beans accessed using a DAO layer
A company has defined an XML-based document format that its business partners need to use
to submit order information. To guarantee confidentiality and information integrity at a fine level in the presence of multiple processing steps, the company wants to take advantage of technologies such as WS-Security and XML Digital Signatures. These technologies define SOAP headers that can be used to sign and encrypt fragments of documents. Your task is to implement the web service that accepts and processes the orders. Which component type should be used for the web service endpoint?
stateless session bean with RMI interface
message-driven bean with web service interface
stateful session bean with web service interface
stateless session bean with access to the SOAP body
stateless session bean with access to the SOAP envelope
You are the architect for an in-house application used by a consulting corporation to schedule internal resources to staff client engagements. The application will be used only by a well- defined user group (the in-house HR team) and so will not be exposed to large spikes in demand. Two phase commit semantics are not required, and the simple security model is addressed by integration with the company's LDAP server at the presentation layer. The company does have a 36-month roadmap for their intranet which calls for incremental development of the application over time. What is the best solution for implementing the business logic tier?
JSPs accessing the database directly is sufficient.
An MVC web framework with no persistence tier is sufficient.
An MVC web framework accessing session beans to access the persistence tier is sufficient.
Any standard web framework implementing the MVC model accessing the persistence tier
A company that sells avatar skins for virtual reality environments has hired an architect
consultant to determine why their system runs slowly. The consultant finds that the business logic that processes orders has been embedded into all of their JSPs using scriptlets. During load testing, the responsiveness of the system is slow, but the CPU and VM-free memory utilization remain at a low level. Which two are most likely causes of the problem? (Choose two.)
User requests are deadlocked.
Theservlet instances are locked on every request.
The Java Virtual Machine is NOT configured properly.
Database connection pooling is NOT configured properly.
A company is embarking on a major new initiative, the creation of an eCommerce, B2C (business to consumer) application to sell their widgets. As the lead architect, you need to decide whether or not to use EJBs in the business tier of the architecture. The architecture is as follows: JSP <-> Controller <-> Business logic <-> JPA-based persistence. Which option represents the optimal solution describing the business tier implementation?
Stateless session beans are required to update values in the database.
Entity beans are necessary to allow the controllers to access the JPA persistence layer.
Message-driven beans are required to decouple the controllers from the persistence tier.
Session beans are required in order to provide unit-of-work, security, and transaction management semantics to the JPA layer.
A large enterprise employs numerous authors to produce content. The decision is made to use a content management system (CMS) to store the content, and its metadata, in a few relational databases. Multiple JSF-based web applications need to display the same data. What implementation strategy would have the most impact on increasing reuse?
Using web services to access the CMS
Using an object relational mapping technology
Using a service locator to find the relational databases
Using a component-oriented web application framework
Using atemplating mechanism to composite view components
JSP with standard tags
JSP with JSTL database tags
building new JSF components
standard JSF component tags
JSP with the Expression Language
Click the Task button.
You are the architect on a project to build a bridge between the legacy customer service tool,
an outdated VT100 terminal server, and a company's new Java EE web application. You do NOT have access to the terminal server and cannot deploy any code to it. Which approach should you use to integrate the systems?
Use a DAO wrapped around a JDBC connection to query the legacy system
Deploy a CORBA server to the legacy system and use RMI-over-IIOP to communicate to it
Develop a session bean that wraps a screen-scraping tool to interact with the legacy system
Develop a web services-based service and use XML to communicate with the terminal server
What are two characteristics of object-oriented design? (Choose two.)
Click the Task button.
Match each security technique with the issue it addresses .
. 11 sed. for bulk encl)fption of data in an
[ S reEnervptton .. established channel
SSL Encapsulates protocol negotiation, key
exchange. and communication
I nc Enc:r}'J)IIIOr\
Oegt41 S ur
Establishes secure communication Wth
previous:ly unknown parties
Can attest to a principal having been
associated with data
Oegt S9Wur -----S-5-L----
I nc Enc:t II SymrnelriC Encr r Oone I
Please join our friendly community by clicking the button below - it only takes a few seconds and is totally free. You'll be able to ask questions about coding or chat with the community and help others. Sign up now!Article by ArticleForge
We're sorry, but there's no news about "Sun Certified Enterprise Architect" right now.
Limit to books that you can completely read online lude partial books (book previews)
Oops, we seem to be having trouble contacting Twitter
Support Wikipedia A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia! Searchlight Group Digplanet also receives support from Searchlight Group. Searchlight
At Kobo, we try to ensure that published reviews do not contain rude or profane language, spoilers, or any of our reviewer's personal information.
Would you like us to take another look at this review?
No, cancel Yes, report itThanks!
You've successfully reported this review. We appreciate your feedback.
OK, closeArticle by ArticleForge
Premature optimizations could be an evil
Posted Rajesh Balamohan on March 22, 2008 in response to Message #249385 databases are best used for this purpose. If there is contention with the database usage, a replicate database of a full extract (Or Dump and load) of a database should be considered. Replicate if you can ensure data letency, which you would have if you loaded the objects into any Caching mechanism. This statement:
"I was told to read from the database at startup, populate my objects and make my queries on these objects NOT on the database. "
dictates your solution, I have two suggestions. First, Space-based architecture (SBA) is a design pattern that leverages the tuple space paragidm for achieving linear scalability of stateful, high-performance applications. Look into Java Spaces implementation such as Gigaspaces, which allows you to pre-load the caches of objects from a database for query purposes, and scales and is very fast. Coherenece if you are an Oracle shop and have Oracle representation (Not exactly a Java Spaces Implementation, but uses the same ) Secondly, Look at a replication of an extract based system to extract data from the main database to a Decision Support database, that your application can query as needed. So you can use the Tools of the Trade, JDBC, J, EJB in native functionality without the restriction of not using the main database. best of of luck. Sometime you have to play with the hand you are dealt with. Tony McClay Sun Certified Enterprise Architect JEE 5 (SCEA CS-">310-052) Sun Certified Business Components Developer JEE5 (SCBCD CX-310-091) Sun Certified Web Components Developer (SCWCD CX-310-081) Sun Certified Java Programmer 5 (SCJP CX-310-056)Article by ArticleForge
Whizlabs, world's leading IT certification exam preparation company with 800000+ users since 2000, launched its Preparation Kit for the SCEA 5 (CX-">310-052) exam
July 21, 2008 - PRLog -- Whizlabs recently announced the launching of SCEA 5.0 Certification Exam Prep. The launch of this kit once again shows the leadership of Whizlabs in Sun Java Certification Exam Preparation. SCEA 5.0 certification exam is essential for the current Java professionals to upgrade their credentials to the latest SCEA 5 certification.A free evaluation version of the new SCEA 5 Preparation Kit with 15 free questions is now available to download.certification.