Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

1z0-807 Questions and Answers

Note! Following 1z0-807 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

1z0-807 Questions and Answers

Question # 6

Your consulting company has been asked to enhance an existing application. The current application is a two-tier system in which all the business logic is located in thick clients. You are considering a solution that would involve moving the business logic into the server's database In the form of stored procedures.

Which statement is an expected outcome of your proposed solution?

A.

It will improve the scalability of the system.

B.

It will improve the manageabilityof the system.

C.

It will recline the amount of traffic on the network.

D.

It will, in effect, turn the application into a three-tier system.

Full Access
Question # 7

A manufacturing company has a large investment in a legacy Inventory Management System (IMS) developed with third-party technologies. You have been asked to design a Java EE application that interacts with it.

You would like to ensure the following:

  • Minimalapplicationcodeisrequired to parsethe communicationmessages.
  • Communication isasynchronousandstateless.
  • Performance import of the existing system is minimal.

Which two technologies combined would meet these requirements?

A.

XML

B.

JSON

C.

RMI

D.

JAX-RS

E.

JAX-WS

Full Access
Question # 8

Your company provides a marketplace for industrial chemicals. You are required to offer accurate pricing and quantities to all marketplace users.

Marketplace users are globally distributed.

What is the most appropriate technology to use to satisfy this requirement?

A.

Server-side distribution using JAX-WS

B.

Client-side polling using JAX-RPC

C.

Web services using REST

D.

An enterprise messaging system

Full Access
Question # 9

Which three principles are best practices when implementing a logging strategy for an enterprise application?

A.

Never print log messages to the console window.

B.

B. Use the appropriate logger level for logging information.

C.

C. Log messages for every method entry and exit.

D.

D. Include programmer-specific data in the log messages.

E.

Include the thread name and Java class name in log messages.

Full Access
Question # 10

You are implementing an online music application that will store and play a user’s collection of songs. You want users to rate their songs and view the top songs from friends. All queries must complete in four seconds or less.

Which approach would meet the response time requirement with minimal overhead?

A.

Java class that uses JDBC with embedded SQL

B.

Java class that uses an optimized stored procedure

C.

JPA entity class with a lazy fetching strategy

D.

JPA entity class with an eager fetching strategy

Full Access
Question # 11

MedLabML is a startup firm that moves patient data between different care providers to provide a “single patient view”. They use a B2B system to exchange electronic business document with their key suppliers. They are seeking your advice about standards to review for improving their message-level security.

Which standard or API would you recommend they read?

A.

SAML 1.1

B.

B. Web Service Interoperability Technology

C.

XML Signature

D.

SSL

Full Access
Question # 12

Which two statements apply to unsigned applets?

A.

They can access the client file system.

B.

They can connect to third-party servers.

C.

C. They can connect to theoriginatinghost.

D.

D. They can invokepublicmethodsof applets on a page.

E.

They can load native libraries.

Full Access
Question # 13

Which two statements are true about delegation as an Object-Oriented Design technique?

A.

It is applied to a system only at compile time.

B.

It is an essential element of the Singleton pattern.

C.

C. It allows you to replace Inheritance with composition.

D.

In Java technology, it is always implemented through the use of generics.

E.

E. It always requires that at least two objects are involved in handling a request.

Full Access