0B0-105-demo
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
BEA<br />
<strong>0B0</strong>-<strong>105</strong><br />
BEA 8.1 Certified Architect: Enterprise Architecture<br />
Demo Product<br />
To Buy Full Set of Exam Questions, Visit:<br />
http://www.test4direct.com/<strong>0B0</strong>-<strong>105</strong>.html
Question: 1<br />
You have determined that your J2EE EJB tier applications should deployed to a WebLogic Cluster in<br />
order to achieve the necessary scalability requirements. When considering adequate network<br />
bandwidth to minimize lost multicast packets, which activity is likely to generate the greatest<br />
concentration of multicast traffic?<br />
A. JNDI updates<br />
B. JMS Server migration<br />
C. JMX Mbean monitoring<br />
D. HTTP Session replication<br />
E. WebLogic cluster heartbeats<br />
Question: 2<br />
Which UML artifact best describes a Business Process?<br />
A. Data Model<br />
B. State Diagram<br />
C. Workflow Detail<br />
D. Activity Diagram<br />
E. Sequence Diagram<br />
Question: 3<br />
Question: 4<br />
Answer: A<br />
Answer: D<br />
In planning most architecture it is considered to be a best practice to avoid long-running XAtransactions.<br />
Which of the following is the most compelling reason?<br />
A. Performance can suffer due to potential XA-resource concurrency bottlenecks<br />
B. With the XA two-phase commit protocol, there is a greater chance for heuristic conditions<br />
C. Client applications with shorter transaction timeouts may not wait long enough for transactions to<br />
be completed.<br />
D. Each in-flight transaction requires a unique XID, performance is impacted by excessive transaction<br />
context switching<br />
E. Deadlock situations can occur within the Transaction Manager by typing up all the available<br />
threads involved in transaction<br />
Answer: A<br />
Which of the following is true related to java Virtual Machine (JVM) issues with your weblogic server
deployments?<br />
A. WebLogic Server does not permit manually forced garbage collection on the JVM<br />
B. The BEA JRockit JVM must be used to allow for garbage collection scheme choice<br />
C. WebLogic Server interfaces within the same cluster may use different typed of JVMs<br />
D. A change to the maximum heap size of the JVM does not require a WebLogic server restart<br />
E. Greater performance is usually achieved by deploying a single multithreaded weblogic server<br />
instance to multiple JVMs.<br />
Question: 5<br />
Question: 6<br />
Question: 7<br />
Answer: C<br />
You have determined that your web applications will be deployed to a weblogic cluster for high<br />
availability. You want to ensure that all HTTP session data is available to other members of the cluster<br />
in case of server failure., but replication performance is a high priority. Based on this requirement,<br />
which approach would be best to incorporate into your design?<br />
A. File-based session persistence<br />
B. In-memory session persistence<br />
C. Single memory-based session<br />
D. JDBC-based session persistence<br />
E. XA-based rapid session synchronization<br />
Within a Service-Oriented Architecture, services in the Connectivity Layer tend to be;<br />
A. Fine-grained and Synchronous<br />
B. Fine-grained and Asynchronous<br />
C. Coarse-grained and synchronous<br />
D. Coarse-grained and Asynchronous<br />
E. Both Coarse-grained and Fine-Grained<br />
Which of the following XML-related standards are NOT used in Liquid Data?<br />
A. XSLT<br />
B. Xpath<br />
C. SOAP<br />
D. XqUERY<br />
E. Xml schema<br />
Answer: B<br />
Answer: A<br />
Answer: A
Question: 8<br />
Many users, located in different geographic regions, all need access to certain secure web<br />
applications and EJB components. The users although dispersed, have common Job descriptions.<br />
What is the best way to generically provide access for all of these users?<br />
A. Use declarative security by providing authorization based user roles<br />
B. Programmatically authorize each user who requests a protected resource<br />
C. Use Security Assertion Markup Language (SAML) to implement discretionary security<br />
D. Create all user accounts in an LDAP server, and make it the default realm for the domain<br />
E. Define a custom security proxy that stores and propagates each authenticated user's credential<br />
information<br />
Question: 9<br />
Question: 10<br />
Answer: A<br />
Within a Service-Oriented Architecture, which of the following is NOT specified by a Service Policy?<br />
A. Encryption rules<br />
B. Execution Rules<br />
C. Versioning Rules<br />
D. Authorization rules<br />
E. Authentication rules<br />
Answer: B<br />
Which statement best describes the way in which WebLogic Workshop can be used to develop<br />
applications following the MVC pattern?<br />
A. Create EJBs and JSPs. Call EJBs from Servlets.<br />
B. WebLogic Workhop doesn't use the MVC model.<br />
C. Create a Struts Action from and associate it with the appropriate action mapping definition<br />
D. Create a serializable javaBean THAT DEFINES THE STATEFUL FIELDS AND<br />
THEIR METHODS AND PASSES THE DATA BETWEEN THE MODEL INVOCATION AND VIEW ELEMENTS<br />
E. Create an action from that defines the stateful fields and their accessor/mutator methods. Scope<br />
the form to a PageFlow and pass the state to controls, and call from the view as necessary.<br />
Answer: E
THANKS FOR TRYING THE DEMO OF OUR PRODUCT<br />
Visit Our Site to Purchase the Full Set of Actual <strong>0B0</strong>-<strong>105</strong> Exam Questions With Answers.<br />
http://www.test4direct.com/<strong>0B0</strong>-<strong>105</strong>.html<br />
We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has<br />
Many Self-Assessment Features. Download Free Product Demo From:<br />
http://www.test4direct.com/<strong>0B0</strong>-<strong>105</strong>.html<br />
Money Back Guarantee<br />
Check Out Our Customer Testimonials