scea questions

9
Java SCEA Practice Exam Question 1 Happy Joe Banking Corporation is building a Banking application to provide online access to their account holders. They have chosen 2 SUN 450s for their web server cluster and 1 SUN E10000 for their application server. The business requirements indicate that to become a customer, a person must have at least a primary checking account with the bank. Further since the custome r will be using the Internet to view confidential information, security is considered paramount. What do you understand about the requirements of the system? a) The need for Security is a classic example of a functional service level requirement and the checking account rule, an example of non-functional QoS require ment. b) The discussion about Security and the mandatory checking account both illustrate functional service level requirements. c) Neither Security nor the mandatory Checking Account is examples of any kind of r equirements, theoretically speaking. d) Security is an Architectural non-functional requirement and the Mandatory Checking Account a functional design requirement. e) They are both examples of Business Use Cases. Question 2 Which of the following are not true about N-Tier Systems?  1. N-Tier systems are distributed over many systems and hence always present a maintenance problem. 2. N-Tier systems are generally component based and are therefore quite easy to maintain. 3. Since N-Tier systems do not use database stored procedures or triggers for business logic processing, they are generally very slow. 4. Since N-Tier systems are container based, many N-Tier systems can be easily scaled (both vertically and horizontally). 5. N-Tier systems suffer only from one drawback over client/server systems - N-Tier systems do not take advantage of resource sharing techniques like connection pooling. 6. N-Tier systems can use various techniques for Identification, Authentication and Authorization and are therefore considered quite secure. a) 1 & 2 b) 2,5, & 6 c) 1, 2, & 5 d) 3 & 6 e) 1, 3, & 5 f) 1 & 5 Question 3  Nopester Inc., a CD manufacturer uses Metallic Corporation for making jewel cases. When the inventory of  jewel cases falls under the r eorder level, Nopeste r communicates with Metallic via faxes. Nopester now wants to build a solution for its supply chain management. Metallic uses a legacy system that supports CORBA interface s for other companies to interface to them with. Metallic's servers are protected by firewalls and will only let HTTP or HTTPS requests through. What is Nopester's best option here? a) Since Metallic will not let CORB A requests through, Nopester should continue sending faxes. b)  Nopester should take its business away to Metallic's competit ors. c) Nopester should use the popular SOAP protocol since SOAP requests communicate over HTTP. d)  Nopester should use a concept called HTTP tunneling to communicate with Metallic.

Upload: umeshoracle

Post on 06-Apr-2018

229 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Scea Questions

8/2/2019 Scea Questions

http://slidepdf.com/reader/full/scea-questions 1/9

Java SCEA Practice Exam

Question 1Happy Joe Banking Corporation is building a Banking application to provide online access to their account

holders. They have chosen 2 SUN 450s for their web server cluster and 1 SUN E10000 for their application

server. The business requirements indicate that to become a customer, a person must have at least a primarychecking account with the bank. Further since the customer will be using the Internet to view confidential

information, security is considered paramount. What do you understand about the requirements of the

system?

a) The need for Security is a classic example of a functional service level requirement and the checkingaccount rule, an example of non-functional QoS requirement. b) The discussion about Security and the

mandatory checking account both illustrate functional service level requirements.

c) Neither Security nor the mandatory Checking Account is examples of any kind of requirements,

theoretically speaking. d) Security is an Architectural non-functional requirement and the Mandatory

Checking Account a functional design requirement.

e) They are both examples of Business Use Cases.

Question 2Which of the following are not true about N-Tier Systems? 

1.  N-Tier systems are distributed over many systems and hence always presenta maintenance problem.

2.  N-Tier systems are generally component based and are therefore quite easyto maintain.

3.  Since N-Tier systems do not use database stored procedures or triggers forbusiness logic processing, they are generally very slow.

4.  Since N-Tier systems are container based, many N-Tier systems can be easilyscaled (both vertically and horizontally).

5.  N-Tier systems suffer only from one drawback over client/server systems -N-Tier systems do not take advantage of resource sharing techniques like

connection pooling.6.  N-Tier systems can use various techniques for Identification, Authentication

and Authorization and are therefore considered quite secure.a) 1 & 2  b) 2,5, & 6 c) 1, 2, & 5  d) 3 & 6 

e) 1, 3, & 5  f) 1 & 5 

Question 3

 Nopester Inc., a CD manufacturer uses Metallic Corporation for making jewel cases. When the inventory of 

 jewel cases falls under the reorder level, Nopester communicates with Metallic via faxes. Nopester now

wants to build a solution for its supply chain management. Metallic uses a legacy system that supports

CORBA interfaces for other companies to interface to them with. Metallic's servers are protected byfirewalls and will only let HTTP or HTTPS requests through. What is Nopester's best option here?

a) Since Metallic will not let CORBA requests through, Nopester should continue sending faxes. b)

 Nopester should take its business away to Metallic's competitors.

c) Nopester should use the popular SOAP protocol since SOAP requests communicate over HTTP. d) Nopester should use a concept called HTTP tunneling to communicate with Metallic.

Page 2: Scea Questions

8/2/2019 Scea Questions

http://slidepdf.com/reader/full/scea-questions 2/9

Question 4

When remote calls are made on the container provided implementations of the EJBHome and EJBObject,

various transactional and security checks are applied before the call is actually passed on to the bean

instance. The Container provided implementations of EJBHome and EJBObject are performing what

Design Pattern's task?

a) Command b) Adapter 

c) Bridge d) Decorator e) Facade

Question 5Compact Computers is a small computer assembly companallows customers to pick and choose accessories to build thThe accessories are:i.Processor -800Mhz, 1Ghz, 1.2Ghzii. HDD - 40 GB, 60 GB, 80 GBiii. Memory -128 MB, 256 MB, 512 MBIf a computer can have exactly 1 processor, 1 HDD and 1memory stick, what pattern would be best used here?a) Factory Method  b) Builder 

c) Prototype d) Abstract Factory 

e) Singleton 

Question 6Ibid is an e-auction house that auctions refurbished products. Each product has a mican query the system for a list of products and then select a product to bid on. Theybid on the selected product. Transactional Integrity is very important as dirty reads,phantom reads can lead to data inconsistency. What technology combination might baddressing Ibid's needs?

a) Applets for presentationand JTA/JTS for transactionalintegrity. 

b) HTML and JSP for presentation, and Servlets fordata retrieval and transaction management. 

c) Servlets and JSP forpresentation, a statefulsession bean with DAO for listretrieval and a statelesssession bean for transactionmanagement.

d) Servlets and JSP for presentation, a statelesssession bean with DAO for list retrieval and CMTEntity bean for Transaction management. 

e) Servlets and JSP forpresentation, and a Java classto encapsulate databaseaccess and transactionmanagement. 

Question 7Toysrfuss, a national toy store is creating a new e-front for Order processing.Customers have to create an account to transact with them, although an accountis not required for browsing the catalog. Customers can browse items and addthem to a shopping cart. They can then proceed to checkout. At this time, theycan update quantities and submit the order. What technologies may be best

Page 3: Scea Questions

8/2/2019 Scea Questions

http://slidepdf.com/reader/full/scea-questions 3/9

suited for this application? 

a. JSP for presentation and Servlets as controllers.b. Servlets for presentation and JSP as controller.c. Stateless Session Bean for Shopping cart.d. Stateless session bean for catalog retrieval.e. Stateful Session bean for shopping cart.

f. Stateful session bean for Order update.g. Entity bean for Catalog retrieval.h. Entity bean for Order update.a) D, E, & G  b) A, B, E & H 

c) A, D, E & H  d) B, E, F & G 

Question 8Which of the following statements about 'Not Supported' and 'Never' transactionalattributes are true? 

a. 'Not Supported' suspends any transaction until the method is completedwhereas 'Never' throws a RemoteException when called with a transaction.

b. 'Never' suspends any transaction until the method is completed whereas 'NotSupported' throws a RemoteException.c. If the method is called without any transactional scope, both attributes willwork identically.d. If the method is called with a transactional scope, both attributes will workidentically.a) A Only  b) A & C 

c) C Only  d) None of the Above 

Question 9The findByXXX() method in the Home Interface of an entity bean returns ____.a. An Instance of java.lang.Object

b. An instance of the Remote Reference to the beanc. An instance of java.util.Enumerationd. An instance of the Bean classa) A  b) B & C 

c) B d) C & D 

Question 10

EJB1.1 has support for undefined Primary Keys. This means that the Primary Key can be undefined until

deployment time. When we use defined Primary Keys, the Bean class and the Interfaces use the BeanPK type to identify the key. What do the Bean class and the Interfaces refer to in the case of undefined Primary

Keys?

a) Though the Primary Key itself can be undefined, its name must be predetermined. The Bean class and

the Interfaces use this name. b) An instance of java.util.Enumeration.c) An instance of java.lang.Class. d) An instance of java.lang.Object.

Page 4: Scea Questions

8/2/2019 Scea Questions

http://slidepdf.com/reader/full/scea-questions 4/9

Question 11What are the benefits of Bean pooling?a. Bean instances are created during startup, thus avoiding the expense of creation,each time a client requests it.b. Bean pooling allows load distribution over several machines.c. Bean pooling is the container's way of balancing load - moving future requests

from client to a different machine, if load increases are encountered.d. Allows a container to use beans as flyweights.a) A & D  b) A & B 

c) C & D  d) B & D 

Question 12Status Quo is an emerging B2C company that has a portal through which customerscan purchase clay jewelry. Since the order process involves a shopping cart, sessionmanagement and secure access are required. How would you manage this?a. Use HTTP since it is a stateful protocol.b. Use HTTPS since it is a stateful protocol.c. Use SOAP for state and security management.

d. Use CGI with cookies for state management.a) A & D  b) B & C 

c) D  d) B 

Question 13Chocolat, an exotic chocolate maker in France is planning to provide an e-front forchocolate sales. FedEx would ship the packages to various national and internationallocations. In order to customize the customer's interaction with the system and tomake his / her overall shopping experience more pleasant, Chocolat has decided tosupport Internationalization. What are some of the common things they would needto consider?a. Language for messages

b. Formats (numeric, date and so on)c. DMZ requirementsd. Taxes and legal rulese. RSA f. MD5a) A, B & D  b) B & C 

c) A, B & E  d) B, D & E 

Question 14

Fire Hall is building a corporate Intranet and wants its employees to access payroll information via theInternet. They are implementing the solution via applets for richer GUI capabilities. The view 401K applet

requires a Java 1.4 Plug in as well as read permission to read cached data from a temporary directory on the

host where it's being executed. Is the applet technology viable for this application?

a) The applet technology is not viable because the sandbox model prevents them from reading or writing to

the host where they are executed. b) The applet technology is a viable solution because the security policy

of the Java 2 Platform is totally flexible.

Advertisement

Page 5: Scea Questions

8/2/2019 Scea Questions

http://slidepdf.com/reader/full/scea-questions 5/9

Question 15

In the Publish subscribe messaging architecture, publishers send messages to:

a) A specified node, which is then re-distributed to all subscribers. b) Directly to all subscribers in the

Topic subscription list.c) A designated queue. d) A component transaction monitor such as an EJB Server for further processing

 by a message driven bean.

Question 16 You have just started a new job working for a top financecompany and you have been asked to provide a user-friendly interface to an existing mainframe application. Youdon't have any access to the mainframes source code.What is the best technique for this?

a) It can't be done. b) Use a screenscraper. 

c) Re-write the main frame usingJava and high-end Unix servers.Although it may takesome time todo this in the long run this willbenefit the company. 

d) Write a Java frontend then use CORBAto communicate withthe mainframe. 

e) Use the Java Native Interface(JNI) to communicate with themainframe. 

f) Use object mapping. 

g) Use JMS. 

Question 17

Your 3-tier application has been running smoothly in a production environment for over 3 months. Due to arecent television campaign, you have started to experience three times the volume of normal traffic. Your architect has suggested that a round robin load distribution mechanism be employed to cope with the issue.How is DNS round robin going to be helpful in this situation?

a) Splitting requests evenly amongst all back end servers. b) The proxy sits behind the backend servers

monitoring the performance of each one. When it notices one is being used too much it will automatically

forward requests to a different server.

c) Time each server has available. d) A technique used to target certain requests to certain backend servers,

e.g. All Servlet requests from one server and all static HTML from another.

Question 18 A Fortune 500 company wishes to add new functionality to their existing salessystem and has contracted you as the lead architect for the project. The legacysystem has been written in C++. They wish to keep this system running and mayswitch over to a full Java solution later, depending on the performance of the newfunctionality. So how will connect to this legacy system?

a) Wrap the applicationusing JNI and make itaccessible using RMI. 

b) Rewrite the C++ code in Java.This shouldn't be too hardbecause it's converting from oneobject-orientated language to

Page 6: Scea Questions

8/2/2019 Scea Questions

http://slidepdf.com/reader/full/scea-questions 6/9

another. 

c) Use a screen scraper. d) Use CORBA to talk to the C program then get the CORBA totalk to the RMI server. 

Question 19 

You are working for a company with a worldwide presence; its offices are spreadacross many countries and over many computer networks. The company has setup Virtual private networks to increase security. What are Virtual PrivateNetworks (VPNs) and where are they created? 

a) A network createdbetween two other networks(these are not located in thesame place, geographically).Encryption andAuthentication are used inthe VPN. Normally the VPN isa network on top of an

untrusted network (like theInternet). 

b) The area between twofirewalls. You let traffic fromthe Internet into this area(through the first firewall)but not through the secondfirewall (to your securenetwork). 

c) The secure (inner) networkas described in choice B. 

d) A network created betweentwo other networks (theseare not located in the sameplace, geographically.)Encryption andAuthentication are NOT usedin the VPN. Normally the VPNis a network on top of atrusted network (like theInternet). 

Question 20 

You are the lead architect for a project that requires interfacing with existingCORBA systems. You are planning to use Java IDL to integrate with these othersystems. Which of the following statements about Java IDL are true?a. Allows Java to use CORBA.b. Should be used when most of your new Java applications will be entirely Javabased.c. Should be used if you have already been using CORBA for a while and wish tocarry on with some CORBA systems.d. Java IDL has nothing to do with CORBA. To communicate with CORBA you willneed to use JNI (Java native interface) and J2C (Java 2 CORBA).e. Same as D except you won't need to use JNI.

f. Should be used when servicing messaging requests fromCORBA clients.a) A & E  b) B, C, & E 

c) A, E & F  d) A & C 

Question 21 

In a Catalog Enterprise Bean, used in an online sports shopping site, you have coexecuted when ejbPassivate() and ejbActivate() methods are called. Since the cohouse keeping tasks, you need to know when these methods would get executed.following statements are therefore true?

Page 7: Scea Questions

8/2/2019 Scea Questions

http://slidepdf.com/reader/full/scea-questions 7/9

Page 8: Scea Questions

8/2/2019 Scea Questions

http://slidepdf.com/reader/full/scea-questions 8/9

e) A, C & E 

Question 25 

You've designed an application that allows customers to buy chapters of e-books.Due to the success of the project this will be launched as a worldwideapplication. In the process of converting this application to be suitable for

worldwide use which of the following will you use?

a) Java already runs with 16 bitcharacters as standard. So youdon't need to use any particularclasses to change text. Allprimitives can be used. 

b) java.text package 

c) java.lang.Integer Class d) java.lang.Number Class 

e) java.international package  f) java.Unicode package 

Question 26 

You have a distributed system that is not made up entirely of Java objects (some of 

them are CORBA.) What J2EE technology should you use in this situation?

a) RMI-JRMP b) CORBA 

c) Rewrite the objects so thesystem in entirely Java based 

d) RMI-IIOP 

Question 27 

As part of a new application you are building, you need to connect to a database. Notethat this database is used to store third party product details and it does not belong toyour company. You do not have any access to the server where the database isinstalled and only have read permissions for the database. Further, you cannot changethe ODBC driver that is currently installed. How do you connect to this database?

a) CORBA  b) JMS-JNI c) JDBC-ODBC  d) Bridge 

e) JDBC 

Question 28 

You have had enough of all the UML tools in the market, as they are all verycumbersome to use. Hence you have decided to design your own UML tool. However,during design, you realize that certain parts will be really complicated. For example,you have a Diagram object that is made up of lots of other objects. This diagram objectcan be used for creating a variety of other diagrams including class and sequencediagrams. When you create it you only want to specify its type and content. What

design pattern should you use here?In the Tips section, the tiers under N-Tier architecture need to be indented. Currentlythey are at the same indentation as the parent.

a) Publish/Subscribe  b) Point-to-Point c) Topic Messaging  d) Instant Messaging 

e) You wouldn't usemessaging 

Page 9: Scea Questions

8/2/2019 Scea Questions

http://slidepdf.com/reader/full/scea-questions 9/9

Question 29 

You have had enough with all the UML tools on the market as none do exactly what youwant them to. So you've decided to design your own. However when designing it you rethat certain parts will be really complicated for example you have a Diagram object thatmade up of lots of other objects. This diagram object can be used for a variety of differdiagrams including class and sequence diagrams. When you create it you only want to

specify its type and content. What pattern should you use?

a) Abstract Factory  b) Factory Method 

c) Builder  d) Decorator