Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM 000-257 Exam - Cheat-Test.com

Free 000-257 Sample Questions:

1.In an enterprise application EJB_A invokes a method on EJB_B. How must the EJB run­as security identity be configured in the EJB deployment descriptor for the current setting to allow EJB_A to invoke EJB_B?
A.Set run­as on EJB_A to role_A.
B.Set run­as on EJB_A to role_B.
C.Set run­as on EJB_B to role_A.
D.Set run­as on EJB_B to role_B.
Answer: B

2.A web module defines a J2EE security role, Managers. Using the appropriate deployment descriptor editor, the developer then binds this role to the User Registry user, supervisors. What file would need to be explored to find this specified association?
A.application.xml
B.web.xml
C.ibm­application­bnd.xmi
D.ibm­web­bnd.xmi
Answer: C

3.A developer wants to use form­based authentication to secure resources in a Web application.
In the Web deployment descriptor editor, the developer has set the Authentication method to FORM and configured appropriate security roles. What additional entries need to be configured to protect the resources?
A.Specify a Login page and create a Security Constraint defining the URL patterns of the resources to be secured and appropriate Authorized roles.
B.Specify Login and Error pages and create a Security Constraint defining the URL patterns of the resources to be secured and appropriate Authorized roles.
C.Specify Login and Error pages.
D.Specify a Login page.
Answer: B

4.A developer is implementing security requirements for a Web module. Which HTTP Methods would be the MOST likely to cover these requirements?
A.GET and POST
B.GET and PUT
C.GET, POST and PUT
D.GET, POST, PUT and DELETE
Answer: A

5.While configuring a datasource in the EAR deployment descriptor editor, the drop­down boxes that allow a JAAS authentication alias to be specified are empty. How can the JAAS authentication alias be configured in order for it to be visible in the drop down box?
A.Add a J2EE security role with associated users in the EAR deployment descriptor editor.
B.Add the required JAAS authentication alias in the EAR deployment descriptor editor.
C.Add the JAAS authentication alias to the datasource reference in the EJB deployment descriptor editor.
D.Use the WebSphere V6 administrative console to add the JAAS authentication alias.
Answer: B

6.If a developer wants to create a Web service that must conform to all supported WS­I profiles, the developer should:
A.Set the WS­I Compliance preferences to "Require compliance" before creating the Web service.
B.Set the WS­I Compliance preferences to "Suggest compliance" before creating the Web service and disable related warnings in the Problems view.
C.Use the New WS­I Compliant Web Service wizard to create the Web service.
D.Check the "Require WS­I compliance" checkbox in the New Web Service wizard.
Answer: A

7.A developer runs a Web service client in an unmanaged environment using a generated Java proxy. The client throws an Exception indicating that it failed to create an InitialContext. The same proxy class used in a managed environment works fine. If the developer did not modify the generated code, what is a likely cause of the problem?
A.The security context for the JNDI manager cannot be propagated in an unmanaged environment.
B.The transaction context can not be propagated in an unmanaged environment.
C.The Web service being invoked uses the SOAP over JMS binding.
D.Java proxies generated by the wizard can only be run in a managed environment.
Answer: C

8.A developer is creating a client to invoke a secured Web service. The service requires that the body of the SOAP request be encrypted. What type of element in the WS Extension page of the client's Deployment Descriptor should the developer configure?
A.Integrity
B.Confidentiality
C.Security Token
D.Timestamp
Answer: B

9.Which of the following EJB components can be used as the basis for bottom­up Web services development in Rational Application Developer?
A.Message­driven bean
B.Stateful session bean
C.Stateless session bean
D.Container­managed entity bean
Answer: C

10.A client uses a generated Java proxy to make a call to a Web service. Invoking the method on the proxy results in a RemoteException. What is a likely cause?
A.The server hosting the Web service is unavailable.
B.An application exception was thrown by the Web service.
C.A handler on the client was configured incorrectly.
D.The client was run in an unmanaged environment.
Answer: A

11.A developer has two J2EE applications that are loosely coupled via Web services. The two applications are designated as the service application and the client application. The Web service
is referenced and called from a Web module in the client application. In which set of files would a developer configure JAX­RPC handlers?
A.The service application's webservices.xml and the service application's web.xml files
B.The client application's webservices.xml and the service application's ejb­jar.xml files
C.The client application's webservices.xml and the service application's web.xml files
D.The service application's webservices.xml and the client application's web.xml files
Answer: D

12.A developer can assign container­managed relationship (CMR) fields by:
A.Coding the ejbCreate() method.
B.Coding the ejbPostCreate() method.
C.Mapping the primary key to the foreign key.
D.Generating the code with the relationship wizard.
Answer: B

13.The relationship fields for a 1:1 container­managed relationship EJB must be of the same type as:
A.The local interface of the related EJB.
B.The remote interface of the related EJB.
C.The primary key of the underlying table.
D.The foreign key of the underlying table.
Answer: A

14.A stateless session EJB has been created that uses EJB inheritance. A developer is testing the newly created child EJB using the Universal Test Client (UTC). The developer has invoked the create method on the child EJB's home interface and is now working with a reference to the child EJB's remote component interface. When the developer expands the child EJB's remote component interface reference within the UTC, the methods inherited from the parent EJB are not displayed. What should the developer do in order to be able to see the inherited methods?
A.Select "Load Class" under the "Utilities" section of the Universal Test Client and load the parent EJB's remote component interface.
B.Select "Cast Class" under the "Utilities" section of the Universal Test Client and cast the reference to the parent EJB's remote component interface.
C.Select "Method Visibility" under the child EJB's remote component interface. On the screen that appears, enable the checkbox beside the parent EJB's remote component interface.
D.Use the JNDI Explorer to find the parent EJB's home interface, invoke the associated create method, and then cast the remote component interface that is returned to the child EJB's remote component interface type.
Answer: C

15.A developer is creating a CMP EJB using an existing database and has begun generating the RDB to EJB mapping by creating a new backend folder. The next step the developer should take is to:
A.Specify attributes for the EJB.
B.Map attributes to columns.
C.Create a bottom up mapping.
D.Create a top down mapping.
Answer: C

16.Which method in an entity bean would a developer have to code business logic in, if the bean contains references to resources that cannot be serialized?
A.ejbRemove()
B.ejbStore()
C.ejbPassivate()
D.ejbFindByPrimaryKey()
Answer: C

17.A developer is working with read­only EJBs that will have exclusive access to the data store. The BEST way to provide better response time at the expense of increased memory utilization is to use the bean cache section of the EJB deployment descriptor to set:
A.Activate at ONCE and load at ACTIVATION.
B.Activate at ONCE and load at TRANSACTION.
C.Activate at TRANSACTION and load at ONCE.
D.Activate at TRANSACTION and load at TRANSACTION.
Answer: A

18.Which of the following is an advantage of using the Snippets view to generate code for invoking a method on a Session Bean?
A.The Service Locator pattern is used and the home is cached.
B.The Service Locator pattern is used and individual bean instances are cached.
C.The generated code does not require try­catch blocks to handle errors.
D.The bean on which the method is invoked can be determined at runtime.
Answer: A

19.An application uses container­managed persistence EJBs to update a DB2 database. If database support for handling collisions is required, which of the following access intent policies will provide the best performance?
A.wsOptimisticUpdate
B.wsPessimisticUpdate­WeakestLockAtLoad
C.wsPessimisticUpdate
D.wsPessimisticUpdate­Exclusive
Answer: B

20.When creating a message­driven bean, which interface, if any, can be generated?
A.The home interface
B.The remote interface
C.The listenerPort interface
D.No interface can be generated
Answer: D

21.A developer configures the following environment entry via the EJB deployment descriptor editor: <env­entry> <description></description>
<env­entry­name>remote_server</env­entry­name>
<env­entry­type>java.lang.String</env­entry­type>
<env­entry­value>myserver.sample.com</env­entry­value> </env­entry> What code snippet should be used to retrieve this information at runtime?
A.(String)context.lookup("java:comp/env/remote_server");
B.(String)context.lookup("remote_server");
C.ejbContext.getEnvironment().getProperty("remote_server");
D.ejbContext.getEnvironment().get("remote_server");
Answer: A

22.A Servlet needs to store a reference to a stateful session bean for use in a later request. The Servlet should:
A.Store the reference to the bean in the HttpSession.
B.Store the bean's home in the HttpSession.
C.Store the bean's SessionContext in the HttpSession.
D.Persist the bean reference in a database.
Answer: A

23.After creating an ejbSelect using EJB QL, the developer can make the query available to clients by:
A.Promoting the ejbSelect method to Home Interface.
B.Promoting the ejbSelect method to LocalHome Interface.
C.Creating an ejbHome method that calls the ejbSelect method.
D.Creating a custom finder method that calls the ejbSelect method.
Answer: C

24.A developer has just created a new EJB project and wishes to add EJBs to it using the visual programming features in Rational Application Developer. The best way to open a suitable diagram
is to right click the deployment descriptor and select:
A.New EJB Diagram File ­> UML Diagram.
B.New Class Diagram File ­> EJB Diagram.
C.Visualize ­> Add to New Diagram File ­> Class Diagram.
D.Visualize ­> New EJB File ­> Class Diagram.
Answer: C

25.Given two CMP entity beans Customer and Order, and given a container­managed 1­to­many relationship between the two, which of the following EJB QL queries will find all customers with unshipped orders?
A.SELECT DISTINCT OBJECT(c) FROM Customer c, IN(c.orders) o WHERE c.o.shipped = FALSE
B.SELECT DISTINCT OBJECT(c) FROM Customer c, IN(c.orders) o WHERE o.shipped = FALSE
C.SELECT DISTINCT OBJECT(c) FROM Customer c, IN(c.orders) WHERE NOT o.shipped
D.SELECT UNIQUE OBJECT(c) FROM Customer c, IN(c.orders) WHERE NOT o.shipped
Answer: B

26.A developer would like to use a tag from the JSP Standard Tag Library (JSTL). What is the first task the developer must complete before using the tag in a JSP?
A.Import the JSTL jar file containing the tag handler classes and tag library descriptor into the dynamic
Web project.
B.Import the tag handler classes into the dynamic Web project's WEB­INF\classes directory and place the tag library descriptor file into the dynamic Web project's WebContent folder.
C.Import the tag handler classes into the dynamic Web project's WEB­INF\classes directory and place the tag library descriptor file into the dynamic Web project's WEB­INF folder.
D.Insert a taglib directive referencing the tag libraries URI in the JSP that uses the tag.
Answer: D

27.A Web developer has implemented a tag within a tag library that uses the SimpleTag interface.
The tag iterates over a collection and prints the contained objects to the screen. If the tag is to print out a collection with five contained objects, how many times is the doTag method invoked?
A.0
B.1
C.5
D.6
Answer: B

28.A developer is designing a Struts­based application. The developer finds common operations throughout the application's many Action classes. A best practice to avoid duplicate code would
be to:
A.Use the Web Diagram editor to implement a global intermediary Action with the common operations. On success or failure, forward to the original Actions or error handlers as appropriate.
B.Create a new Java class and use the Superclass option to extend org.apache.struts.action.RequestProcessor class. After executing the common operations, invoke the ActionServlet from the new RequestProcessor by using the RequestDispatcher.
C.Create a new Java class and use the Superclass option to extend the org.apache.struts.action.ActionServlet class. Implement all common operation methods. Use the Web Deployment Descriptor editor to use this new class as the ActionServlet.
D.Create a new Java class and use the Superclass option to extend the org.apache.struts.action.Action class and handle the common operations. Use this new class when implementing the Action classes.
Answer: D

29.A developer is working on a Dynamic Web project that uses Faces JSP pages. The application displays information from three existing related tables. Using the available Faces features in the workbench, the developer should:
A.Drag and drop a Relational Record List from the Palette to the Faces JSP. Use the resulting wizard to navigate the required table data through their relationships, select the Data Control to be created, and then select the columns to be displayed.
B.Drag and drop three Relational Records from the Palette into a table on the Faces JSP. Use the resulting wizards to navigate the tables and select the required columns to be displayed.
C.Drag and drop a Relation Record List from the Faces Client Component drawer to the Faces JSP. Access the appropriate table data through Java objects using JDBC on the Faces JSP.
D.Use the Faces Client Components to access the table information through a JDBC datasource. Faces
JSPs may then be used to format and provide access to the appropriate table information.
Answer: A

30.A Web application is distributed across multiple Web containers. The application is required to track hit counts for each of the Servlets in the application. The hit counts must be global and should not be tracked on a per­container basis. Which of the following is the BEST solution for storing the data?
A.The ServletContext
B.The HttpSession
C.An instance variable in each Servlet
D.A database table
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved