Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

BEA Systems 0B0-105 Exam -

Free 0B0-105 Sample Questions:

Smithers and Dithers


History and project background
Smithers and Dithers (S&D) is a well-established, well-respected retail apparel company that has been in business for forty years; it currently implements thirty custom product lines in five separate retail divisions; each division comprises many retail locations across the United States. Although the day-to-day store operations are handled locally for each chain and managed through local POS systems, S&D’s corporate headquarters handles all back-office business operations for each retail division as a whole. As a result of its longevity, the size and complexity of its operations, and a series of acquisitions, S&D currently supports many large-scale and legacy applications.

The primary legacy applications are as follows:
• PeopleSoft-based Human Resources (HR) system: all employee information, including corporate information, employee benefits package, timesheets, and so on, for every Smithers and Dithers employee, is stored in the corporate PeopleSoft implementation. Employee new-hire and status-change information is also stored in the corporate PeopleSoft system.
• Customer Relationship Management (CRM) system: S&D uses a CRM system provided by NCR; this choice allowed Smithers and Dithers to leverage their existing Teradata Data Warehouse, and incorporate capabilities to target the right kind of merchandise at the right type of customer, based on demographic and geographic information. This system is successfully used by Marketing to analyze and predict customer trends and help in creating special promotions and ad campaigns.
• Custom accounting system: S&D uses a proprietary accounting system that has been in use by their chains for many years. The system was written in Cobol; it uses CICS for transaction monitoring and management. Correct integration with the accounting system is crucial to the POS project, because the other systems rely on this system.
• Inventory control system: the inventory system employed by S&D is a custom application. It has been evolving for many years. It is complex, and it integrates with the existing accounting system, SCM system, and warehouse. Interestingly, in addition to regular inventory control functions, the inventory system contains the purchase ordering functionality for all of the retail divisions.
• Supply Chain Management: this is another custom application, running on the S&D mainframe, leveraging a DB2-based data store. The current system is very sophisticated; it is designed around the following key ideas:
• Fulfillment optimization
• Logistics optimization
• Production optimization
• Revenue and profit optimization

S&D also has a fairly complex reverse supply chain process in place, that allows for reselling certain merchandise back to its suppliers. S&D also participates in buying, from other chains, discounted merchandise that matches its current inventory offerings.

As you might imagine, S&D has some very complex business processes in place. S&D was not immune to the process re-engineering craze of the 1990's, and, for the most part, the company has been the better for it.

Although its processes are highly refined and streamlined, the CIO, CEO and Board of Directors feel that the business itself is in need of some restructuring of electronic resources and business processes to provide more agility and competitiveness moving forward. The CIO and IT division heads have been researching ways to provide this agility and resiliency across S&D operations; they finally decided to standardize on Java and J2EE, as language and platform, respectively.

This decision was helped by the fact S&D successfully implemented a few J2EE-based applications that support electronic commerce (e-commerce); the most notable is a portal application that provides an online catalog and e-tailing capabilities for each retail division.

S&D’s standardized application server and portal choices for this project are WebLogic Application Server and WebLogic Portal. The company has made significant economic and resource investments in the BEA line of enterprise platform products.

The architecture oversight committee decided to break the re-architecture of S&D operations into two main stages.

Stage 1 includes redesigning, implementing, deploying and testing storefront operations. Storefront operations are defined as the key day-to-day retail operations conducted through each S&D chain, which will be handled through a newly-defined Point of Sale (POS) system.

Storefront operations include:
• Store inventory management
• Store operations: hiring, firing, training and general management of employees
• Processing sales transactions
• Processing deliveries

Many POS systems do not provide all this functionality directly; S&D’s current system does not. This has been a source of frustration to department and general managers for several years, and they identify this problem as one key reason for S&D’s declining competitiveness in the retail space. As a result, S&D sees a great opportunity to incorporate new functionality into the system.

Stage 2, to be completed after Stage 1 is successfully executed, includes redesigning, implementing, integrating, deploying and testing corporate, or back-office, operations. Corporate operations are defined as all the business processes and enterprise information systems in use by S&D.

Corporate operations include:
• Buying merchandise and coordinating a vast network of suppliers
• Coordinating inventory and logistics for each S&D outlet
• Human Resource management (payroll, and so on)
• Marketing, marketing analyses and advertising
• Daily warehouse operations

Although this is not a complete list of storefront and corporate operations, these examples indicate the complexities involved.


You have been hired as the new Enterprise Architect for the Smithers and Dithers Corporation. You will assume this role for the entire assessment, and your primary responsibility is for the design and definition of Stage 1 of S&D’s vision.

You will demonstrate a thorough understanding and knowledge of enterprise architecture through the key decisions that you will be required to make and support, through complex scenarios and general knowledge-based questions.

The assessment uses the Unified Modeling Language (UML) throughout, but it does not impose any particular methodology or taxonomy on you. You will be armed with S&D’s vision statement, current analyses documentation, and a record of key business processes that must be implemented in Stage 1, and with WebLogic and industry-accepted best practices for architecture, security and design.

The primary analysis tools that you will have to work with are as follows.
Exhibit is unavailable at the demo page
Every key piece of information that you need is provided in the documentation, as either a key artifact or an appendix. You are expected to focus only on the implementation of the requirements and analyses for Stage 1 of S&D’s application rollout.

Good luck!

Smithers and Dithers Artifacts

The following artifacts represent sample Use Case diagrams, Activity diagrams, Network Model, Data Model and non Functional Requirements. Each of these is a small sampling of the overall Smithers and Dithers architecture needed to successfully answer several of the certification questions. None of them are meant to represent the complete or thorough architecture design.

1.0 Non-Functional Requirements
Exhibit is unavailable at the demo page
Table 1.1 Non Functional Requirements

2.0 Use Case Diagrams
Exhibit is unavailable at the demo page
Use Case Diagram 2.0.1 Store POS Application
Exhibit is unavailable at the demo page
Use Case Diagram 2.0.2 Inventory Application

3.0 Sample Requirements and Activity Diagrams

Each Use Case below is really a snippet from the Use Case that defines the basic functional requirements from a very high level. For each sample Use Case statement, there is a Use Case diagram and an activity diagram that explain the path through the Use Case.

Use Case FR001 Run nightly reports functional requirements:

Nightly reports are summaries of all the transactions and status for the previous selling day. The nightly reporting system shall provide a summary of all the daily transaction information that will be the same detail that was stored in the DAILY_TRANSACTIONS data table. Nightly reports shall provide a summary of all merchandise sold by department and merchandise code, merchandise sales by price, and transactions of multiple groupings.

Figure 3.0.1 shows the activity diagram for this process.
Exhibit is unavailable at the demo page
Figure 3.0.1 Run Nightly Reports

Use Case FR002 Adjust Inventory Functional Requirements:

From time to time, it is necessary to adjust the merchandise levels of S&D’s stores. The reasons for this include: transferring of sale and special merchandise to other retail outlets during a marketing promotion, a legitimate inventory discrepancy filed by a store manager, and discontinuation of select merchandise.

Regardless the reason for the update, the system must be capable of responding to and handling orders for adjusting the store inventory level. The POS system shall provide the ability to notify an individual outlet of an adjustment of its inventory.

The system shall provide the functionality to respond to messages and invocations from the inventory management system, notifying an outlet of an adjustment to its stock levels. The system must provide a programmatic interface and a graphical interface, for use by human and electronic processes. The system must provide a mechanism to generate a unique, verifiable adjustment notification ID, that will be used to authenticate the adjustment request.

The system shall ensure confidentiality, integrity and non-repudiation of all parties during an adjustment transaction. The POS system shall provide interfacing to, and integration with, the legacy inventory management system, and it shall accommodate future integration with disparate enterprise applications and enterprise information systems.

Figure 3.0.2 provides the activity diagram for this process.
Exhibit is unavailable at the demo page
Figure 3.0.2 Adjust Inventory

Use Case FR003 Order Merchandise

A general merchandiser is assigned to each store. The merchandiser coordinates with several different brand buyers in ordering appropriate merchandise, specific to a S&D chain’s image.

Currently the merchandisers send PO requests to various suppliers as a manual process, defined in Figure 3.0.3 in the current as-is model. The POS system must provide functionality to allow a merchandiser to send a PO to multiple suppliers electronically. This exchange must leverage the existing infrastructure of the trading partners, and the document exchange must use well-defined, industry-standard partner interface processes. This functionality must maintain the integrity and confidentiality of documents exchanged with business partners, and it must provide authentication and authorization of external users.

Figure 3.0.3 provides the activity diagram for this process.
Exhibit is unavailable at the demo page
Figure 3.0.3 Order Merchandise

Use Case FR004 Daily Transaction Upload

At the end of each business day, each POS terminal of each S&D chain must upload a record of its daily transactions. Currently, the POS terminals for each store use SNA to send this data to the various mainframe systems handling general ledgers, merchandise, inventory levels, and so on.

The new system shall provide the ability for the new J2EE-based POS terminal application to continue to upload this information on a nightly basis. The terminal application shall be capable of receiving multiple data streams, in an asynchronous; loosely coupled way, and each update shall arrive to the terminal application in the form of an encapsulated message. The terminal application must implement redundancy, fault tolerance and guarantee of message delivery from each store terminal to the terminal application.

The terminal application must ensure that stored messages are retrieved in the fastest and safest way possible. Each store must be authenticated before its terminal’s daily transaction record is processed.

The POS terminal application shall ensure that each update to all Enterprise Information Systems participating in the daily transaction modification is successful; otherwise the transactional record shall be rolled back and a failure notification will be sent to the store that owns the terminal.

This application shall provide direct data and application integration with the existing Enterprise Information Systems; impact to the existing legacy applications shall be kept to a minimum.

Figure 3.0.4 provides the activity diagram for this process.
Exhibit is unavailable at the demo page
Figure 3.0.4 Daily Transaction Upload

4.0 Network Model
Exhibit is unavailable at the demo page
Figure 4.0.1 Network Diagram

1. A security model implements asymmetric-key, 4096-bit data encryption provided by an X.509 digital certificate, using a public key infrastructure; however, there is a concern that the overhead associated with asymmetric key exchange will not be acceptable, given the application performance requirements. What is the best way to reduce this overhead?
A. Switch to 1024-bit encryption
B. Add a requirement that the System Administrator set the export key lifespan setting to a shorter value
C. Reassess performance; if performance is still a problem, the problem exists only within the DMZ
D. Alter the performance requirement to a more reasonable performance value from the security model, because security is more important
E. Use mutual client authentication, allowing WebLogic Server to switch to symmetric key exchange once a secure session is established
Answer: E

2. Scenario: A functional requirement specifies that you must include an existing order-fulfillment business process, and provide direct access to the legacy order-fulfillment system.
You determined that the JCA specification provides the most direct and appropriate way to accomplish this task within your architecture. You decided to use the JCA implementation and business-process modeling capabilities of WebLogic Integration 8.1 to implement the requirement.
You narrowed the selection of JCA adapters down to the following list. Which adapter is the best selection, based on your integration requirements?
A. Adapter A, which supports synchronous and asynchronous request and response models, and bi-directional event handling, but does not support CCI
B. Adapter B, which supports the items that Adapter A supports, and CCI
C. Adapter C, which supports XCCI, metadata, and all optional and mandatory elements of the JCA
D. Adapter D, which supports synchronous request and response models and XRT-CCI
E. Adapter E, which supports metadata and all optional and mandatory elements of the JCA, including CCI
Answer: C

3. Scenario: You have a requirement to use existing user-specific data to a) display selected data elements; and b) control personalization of the presentation to the user.
Which is the best architectural approach for incorporating this data, seamlessly?
A. Create Entity Beans that provide wrapper access to the legacy data
B. Incorporate access through a profile, using a unification process
C. Allow programmatically access to the legacy data directly from the presentation layer
D. Wrap the legacy data behind a Web service
E. Interface to the data by adding access to it through the content repository system
Answer: B

4. To begin the business prioritization of use cases, which artifacts should you use?
A. The Use Case Model and Sequence Diagrams
B. The Use Case Model and the Data Model
C. The Use Case Model and the Software Requirements Specification
D. The Data Model and the Software Architecture Document
E. The Use Case Model and the Software Vision Statement
Answer: C

5. Your application requirements include accessing a legacy mainframe application with native communications protocols. To do this most effectively, you would use a product based on which specification?
C. Java to CORBA bridge
E. Web Services
Answer: B

6. When developing an application architecture, what is the most important consideration?
A. Identifying and applying the correct design patterns for well-known problems, reducing the amount of time to complete the project
B. Security
C. Modularity
D. Correct identification of requirements, and continually ensuring that the customer's needs are being met
E. Enforcing a strict three-tiered design approach
Answer: D

7. You want to ensure that all of a user's Stateful Session information is stored in a highly-available, safe way that is also conducive to quick access. If the application is deployed on a WebLogic cluster, which replication method would it be best to incorporate into your design, to meet the stated goals?
A. Replicated sessions, using in-memory replication
B. Replicated sessions, using file replication
C. HTTP session replication
D. XA-based rapid session synchronization
E. WebLogic Application Server Cluster session replication
Answer: A

8. How would you define the deployment artifacts for deployment of an application to a cluster?
A. Deployment of the application directly to each server in the cluster
B. Scheduled, two-phase deployment of the application targeted to a cluster
C. Deployment of the application to each server individually, using the application monitoring tools to determine whether the deployment is successful
D. Changing the Load Order deployment property of each application to 1
E. Deploying the application to the cluster, then setting the Auto-rollback On Failure attribute to true
Answer: B

9. What is the best way to deal with the problem of Entity EJB granularity and Remote Method Invocation?
A. Create a value object and pass the value object to the Entity Bean method
B. Directly update the value of the persistent attribute, thus bypassing a call to the Entity Bean
C. Replace the Entity interface with a Session interface to improve performance, yet maintaining the same bean implementation code
D. Implement the value list pattern, restricting the amount of data that is passed and returned from the Entity Bean
E. Create a Stateless Session Bean facade, providing a more fine-grained method invocation and encapsulating the coarse-grained call to the Entity Bean
Answer: E

10. Which best describes a distributed transaction?
A. It is an ACID transaction specialized to ensure proper synchronization of redundant, replicated data using a master-slave configuration
B. It is a specialized ACID transaction that enables sub-transactional units across multiple application servers
C. It is an ACID transaction that supports remote management and synch-level 2 support
D. It is an ACID transaction that provides unified coordination and management of committing or rolling back data, and management of in-flight data across networks
E. It is a special type of transaction that is used only by an EJB container, to provide container-managed transactions
Answer: D

11. A UML Use Case Diagram describes which of the following?
A. The baseline architecture decisions made by project stakeholders
B. Actor interactions with a proposed system
C. How each user action is linked to a class or sequence defined in the system
D. How to manage concurrency and resource iteration over the development lifecycle
E. The view of a system, including the functionality provided by each subsystem and class
Answer: B

12. To take advantage of well defined standard Partner Interface Processes in your document-exchange application, which protocol would you use?
A. ebXML
B. SOAP with Attachments 1.2
C. Open Collaborate 2.1
D. RosettaNet
Answer: D

13. Which two EJB methods have the greatest performance impact on the Entity EJB life-cycle, and should be given special consideration in your design?
A. ejbLoad() and ejbStore()
B. ejbCreate() and ejbRemove()
C. ejbPassivate() and ejbActivate()
D. ejbPassivate() and ejbRemove()
E. setEntityContext() and ejbCreate()
Answer: A

14. Which is the best design strategy for ensuring that the same network configuration is used for multiple servers in a WebLogic domain?
A. Edit the config.xml file for the domain, ensuring that each server has the same network settings
B. Create a distributed destination for the domain and assign it to each server
C. Define the configuration parameters in a subclass of and deploy the class on each server in the domain
D. Assign the configuration for each server in the domain, using the WebLogic Administration Console
E. A Domain-defined Network Channel
Answer: E

15. Which is the most effective design strategy for passing business data across the Control, Model and View tiers, using WebLogic Platform 8.1?
A. Create an action form that defines the stateful fields and their methods. Scope the form to PageFlow scope and pass the state to controls, and call from the view as necessary.
B. Create an action form that defines the stateful fields and their methods. Scope the form to PageSession scope and pass the state to controls, and call from the view as necessary.
C. Create a Struts Action Form and associate it with the appropriate Action Mapping definition.
D. Create a serializable JavaBean that defines the stateful fields and their methods, and passes the data between the model invocation and view elements.
E. Create an action form that defines the stateful fields and their methods. Scope the form to ServletConfig scope and pass the state to controls and call from the view, as necessary.
Answer: A

16. Which artifact would best describe the activation, lifespan and interaction of objects in the implementation of a Value List design pattern?
A. UML Class Diagram
B. Design Pattern catalog
C. Software Requirements Document
D. UML Sequence Diagram
E. Deployment Diagram
Answer: D

17. What is the best way to provide for non-repudiation of clients who invoke HTTP Servlets in the controller tier?
A. Rely on server-based form authentication to supply the user credentials
B. Use client-side digital certificates to supply the client credentials required for authentication
C. Browser-based authentication is sufficient for this purpose
D. Ensure that the deployment strategy calls for configuring HTTPS for each server the application will be deployed on
E. It is not necessary to factor this into the application design, because WebLogic provides non-repudiation automatically for every request
Answer: B

18. Which UML artifact best describes a Business Process?
A. Data Model
B. Workflow Detail
C. State Diagram
D. Sequence Diagram
E. Activity Diagram
Answer: E

19. How are business processes represented in WebLogic Workshop 8.1?
A. In a Business Process Definition file with a .jpf extension
B. In a Business Process Definition file with a .jpd extension
C. In a Business Process Definition file with a .wkf extension
D. As a separate project in the Business Process Modeler Studio
E. As a set of Stateless Session EJBs that define the context of the business process
Answer: B

20. Many users, located in different geographic regions, all need access to certain secure presentation and middleware resources. The users, although dispersed, have common job functions. What is the best way to generically provide access to these users?
A. Programmatically authorize each user who requests a protected resource
B. Create all user accounts in an LDAP server, and make it the default security realm for the domain
C. Use Security Assertion Markup Language (SAML) to implement discretionary security
D. Use declarative security for both the presentation and middleware resources and provide authorization based on user roles
E. Define a custom security proxy that stores and propagates each authenticated user's credential information
Answer: D

21. What is the best method for converting EBCDIC to UTF-8 data between a legacy purchasing system and a Web service, sending a purchase order to a supplier?
A. It is not necessary to convert the data, because the binary format of the data is self-describing
B. Define an XSD that defines the document structure, then define a transformation control that converts the binary input into XML
C. Define an XSD that defines the document structure, then apply XSLT for the transformation
D. Employ a COTS EDI solution
E. It is not necessary to convert the data, because the format is understood by the supplier
Answer: B

22. Further evaluation of the security model reveals that it might be necessary for components to communicate across an internal firewall. What is the best way to facilitate this, without changing the security model or application design?
A. Create a message wrapper around each component that uses a protocol not blocked by the firewall
B. Restrict the components to deployment only on an edge server that can bypass the firewall
C. Ensure that the components use the IIOP communication protocol, rather than JRMP
D. Switch to Serialized objects, communicating via sockets
E. Enable HTTP tunneling on the servers where the components are deployed
Answer: E

23. The security model includes a threat tree (or attack tree) that has a branch for a denial-of-service attack. Which application server design choice best defines how to address this issue?
A. For each server that handles external client requests, set an appropriate Post Timeout setting; for all other servers, set a network channel that prevents external access
B. Create a security proxy class that allows access only to trusted domains
C. Use HTTPS and allow connections only from trusted clients
D. For each server that handles external client requests, increase the Execute Thread pool size; for all other servers, set a network channel that prevents external access
E. Incorporate the use of network monitoring applications into the design, to monitor and spot trends of denial-of-service attacks and suspend suspicious requests
Answer: A

24. In a UML Activity Diagram, what is the function of the swim lane?
A. To define the channels of synchronization
B. To specify which external actors are involved with an activity
C. To describe which entity is responsible for a specific action defined by an activity or business process
D. To synchronize external actors with the processes' sequence diagrams
E. To define which business entities are responsible for synchronizing events in an activity or business process
Answer: C

25. What are the UML artifacts that result from the Rational Unified Process Elaboration phase?
A. Deployment Model, Design Model, Use Case Package
B. Deployment Model, Design Model, Software Architecture Document
C. Use Case Package, Design Model, Software Architecture Document
D. Implementation Model, Design Model, Software Architecture Document
E. User Experience Guidelines, Design Model, Software Architecture Document
Answer: B

26. Which artifact best describes what the user sees (such as content, screens, and so on), when interacting with the system?
A. Use Case Model
B. Implementation Model
C. Data Model
D. User Experience Model
E. Design Model
Answer: D

27. When conducting the initial stakeholder interviews, the system analysts identified domain-wide requirements, such as legal and compliance requirements, and new quality of service requirements pertaining to Smithers & Dithers suppliers.
Which is the best artifact to address these supplemental requirements?
A. Supplementary Specification
B. Use Case Model
C. Behavior diagram
D. Requirements Overview
E. Use Case Glossary
Answer: A

28. Which of the following is NOT a step in the analysis process?
A. Survey the available assets
B. Define the Initial Deployment Model
C. Identify the key abstractions
D. Identify the analysis mechanisms
E. Select design and implementation mechanisms
Answer: E

29. The design phase results in the creation of which set of documents?
A. Design Guidelines, Design Model, Software Architecture Document
B. Reference Architecture, Supplementary Specification, Use Case Model
C. Design Guidelines, Network Model, Data Model
D. Software Architecture Document, Network Model, Data Model
E. Use Case Model, Network Model, Data Model
Answer: A

30. Which is NOT a step in the design process?
A. Inventory the Design and Implementation Mechanisms
B. Identify the Key Abstractions
C. Select Design and Implementation Mechanisms
D. Document the Design
E. Document the Implementation Mechanisms
Answer: B

© 2014, All Rights Reserved