Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Sun 310-051 Exam -

Free 310-051 Sample Questions:

Q: 1 Which two features of a firewall might interfere with the operation of IIOP? (Choose two.)
A. port filtering
B. load balancing
C. address filtering
D. network address translation
Answer: A, C

Q: 2 Your client is a bank that wants to allow its customers to access their bank accounts over the Internet. Given the following requirements, which protocol communicates with the Web browsers?
Confidential information must be protected.
Customers will access their account using only a simple Web browser with no extensions.
Answer: D

Q: 3 What are two features of IIOP? (Choose two.)
A. It is secure.
B. It is connnectionless.
C. It is connection-based.
D. It is used for load balancing.
E. It is used for hypermedia requests.
F. It is used for remote-object communications.
Answer: C, F

Q: 4 These are the requirements for your new system:
All current business logic is in the form of database-stored procedures.
All current and new business logic is to be migrated to EJB.
The system is an online, Web-based system. The UI is HTML-based.
There are three EJBs: Customer, Order, and Account. There is one Java object, ShoppingList, which holds the current list of ordered items.
Only account and order data are stored in the database.
The Customer EJB maintains a reference to the ShoppingList.
Which three architectural decisions adhere to the requirements? (Choose three.)
A. make Order and Account an entity EJB
B. make Customer a stateful-session EJB
C. make Customer a stateless-session EJB
D. make Customer an entity EJB and put business logic in it
E. make Customer a session EJB and put business logic in it
F. use the Container Managed Persistence policy for the Customer session EJB
Answer: A, B, E

Q: 5 Which two services does EJB provide? (Choose two.)
A. HTML generation
B. transaction services
C. lifecycle management
D. remote-method invocation
Answer: B, C

Q: 6 You are developing an HR application with the following requirements:
Users access the systems over an intranet, using a standard Web browser.
Organization information is stored in LDAP.
Benefits information is stored in an RDBMS.
Complaints are sent directly to a third-party system for compliance.
Which J2EE technology would send messages to the third-party complaint system?
Answer: C

Q: 7 What are two benefits of the Iterator pattern? (Choose two.)
A. It organizes collections into tree structures.
B. It performs a task for each object it visits in the collection.
C. It supports traversing the same collection in different orders.
D. Multiple Iterators can traverse the same collection simultaneously.
Answer: C, D

Q: 8 Which pattern is the most appropriate for allowing transparent access to a remote object?
A. Proxy
B. Facade
C. Memento
D. Singleton
E. Command
Answer: A

Q: 9 Which three are limitations of design patterns? (Choose three.)
A. They can complicate a design.
B. They are limited to Java and C++.
C. They can introduce performance problems.
D. They do not provide an implementation for a specific problem.
Answer: A, C, D

Q: 10 Which design pattern is represented by the JDBC ResultSet class?
A. Bridge
B. Iterator
C. Composite
D. Factory Method
Answer: B

Q: 11 Which pattern allows dependent objects to be notified when an object changes state?
A. Mediator
B. Observer
C. Decorator
D. Interpreter
E. Command
Answer: B

Q: 12 As an architect, you are interested in the architectural characteristics of a system. Which two are architectural characteristics? (Choose two.)
A. nameability
B. availability
C. manageability
D. accountability
Answer: B, C

Q: 13 You have been tasked with Web-enabling your backend order-entry services using J2EE technology. Your services are mainframe-based, and all have C APIs. All client access must be through the Web server, and all new business logic will be in EJB. Which two architectural solutions are appropriate for your new order-entry system? (Choose two.)
A. wrap J2EE technology around the existing services
B. wrap the existing services around J2EE technology
C. have JSP use Java objects to make EJB business calls
D. put the business logic in Java objects called by JSP, and have the JSP make EJB business calls
Answer: A, C

Q: 14 A telemarketing company is building an enterprise system to allow the sales staff to access contact information over an intranet. All of the contact information is stored in a legacy system and can only be accessed using a VT100 terminal session. You must create an architecture to access that legacy system.
Which component should you use to encapsulate access to the legacy system?
A. a Java class that uses a screen-scraping tool to interact with the legacy system
B. a distributed CORBA object that uses IIOP to interact directly with the legacy system
C. an EJB session bean that uses JMS to send asynchronous messages to the legacy system
D. an EJB entity bean that uses container-managed persistence to encapsulate the legacy system
Answer: A

Q: 15 You have been tasked to create an architecture which has EJB making calls on legacy services. The legacy services all run on UNIX machines and provide Java network APIs. Each invocation on the EJB must be in a transaction.
How can the EJB transaction adhere to the ACID properties when making a legacy service call?
A. let the EJB container manage the transaction
B. make sure the EJB is an entity bean and have the state automatically managed
C. have the EJB monitor the service call completion and roll back the EJB state if necessary
D. mark the EJB as Container Managed Transaction and have the bean demarcate the transaction
Answer: C

Q: 16 A toy company is building an enterprise system to allow the sales staff to place customer orders over an intranet. All orders must be placed using a legacy system running MQSeries. You must create an architecture to interact with that legacy system.
How would you encapsulate interaction with that legacy system?
A. with an EJB session bean that uses a screen scraping tool
B. with a distributed CORBA object that uses IIOP to message the legacy system
C. with a Java class that uses JMS to send asynchronous messages to the legacy system
D. with an EJB entity bean that uses container-managed persistence to encapsulate the legacy system
Answer: C

Q: 17 Which two statements about the lifecycle of a session bean are true? (Choose two.)
A. The data in a stateful session bean survives a server's crash.
B. A server that has crashed and been restarted can deserialize cached data for a stateful session bean.
C. A session bean instance can be recreated through the use of a handle.
D. Client should be prepared to recreate a session bean in the event of a server crash.
Answer: C, D

Q: 18 Which statement about an EJB container's lifecycle management of session beans is true?
A. The container can activate a session bean to free limited resources.
B. The container can passivate a stateless session bean to free limited resources.
C. A developer can specify a timeout in the deployment tool that causes a container to remove the bean after the timeout period.
D. A developer can specify a timeout in the deployment tool that causes a container to remove a bean whose transaction has not been committed within the timeout period.
Answer: C

Q: 19 Which statement is true about pooling entity beans?
A. Pooling entity beans can increase reliability.
B. Pooling entity beans can increase scalability.
C. Pooling entity beans can increase extensibility.
D. Pooling entity beans has no effect on scalability or reliability.
Answer: B

Q: 20 Which statement about passivating session beans is true?
A. The passivated stateless session bean should close all connections before being passivated.
B. The container ensures that the passivated bean's open connections are closed or returned to the connection pool.
C. The container ensures that the passivated stateless session bean is reassigned to the remote object upon activation.
D. The passivated stateful session bean should open the connections in activation that were closed when it was passivated.
Answer: D

Q: 21 Which three aspects of an application are most likely to be determined at runtime based on the user's declared nationality or locale? (Choose three.)
A. network protocols
B. help message text
C. program feature set
D. sorting order of text items
E. formatting of numeric items
Answer: B, D, E

Q: 22 Which two items provide the ability to convert data between Locale specific 8 bit data and Unicode text? (Choose two.)
A. the java.text package
B. the java.util.Locale class
C. the java.util.ResourceBundle class
D. the class
E. the class
Answer: D, E

Q: 23 Your company's employee assistance program (EAP) application is now required to be deployed on the Web. The following are characteristics and requirements of the new system:
The UI is an off-the-shelf, unsigned terminal-emulator applet.
The applet communicates with a terminal server using a proprietary TCP/IP-based protocol.
The terminal server sits behind the corporate firewall and listens on port 10001.
The only configurable items for the applet are the host IP and port of the terminal server.
Your company's firewall only allows traffic through on port 80 for HTTP and port 443 for HTTPS.
Problem: The applet is unable to communicate through the firewall. Which two statements about this architecture are false? (Choose two.)
A. If the applet were signed, it could communicate directly with the terminal server.
B. If the terminal server were signed, the applet could communicate with it directly on port 10001.
C. The applet can communicate with the terminal server if the firewall is modified to allow traffic through on port 10001.
D. The applet can communicate with the terminal server if it is configured to communicate with the terminal server on port 80 or 443.
Answer: A, B

Q: 24 You are in the process of migrating your existing system to a new architecture to support your growing user base. The current system consists of:
Browser-based HTML/JavaScript UI
One Web server instance
One J2EE application server instance
A database
The new architecture has the following requirements:
Browser-based HTML/JavaScript UI
Cluster of Web servers
Cluster of J2EE application servers
A database
Which two statements are true? (Choose two.)
A. Clustering increases scalability.
B. Clustering impacts availability, not scalability.
C. DNS round-robin can be used to load-balance the Web servers.
D. Clustering the application servers provides automatic EJB fault-tolerance.
Answer: A, C

Q: 25 Your supply chain software currently runs as a standalone application which communicates to the backend services using IIOP. The new requirements for the software are:
The client software must run as an applet.
The user's firewall will only allow port 80 and 443 traffic through its firewall.
All the backend services will be CORBA-based.
A Web server sits in front of the CORBA services.
The backend Web server runs on port 80 and 443.
Which two solutions support the new requirements? (Choose two.)
A. You convert the application to an applet and use IIOP to communicate with the backend services.
B. You convert the application to an applet running outside the browser and send XML through port 443.
C. You convert the application to an applet and use IIOP tunneled through HTTP to communicate with the backend services.
D. You convert the application to an applet and use HTTPS to communicate with a servlet which
communicates with the backend services using IIOP.
Answer: C, D

© 2014, All Rights Reserved