Hello Folks,
I would like to invite you to look at these questions and my answers to the Simon Lee Mock Exam (
http://www.x-nt.com/questions.html).
Some of my answers are not guarantee!!
We need to work together on these questions because most of them are in the real exam !!!
Simon Lee is free to give its advices :-)
Regards,
Herve Attia
==========================================================
Question 1
What is new feature in
Java 2 security? (select one)
1. protection domain
2. Access Control List
3. digital signature
4. message digests
answer : 1 Protection domain is new in Java2
Question 2
Normal lifecycle of a java application are
1) Problem Statement
2) OO Desgin
3) implementation
4) java app architecture
5) OO analysis
in what order? (select two)
1. 12345
2. 45213
3. 51423
4. 15423
5. 15243
answer 4 problem statement -> OO analisys -> OO design -> Java app architecture -> implementation
Question 3
What is
EJB's primary purpose? (select one)
1. Middleware independence
2. Platform independence
3. Language independence
4. Allow user to build middleware
Well, tricky question...all sounds correct....
I will say the most suitable answer is 4 ?!
help !!
Question 4
What most accuratly describes the feature that JAVA 2 security provides? (select one)
1)Browers admins and users can grant access to websites and individuals to have system privileges
browsers grant access to websites and individuals to have system privileges
2) Browser admins and users can grant access to individual classes to have system privileges
answer : 1
Question 5
How do you find the origin of an
applet (in JDK 1.0, 1.1 and 1.2)?
1) digital signatures.
2) Host name IP
All a signature tells you is who signed the code !!
So, the suitable answer is 2 .....
Question 6
How can hierachical databases be accessed?
1)
JDBC 2) JNI
3) JTAPI
4) Object/relational mapping
5) JavaBlend
What a good question that you might have at the real exam !!!
Let's process by elimination :
Javablend is no longer marketed by Sun Microsystems.
JTA is the Java API for telephony call control.
A hierarchical model was this old thing from back in the 60s that only survives in legacy systems.
Since the data are not stored using the relational model we can hardly use an object-relational mapping.
...And find a JDBC driver must be hard as well.
JNI is a standard programming interface for writing Java native methods and embedding the JVM
into native applications...must be the winner of these tricky questions.
Any advices to my answer will be appreciated !!
Question 7
What are X.509 certificates?
Certificates are digital documents attesting to the binding of a public key to an individual or other entity.
They allow verification of the claim that a given public key does in fact belong to a given individual.
certificates contain a public key, name, an expiration date, the name of the certifying authority ...
Most importantly, it contains the digital signature of the certificate issuer.
The most widely accepted format for certificates is X.509.
Question 8
How does applet printing in 1.2 differ over 1.1
Since the applet is untrusted (sandbox)
we know that trying to print to client is out of the question.
With 1.2 a applet trusted and signed can print to the client.
Question 9
What does a good software architecture increase? (Choose the best answer)
1) robustness
2) scalability
3) complexity
4) maintenance
I guess a good software architecture should increase scalability.
If the load increases, it might affect Robustness.
Question 10
You are asked to convert an existing two-tier client-server application
interacting with Oracle database to java.
What input is most needed to study feasibilty of that project in java? any one.
1) er diagram (Entity-Relationship diagram)
2) application design
3) application code
4) list of gui objects
1, 2, 3, 4 Help !!
Question 11
SSL. what does it encrypt? (choose one)
1) all tcp data but not TCP, IP or physical headers
2) physical data but not headers
3) ip data and not header
4) specific application fields but not protocol messages
My SSL understanding is that SSL provides a secure communication between client and server over TCP sockets,
by allowing mutual authentication, it uses digital signatures for integrity, and encryption for privacy.
As SSL sits on top of TCP/IP, means that parts of the message used by TCP/IP should be un-touched by encryption.
TCP/IP does not know anything about SSL !!
so, I will answer 4).
Question 12
What is OQL?
1) ad-hoc query standards for ODMBS.
2) Proprietary language to query ODBMS
OQL is a database query language that is based on SQL. OQL is an object variant of SQL3.
Proprietary is not an "open standard"
word so answer 1 is suitable !!
Question 13
How can an EJB component access a mainframe transaction processing system? (choose one)
1) Container that provides transaction processing
2) Container that provides database access
the most suitable answer is 1. I think the EJB container should access a mainframe transaction using transaction monitor/manager services....any clues ?
Question 14
What is logging used for? (choose one)
1) tracking the activity of an individual
2) identifies an individual
3) determine the identity of an individual
I don't really understand the difference between 2) and 3) ?!
Logging is a mechanism to authentificate an individual. So, either 2) or 3)
Question 16
How does a client locate an EJB instances? (choose one)
1) through JNDI
2) through RMI
3) through a home interface
4) through a remote interface
answer 1 : we use JNDI to lookup an EJB Home interface.
Question 17
What two must be taken care of to ensure successful transition from development to production? (choose two)
1)
Test on all web browsers and users
2) Use latest JDK
3) async communication between tiers
answer : 1 , 2 ?!
Question 18
When would you use synchronous communication between Java architecture layers?
1) When the client needs to wait for an response
2) When the client doesn't need to wait for a response
3) When the network is not available
answer : 1
Question 19
What protocol will an applet use to communicate with a
servlet?
1) sockets
2) RMI
3) HTTP
4) IIOP
answer : 3 Servlet is a request/response mechanism
Question 20
What must be taken care of during testing an Internet application from dev to depl on Intranet?
1) Test thru firewall
2) test with the slowest part of the n/w
3) load compatible jvms on client platforms
4) test in an isolated subnet
1, 2, 3 ...any clues ?
answer :
Question 21
What does EJB propose to solve? (choose one)
1) Middleware independence
2) Platform independence
3) Language independence
4) Enables client to write Java middleware
answer 1 ...but I'm confused.
Question 22
When must you use async comm.? (choose one)
1) in a publish subscribe arch
2) when the network is reliable
3) when the network must be available
4) When you are developing transaction processing application
answer : 1
Question 23
What is the function of subscribe in publish/subscribe arch.? (choose one)
1) registers interest in an event
2) publishes to the arch.
3) subscribes to the architecture
answer 1
Question 24
Two advantages of publish/subscribe arch. (choose two)
1) it is scalable
2) allows decoupling of publishers and subscribers
3) it is fully object oriented
4) it is reusable
2, 3
Question 25
When should you use HTTP with java. (choose one)
1) When using only object references.
2) Through a firewall
I don't really get it the question.
HTTP is a communication protocol. How can it be related to object reference ?
So, I will answer 2 because we can use HTTP Tunneling mechanism to wrap another protocol and go
through a firewall.
Question 26
What is DMZ? (choose one)
1) A secure buffer between the the internet and intranet.
2) A semi-secure buffer between the internet and intranet.
3) A unsecure buffer between the internet and intranet.
answer 1
DMZ (demilitarized zone) is a computer host or small network inserted as a "neutral zone"
between a compagny's private network and the outside public network (internet)
Question 27
In a 2-tier scenario with client talking SQL to Oracle database given the customer requirements,
what additional information is required to decide the feasibility of whether app
can be migrated to java or a new application written:
1) Application design
2) ER diagram of database schema
answer: 1 ?
Question 28
Given a UML notation representation: a rectangle with var:Order (underlined) inside it?
1) an active "Order" object
2) instance of "Order" object
3) package containing "Order" object
4) node containing "Order" object
"var:Order" var is the instance name and Order is the classname.
A rectangle corresponds to a single instance.
Instance names are underlined in UML diagrams (see Object diagrams, collaboration diagrams).
answer 1, 2
Question 29
In both CORBA and RMI, a cause for large network traffic might be? (select most suitable answer)
1) NV lists
2) App data
3) Object wrappers
4) Object references
too much object reference in the client side increases round trip with the server.
4 might be a suitable answer ?!
Question 30
Given a scenario of an existing application with 2 tier fat client accessing Oracle db through SQL,
It may be less feasible to migrate to java if? (Choose the most suitable answer)
1) Volatile client app
2) Multiple client platforms
3) Experience in 4GL
4) Experience Database design
5) Experience in Smalltalk
I will answer 4) ?!
Question 31
What are two advantages of publisher/subscribe?
1) scaleable
2) reusable
3) object-oriented
answer 2, 3
Question 32
Applet performance benchmarks?
Jperf.
Question 33
With respect to servlet which of the following are true?
1) Servlet can not access other Java objects on the server in which it resides
2) Servlet resides in the client
3) Servlet is multithreaded by default
4) Servlet is a request/response mechanism
answer : 3, 4
Question 34
A entity EJBObject class of an EJB implements
1) SessionBean
2) EntityBean
3) EJBHome
4) EJBObject
answer 2 javax.ejb.EntityBean
Question 35
Facade
pattern is best described as
1) The complex logic underlying is hidden in the (published) interface
2) To execute a chain of command in any order 4) To log the client interactions
answer: 1
Question 36
What duties are performed by a Java Architect? (choose three)
1) Take an existing system to production
2) Define requirements for a new system
3) Develop a project plan which might include recommendations for training and mentoring the customer's staff.
4) Write stubs.
5) Evaluate a proposed architect put forward by a client.
2, 3, 5
Question 37
Where does a architectural design fit into the application development lifecycle.
Between object-oriented analysis and object-oriented design.
Question 38
On whathat port number will you find HTTPS
1) 80
2) 81
3) 443
4) HTTPS uses named pipes
answer 3
http = 80
https= 443
iiop = 535
jrmp=1099