0b0 105 exam questions pass in first attempt

Page 1

www.DirectCertify.com IT Certification Exams PDF

BEA 0B0-105 BEA 8.1 Certified Architect: Enterprise Architecture

Edition = DEMO Full Version Features:  90 Days Free Updates  30 Days Money Back Guarantee  Instant Download Once Purchased  24 Hours Live Chat Support

Full version is available at link below with affordable price.

http://www.directcertify.com/0B0-105.html

Page | 1

http://www.directcertify.com/0B0-105.html


www.DirectCertify.com IT Certification Exams PDF Question: 1 You have determined that your J2EE EJB tier applications should deployed to a WebLogic Cluster in order to achieve the necessary scalability requirements. When considering adequate network bandwidth to minimize lost multicast packets, which activity is likely to generate the greatest concentration of multicast traffic? A. JNDI updates B. JMS Server migration C. JMX Mbean monitoring D. HTTP Session replication E. WebLogic cluster heartbeats

Answer: A Question: 2 Which UML artifact best describes a Business Process? A. Data Model B. State Diagram C. Workflow Detail D. Activity Diagram E. Sequence Diagram

Answer: D Question: 3 In planning most architecture it is considered to be a best practice to avoid long-running XA-transactions. Which of the following is the most compelling reason? A. Performance can suffer due to potential XA-resource concurrency bottlenecks B. With the XA two-phase commit protocol, there is a greater chance for heuristic conditions C. Client applications with shorter transaction timeouts may not wait long enough for transactions to be completed. D. Each in-flight transaction requires a unique XID, performance is impacted by excessive transaction context switching E. Deadlock situations can occur within the Transaction Manager by typing up all the available threads involved in transaction

Answer: A Question: 4 Which of the following is true related to java Virtual Machine (JVM) issues with your weblogic server deployments? A. WebLogic Server does not permit manually forced garbage collection on the JVM B. The BEA JRockit JVM must be used to allow for garbage collection scheme choice Page | 2

http://www.directcertify.com/0B0-105.html


www.DirectCertify.com IT Certification Exams PDF C. WebLogic Server interfaces within the same cluster may use different typed of JVMs D. A change to the maximum heap size of the JVM does not require a WebLogic server restart E. Greater performance is usually achieved by deploying a single multithreaded weblogic server instance to multiple JVMs.

Answer: C Question: 5 You have determined that your web applications will be deployed to a weblogic cluster for high availability. You want to ensure that all HTTP session data is available to other members of the cluster in case of server failure., but replication performance is a high priority. Based on this requirement, which approach would be best to incorporate into your design? A. File-based session persistence B. In-memory session persistence C. Single memory-based session D. JDBC-based session persistence E. XA-based rapid session synchronization

Answer: B Question: 6 Within a Service-Oriented Architecture, services in the Connectivity Layer tend to be; A. Fine-grained and Synchronous B. Fine-grained and Asynchronous C. Coarse-grained and synchronous D. Coarse-grained and Asynchronous E. Both Coarse-grained and Fine-Grained

Answer: A Question: 7 Which of the following XML-related standards are NOT used in Liquid Data? A. XSLT B. Xpath C. SOAP D. XqUERY E. Xml schema

Answer: A Question: 8 Page | 3

http://www.directcertify.com/0B0-105.html


www.DirectCertify.com IT Certification Exams PDF Many users, located in different geographic regions, all need access to certain secure web applications and EJB components. The users although dispersed, have common Job descriptions. What is the best way to generically provide access for all of these users? A. Use declarative security by providing authorization based user roles B. Programmatically authorize each user who requests a protected resource C. Use Security Assertion Markup Language (SAML) to implement discretionary security D. Create all user accounts in an LDAP server, and make it the default realm for the domain E. Define a custom security proxy that stores and propagates each authenticated user's credential information

Answer: A Question: 9 Within a Service-Oriented Architecture, which of the following is NOT specified by a Service Policy? A. Encryption rules B. Execution Rules C. Versioning Rules D. Authorization rules E. Authentication rules

Answer: B Question: 10 Which statement best describes the way in which WebLogic Workshop can be used to develop applications following the MVC pattern? A. Create EJBs and JSPs. Call EJBs from Servlets. B. WebLogic Workhop doesn't use the MVC model. C. Create a Struts Action from and associate it with the appropriate action mapping definition D. Create a serializable javaBean THAT DEFINES THE STATEFUL FIELDS AND THEIR METHODS AND PASSES THE DATA BETWEEN THE MODEL INVOCATION AND VIEW ELEMENTS E. Create an action from that defines the stateful fields and their accessor/mutator methods. Scope the form to a PageFlow and pass the state to controls, and call from the view as necessary.

Answer: E

Page | 4

http://www.directcertify.com/0B0-105.html


www.DirectCertify.com IT Certification Exams PDF

Full version is available at link below with affordable price.

http://www.directcertify.com/0B0-105.html

Full Product Includes.

Page | 5

http://www.directcertify.com/0B0-105.html


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.