SUN CERTIFIED ENITRPRISE ARCHITECT FOR J2EE(tm)TECHNOLOGY
- Exam Number/Code : 310-051
- Exam Name : SUN CERTIFIED ENITRPRISE ARCHITECT FOR J2EE(tm)TECHNOLOGY
- Questions and Answers : 96 Q&As
- Update Time: 2013-04-05
$ 119.00$ 69.00
- 310-051 Hard Copy (PDF)
- 310-051 Test Engine
Free 310-051 Demo Download
Test4pass offers free demo for SUN Other Certifications 310-051 exam (SUN CERTIFIED ENITRPRISE ARCHITECT FOR J2EE(tm)TECHNOLOGY). You can check out the interface, question quality and usability of our practice exams before you decide to buy it. We are the only one site can offer demo for almost all products.
It is well known that 310-051 exam test is the hot exam of SUN certification. Test4pass offer you all the Q&A of the 310-051 real test . It is the examination of the perfect combination and it will help you pass 310-051 exam at the first time!
Why choose Test4pass 310-051 braindumps
Quality and Value for the 310-051 Exam
100% Guarantee to Pass Your 310-051 Exam
Downloadable, Interactive 310-051 Testing engines
Verified Answers Researched by Industry Experts
Drag and Drop questions as experienced in the Actual Exams
Practice Test Questions accompanied by exhibits
Our Practice Test Questions are backed by our 100% MONEY BACK GUARANTEE.
Test4pass 310-051 Exam Features
Quality and Value for the 310-051 Exam
Test4pass Practice Exams for SUN 310-051 are written to the highest standards of technical accuracy, using only certified subject matter experts and published authors for development.
100% Guarantee to Pass Your 310-051 Exam
If you prepare for the exam using our Test4pass testing engine, we guarantee your success in the first attempt. If you do not pass the SUN Other Certifications 310-051 exam (ProCurve Secure WAN) on your first attempt we will give you a FULL REFUND of your purchasing fee AND send you another same value product for free.
SUN 310-051 Downloadable, Printable Exams (in PDF format)
Our Exam 310-051 Preparation Material provides you everything you will need to take your 310-051 Exam. The 310-051 Exam details are researched and produced by Professional Certification Experts who are constantly using industry experience to produce precise, and logical. You may get questions from different web sites or books, but logic is the key. Our Product will help you not only pass in the first try, but also save your valuable time.
310-051 Downloadable, Interactive Testing engines
We are all well aware that a major problem in the IT industry is that there is a lack of quality study materials. Our Exam Preparation Material provides you everything you will need to take a certification examination. Like actual certification exams, our Practice Tests are in multiple-choice (MCQs) Our SUN 310-051 Exam will provide you with free 310-051 dumps questions with verified answers that reflect the actual exam. These questions and answers provide you with the experience of taking the actual test. High quality and Value for the 310-051 Exam:100% Guarantee to Pass Your SUN Other Certifications exam and get your SUN Other Certifications Certification.
Hot KeyWords On 310-051 test
We collect some hot keywords about this exam:
Test4pass , Pass 4 Sure , Test in Side ,Pass Guide ,Test King 310-051 exam | 310-051 pdf exam | 310-051 braindumps | 310-051 study guides | 310-051 trainning materials | 310-051 simulations | 310-051 testing engine | 310-051 vce | 310-051 torrent | 310-051 dumps | free download 310-051 | 310-051 practice exam | 310-051 preparation files | 310-051 questions | 310-051 answers.
How to pass your 310-051 exam
You can search on Search Engine and Find Best IT Certification site: Test4pass.com - Find the Method to succeed 310-051 test,The safer.easier way to get SUN Other Certifications Certification .
Exam : Sun 310-051
Title : Sun Certified Enitrprise Architect for J2EE(TM)Technology
1. You are developing an HR application with the following requirements:
Users access the systems over an intranet, using a standard Web browser.
Organization information is stored in LDAP.
Benefits information is stored in an RDBMS.
Complaints are sent directly to a third-party system for compliance.
Which J2EE technology would send messages to the third-party complaint system?
2. Click the Exhibit button.
then click the Tile button. You have been hired to design a service-based architecture for your customer. The requirement is to integrate the existing services and provide web access.
The customer design team has drawn up a suggested architecture as shown in the Exhibit. Their suggested architecture shows the Web server making requests to the relevant service and having service-to-service communication handle the business request.
Which two statements are false about the suggested architecture? (Choose two.)
A. The suggested architecture may require new service-to-service communication to support new business functionality.
B. The suggested architecture puts the burden on the service-to-service communication to support new business functionality.
C. The suggested architecture will not require new service-to-service communication to support new business functionality.
D. Introducing EJB into the suggested architecture would require having the services communicating with the EJB as if it was another service.
3. A telemarketing company is building an enterprise system to allow the sales staff to access contact information over an intranet. All of the contact information is stored in a legacy system and can only be accessed using a VT100 terminal session. You must create an architecture to access that legacy system.
Which component should you use to encapsulate access to the legacy system?
A. a Java class that uses a screen-scraping tool to interact with the legacy system
B. a distributed CORBA object that uses IIOP to interact directly with the legacy system
C. an EJB session bean that uses JMS to send asynchronous messages to the legacy system
D. an EJB entity bean that uses container-managed persistence to encapsulate the legacy system
4. Which design pattern is represented by the JDBC ResultSet class?
D. Factory Method
5. Which pattern is the most appropriate for allowing transparent access to a remote object?
6. You have been tasked with Web-enabling your backend order-entry services using J2EE technology. Your services are mainframe-based, and all have C APIs. All client access must be through the Web server, and all new business logic will be in EJB. Which two architectural solutions are appropriate for your new order-entry system? (Choose two.)
A. wrap J2EE technology around the existing services
B. wrap the existing services around J2EE technology
C. have JSP use Java objects to make EJB business calls
D. put the business logic in Java objects called by JSP, and have the JSP make EJB business calls
7. Which two features of a firewall might interfere with the operation of IIOP? (Choose two.)
A. port filtering
B. load balancing
C. address filtering
D. network address translation
8. These are the requirements for your new system:
All current business logic is in the form of database-stored procedures.
All current and new business logic is to be migrated to EJB.
The system is an online, Web-based system. The UI is HTML-based.
There are three EJBs: Customer, Order, and Account. There is one Java object, ShoppingList, which holds the current list of ordered items.
Only account and order data are stored in the database.
The Customer EJB maintains a reference to the ShoppingList.
Which three architectural decisions adhere to the requirements? (Choose three.)
A. make Order and Account an entity EJB
B. make Customer a stateful-session EJB
C. make Customer a stateless-session EJB
D. make Customer an entity EJB and put business logic in it
E. make Customer a session EJB and put business logic in it
F. use the Container Managed Persistence policy for the Customer session EJB
9. What are two benefits of the Iterator pattern? (Choose two.)
A. It organizes collections into tree structures.
B. It performs a task for each object it visits in the collection.
C. It supports traversing the same collection in different orders.
D. Multiple Iterators can traverse the same collection simultaneously.
10. Your client is a bank that wants to allow its customers to access their bank accounts over the Internet. Given the following requirements, which protocol communicates with the Web browsers?
Confidential information must be protected.
Customers will access their account using only a simple Web browser with no extensions.
11. Which two services does EJB provide? (Choose two.)
A. HTML generation
B. transaction services
C. lifecycle management
D. remote-method invocation
12. What are two features of IIOP? (Choose two.)
A. It is secure.
B. It is connnectionless.
C. It is connection-based.
D. It is used for load balancing.
E. It is used for hypermedia requests.
F. It is used for remote-object communications.
13. Which three are limitations of design patterns? (Choose three.)
A. They can complicate a design.
B. They are limited to Java and C++.
C. They can introduce performance problems.
D. They do not provide an implementation for a specific problem.
14. Which pattern allows dependent objects to be notified when an object changes state?