Oracle 1z0-807 Exam Practice Questions (P. 3)
- Full Access (90 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
While analyzing an existing web application, you observe the following issues in the source code:
✑ Duplicate control code is scattered throughout various view.
✑ Business and presentation logic are mixed within these view.
The next phase of the project involves refactoring the existing code to address these two issues.
Which design pattern, if employed in the refactoring exercise, would most directly address the two issues?
✑ Duplicate control code is scattered throughout various view.
✑ Business and presentation logic are mixed within these view.
The next phase of the project involves refactoring the existing code to address these two issues.
Which design pattern, if employed in the refactoring exercise, would most directly address the two issues?
- AService to Worker
- BDispatcher view
- CDAO
- DComposite View
Correct Answer:
A
Reference:
http://www.vincehuston.org/j2ee/corepatterns.html
(see service to worker)
A
Reference:
http://www.vincehuston.org/j2ee/corepatterns.html
(see service to worker)
send
light_mode
delete
Question #12
You are using an open source integration framework in your project. However, key interfaces do not explicitly define several strange conditions you have repeatedly seen while testing.
Which option is the name given to the anti pattern described above?
Which option is the name given to the anti pattern described above?
- AComposite View
- BLeaky Abstraction
- CAsynchronous Interaction
- DGolden Hammer
Correct Answer:
B
All non-trivial abstractions, to some degree, are leaky.
An abstraction that works most of the time, but where a detail of the underlying complexity cannot be ignored, thus leaking complexity out of the abstraction back into the software that uses the abstraction.
B
All non-trivial abstractions, to some degree, are leaky.
An abstraction that works most of the time, but where a detail of the underlying complexity cannot be ignored, thus leaking complexity out of the abstraction back into the software that uses the abstraction.
send
light_mode
delete
Question #13
Which two statements are true about security strategies at the message-level?
- AMessages are secured during transport and after arrival at their destination
- BEach portion of a compound message is secured.
- CSSL is required to ensure authenticity, integrity, and confidentiality.
- DMessage attachments are secured without the need for a dedicated API.
- ESecurity is dependent on the application environment or the transport protocol.
Correct Answer:
AC
AC
send
light_mode
delete
Question #14
Which two features are supported by the Java Authentication and Authorization Service (JAAS) API?
- ASingle sign on
- BSecure network connections
- CConfigurable access control policies
- DWeb services security
- EMessage encryption and key generation
Correct Answer:
AC
AC
send
light_mode
delete
Question #15
Your development team wants to use Google Guice. A previous architect assigned this request a low priority, citing the complexity of integration and no compelling benefits statements from the requesting team.
The team claims that their colleagues have achieved the integration using a pattern. This pattern reduced the level of difficulty and risk and did not require vendor support.
Which pattern fits this description?
The team claims that their colleagues have achieved the integration using a pattern. This pattern reduced the level of difficulty and risk and did not require vendor support.
Which pattern fits this description?
- AContext Holder
- BService Starter
- CDependency Injection Extender
- DBean Locator
Correct Answer:
C
Reference:
https://code.google.com/p/peaberry/
C
Reference:
https://code.google.com/p/peaberry/
send
light_mode
delete
All Pages