Tired of trying again and again to pass SUN 310-051 exam? Flydumps provides you the latest SUN 310-051 exam preparation material to make you pass in the first attempt. Those who are going to take SUN https://www.pass4itsure.com/310-051.html exam shortly must use our excellent exam preparation products to increase the probability of getting amazing results.
QUESTION NO: 1
Which acts as a proxy to an EJB?
A. home instance
B. remote instance
C. bean instance
D. IDL instance
QUESTION NO: 2
Which statement about passivating session beans is true?
A. The passivated stateful session bean should open the connections in activation that were closed when it was passivated.
B. The container ensures that the passivated bean’s open connections are closed or returned to the connection pool.
C. The container ensures that the passivated stateless session bean is reassigned to the remote object upon activation.
D. The passivated stateless session bean should close all connections before being passivated.
QUESTION NO: 3
Which two statements about JMS are true? (Choose two.)
A. JMS supports Publish/Subcribe.
B. JMS uses JNDI to find the destination.
C. JMS enhances access to email services.
D. JMS uses JMX to create a connectionFactory.
QUESTION NO: 4
Which two services does EJB provide? (Choose two.)
A. lifecycle management
B. transaction services
C. HTML generation
D. remote-method invocation
QUESTION NO: 5
Which two features of a firewall might interfere with the operation of IIOP? (Choose two.)
A. port filtering
B. address filtering
C. network address translation
D. load balancing
QUESTION NO: 6
What are two security responsibilities of the Application Assembler? (Choose two.)
A. defining the security roles as required
B. mapping the EJB methods to roles as required
C. defining the EJB interface
D. encrypting the DDs
QUESTION NO: 7
Which two statements are true about management of an EJB’s resources? (Choose two.)
A. The reference to home object is obtained through JNDI to improve maintainability and flexibility.
B. The EJB container can manage the instance’s access to its resources because the remote object acts as a proxy.
C. The EJB container can manage the instance’s access to its resources because the home object acts as a proxy.
D. The reference to the remote object is obtained through JNDI to improve maintainability and flexibility.
QUESTION NO: 8
You are creating an architecture for an online ordering system with the following requirements:
Users will order products over the Internet.
Business objects will reside on a local application server.
All product information is stored in a local RDBMS.
Credit card information must be validated by an external system.
All local systems will be secured behind a firewall.
All communications with external systems must be secure.
Which two design decisions will increase the flexibility of the system? (Choose two.)
A. using an entity bean to encapsulate the external credit card system
B. using a stateless session bean to validate user ID and password
C. using an entity bean to encapsulate product information
D. using an entity bean to track the user’s shopping cart
QUESTION NO: 9
These are the requirements for your new system:
All current business logic is in the form of database-stored procedures.
All current and new business logic is to be migrated to EJB.
The system is an online, Web-based system. The UI is HTML-based.
There are three EJBs: Customer, Order, and Account. There is one Java object, ShoppingList,
which holds the current list of ordered items.
Only account and order data are stored in the database.
The Customer EJB maintains a reference to the ShoppingList.
Which three architectural decisions adhere to the requirements? (Choose three.)
A. make Customer an entity EJB and put business logic in it
B. make Customer a stateful-session EJB C. make Customer a stateless-session EJB
D. make Customer a session EJB and put business logic in it
E. use the Container Managed Persistence policy for the Customer session EJB
F. make Order and Account an entity EJB
QUESTION NO: 10
Click the Exhibit button. Then click the Tile button.
An auction house is developing an online auction system with the following requirements:
Sellers submit information about the items being sold over the Internet.
Buyers submit bids for those items being sold over the Internet.
Credit card information is verified using an external system, over the Internet.
All user interfaces are done using pure HTML.
All transactions must be secure.
Based on the architecture exhibit, which two transactions must be secured using an encrypted
communications channel? (Choose two.)
A. a seller entering information about an item
B. the Web server invoking business objects on the application server
C. the application server verifying credit card information
D. the application server adding item information to the database
QUESTION NO: 11
A department in a company uses entity beans with bean-managed persistence to access an RDBMS. The entity beans contain the code to access the database directly. The company decided that other departments can reuse the business logic to access their databases, which include an OODBMS and a different type of RDBMS.
Which statement best describes how the company can integrate their departmental business logic to access the various databases, and to ensure that the entity bean code is easy to read?
A. move the data-access code out of the entity beans into a data-access object
B. use session beans to access an entity bean through a data access object
C. distribute the data-access code among several entity beans to access different databases
D. use session beans to access several entity beans that represent the data in all three databases
QUESTION NO: 12
Your supply chain software currently runs as a standalone application which communicates to the
backend services using IIOP. The new requirements for the software are:
The client software must run as an applet.
The user’s firewall will only allow port 80 and 443 traffic through its firewall.
All the backend services will be CORBA-based.
A Web server sits in front of the CORBA services.
The backend Web server runs on port 80 and 443.
Which two solutions support the new requirements? (Choose two.)
A. You convert the application to an applet and use IIOP to communicate with the backend services.
B. You convert the application to an applet running outside the browser and send XML through port 443.
C. You convert the application to an applet and use IIOP tunneled through HTTP to communicate with the backend services.
D. You convert the application to an applet and use HTTPS to communicate with a servlet which communicates with the backend services using IIOP.
QUESTION NO: 13
What are two features of IIOP? (Choose two.)
A. It is used for remote-object communications.
B. It is connnectionless.
C. It is connection-based.
D. It is used for load balancing.
E. It is secure.
F. It is used for hypermedia requests.
QUESTION NO: 14
Click the Exhibit button.
Then click the Tile button. Which diagram in the exhibit reflects the relationship:
“A is always associated with one B”?
QUESTION NO: 15
What are two clear advantages to using message services in an application? (Choose two.)
A. provides scalability
B. allows clients and servers to communicate directly
C. provides secure communication services
D. allows loose coupling between components
QUESTION NO: 16
As an architect, you are interested in the architectural characteristics of a system. Which two are architectural characteristics? (Choose two.)
B. inheritance C. performance D. liability
QUESTION NO: 17
Which three aspects of an application are most likely to be determined at runtime based on the user’s declared nationality or locale? (Choose three.)
A. program feature set
B. sorting order of text items
C. formatting of numeric items
D. network protocols
E. help message text
QUESTION NO: 18
The requirements for an online shopping application are:
It must support millions of customers. The invocations must be transactional. The shopping cart must be persistent.
Which technology is required to support these requirements?
QUESTION NO: 19
Click the Exhibit button.
Then click the Tile button. Your company has purchased a B2B system to run a manufacturing trading hub. The protocol of choice is HTTPS and the data representation mechanism is XML.
You have been tasked with integrating all of your customer’s manufacturing systems into your trading hub. The manufacturing systems are integrated using custom adapters. The adapters are responsible for:
sending and receiving XML using HTTPS converting XML into data required by the customer system
Which statement best labels the architecture in the exhibit?
A. A – adapter, B – hub, C – HTTPS, D – adapter
B. A – adapter, B – hub, C – adapter, D – XML
C. A – manufacturing system, B – hub, C – adapter, D – HTTPS
D. A – XML, B – manufacturing system, C – adapter, D – hub
QUESTION NO: 20
What are three benefits of design patterns? (Choose three.)
A. They provide standard code libraries.
B. They describe an object-oriented development process.
C. They standardize the way designs are developed.
D. They provide a common design vocabulary.
E. They act as a learning aid.
Whenever Cisco candidates take a tour of sample questions of SUN https://www.pass4itsure.com/310-051.html exam they find their training to be matchless to great extent.Passing the SUN 310-051 on your own can be a difficult task,but with SUN 310-051 preparation products,many candidates who appeared online passed SUN 310-051 easily.