Section 1:application Design Concepts and principles
- Explain the main advantages of a object-oriented approach to system design including the effect of encapsulation, inherit Ance, and use of the interfaces on architectural characteristics.
- Describe how the principle of "separation of concerns" have been applied to the main system tiers of a Java Platform, Enter Prise Edition application. Tiers include client (both GUI and web), Web (Web Container), Business (EJB container), integration, and resource Tiers.
- Describe how the principle of "separation of concerns" have been applied to the layers of a Java EE application. Layers include application, virtual platform (component APIs), Application infrastructure (containers), Enterprise Servic ES (operating system and virtualization), compute and storage, and the networking infrastructure layers.
Section 2:common architectures
- Explain The advantages and disadvantages of two-tier architectures when examined under the following Topics:sca Lability, maintainability, reliability, availability, extensibility, performance, manageability, and security.
- Explain The advantages and disadvantages of three-tier architectures when examined under the following Topics:scalabi Lity, maintainability, reliability, availability, extensibility, performance, manageability, and security
- Explain the advantages and disadvantages of multi-tier architectures when examined under the following topics:scalability , maintainability, reliability, availability, extensibility, performance, manageability, and security.
- Explain The benefits and drawbacks of rich clients and browser-based clients as deployed in a typical Java EE applicat Ion.
- Explain appropriate and inappropriate uses for Web services in the Java EE platform
Section 3:integration and Messaging
- Explain possible approaches for communicating and a external system from a Java EE technology-based system given an outl INE description of those systems and outline the benefits and drawbacks of each approach.
- Explain Typical uses of Web services and XML over HTTP as mechanisms to integrate distinct software components.
- Explain how JCA and JMS is used to integrate distinct software the components as part of the overall Java EE application.
Section 4:business Tier Technologies
- Explain and contrast uses for entity beans, entity classes, stateful and stateless session beans, and message-driven beans , and understand the advantages and disadvantages of each type.
- Explain and contrast the following persistence strategies:container-managed persistence (CMP) BMP, JDO, JPA, ORM and Usin G DAOs (Data Access Objects) and direct JDBC technology-based persistence under the following headings:ease of Developmen T, performance, scalability, extensibility, and security.
- Explain how Java EE supports the deployment of Server-side components implemented as Web services and the advantages and D Isadvantages of adopting such an approach.
- Explain the benefits of the EJB 3 development model over previous EJB generations for ease of development including how th E EJB container simplifies EJB development.
Section 5:web Tier Technologies
- State the benefits and drawbacks of adopting a web framework in designing a Java EE application
- Explain standard uses for JSP pages and Servlets in a typical Java EE application.
- Explain standard uses for JavaServer Faces, in a typical Java EE application.
- Given A system requirements definition, explain and justify your rationale for choosing a web-centric or Ejb-centric imple Mentation to solve the requirements. Web-centric means that is providing a solution that does is not the use of EJB components. Ejb-centric solution would require an application server, the supports EJB components.
Section 6:applicability of Java EE Technology
- Given a specified business problem, design a modular solution that solves the problem using Java EE.
- Explain how the Java EE platform enables service Oriented architecture (SOA)-based applications.
- Explain How do you would design a Java EE application to repeatedly measure critical non-functional requirements and outline A standard process with specific strategies to refactor, application to improve on the results of the measurements.
Section 7:patterns
- From a list, select the most appropriate pattern for a given scenario. Patterns is limited to those documented in the Book-alur, Crupi and Malks (2003). Core ee patterns:best practices and Design Strategies 2nd Edition and named using the names given in this book.
- From a list, select the most appropriate pattern for a given scenario. Patterns is limited to those documented in the Book-gamma, Erich; Richard Helm, Ralph Johnson, and John Vlissides (1995). Design patterns:elements of reusable object-oriented software and is named using the names given in this book.
- From a list, select the benefits and drawbacks of a pattern drawn from the Book-gamma, Erich; Richard Helm, Ralph Johnson, and John Vlissides (1995). Design patterns:elements of reusable object-oriented software.
- From a list, select the benefits and drawbacks of a specified Core EE pattern drawn from the Book-alur, Crupi and Malk S (2003). Core Java EE patterns:best practices and Design strategies 2nd Edition.
Section 8:security
- Explain the Client-side security model for the Java SE environment, including the Web Start and applet deployment modes.
- Given an architectural system specification, select appropriate locations for implementation of specified security feature s, and select suitable technologies for implementation of those features
- Identify and classify potential threats to a system and describe how a given architecture would address the threats.
- Describe the commonly used declarative and programmatic methods used to secure applications built on the Java EE platform, For example use of deployment descriptors and JAAS.
Java EE (6)--Java EE 5 Enterprise Architect certified Master