S90-08A - Advanced SOA Design & Architecture
Go back to SOA
Which of the following statements are false?
The application of the Policy Centralization pattern increases the amount of policy content in the service inventory.
The application of the Policy Centralization pattern combines global and domain-specific policies into a single location. As a result, the distinction between a global and domain policy is eliminated.
The application of the Policy Centralization pattern requires that policies only be expressed with the WS-Policy standard.
Governance can become an issue with service agents because:
All of the above.
Which of the following functions would not be suitable for a typical service agent?
complex Web service composition
The Process Abstraction pattern can help solve which of the following problems?
Grouping non-agnostic business logic together with agnostic business logic hinders the governance of the non-agnostic logic and the reuse of the agnostic logic.
A service composition architecture with the following requirements needs to be created: 1. Services will have different periods of availability. 2. Sometimes the destination of a message cannot be determined until runtime. 3. All the services do not support the same messaging protocol. Of the following choices, which patterns should be used to address these requirements?
Protocol Bridging, Intermediate Routing, Asynchronous Queuing
In order to realize the failover support provided by the application of the Redundant Implementation pattern, the Intermediate Routing pattern also needs to be applied so that services can be load balanced.
Which of the following statements is false?
The application of the Contract Centralization pattern enables access to underlying service resources through the use of secondary or unofficial technical contracts.
When applying the Policy Centralization pattern, if you create a global policy that conflicts with a service-specific policy that you already had in place, then:
None of the above.
Which of the following statements is true?
None of these statements are true.
The Reliable Messaging pattern requires:
a framework for temporarily persisting messages and issuing acknowledgements
The application of the Protocol Bridging pattern helps overcome disparity between:
The WS-BPEL technology can be used when applying the Compensating Service Transaction pattern.
The Atomic Service Transaction pattern can be applied using the WS-Coordination and WS- AtomicTransaction standards.
The State Repository pattern is one of the core patterns that comprise the Enterprise Service Bus pattern because complex compositions often include long periods of inactivity while waiting for composed services to complete their processing, thereby providing an opportunity to defer state from memory to a state repository.
Load balancing is commonly associated with which pattern?
Which of the following statements are true?
The application of the Rules Centralization pattern centralizes the governance of business rules so that they can be modified and evolved from a single location.
The application of the Rules Centralization pattern reduces redundancy by centralizing common business rules-related logic that would normally be distributed across multiple services.
The application of the Rules Centralization pattern results in centralized business rules that can be applied at runtime.
The application of the Rules Centralization pattern can lead to a decrease in autonomy because it can introduce the need for an additional service to be part of service compositions.
Of the following Web service technologies, which is most commonly associated with the Orchestration pattern?
The use of the Intermediate Routing pattern typically results in:
common routing logic being removed from service logic and placed into service agents
Which of the following statements about the application of the Policy Centralization pattern is true?
All of these statements are true.
A common XML-based technology used to apply the Data Model Transformation pattern is:
None of the above.
Which of the following statements regarding the application of the State Repository pattern is false?
A state repository is not useful for supporting long-running service activities.
Which of the following is a common problem associated with the application of the Policy Centralization pattern?
Changes to a shared policy definition can affect all services that rely upon it, which in turn, can affect all service consumers that have formed dependencies on the corresponding service contracts.
Technical service contracts that use the same XML schemas will support the exchange of messages based on the same data models.
The Protocol Bridging pattern addresses problems that occur when services using different transport protocols or different versions of the same transport protocol try to communicate.
An atomic service transaction requires that:
a service participating in a transaction either commit or rollback changes in response to the success or failure of the transaction
A service fa?ade component can be used to abstract the part of a service architecture that has negative coupling potential.
The application of the Legacy Wrapper pattern typically results in:
no coupling of the service consumer to the legacy system encapsulated by the wrapper service
The application of the Redundant Implementation pattern helps increase the autonomy of:
redundantly deployed services
compositions that compose redundantly deployed services
When applying the Schema Centralization pattern, multiple services can form dependencies on the same centralized schema.
The Asynchronous Queuing pattern can be combined with the Event-Driven Messaging pattern to allow a service consumer acting as a subscriber to receive all event notification messages that are broadcast, even those that are sent when the service consumer is unavailable.
Because the Process Abstraction pattern advocates the abstraction of ___________ logic, its application helps filter out ___________ logic in support of defining ___________ services.
non-agnostic, agnostic, agnostic
Which pattern aims to increase the autonomy of a service specifically via the use of a replicated database?
None of the above.
Which of the following statements accurately describes the difference between the Atomic Service Transaction pattern and the Compensating Service Transaction pattern?
All of the above.
The Process Centralization pattern:
physically centralizes business process logic into a single location
A service agent has a technical contract that allows it to be explicitly invoked by service consumer programs.
Official Endpoint is a compound pattern that is comprised of the Logic Centralization pattern and the Contract Centralization pattern.
The application of the Intermediate Routing pattern can address which of the following needs?
The need to perform content-based routing based upon metadata found in the message header.
The need for load-balanced access to a redundantly deployed service.
For a given service inventory architecture you would choose between an enterprise service bus product or an orchestration product, but you would not use both together.
The Protocol Bridging and Data Model Transformation patterns can be applied together to the same message or data exchange.
The application of the Contract Centralization pattern requires that runtime access policies be implemented.
If a service consumer program needs to get data from a service that is not available, it can poll the service by periodically issuing a request message. This type of interaction can be inefficient because it can lead to unnecessary message transmissions. Which of the following statements describes a solution to this problem?
The Event-Driven Messaging pattern can be applied to establish a messaging framework in which service consumers are automatically notified of relevant runtime service events.
The messaging framework established by the application of the Event-Driven Messaging pattern positions a(n) ___________ as being responsible for the broadcast of event notification messages.
event management program
With the Rules Centralization pattern, business rules are:
retrieved and applied at runtime
Which of the following statements about the Schema Centralization pattern does not make sense?
Services in the same service inventory cannot share the same schemas.
Even though atomic service transactions can be used to ensure that all services within the transaction either succeed or fail, in larger transactions involving multiple services, the amount of required memory consumption can ___________.
add up and reduce overall service scalability
The application of the Intermediate Routing pattern relies on the use of service agents. In order for the pattern to be applied properly, these service agents must be active in that they must change data within the message as part of their routing functionality.
The application of the Protocol Bridging pattern automatically results in the application of the Data Model Transformation pattern.
The Service Fa?ade pattern can be used to introduce a logic layer that resides between the ___________ and an underlying ___________.
All of the above.
The application of the Rules Centralization pattern achieves the ___________ of business rules data within an inventory, but it also ___________ business logic associated with business-centric services.
By applying the Service Broker compound pattern, you establish an environment capable of carrying out which of the following patterns?
Data Model Transformation
Data Format Transformation