wood burning stoves 2.0*
The moose likes Architect Certification (SCEA/OCMJEA) and the fly likes New mock tests! Big Moose Saloon
  Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies
Register / Login


Win a copy of Murach's Java Servlets and JSP this week in the Servlets forum!
JavaRanch » Java Forums » Certification » Architect Certification (SCEA/OCMJEA)
Bookmark "New mock tests!" Watch "New mock tests!" New topic
Author

New mock tests!

Ian B Anderson
Ranch Hand

Joined: Jun 26, 2001
Posts: 275
Hello,
I have put together a few mock tests and put them on my site.
http://www.ianswebpage.com/cert/
There are 10 different tests in all (2 are still under construction, should be finished by the weekend). In total about 130 different questions. I have written all questions myself and none are copied from other sites (But as they are on the same topics there may be similarities).
Let me know what you think. There will probably be some errors with the questions so email me and I’ll fix it.
My reason for writing these was partly for my own revision but also I wanted to give something back for all the help I received in the Programmer\Developer\Web Developers forums. I haven't yet done the test so I don't know how accurate the questions are with regards to difficulty, maybe some of the people who have already passed could have a look and let me know.
Hope you find them useful
Next week I will add the UML questions I've written and a full 48-question mock.
Ian
PS - My site is like a testing ground for me so there is no other content there, it’s a work in progress!
[ April 12, 2002: Message edited by: Ian B Anderson ]

<a href="http://www.INESystems.com/scbcd/" target="_blank" rel="nofollow">http://www.INESystems.com/scbcd/</a> - SCBCD Exam simulator<br /><a href="http://www.INESystems.com/scbcd/" target="_blank" rel="nofollow">http://www.INESystems.com/scea/</a> - SCEA Exam simulator
Win Yu
Ranch Hand

Joined: Oct 17, 2001
Posts: 224
thanks, but do you have the answers for those question?


Win
Ian B Anderson
Ranch Hand

Joined: Jun 26, 2001
Posts: 275
Yes, When you finish the test there is the text "Grade your answers" click that and it will tell you what you got right and wrong giving the correct answers.
Ian
Win Yu
Ranch Hand

Joined: Oct 17, 2001
Posts: 224
got it
SJ Adnams
Ranch Hand

Joined: Sep 28, 2001
Posts: 925
Ian,
You are more than ready for part I !!!
Live long, drink beer
Ian B Anderson
Ranch Hand

Joined: Jun 26, 2001
Posts: 275
Thanks Simon,
I plan to take part 1 next week, then the week after...
I plan to drink beer!
Ian
Mark Spritzler
ranger
Sheriff

Joined: Feb 05, 2001
Posts: 17249
    
    6

Thanks Ian, I need all the help I can get.
Mark


Perfect World Programming, LLC - Two Laptop Bag - Tube Organizer
How to Ask Questions the Smart Way FAQ
Robin Zhang
Ranch Hand

Joined: Apr 11, 2002
Posts: 139
What is true about the Properties class used for?
(A) Is used to get access to local system resources such as files etc(B) To store information about the program, like an external configuration file.
(B) It can only store Strings.
(C) It can store all types of objects.

why answer is c? I think should be B
Srinivas Velamuri
Greenhorn

Joined: Apr 02, 2001
Posts: 28
Great work, Ian ! I really appreciate your effort. Thanks !


Srinivas
Ian B Anderson
Ranch Hand

Joined: Jun 26, 2001
Posts: 275
Hello,
Thanks for all the comments.
Robin - I thought the Properties class is like the HashTable class, its uses a text key to locate an Object. It can also be read directly from a text file, like a command line parameter. So the answer would be C - It can store all types of objects. (I will improve the wording of the question, was quite late when I wrote it!)
Please correct me if I'm wrong
Ian
Ian B Anderson
Ranch Hand

Joined: Jun 26, 2001
Posts: 275
Hello,
I noticed that there is a spare space on the links page for mock exams, do you think my site could be added?
Ian
Robin Zhang
Ranch Hand

Joined: Apr 11, 2002
Posts: 139
HI , you are right about the properoty class,but API say :
"Because Properties inherits from Hashtable, the put and putAll methods can be applied to a Properties object. Their use is strongly discouraged as they allow the caller to insert entries whose keys or values are not Strings. The setProperty method should be used instead. If the store or save method is called on a "compromised" Properties object that contains a non-String key or value, the call will fail. "

I think that means we often use it to store a string.Am I right?
Ian B Anderson
Ranch Hand

Joined: Jun 26, 2001
Posts: 275
Hello Robin,
I will re-word the question to the following:
What is true about the Properties class?
(A) Is used to get access to local system resources such as files etc.
(B) To store information about the program, like an external configuration file.
(C) It should only be used to store Strings.
(D) It should be used to store all types of objects.
So the answer would be C.
I can't change it till I get home, I don't have access from work.
Thanks
Ian
Ian B Anderson
Ranch Hand

Joined: Jun 26, 2001
Posts: 275
Hello,
Just to let anyone who�s interested know I've uploaded the Mock questions for EJB lifecycle and JMS.
Enjoy
Ian
http://www.ianswebpage.com/cert/
Robin Zhang
Ranch Hand

Joined: Apr 11, 2002
Posts: 139
5) ID - SE005
What is Asymmetric Encryption?
(A) The same key is used to encrypt data and decrypt data.
(B) A private key is used to encrypt data and a public key is used to decrypt data.
(C) A public key is used to encrypt data and a private key is used to decrypt data.
why the answer is C? I think B is also correct.
Robin Zhang
Ranch Hand

Joined: Apr 11, 2002
Posts: 139
5) ID - JM005
JMS provides a full implementation of classes for Messaging.

(A) TRUE
(B) FALSE
why the answer is false?
Ian B Anderson
Ranch Hand

Joined: Jun 26, 2001
Posts: 275
Hello Robin,
Question ID - SE005
The answer is B not C. I've checked on the site and it comes up as B. When encrypting your data you use your private key and when decrypting it your public key will be used.
Question ID - JM005
The JMS pacakge defines a set of interfaces there are no implementation details that is why the answer is false.
Ian
Alberto Dell'Era
Greenhorn

Joined: Mar 02, 2002
Posts: 29
Great work! The best on the net AFAIK!


Ciao,<br />Alberto
Robin Zhang
Ranch Hand

Joined: Apr 11, 2002
Posts: 139
pleae look at the following link: http://www.stormpages.com/jnagal/concepts.html
----------------------------------------------
What is the difference between public-key encryption (asymmetric) and private-key (symmetric) encryption?
Public-key encryption makes use of a pair of public and private keys. The public key is used to encrypt data and the private key is used to decrypt it. In private-key encryption the encryption and decryption keys are usually the same. Both keys must be kept secret to maintain the security of encrypted information.
---------------------------------------------
Ian B Anderson
Ranch Hand

Joined: Jun 26, 2001
Posts: 275
Hello Robin,
I've updated the answer to (C) A public key is used to encrypt data and a private key is used to decrypt data.
I had it stuck in my head that it was the other way round!
Thanks
Ian
Alberto Dell'Era
Greenhorn

Joined: Mar 02, 2002
Posts: 29
Originally posted by Robin Zhang:
5) ID - SE005
What is Asymmetric Encryption?
(A) The same key is used to encrypt data and decrypt data.
(B) A private key is used to encrypt data and a public key is used to decrypt data.
(C) A public key is used to encrypt data and a private key is used to decrypt data.
why the answer is C? I think B is also correct.

Your public key is supposed to be known by everyone in the world, while the private key is supposed to be known only by you. So,if you want to send a confidential message to someone, you have to encrypt the message using *his/her* public key, and only S/he, knowing the corresponding private key, will be able to decrypt it. If you use *your* private key, the whole world will be able to decrypt the message, since all the people in the world (are supposed to) know your public key ... so (C) is the answer.
You use your private key to *sign* a message, not to encrypt it, if by "encryption" you mean "turn the message into a form which is unreadable by everyone but the person you are sending it to", which is the strict definition of the word ("readable by friends and unreadable by enemies"). I think that this is the intended meaning of the word, here.
[ April 14, 2002: Message edited by: Alberto Dell'era ]
[ April 14, 2002: Message edited by: Alberto Dell'era ]
[ April 14, 2002: Message edited by: Alberto Dell'era ]
[ April 14, 2002: Message edited by: Alberto Dell'era ]
Robin Zhang
Ranch Hand

Joined: Apr 11, 2002
Posts: 139
thanks Alberto Dell'era. But in some case, we can use private to encryption and use public to decryption,exp, in digital signature.
[ April 14, 2002: Message edited by: Robin Zhang ]
Alberto Dell'Era
Greenhorn

Joined: Mar 02, 2002
Posts: 29
Originally posted by Robin Zhang:
thanks Alberto Dell'era. But in same case, we can use private to encryption ans use public to decryption,exp, in digital signature.

You're correct, if by "encryption" you mean transforming the message in a "crypted" form that can only be decrypted if you know the other key; that is, in fact, the meaning of the word "encryption" used by the mathematicians who study cryptography. Moreover, normally the PK mathematical algorithms speak about a "key pair", and don't distinguish between public and private; both keys have exactly the same power, that is, to be able to encode ("encrypt") a message that can be decoded ("decrypted") only by the other key. So, you can choose any of the two keys as your private and the other as the public.
In the question we are speaking about, I think the meaning of "encryption" was "unreadable by enemies (hackers)", as I said in the previous post.
Another way to say the same thing: if you use the public key (of the recipient), you get Confidentiality (only who knows the private key can read it, and the recipient is the only one that knows the private key) but no Integrity (anyone can substitute your message with another, since S/he knows the public key); if you use the private key (your one, not the one of the recipient, which you don't know anyway), you get no Confidentiality (anyone can use the public key to decode it), even if you get Integrity (no one can forge another message that can be decoded by your public key, since S/he has not your private key).
Moreover, if by using your public key the message decodes succesfully, it means that the message was encoded using the corresponding private key, and so by you, the only one that knows your private key. So, the recipient is sure that you was the sender, and you can't deny it (the latter is called "Non-Repudiability"). It's exactly like a signature, only better because it's much more difficult to break an algorithm than to forge a signature written on paper.
If you need Confidentiality, Integrity, and Signatures, the solution is simple: first encode using your private key, then pick the encoded message and encode it again using the recipient public key (the order does not matter).
Difficult but fascinating stuff. Hard at the beginning, but then simple, once you have understood it.
[ April 14, 2002: Message edited by: Alberto Dell'era ]
[ April 14, 2002: Message edited by: Alberto Dell'era ]
Srini Admala
Ranch Hand

Joined: Dec 04, 2001
Posts: 50
Great job !
Thanks for all the mock tests. we can use them all.
Regarding question :
ID - AP010
You should use EJBs even if there is NO data to persist in your application but there are transactions. Answer is TRUE.
Unless we assume all other services offered by EJB container are required, I think the answer should be FALSE. Why use EJB's at all ? You can use JTA and a simple Web container to support transactions.
-Srini
Robin Zhang
Ranch Hand

Joined: Apr 11, 2002
Posts: 139
hi Alberto, I think you are the expert in this field. Hope you could explain more topics here.
Glenn Opdycke-Hansen
Ranch Hand

Joined: Feb 16, 2001
Posts: 40
Very nice mock exam. I did see a typo in the following answer to EJB question 24:
(C) It is less more flexible than BMT. Cannot handle transactions at a finer granularity than BMT.
You probably meant to strike the word "more".


--glenn
Glenn Opdycke-Hansen
Ranch Hand

Joined: Feb 16, 2001
Posts: 40
For question EJ015, I was confused by the wording of the question:
You have a method that must be executing in a transaction. What is the correct attribute in the deployment descriptor?
Did you mean "must be executing in an existing transaction"?
Ian B Anderson
Ranch Hand

Joined: Jun 26, 2001
Posts: 275
Hello Srini and Glenn,
Srini I will try and improve the wording of the question.
Glenn thanks for pointing the typos out, I wrote so many it seems I made a few errors! The answer to the second question is (D) Mandatory I will improve the wording of the question.
I'm at work now so I will make the changes tonight.
Hope the mocks are useful
Ian
 
jQuery in Action, 2nd edition
 
subject: New mock tests!
 
Similar Threads
UML questions
my experience in passing part I with 100%
Resource page
What happened to the search feature?
Passed, my thoughts...