• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

Wrote the SCEA Beta Exam

 
Ranch Hand
Posts: 35
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Today gave the SCEA Beta exam.

Exam was very lengthy and loose concentration at end of the Exam.

This exam is neither hard nor easy. Some question you must have to needed some real experience.

I got the question
on two tiers and n-tiers Architecture
Conman atrchitecture,
Design pattern- need to read definition and cons/pros,
EJB 3.0, mainly the WebServices with Stateful Stateless, transactions
Question on JPA and JMS-needed handful knowledge
Couple of OOAD questions.
So many questions on JSP And JSF
Good amount of questions on Securities (SQL injection ,Types of Hacking)
Thanks
Karan
 
author and cow tipper
Posts: 5009
1
Hibernate Spring Tomcat Server
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
"Not to hard and not too easy." Sounds like a bear describing its poridge. I do think that is what the test takers were looking for though.

I'd forgotten about SQL Injection, but indeed, there were a few questions on there. The Wiki has a decent overview:


SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is in fact an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another.



Wiki Article on SQL Injection

-Cameron McKenzie
 
Consider Paul's rocket mass heater.
reply
    Bookmark Topic Watch Topic
  • New Topic