Which of the following statements is false?
A. Widespread use of the Messaging Metadata pattern can be seen in the emergence of many WS-* extensions that define industry standard SOAP header blocks that carry metadata.
B. Messaging frameworks and technologies need to provide support for the reading and writing of message headers or properties in order to fully support the application of the Messaging Metadata pattern.
C. The Messaging Metadata pattern is not applicable to situations where the message sender and receiver need to participate in stateful or conversational message exchanges.
D. The Messaging Metadata pattern can support the application of patterns such as Intermediate Routing by supplementing messages with activity-specific metadata.
The use of service agents will affect the design of service compositions as follows:
A. it will tend to increase the number of required services
B. it will tend to decrease the number of required services
C. it will tend to increase the number of required service compositions
D. it will tend to decrease the number of required service compositions
The application of the Intermediate Routing pattern can result in multiple service agents intercepting a message before it arrives at its destination.
A. True
B. False
The application of the Redundant Implementation pattern can help increase service availability by establishing a duplicate deployment of a service in order to provide failover support.
A. True
B. False
In order to realize the failover support provided by the application of the Redundant Implementation pattern, the Intermediate Routing pattern also needs to be applied so that services can be load balanced.
A. True
B. False
A service composition architecture with the following requirements needs to be created:
1.
Services will have different periods of availability.
2.
Sometimes the destination of a message cannot be determined until runtime.
3.
All the services do not support the same messaging protocol. Of the following choices, which patterns should be used to address these requirements?
A. Event-Driven Messaging, Intermediate Routing, Atomic Service Transaction
B. Protocol Bridging, Compensating Service Transaction, Asynchronous Queuing
C. Intermediate Routing, Data Format Transformation, Asynchronous Queuing
D. Protocol Bridging, Intermediate Routing, Asynchronous Queuing
Which of the following statements about the Schema Centralization pattern does not make sense?
A. Up-front analysis effort is required to establish a schema layer independent of and in support of the service layer.
B. Schemas can be designed and implemented independently from the service capabilities that utilize them.
C. Multiple technical service contracts can make reference to a single schema.
D. Services in the same service inventory cannot share the same schemas.
Which of the following is a common problem associated with the application of the Policy Centralization pattern?
A. Changes to a shared policy definition can affect all services that rely upon it, which in turn, can affect all service consumers that have formed dependencies on the corresponding service contracts.
B. Changes to a shared data model can affect all services that rely upon it, which in turn, can affect all service consumers that have formed dependencies on the corresponding service contracts.
C. Changes to a shared database can affect all services that rely upon it, which in turn, can affect all service consumers that have formed dependencies on the corresponding service contracts.
D. None of the above.
The WS-BPEL technology can be used when applying the Compensating Service Transaction pattern.
A. True
B. False
Even though atomic service transactions can be used to ensure that all services within the transaction either succeed or fail, in larger transactions involving multiple services, the amount of required memory consumption can .
A. add up and reduce overall service scalability
B. be minimized through the use of service agents
C. be deferred to a compensating service transaction
D. None of the above.
A service fa?ade component can be used to abstract the part of a service architecture that has negative coupling potential.
A. True
B. False
The Process Abstraction pattern can help solve which of the following problems?
A. When business process logic is physically distributed across independent service implementations, it can be difficult to extend and evolve due to its decentralized nature.
B. The same business rules may exist within different business-centric services, leading to redundancy issues and governance problems due to the challenge of maintaining consistent rule logic within multiple services as rules changes over time.
C. Grouping non-agnostic business logic together with agnostic business logic hinders the governance of the non-agnostic logic and the reuse of the agnostic logic.
D. Bundling both messaging and validation logic into the same service eventually results in the creation of redundant logic across multiple services, thereby causing performance challenges.
When applying the Asynchronous Queuing pattern you aim to establish an environment in which:
A. an intermediate buffer exists between a service and its service consumer
B. temporary message storage is provided in case either the service or service consumer are unavailable
C. periodic re-transmission of a message is supported until it is successfully delivered
D. enforcement of consistent, uninterrupted, synchronous communication between service and service consumer are guaranteed
Which of the following statements regarding the application of the State Repository pattern is false?
A. State data can be temporarily written to and then later retrieved from a dedicated state repository.
B. Caching large amounts of state data in memory negatively impacts scalability.
C. A state repository is not useful for supporting long-running service activities.
D. Database technology is typically used for the implementation of a state repository.
One SOA type can inherit the features and limitations of another SOA type with a broader scope. For example, the environment and conventions established by the service-oriented enterprise architecture can be carried over into individual service inventory architectures.
A. True
B. False