Deck 4: Advanced SOA Design & Architecture (S90-08A)

Full screen (f)
exit full mode
Question
The queue established by applying the Asynchronous Queuing pattern enables service consumer and service to revert to a stateless condition before a data exchange has fully completed.
Use Space or
up arrow
down arrow
to flip the card.
Question
The Protocol Bridging and Data Model Transformation patterns can be applied together to the same message or data exchange.
Question
If a service consumer program needs to get data from a service that is not available, it can poll the service by periodically issuing a request message. This type of interaction can be inefficient because it can lead to unnecessary message transmissions. Which of the following statements describes a solution to this problem?

A) By applying the Messaging Metadata pattern, the service consumer can write a request identifier in the message header. Service agents then intercept the request messages and do not forward those that contain a previously detected identifier. This practice eliminates the delivery of the duplicate messages to the service.
B) The Event-Driven Messaging pattern can be applied to establish a messaging framework in which service consumers are automatically notified of relevant runtime service events.
C) By applying the Atomic Service Transaction pattern, a service can be designed to invoke an alternative exception handling process when it is unavailable to receive a given message.
D) None of these statements describe solutions that directly solve this problem.
Question
Which of the following statements are false?

A) Using the Reliable Messaging pattern can improve the quality of messaging-based communication.
B) The Reliable Messaging pattern is applied to databases, not services.
C) The Reliable Messaging pattern is one of the patterns that can be associated with the Enterprise Service Bus compound pattern.
D) The Reliable Messaging pattern is always applied together with the Atomic Service Transaction pattern.
Question
Based on the publisher and subscriber roles established by the application of the Event-Driven Messaging pattern, which of the following statements are true?

A) a service, acting as a publisher, issues event notification messages to an event management program that is responsible for broadcasting the messages
B) a service consumer, acting as a subscriber, can selectively subscribe to specific events
C) an intermediate event management program enters the role of subscriber when accepting event subscriptions
D) upon receiving a message associated with an event that a service consumer subscribed to, the service consumer enters the publisher role
Question
The Protocol Bridging pattern addresses problems that occur when services using different transport protocols or different versions of the same transport protocol try to communicate.
Question
The application of the Protocol Bridging pattern automatically results in the application of the Data Model Transformation pattern.
Question
Which of the following statements about the subscriber role established by the application of the Event-Driven Messaging pattern is true?

A) a service can have multiple consumers as subscribers
B) a consumer can only subscribe to one service
C) a service can only have one consumer as a subscriber
D) All of these statements are true.
Question
The messaging framework established by the application of the Event-Driven Messaging pattern positions a(n) ___________ as being responsible for the broadcast of event notification messages.

A) event management program
B) synchronous queue
C) event-driven Web service
D) database
Question
The application of the Protocol Bridging pattern helps overcome disparity between:

A) transport protocols
B) messaging protocols
C) transaction protocols
D) policy protocols
Question
The Reliable Messaging pattern requires:

A) the use of standardized service contracts in order to enable message atomic transaction details to be carried in the message header
B) a framework for temporarily persisting messages and issuing acknowledgements
C) the application of the Official Endpoint pattern in order to enable acknowledgement features
D) a framework capable of bridging disparate messaging protocols in order to exchange schemas between compatible services
Question
Protocol bridging features are a common part of enterprise service bus products and can be provided through the use of adapters.
Question
Which of the following does not make sense when considering the contents of a technical service contract for a SOAP-based Web service?

A) The Schema Centralization pattern supports the creation of independent data models that define data transmitted in SOAP messages.
B) The Decoupled Contract pattern results in the separation of the service contract from the service implementation, allowing the service contract to be independently designed and governed.
C) The application of the Policy Centralization pattern eliminates redundancy and inconsistency by creating a single, master policy bound to the WSDL definition of every service in a service inventory.
D) The Legacy Wrapper pattern can be used to expose a legacy system as a SOAP-based Web service with a standardized technical service contract.
Question
Two services need to exchange a business document that exists as an XML document. Each service's contract uses a different XML schema to represent the business document structure. This results in two different XML representations for the same business data. Which of the following patterns can be used to enable the exchange of the business document between these two services?

A) Data Format Transformation
B) Protocol Bridging
C) Atomic Service Transaction
D) Data Model Transformation
Question
Assuming the Reliable Messaging pattern is successfully applied, which of the following statements is correct?

A) A service agent intercepts and stores a message from the service consumer. The service agent then returns an acknowledgement back to the service consumer. Next, the service agent forwards the message to the service and when it receives an acknowledgement back from the service, it deletes the message.
B) A service agent intercepts and stores a message from the service consumer. The service agent then forwards the message to the service. Next, the service agent receives an acknowledgement from the service, which it returns to the service consumer. Finally, the service agent deletes the message and related acknowledgements.
C) The service consumer stores the message and forwards it to a service agent, which issues an acknowledgement back to the service consumer. The service agent then forwards the message to the service and when it receives an acknowledgement from the service, the service agent informs the service consumer so that it can delete the message and the acknowledgement.
D) None of the above.
Question
A common XML-based technology used to apply the Data Model Transformation pattern is:

A) XHTML
B) WS-Policy
C) WSDL
D) None of the above.
Question
The application of the Intermediate Routing pattern relies on the use of service agents. In order for the pattern to be applied properly, these service agents must be active in that they must change data within the message as part of their routing functionality.
Question
In the message exchange framework established by the application of the Reliable Messaging pattern, what roles are typically fulfilled by service agents?

A) service agents can process positive acknowledgements
B) service agents can process negative acknowledgements
C) service agents can load balance messages
D) service agents can route messages based on their content
Question
Which of the following statements is false?

A) When applying the Data Format Transformation pattern, data format transformation logic can be the responsibility of a service façade component that is tasked with converting between proprietary and standardized data formats.
B) The Data Format Transformation pattern is applied in situations where there is a need to convert data between disparate XML schemas.
C) Some transport protocols can be associated with specific data formats, in which case it makes sense to apply the Data Format Transformation pattern together with the Protocol Bridging pattern.
D) The Data Format Transformation pattern is one of the patterns that comprise the Service Broker pattern.
Question
Because the Service Broker pattern is part of the Enterprise Service Bus pattern, the Schema Centralization pattern is also considered part of the Enterprise Service Bus pattern.
Question
The Process Centralization pattern is a part of which compound pattern?

A) Enterprise Service Bus
B) Orchestration
C) Federated Endpoint layer
D) Official Endpoint layer
Question
A service composition architecture with the following requirements needs to be created: 1. Services will have different periods of availability. 2. Sometimes the destination of a message cannot be determined until runtime. 3. All the services do not support the same messaging protocol. Of the following choices, which patterns should be used to address these requirements?

A) Event-Driven Messaging, Intermediate Routing, Atomic Service Transaction
B) Protocol Bridging, Compensating Service Transaction, Asynchronous Queuing
C) Intermediate Routing, Data Format Transformation, Asynchronous Queuing
D) Protocol Bridging, Intermediate Routing, Asynchronous Queuing
Question
When applying the Process Abstraction and Process Centralization patterns together, non-agnostic business process logic is:

A) located in one place and separated from agnostic logic
B) distributed across multiple locations and separated from agnostic logic
C) located in one place and combined with agnostic logic
D) distributed across multiple locations and combined with agnostic logic
Question
Which pattern can be applied together with the Intermediate Routing pattern to facilitate a service agent needing to perform runtime message routing based on business rules?

A) Redundant Implementation
B) Compensating Service Transaction
C) Rules Centralization
D) Service Data Replication
Question
Which of the following statements accurately describes the difference between the Atomic Service Transaction pattern and the Compensating Service Transaction pattern?

A) The Atomic Service Transaction pattern is more suitable in situations that require real-time activity processing, whereas the Compensating Service Transaction pattern is more suitable for long-running activity processing.
B) The Atomic Service Transaction pattern provides support for the rollback of changes, whereas the Compensating Service Transaction pattern does not.
C) The Atomic Service Transaction pattern does not rely on pre-defined alternative exception handling logic, whereas the Compensating Service Transaction pattern does.
D) All of the above.
Question
Which of the following statements is true?

A) The Legacy Wrapper pattern should not be applied in conjunction with the Process Centralization pattern because legacy systems do not possess enough autonomy to be effectively composed.
B) The Messaging Metadata pattern can be applied to supplement messages with metadata that can be used for tracking purposes when also applying the Reliable Messaging pattern.
C) The Protocol Bridging pattern is often used with the Legacy Wrapper pattern as a means of performing data model transformation between service inventory-wide data models created through the application of the Schema Centralization pattern and the underlying proprietary legacy format.
D) All of these statements are true.
Question
Which of the following is a common problem associated with the application of the Policy Centralization pattern?

A) Changes to a shared policy definition can affect all services that rely upon it, which in turn, can affect all service consumers that have formed dependencies on the corresponding service contracts.
B) Changes to a shared data model can affect all services that rely upon it, which in turn, can affect all service consumers that have formed dependencies on the corresponding service contracts.
C) Changes to a shared database can affect all services that rely upon it, which in turn, can affect all service consumers that have formed dependencies on the corresponding service contracts.
D) None of the above.
Question
Which of the following statements is true?

A) Enterprise service bus products commonly provide data model transformation features.
B) Orchestration products commonly provide data model transformation features.
C) The Service Broker compound pattern includes the Data Model Transformation pattern.
D) All of these statements are true.
Question
Assuming you have technical service contracts for SOAP-based Web services, you can apply the ___________ pattern through the use of ___________.

A) Schema Centralization, XML schemas
B) Message Metadata, SOAP message headers
C) Decoupled Contract, WSDL definitions
D) Policy Centralization, WS-Policy definitions
Question
The Invoice service in an accounting firm is heavily reused by different service compositions. The owners of the service decide to protect its integrity by disallowing access to any part of its underlying implementation and further want to avoid the risk of having this service create a single point of failure. Which two patterns should they apply in order to accomplish this goal?

A) Contract Centralization, Decoupled Contract
B) Domain Inventory, Redundant Implementation
C) Data Model Transformation, Service Data Replication
D) Contract Centralization, Redundant Implementation
Question
Which of the following statements about the Schema Centralization pattern does not make sense?

A) Up-front analysis effort is required to establish a schema layer independent of and in support of the service layer.
B) Schemas can be designed and implemented independently from the service capabilities that utilize them.
C) Multiple technical service contracts can make reference to a single schema.
D) Services in the same service inventory cannot share the same schemas.
Question
Technical service contracts that use the same XML schemas will support the exchange of messages based on the same data models.
Question
In order to realize the failover support provided by the application of the Redundant Implementation pattern, the Intermediate Routing pattern also needs to be applied so that services can be load balanced.
Question
Which of the following statements about the application of the Policy Centralization pattern is true?

A) Service agents can check for policy compliance at runtime.
B) A policy framework that supports both the definition of policies and their consistent runtime enforcement is essential to meeting the goals of the Policy Centralization pattern.
C) Enterprise service bus products sometimes use proprietary policy formats which can lead to vendor lock-in and incompatibilities with other enterprise service bus products.
D) All of these statements are true.
Question
When applying the Schema Centralization pattern, multiple services can form dependencies on the same centralized schema.
Question
The Process Centralization pattern:

A) physically centralizes business process logic into a single location
B) logically centralizes business process logic into a separate service layer
C) physically centralizes task services into an enterprise service bus
D) logically centralizes task services into an enterprise service bus
Question
The Asynchronous Queuing pattern can be combined with the Event-Driven Messaging pattern to allow a service consumer acting as a subscriber to receive all event notification messages that are broadcast, even those that are sent when the service consumer is unavailable.
Question
The Process Centralization pattern is most commonly associated with which service model?

A) utility service
B) entity service
C) task service
D) hybrid service
Question
Which of the following statements is true?

A) The Enterprise Service Bus pattern is primarily concerned with message processing logic, while the Orchestration pattern is primarily concerned with service composition logic.
B) The Enterprise Service Bus pattern is primarily concerned with synchronous messaging logic, while the Orchestration pattern is primarily concerned with asynchronous messaging logic.
C) The Enterprise Service Bus pattern is primarily concerned with service composition logic, while the Orchestration pattern is primarily concerned with message processing logic.
D) None of these statements are true.
Question
Which of the following statements are false?

A) The application of the Policy Centralization pattern decreases the governance burden required to ensure that common policies are kept synchronized over time.
B) The application of the Policy Centralization pattern increases the amount of policy content in the service inventory.
C) The application of the Policy Centralization pattern combines global and domain-specific policies into a single location. As a result, the distinction between a global and domain policy is eliminated.
D) The application of the Policy Centralization pattern requires that policies only be expressed with the WS-Policy standard.
Question
The application of the Redundant Implementation pattern helps increase the autonomy of:

A) redundantly deployed services
B) service agents that perform load-balanced access to services that are not redundantly deployed
C) compositions that compose redundantly deployed services
D) core service logic contained within services that do not rely on the redundantly deployed service
Question
Which pattern aims to increase the autonomy of a service specifically via the use of a replicated database?

A) Redundant Implementation
B) Stateful Services
C) State Repository
D) None of the above.
Question
Because the Process Abstraction pattern advocates the abstraction of ___________ logic, its application helps filter out ___________ logic in support of defining ___________ services.

A) agnostic, atomic, agnostic
B) non-agnostic, business, agnostic
C) non-agnostic, agnostic, agnostic
D) agnostic, rules-related, non-agnostic
Question
The Service Façade pattern is often applied in order to separate the ___________ from the underlying service implementation so that they can evolve independently.

A) service agent
B) service contract
C) service activity
D) None of the above.
Question
Which of the following statements is true?

A) Although the Logic Centralization pattern addresses the question of how to avoid redundant service logic, it does not address how the logic should be accessed.
B) The Contract Centralization pattern specifies how to access a service through its published contract, but it does not indicate which services should be accessed for specific purposes.
C) When the Logic Centralization and Contract Centralization patterns are applied together, they realize the Official Endpoint pattern because they effectively establish an official endpoint for a service.
D) All of these statements are true.
Question
By applying the Service Broker compound pattern, you establish an environment capable of carrying out which of the following patterns?

A) Data Model Transformation
B) Data Format Transformation
C) Transaction Protocol Transformation
D) Policy Transformation
Question
The Service Façade pattern can be used to introduce a logic layer that resides between the ___________ and an underlying ___________.

A) core service logic, database
B) core service logic, resource
C) core service logic, legacy system
D) All of the above.
Question
The application of which pattern can address inconsistent service behavior exhibited when a service is required to access a shared database with inconsistent performance?

A) Stateful Services
B) Atomic Service Transaction
C) Service Data Replication
D) Asynchronous Queuing
Question
A service façade component can be used to abstract the part of a service architecture that has negative coupling potential.
Question
When applying the Policy Centralization pattern, if you create a global policy that conflicts with a service-specific policy that you already had in place, then:

A) you did not correctly apply the Policy Centralization pattern, because it guarantees policy conflict resolution
B) you need to apply the Intermediate Routing pattern in order to allow messages to avoid one or the other policy
C) you need to apply the Decoupled Contract pattern in order to separate the conflicting policy definitions
D) None of the above.
Question
Service logic can be deployed in isolation to ___________ autonomy, but services can still ___________ autonomy when they are required to access shared data sources.

A) increase, gain
B) decrease, gain
C) increase, lose
D) decrease, lose
Question
Which of the following statements are true?

A) The Redundant Implementation pattern is most useful for services that possess non-agnostic service logic.
B) The Redundant Implementation pattern is concerned with eliminating single point of failure problems associated with services that are actively reused.
C) The Redundant Implementation pattern can be supplemented with the Intermediate Routing pattern, which can be applied to load balance access to a redundantly deployed service.
D) The Redundant Implementation pattern addresses issues of scalability, not issues of availability.
Question
Which of the following represent common types of logic that can be placed within a service façade component?

A) Behavior correction logic used to compensate for changes in the behavior of the core service logic.
B) Protocol bridging logic that dynamically converts from one transport protocol to another at runtime.
C) Relaying logic that simply relays input and output messages to and from the core service logic.
D) Transformation logic that performs runtime data model or data format conversion.
Question
For a given service inventory architecture you would choose between an enterprise service bus product or an orchestration product, but you would not use both together.
Question
Which of the following statements are true?

A) The application of the Rules Centralization pattern centralizes the governance of business rules so that they can be modified and evolved from a single location.
B) The application of the Rules Centralization pattern reduces redundancy by centralizing common business rules-related logic that would normally be distributed across multiple services.
C) The application of the Rules Centralization pattern results in centralized business rules that can be applied at runtime.
D) The application of the Rules Centralization pattern can lead to a decrease in autonomy because it can introduce the need for an additional service to be part of service compositions.
Question
The application of the Redundant Implementation pattern can help increase service availability by establishing a duplicate deployment of a service in order to provide failover support.
Question
The Process Abstraction pattern can help solve which of the following problems?

A) When business process logic is physically distributed across independent service implementations, it can be difficult to extend and evolve due to its decentralized nature.
B) The same business rules may exist within different business-centric services, leading to redundancy issues and governance problems due to the challenge of maintaining consistent rule logic within multiple services as rules changes over time.
C) Grouping non-agnostic business logic together with agnostic business logic hinders the governance of the non-agnostic logic and the reuse of the agnostic logic.
D) Bundling both messaging and validation logic into the same service eventually results in the creation of redundant logic across multiple services, thereby causing performance challenges.
Question
Official Endpoint is a compound pattern that is comprised of the Logic Centralization pattern and the Contract Centralization pattern.
Question
The application of the Rules Centralization pattern achieves the ___________ of business rules data within an inventory, but it also ___________ business logic associated with business-centric services.

A) centralization, centralizes
B) decentralization, centralizes
C) decentralization, decentralizes
D) centralization, decentralizes
Question
The service model most associated with the Process Abstraction and Orchestration patterns in general is:

A) entity service
B) utility service
C) wrapper service
D) None of the above.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/60
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Advanced SOA Design & Architecture (S90-08A)
1
The queue established by applying the Asynchronous Queuing pattern enables service consumer and service to revert to a stateless condition before a data exchange has fully completed.
True
2
The Protocol Bridging and Data Model Transformation patterns can be applied together to the same message or data exchange.
True
3
If a service consumer program needs to get data from a service that is not available, it can poll the service by periodically issuing a request message. This type of interaction can be inefficient because it can lead to unnecessary message transmissions. Which of the following statements describes a solution to this problem?

A) By applying the Messaging Metadata pattern, the service consumer can write a request identifier in the message header. Service agents then intercept the request messages and do not forward those that contain a previously detected identifier. This practice eliminates the delivery of the duplicate messages to the service.
B) The Event-Driven Messaging pattern can be applied to establish a messaging framework in which service consumers are automatically notified of relevant runtime service events.
C) By applying the Atomic Service Transaction pattern, a service can be designed to invoke an alternative exception handling process when it is unavailable to receive a given message.
D) None of these statements describe solutions that directly solve this problem.
B
4
Which of the following statements are false?

A) Using the Reliable Messaging pattern can improve the quality of messaging-based communication.
B) The Reliable Messaging pattern is applied to databases, not services.
C) The Reliable Messaging pattern is one of the patterns that can be associated with the Enterprise Service Bus compound pattern.
D) The Reliable Messaging pattern is always applied together with the Atomic Service Transaction pattern.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
5
Based on the publisher and subscriber roles established by the application of the Event-Driven Messaging pattern, which of the following statements are true?

A) a service, acting as a publisher, issues event notification messages to an event management program that is responsible for broadcasting the messages
B) a service consumer, acting as a subscriber, can selectively subscribe to specific events
C) an intermediate event management program enters the role of subscriber when accepting event subscriptions
D) upon receiving a message associated with an event that a service consumer subscribed to, the service consumer enters the publisher role
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
6
The Protocol Bridging pattern addresses problems that occur when services using different transport protocols or different versions of the same transport protocol try to communicate.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
7
The application of the Protocol Bridging pattern automatically results in the application of the Data Model Transformation pattern.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following statements about the subscriber role established by the application of the Event-Driven Messaging pattern is true?

A) a service can have multiple consumers as subscribers
B) a consumer can only subscribe to one service
C) a service can only have one consumer as a subscriber
D) All of these statements are true.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
9
The messaging framework established by the application of the Event-Driven Messaging pattern positions a(n) ___________ as being responsible for the broadcast of event notification messages.

A) event management program
B) synchronous queue
C) event-driven Web service
D) database
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
10
The application of the Protocol Bridging pattern helps overcome disparity between:

A) transport protocols
B) messaging protocols
C) transaction protocols
D) policy protocols
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
11
The Reliable Messaging pattern requires:

A) the use of standardized service contracts in order to enable message atomic transaction details to be carried in the message header
B) a framework for temporarily persisting messages and issuing acknowledgements
C) the application of the Official Endpoint pattern in order to enable acknowledgement features
D) a framework capable of bridging disparate messaging protocols in order to exchange schemas between compatible services
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
12
Protocol bridging features are a common part of enterprise service bus products and can be provided through the use of adapters.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following does not make sense when considering the contents of a technical service contract for a SOAP-based Web service?

A) The Schema Centralization pattern supports the creation of independent data models that define data transmitted in SOAP messages.
B) The Decoupled Contract pattern results in the separation of the service contract from the service implementation, allowing the service contract to be independently designed and governed.
C) The application of the Policy Centralization pattern eliminates redundancy and inconsistency by creating a single, master policy bound to the WSDL definition of every service in a service inventory.
D) The Legacy Wrapper pattern can be used to expose a legacy system as a SOAP-based Web service with a standardized technical service contract.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
14
Two services need to exchange a business document that exists as an XML document. Each service's contract uses a different XML schema to represent the business document structure. This results in two different XML representations for the same business data. Which of the following patterns can be used to enable the exchange of the business document between these two services?

A) Data Format Transformation
B) Protocol Bridging
C) Atomic Service Transaction
D) Data Model Transformation
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
15
Assuming the Reliable Messaging pattern is successfully applied, which of the following statements is correct?

A) A service agent intercepts and stores a message from the service consumer. The service agent then returns an acknowledgement back to the service consumer. Next, the service agent forwards the message to the service and when it receives an acknowledgement back from the service, it deletes the message.
B) A service agent intercepts and stores a message from the service consumer. The service agent then forwards the message to the service. Next, the service agent receives an acknowledgement from the service, which it returns to the service consumer. Finally, the service agent deletes the message and related acknowledgements.
C) The service consumer stores the message and forwards it to a service agent, which issues an acknowledgement back to the service consumer. The service agent then forwards the message to the service and when it receives an acknowledgement from the service, the service agent informs the service consumer so that it can delete the message and the acknowledgement.
D) None of the above.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
16
A common XML-based technology used to apply the Data Model Transformation pattern is:

A) XHTML
B) WS-Policy
C) WSDL
D) None of the above.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
17
The application of the Intermediate Routing pattern relies on the use of service agents. In order for the pattern to be applied properly, these service agents must be active in that they must change data within the message as part of their routing functionality.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
18
In the message exchange framework established by the application of the Reliable Messaging pattern, what roles are typically fulfilled by service agents?

A) service agents can process positive acknowledgements
B) service agents can process negative acknowledgements
C) service agents can load balance messages
D) service agents can route messages based on their content
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following statements is false?

A) When applying the Data Format Transformation pattern, data format transformation logic can be the responsibility of a service façade component that is tasked with converting between proprietary and standardized data formats.
B) The Data Format Transformation pattern is applied in situations where there is a need to convert data between disparate XML schemas.
C) Some transport protocols can be associated with specific data formats, in which case it makes sense to apply the Data Format Transformation pattern together with the Protocol Bridging pattern.
D) The Data Format Transformation pattern is one of the patterns that comprise the Service Broker pattern.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
20
Because the Service Broker pattern is part of the Enterprise Service Bus pattern, the Schema Centralization pattern is also considered part of the Enterprise Service Bus pattern.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
21
The Process Centralization pattern is a part of which compound pattern?

A) Enterprise Service Bus
B) Orchestration
C) Federated Endpoint layer
D) Official Endpoint layer
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
22
A service composition architecture with the following requirements needs to be created: 1. Services will have different periods of availability. 2. Sometimes the destination of a message cannot be determined until runtime. 3. All the services do not support the same messaging protocol. Of the following choices, which patterns should be used to address these requirements?

A) Event-Driven Messaging, Intermediate Routing, Atomic Service Transaction
B) Protocol Bridging, Compensating Service Transaction, Asynchronous Queuing
C) Intermediate Routing, Data Format Transformation, Asynchronous Queuing
D) Protocol Bridging, Intermediate Routing, Asynchronous Queuing
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
23
When applying the Process Abstraction and Process Centralization patterns together, non-agnostic business process logic is:

A) located in one place and separated from agnostic logic
B) distributed across multiple locations and separated from agnostic logic
C) located in one place and combined with agnostic logic
D) distributed across multiple locations and combined with agnostic logic
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
24
Which pattern can be applied together with the Intermediate Routing pattern to facilitate a service agent needing to perform runtime message routing based on business rules?

A) Redundant Implementation
B) Compensating Service Transaction
C) Rules Centralization
D) Service Data Replication
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following statements accurately describes the difference between the Atomic Service Transaction pattern and the Compensating Service Transaction pattern?

A) The Atomic Service Transaction pattern is more suitable in situations that require real-time activity processing, whereas the Compensating Service Transaction pattern is more suitable for long-running activity processing.
B) The Atomic Service Transaction pattern provides support for the rollback of changes, whereas the Compensating Service Transaction pattern does not.
C) The Atomic Service Transaction pattern does not rely on pre-defined alternative exception handling logic, whereas the Compensating Service Transaction pattern does.
D) All of the above.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following statements is true?

A) The Legacy Wrapper pattern should not be applied in conjunction with the Process Centralization pattern because legacy systems do not possess enough autonomy to be effectively composed.
B) The Messaging Metadata pattern can be applied to supplement messages with metadata that can be used for tracking purposes when also applying the Reliable Messaging pattern.
C) The Protocol Bridging pattern is often used with the Legacy Wrapper pattern as a means of performing data model transformation between service inventory-wide data models created through the application of the Schema Centralization pattern and the underlying proprietary legacy format.
D) All of these statements are true.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is a common problem associated with the application of the Policy Centralization pattern?

A) Changes to a shared policy definition can affect all services that rely upon it, which in turn, can affect all service consumers that have formed dependencies on the corresponding service contracts.
B) Changes to a shared data model can affect all services that rely upon it, which in turn, can affect all service consumers that have formed dependencies on the corresponding service contracts.
C) Changes to a shared database can affect all services that rely upon it, which in turn, can affect all service consumers that have formed dependencies on the corresponding service contracts.
D) None of the above.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following statements is true?

A) Enterprise service bus products commonly provide data model transformation features.
B) Orchestration products commonly provide data model transformation features.
C) The Service Broker compound pattern includes the Data Model Transformation pattern.
D) All of these statements are true.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
29
Assuming you have technical service contracts for SOAP-based Web services, you can apply the ___________ pattern through the use of ___________.

A) Schema Centralization, XML schemas
B) Message Metadata, SOAP message headers
C) Decoupled Contract, WSDL definitions
D) Policy Centralization, WS-Policy definitions
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
30
The Invoice service in an accounting firm is heavily reused by different service compositions. The owners of the service decide to protect its integrity by disallowing access to any part of its underlying implementation and further want to avoid the risk of having this service create a single point of failure. Which two patterns should they apply in order to accomplish this goal?

A) Contract Centralization, Decoupled Contract
B) Domain Inventory, Redundant Implementation
C) Data Model Transformation, Service Data Replication
D) Contract Centralization, Redundant Implementation
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following statements about the Schema Centralization pattern does not make sense?

A) Up-front analysis effort is required to establish a schema layer independent of and in support of the service layer.
B) Schemas can be designed and implemented independently from the service capabilities that utilize them.
C) Multiple technical service contracts can make reference to a single schema.
D) Services in the same service inventory cannot share the same schemas.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
32
Technical service contracts that use the same XML schemas will support the exchange of messages based on the same data models.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
33
In order to realize the failover support provided by the application of the Redundant Implementation pattern, the Intermediate Routing pattern also needs to be applied so that services can be load balanced.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following statements about the application of the Policy Centralization pattern is true?

A) Service agents can check for policy compliance at runtime.
B) A policy framework that supports both the definition of policies and their consistent runtime enforcement is essential to meeting the goals of the Policy Centralization pattern.
C) Enterprise service bus products sometimes use proprietary policy formats which can lead to vendor lock-in and incompatibilities with other enterprise service bus products.
D) All of these statements are true.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
35
When applying the Schema Centralization pattern, multiple services can form dependencies on the same centralized schema.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
36
The Process Centralization pattern:

A) physically centralizes business process logic into a single location
B) logically centralizes business process logic into a separate service layer
C) physically centralizes task services into an enterprise service bus
D) logically centralizes task services into an enterprise service bus
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
37
The Asynchronous Queuing pattern can be combined with the Event-Driven Messaging pattern to allow a service consumer acting as a subscriber to receive all event notification messages that are broadcast, even those that are sent when the service consumer is unavailable.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
38
The Process Centralization pattern is most commonly associated with which service model?

A) utility service
B) entity service
C) task service
D) hybrid service
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following statements is true?

A) The Enterprise Service Bus pattern is primarily concerned with message processing logic, while the Orchestration pattern is primarily concerned with service composition logic.
B) The Enterprise Service Bus pattern is primarily concerned with synchronous messaging logic, while the Orchestration pattern is primarily concerned with asynchronous messaging logic.
C) The Enterprise Service Bus pattern is primarily concerned with service composition logic, while the Orchestration pattern is primarily concerned with message processing logic.
D) None of these statements are true.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following statements are false?

A) The application of the Policy Centralization pattern decreases the governance burden required to ensure that common policies are kept synchronized over time.
B) The application of the Policy Centralization pattern increases the amount of policy content in the service inventory.
C) The application of the Policy Centralization pattern combines global and domain-specific policies into a single location. As a result, the distinction between a global and domain policy is eliminated.
D) The application of the Policy Centralization pattern requires that policies only be expressed with the WS-Policy standard.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
41
The application of the Redundant Implementation pattern helps increase the autonomy of:

A) redundantly deployed services
B) service agents that perform load-balanced access to services that are not redundantly deployed
C) compositions that compose redundantly deployed services
D) core service logic contained within services that do not rely on the redundantly deployed service
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
42
Which pattern aims to increase the autonomy of a service specifically via the use of a replicated database?

A) Redundant Implementation
B) Stateful Services
C) State Repository
D) None of the above.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
43
Because the Process Abstraction pattern advocates the abstraction of ___________ logic, its application helps filter out ___________ logic in support of defining ___________ services.

A) agnostic, atomic, agnostic
B) non-agnostic, business, agnostic
C) non-agnostic, agnostic, agnostic
D) agnostic, rules-related, non-agnostic
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
44
The Service Façade pattern is often applied in order to separate the ___________ from the underlying service implementation so that they can evolve independently.

A) service agent
B) service contract
C) service activity
D) None of the above.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following statements is true?

A) Although the Logic Centralization pattern addresses the question of how to avoid redundant service logic, it does not address how the logic should be accessed.
B) The Contract Centralization pattern specifies how to access a service through its published contract, but it does not indicate which services should be accessed for specific purposes.
C) When the Logic Centralization and Contract Centralization patterns are applied together, they realize the Official Endpoint pattern because they effectively establish an official endpoint for a service.
D) All of these statements are true.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
46
By applying the Service Broker compound pattern, you establish an environment capable of carrying out which of the following patterns?

A) Data Model Transformation
B) Data Format Transformation
C) Transaction Protocol Transformation
D) Policy Transformation
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
47
The Service Façade pattern can be used to introduce a logic layer that resides between the ___________ and an underlying ___________.

A) core service logic, database
B) core service logic, resource
C) core service logic, legacy system
D) All of the above.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
48
The application of which pattern can address inconsistent service behavior exhibited when a service is required to access a shared database with inconsistent performance?

A) Stateful Services
B) Atomic Service Transaction
C) Service Data Replication
D) Asynchronous Queuing
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
49
A service façade component can be used to abstract the part of a service architecture that has negative coupling potential.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
50
When applying the Policy Centralization pattern, if you create a global policy that conflicts with a service-specific policy that you already had in place, then:

A) you did not correctly apply the Policy Centralization pattern, because it guarantees policy conflict resolution
B) you need to apply the Intermediate Routing pattern in order to allow messages to avoid one or the other policy
C) you need to apply the Decoupled Contract pattern in order to separate the conflicting policy definitions
D) None of the above.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
51
Service logic can be deployed in isolation to ___________ autonomy, but services can still ___________ autonomy when they are required to access shared data sources.

A) increase, gain
B) decrease, gain
C) increase, lose
D) decrease, lose
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following statements are true?

A) The Redundant Implementation pattern is most useful for services that possess non-agnostic service logic.
B) The Redundant Implementation pattern is concerned with eliminating single point of failure problems associated with services that are actively reused.
C) The Redundant Implementation pattern can be supplemented with the Intermediate Routing pattern, which can be applied to load balance access to a redundantly deployed service.
D) The Redundant Implementation pattern addresses issues of scalability, not issues of availability.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following represent common types of logic that can be placed within a service façade component?

A) Behavior correction logic used to compensate for changes in the behavior of the core service logic.
B) Protocol bridging logic that dynamically converts from one transport protocol to another at runtime.
C) Relaying logic that simply relays input and output messages to and from the core service logic.
D) Transformation logic that performs runtime data model or data format conversion.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
54
For a given service inventory architecture you would choose between an enterprise service bus product or an orchestration product, but you would not use both together.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following statements are true?

A) The application of the Rules Centralization pattern centralizes the governance of business rules so that they can be modified and evolved from a single location.
B) The application of the Rules Centralization pattern reduces redundancy by centralizing common business rules-related logic that would normally be distributed across multiple services.
C) The application of the Rules Centralization pattern results in centralized business rules that can be applied at runtime.
D) The application of the Rules Centralization pattern can lead to a decrease in autonomy because it can introduce the need for an additional service to be part of service compositions.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
56
The application of the Redundant Implementation pattern can help increase service availability by establishing a duplicate deployment of a service in order to provide failover support.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
57
The Process Abstraction pattern can help solve which of the following problems?

A) When business process logic is physically distributed across independent service implementations, it can be difficult to extend and evolve due to its decentralized nature.
B) The same business rules may exist within different business-centric services, leading to redundancy issues and governance problems due to the challenge of maintaining consistent rule logic within multiple services as rules changes over time.
C) Grouping non-agnostic business logic together with agnostic business logic hinders the governance of the non-agnostic logic and the reuse of the agnostic logic.
D) Bundling both messaging and validation logic into the same service eventually results in the creation of redundant logic across multiple services, thereby causing performance challenges.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
58
Official Endpoint is a compound pattern that is comprised of the Logic Centralization pattern and the Contract Centralization pattern.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
59
The application of the Rules Centralization pattern achieves the ___________ of business rules data within an inventory, but it also ___________ business logic associated with business-centric services.

A) centralization, centralizes
B) decentralization, centralizes
C) decentralization, decentralizes
D) centralization, decentralizes
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
60
The service model most associated with the Process Abstraction and Orchestration patterns in general is:

A) entity service
B) utility service
C) wrapper service
D) None of the above.
Unlock Deck
Unlock for access to all 60 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 60 flashcards in this deck.