多选题Which two are characteristics of the Front Controller pattern?()AIt simplifies remote interfaces to distributed objects.BIt promotes cleaner application partitioning and encourages reuse.CIt provides an initial point of contact for handling all related

题目
多选题
Which two are characteristics of the Front Controller pattern?()
A

It simplifies remote interfaces to distributed objects.

B

It promotes cleaner application partitioning and encourages reuse.

C

It provides an initial point of contact for handling all related requests.

D

It reduces maintainability due to the increased complexity of the design.

E

It provides loosely coupled handlers that can be combined in various permutations.


相似考题
更多“多选题Which two are characteristics of the Front Controller pattern?()AIt simplifies remote interfaces to distributed objects.BIt promotes cleaner application partitioning and encourages reuse.CIt provides an initial point of contact for handling all related”相关问题
  • 第1题:

    Which two are characteristics of the IS -IS protocol but not OSPF?()

    • A、forms adjacencies with all neighbors
    • B、supports demand circuit routing
    • C、provides routing support for multiple network layer protocols
    • D、utilizes SPF algorithm
    • E、provides for network scalability by allowing the network to be separated into areas
    • F、three layers of hierarchical routing

    正确答案:A,C

  • 第2题:

    Which two are characteristics of the Intercepting Filter pattern?()

    • A、 it provides centralized request handling for incoming requests.
    • B、 It forces resource authentication to be distributed across web components.
    • C、 It reduces coupling between presentation-tier clients and underlying business services.
    • D、 It can be added and removed unobtrusively, without requiring changes to existing  code.
    • E、 It allows preprocessing and postprocessing on the incoming requests and outgoing  responses.

    正确答案:D,E

  • 第3题:

    A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()

    • A、Flyweight
    • B、Transfer Object
    • C、Service Locator
    • D、Dispatcher View
    • E、Business Delegate
    • F、Model-View-Controller

    正确答案:B

  • 第4题:

    A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()

    • A、Remote Proxy
    • B、Front Controller
    • C、Service Activator
    • D、Intercepting Filter
    • E、Business Delegate

    正确答案:B

  • 第5题:

    Which two are characteristics of the Transfer Object design pattern?()

    • A、It reduces network traffic by collapsing multiple remote requests into one.
    • B、It increases the complexity of the remote interface by removing coarse-grained methods.
    • C、It increases the complexity of the design due to remote synchronization and version control issues.
    • D、It increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.

    正确答案:A,C

  • 第6题:

    单选题
    A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()
    A

     Flyweight

    B

     Transfer Object

    C

     Service Locator

    D

     Dispatcher View

    E

     Business Delegate

    F

     Model-View-Controller


    正确答案: C
    解析: 暂无解析

  • 第7题:

    多选题
    Which the two are characteristics of the Service Locator pattern?()
    A

    It encapsulates component lookup procedures

    B

    It increases source code duplication and decreases reuse

    C

    It improves client performance by caching context and factory objects

    D

    It degrades network performance due to increased access to distributed lookup services


    正确答案: C,A
    解析: 暂无解析

  • 第8题:

    单选题
    A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, because the business and resourcetiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing clientrequests. Which design patterns, working together, address these issues?()
    A

    Front Controller and Transfer Object

    B

    Front Controller and Service Locator

    C

    Business Delegate and Transfer Object

    D

    Business Delegate and Intercepting Filter


    正确答案: A
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements are true about Oracle Real Applications Insight ?()
    A

    it provides enhanced visibility across the entire application infrastructure

    B

    it provides a set of management tools that enable automation of configuraion

    C

    it significantly increases the performance of Web-based applications with no code change

    D

    it dramatically reduces costs associated with diagnostics, configuration, and deployment on production servers


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two are characteristics of the Service Locator pattern?()
    A

    It encapsulates component lookup procedures.

    B

    It increases source code duplication and decreases reuse.

    C

    It improves client performance by caching context and factory objects.

    D

    It degrades network performance due to increased access to distributed lookup services.


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    单选题
    A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()
    A

    Flyweight

    B

    Transfer Object

    C

    Service Locator

    D

    Dispatcher View

    E

    Business Delegate

    F

    Model-View-Controller


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests.  Which design patterns, working together, address these issues?()
    A

     Front Controller and Transfer Object

    B

     Front Controller and Service Locator

    C

     Business Delegate and Transfer Object

    D

     Business delegate and Intercepting Filter

    E

     Model-View-Controller and Intercepting Filter


    正确答案: E
    解析: 暂无解析

  • 第13题:

    The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()

    • A、Transfer Object
    • B、Front Controller
    • C、Service Locator
    • D、Intercepting Filter
    • E、Business Delegate
    • F、Model-View-Controller

    正确答案:C

  • 第14题:

    A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()

    • A、 Flyweight
    • B、 Transfer Object
    • C、 Service Locator
    • D、 Dispatcher View
    • E、 Business Delegate
    • F、 Model-View-Controller

    正确答案:B

  • 第15题:

    Which the two are characteristics of the Service Locator pattern?()

    • A、 It encapsulates component lookup procedures
    • B、 It increases source code duplication and decreases reuse
    • C、 It improves client performance by caching context and factory objects
    • D、 It degrades network performance due to increased access to distributed lookup services

    正确答案:A,C

  • 第16题:

    Which two are characteristics of the Front Controller pattern?()

    • A、It simplifies remote interfaces to distributed objects.
    • B、It promotes cleaner application partitioning and encourages reuse.
    • C、It provides an initial point of contact for handling all related requests.
    • D、It reduces maintainability due to the increased complexity of the design.
    • E、It provides loosely coupled handlers that can be combined in various permutations.

    正确答案:B,C

  • 第17题:

    多选题
    You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()
    A

    It resembles a Layer 2 bridge.

    B

    Traffic flow through the IPS resembles traffic flow through a Layer 3 router.

    C

    Inline interfaces which have no IP addresses cannot be detected.

    D

    Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.


    正确答案: C,A
    解析: 暂无解析

  • 第18题:

    多选题
    Which two are characteristics of the Intercepting Filter pattern?()
    A

    it provides centralized request handling for incoming requests.

    B

    It forces resource authentication to be distributed across web components.

    C

    It reduces coupling between presentation-tier clients and underlying business services.

    D

    It can be added and removed unobtrusively, without requiring changes to existing  code.

    E

    It allows preprocessing and postprocessing on the incoming requests and outgoing  responses.


    正确答案: C,A
    解析: 暂无解析

  • 第19题:

    多选题
    What are two characteristics of GSS?()
    A

    It helps verify end-to-end path availability.

    B

    It provides traffic rerouting in case of disaster.

    C

    HSRP, GLBP, and VRRP can be clients of GSS.

    D

    BGP must be the routing protocol between the distributed data centers.

    E

    DNS responsiveness is improved by providing centralized domain management.


    正确答案: A,E
    解析: 暂无解析

  • 第20题:

    单选题
    On a series 1010 lightweight access point, the alarm led is flashing red, and all other leds are off. What is the lightweight access point indicating?()
    A

    it has lost contact with controller.

    B

    its ip address already exists.

    C

    it requires a code upgrade.

    D

    it is operating normally.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two are characteristics of the Transfer Object design pattern?()
    A

    It reduces network traffic by collapsing multiple remote requests into one.

    B

    It increases the complexity of the remote interface by removing coarse-grained methods.

    C

    It increases the complexity of the design due to remote synchronization and version control issues.

    D

    It increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.


    正确答案: C,A
    解析: 暂无解析

  • 第22题:

    多选题
    What are two characteristics of the SDM Security Audit wizard?()
    A

    displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implement

    B

    has two modes of operationinteractive and non-interactive

    C

    automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the router

    D

    uses interactive dialogs and prompts to implement role-based CLI

    E

    requires users to first identify which router interfaces connect to the inside network and which connectto the outside network


    正确答案: D,B
    解析: 暂无解析

  • 第23题:

    单选题
    A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()
    A

    Transfer Object

    B

    Session Facade

    C

    Intercepting Filter

    D

    Template Method

    E

    Model-View-Controller


    正确答案: C
    解析: 暂无解析