S90.09: SOA Design Architecture Lab (S90-09A) Sample Questions

  1. Home
  2. S90.09: SOA Design Architecture Lab (S90-09A) Sample Questions
S90.09: SOA Design Architecture Lab (S90-09A) Sample Questions

Advanced Sample Questions

Which of the following is a key principle of Service-Oriented Architecture (SOA)?

  • a) Tight coupling between services
  • b) Service implementation specific to individual business processes
  • c) Encapsulation of service logic
  • d) Limited reusability of services

Answer: c) Encapsulation of service logic

Explanation: The principle of encapsulation is a key aspect of Service-Oriented Architecture (SOA), which means that the implementation details of a service should be hidden behind a well-defined interface. This promotes loose coupling between services, which is another key principle of SOA. By encapsulating the service logic, a service can be reused in multiple business processes without needing to modify the service itself.

Which of the following is NOT a characteristic of a well-designed service contract?

  • a) Precise and unambiguous
  • b) Loose coupling
  • c) High cohesion
  • d) Extensibility through versioning

Answer: b) Loose coupling

Explanation: Loose coupling is a characteristic of a well-designed service, but it is not a characteristic of a well-designed service contract. The service contract should be precise, unambiguous, and have high cohesion, meaning that it should contain all the necessary information to allow a consumer to effectively use the service. The service contract should also be designed for extensibility through versioning to ensure that changes can be made to the service without breaking existing consumers.

Reference: https://docs.microsoft.com/en-us/dotnet/architecture/microservices/architect-microservice-container-applications/define-microservices#the-service-contract

Which of the following is NOT a design principle for creating reusable services?

  • a) Keep services small and focused
  • b) Use a standard messaging protocol
  • c) Avoid using a service registry
  • d) Avoid hard-coding service endpoints

Answer: c) Avoid using a service registry

Explanation: Using a service registry is a design principle for creating reusable services. A service registry is a repository that allows services to be discovered and managed, which promotes loose coupling and allows services to be reused in multiple contexts. Keeping services small and focused, using a standard messaging protocol, and avoiding hard-coding service endpoints are also important design principles for creating reusable services.

Reference: https://docs.microsoft.com/en-us/dotnet/architecture/microservices/architect-microservice-container-applications/service-design-principles

Which of the following is a common approach for integrating legacy systems into a Service-Oriented Architecture (SOA)?

  • a) Replace the legacy systems with new services
  • b) Create a new middleware layer to communicate with the legacy systems
  • c) Create an adapter to convert the legacy system’s interface into a service interface
  • d) Implement a new interface for the legacy systems using SOAP

Answer: c) Create an adapter to convert the legacy system’s interface into a service interface

Explanation: Legacy systems often have their own unique interfaces and data formats, which can make it difficult to integrate them into a Service-Oriented Architecture (SOA). One common approach is to create an adapter that can convert the legacy system’s interface into a service interface that is compatible with the SOA. This allows the legacy system to be used as a service without needing to replace it or create a new middleware layer.

Which of the following is NOT a key aspect of service composition?

  • a) Sequencing
  • b) Aggregation
  • c) Orchestration
  • d) Encapsulation

Answer: d) Encapsulation

Explanation: Encapsulation is a key aspect of service design, but it is not a key aspect of service composition. Service composition involves combining multiple services together to form a new, more complex service. The key aspects of service composition include sequencing, aggregation, and orchestration. Sequencing involves specifying the order in which services are executed, aggregation involves combining the results of multiple services into a single response, and orchestration involves controlling the flow of data and control between services.

Reference: https://www.ibm.com/cloud/learn/service-composition

Which of the following is a common method for measuring the performance of a Service-Oriented Architecture (SOA)?

  • a) Service-level agreements (SLAs)
  • b) Component-level metrics
  • c) Code coverage
  • d) Test-driven development (TDD)

Answer: a) Service-level agreements (SLAs)

Explanation: Service-level agreements (SLAs) are a common method for measuring the performance of a Service-Oriented Architecture (SOA). An SLA is a contract that specifies the level of service that a provider will deliver to a consumer, including performance metrics such as response time and availability. By measuring the performance of the service against the SLA, both providers and consumers can ensure that the service is meeting the necessary requirements.

Reference: https://www.ibm.com/cloud/learn/service-level-agreements-slas

Which of the following is a key advantage of using a service-oriented architecture (SOA)?

  • a) Increased complexity and coupling between services
  • b) Reduced reuse of services
  • c) Increased flexibility and adaptability
  • d) Reduced scalability of services

Answer: c) Increased flexibility and adaptability

Explanation: One of the key advantages of using a service-oriented architecture (SOA) is the increased flexibility and adaptability it provides. By encapsulating service logic and promoting loose coupling between services, SOA allows for services to be easily modified and reused in different contexts. This can improve the agility and responsiveness of the overall system.

Which of the following is a common challenge in service-oriented architecture (SOA) governance?

  • a) Ensuring security and compliance
  • b) Encouraging tight coupling between services
  • c) Ignoring service reuse opportunities
  • d) Implementing a standardized service registry

Answer: a) Ensuring security and compliance

Explanation: One of the common challenges in service-oriented architecture (SOA) governance is ensuring security and compliance. Because SOA involves multiple services working together, it can be difficult to ensure that security and compliance requirements are met across the entire system. This can include issues such as data privacy, access control, and regulatory compliance.

Which of the following is NOT a key aspect of the service-oriented modeling and architecture (SOMA) process?

  • a) Requirements analysis
  • b) Service design
  • c) Service testing
  • d) Service deployment

Answer: c) Service testing

Explanation: Service testing is an important aspect of service-oriented architecture (SOA), but it is not one of the key aspects of the service-oriented modeling and architecture (SOMA) process. The SOMA process includes requirements analysis, service design, service implementation, and service deployment. Testing is typically performed during the service implementation phase.

Reference: https://www.ibm.com/support/knowledgecenter/SSMKHH_10.0.0/com.ibm.etools.mft.doc/bn13690_.htm

Basic Sample Questions

Question  1 – Business document data is typically placed in the message header, while supplementary messaging metadata is placed in the message body when applying the Messaging Metadata pattern.
  • A. True
  • B. False

Correct Answer: B 

Question  2 – To support Messaging Metadata, a messaging framework must support message headers and properties.
  • A. True
  • B. False

Correct Answer: A 

Question  3 – Identify the false statement.
  • A. Widespread use of the Messaging Metadata pattern can be seen in the emergence of many WS-* extensions that define industry-standard SOAP header blocks that carry metadata.
  • B. As part of the Messaging Metadata pattern, messaging frameworks and technologies must be able to read and write message headers and properties.
  • C. The Messaging Metadata pattern cannot be applied in stateful or conversational messaging scenarios.
  • D. With Messaging Metadata, activity-specific metadata can be added to messages to support the application of patterns like Intermediate Routing

Correct Answer: C 

Question  4 – A Program that consumes service agents can explicitly invoke them via a technical contract.
  • A. True
  • B. False

Correct Answer: B

Question  5 – A typical service agent would not be able to perform which of the following functions?
  • A. event logging
  • B. message routing
  • C. complex Web service composition
  • D. error logging

Correct Answer: C 

Question  6 – Service compositions will be affected by the use of service agents in the following ways:
  • A. it will lead to an increment in the number of required services
  • B. it will decrease the number of required services
  • C. it will lead to an increment in the number of required service compositions
  • D. it will decrease the number of required service compositions

Correct Answer: B 

Question  7 – Out of the following statements, which is true?
  • A. Using service agents excessively can lead to vendor platform dependence.
  • B. The use of service agents is limited to the service architecture.
  • C. Service agents are common in orchestration environments but not within enterprise service bus environments.
  • D. None of these statements are true.

Correct Answer: A 

Question 8 – What are the issues that can arise in Governance with service agents:
  • A. One has to be designated to own and maintain the service agents.
  • B. One change to an agent can have an impact on multiple services throughout the service inventory.
  • C. Just like services, service agents need to be versioned.
  • D. All of the above.

Correct Answer: D

Question 9 – A service Agent may also be needed in which of the following patterns?
  • A. Reliable Messaging
  • B. Asynchronous Queuing
  • C. Intermediate Routing
  • D. Policy Centralization

Correct Answer: ABCD 

Question 10 –  Identify the true statement regarding intermediate routing.
  • A. In order to handle message routing requirements that are dynamic in nature and difficult to anticipate in advance, the Intermediate Routing pattern can be applied.
  • B. A message path with fixed routing requirements can be handled with Intermediate Routing by applying our Intermediate Routing pattern.
  • C. Intermediate Routing tends to provide better runtime performance than embedded routing logic within individual services when applied in conjunction with the Intermediate Routing pattern.
  • D. None of these statements are true.

Correct Answer: A 

Question 11 – Which of the following problems can be addressed by the Intermediate Routing pattern?
  • A. The requirement of increasing the autonomy of a service due to its dependence on a shared data source.
  • B. The requirement of performing content-based routing based upon metadata found in the message header.
  • C. The requirement of load-balanced access to a redundantly deployed service.
  • D. The requirement of providing pre-defined compensating logic for when an atomic service transaction fails.

Correct Answer: BC 

Question 12 – Which pattern is commonly associated with load balancing?
  • A. Atomic Service Transaction
  • B. Intermediate Routing
  • C. Service Broker
  • D. Decoupled Contract

Correct Answer: B

Question 13 – A typical result of using Intermediate Routing is:
  • A. removal of common routing logic from service logic and its deployment into the service agents
  • B. removal of common routing logic from service agents and its deployment into a database
  • C. Physical centralization of common routing logic into a single service
  • D. Physical centralization of common routing logic into a single service composition

Correct Answer: A 

Question 14 – Messages intercepted by multiple service agents before they reach their destination can result from the Intermediate Routing pattern.
  • A. True
  • B. False

Correct Answer: A 

Question 15 – Applying the Asynchronous Queuing pattern, you aim to create an environment that:
  • A. there is an intermediate buffer between a service and its consumer
  • B. Stores temporary messages in case neither the service nor the service consumer is available
  • C. Messages can be re-transmitted periodically until they are successfully delivered
  • D. Communication between the service provider and consumer is guaranteed to be consistent, uninterrupted, and synchronous

Correct Answer: ABC 

Question 16 – By applying Asynchronous Queuing, service consumers and services can revert to stateless conditions before a data exchange has been completed.
  • A. True
  • B. False

Correct Answer: A

Question 17 – Which of the following does the Reliable Messaging pattern require:
  • A. Standardizing service contracts so that atomic transaction information can be included in message headers
  • B. Protocols for storing and acknowledging messages temporarily
  • C. Implementing the Official Endpoint pattern for acknowledgment
  • D. A framework that allows the exchange of schemas between services that use disparate messaging protocols

Correct Answer: B 

Question 18 – Identify the false statements.
  • A. A messaging-based communication system can be improved by using a Reliable Messaging pattern.
  • B. Application of Reliable Messaging pattern is restricted to databases, and cannot be done on services.
  • C. The Enterprise Service Bus compound pattern can be associated with the Reliable Messaging pattern.
  • D. Atomic Service Transactions and Reliable Messaging patterns have to be applied together.

Correct Answer: BD 

Question  19 – Which of the following statements is true if the Reliable Messaging pattern is successfully applied?
  • A. Service agents intercept and store consumer messages. Then, the service agent returns an acknowledgment to the service consumer. Once the message has been forwarded to the service, it gets deleted by the agent when it receives an acknowledgment from the service.
  • B. Agents intercept and store messages from service consumers and forward them to the service. Finally, the service agent deletes the message and its related acknowledgments after receiving an acknowledgment from the service.
  • C. Service consumers store messages and forward them to service agents, who acknowledge them. Upon receiving an acknowledgment from the service, the service agent informs the service consumer so that both the message and the acknowledgment can be deleted.
  • D. None of the above.

Correct Answer: A 

Question 20 – What roles do service agents typically fulfill in the message exchange framework established by Reliable Messaging?
  • A. positive acknowledgments can be processed by service agents
  • B. negative acknowledgments can be processed by service agents
  • C. balance messages can be loaded by service agents
  • D. messages can be routed by the service agents based on their content

Correct Answer: AB

S90.09 SOA Design Architecture Lab (S90-09A) Free Practice Tests
Menu