Far out Oracle 1Z0-897 - An Overview 11 to 20

Act now and download your Oracle 1Z0-897 test today! Do not waste time for the worthless Oracle 1Z0-897 tutorials. Download Far out Oracle Java Platform, Enterprise Edition 6 Web Services Developer Certified Expert Exam exam with real questions and answers and begin to learn Oracle 1Z0-897 with a classic professional.

Q11. Which two statements are true about WSDL 1.1 and the Basic Profile? (Choose two.) 

A. WSDL does NOT recommend a specific system for user-defined datatypes. 

B. WSDL recommends the use of XML Schema for user-defined datatypes. 

C. WSDL mandates the use of XML Schema for user-defined datatypes. 

D. Basic Profile recommends the use of XML Schema for user-defined datatypes. 

E. Basic Profile mandates the use of XML Schema for user-defined datatypes. 

F. Basic Profile recommends the use of either XML Schema or DTD for user-defined datatypes. 

Answer: BE 


Q12. Which of the following is NOT a correct way of configuring handlers on a Web Service client ? (Choose one) 

A. Specify the handlers in jaxws-catalog.xml and make it available in the classpath of the client 

B. Create a handlerchain as list of handlers and call setHandlerChain() with that list on the Binding object. 

C. Programmatically configure the handlers by setting a custom HandlerResolver on the service instance and create proxies from that service. 

D. Specify handlers in handler chain configuration XML file and add @HandlerChain referencing handler configuration file to the Web Service references for clients running in JavaEE Container. 

Answer:


Q13. What is an accurate description of the handling of application exceptions thrown by a JAX-WS service endpoint? 

A. Application exceptions can be mapped to faults in WSDL. 

B. Application exceptions are NOT handled by JAX-WS SEI clients. 

C. Application exceptions are always propagated to JAX-WS clients as RemoteExceptions. 

D. Application exceptions are always propagated to JAX-WS SEI clients as WebServiceExceptions. 

E. Application exceptions are always propagated to JAX-WS SEI clients as SOAPFaultExceptions. 

Answer:


Q14. A developer needs to write a Web service that supports user sessions that timeout after 120 seconds. Which configuration file is correct for the developer use? (Choose one) 

A. web.xml 

B. server.xml 

C. ejb-jar.xml 

D. service-config.xml 

Answer:


Q15. A developer wants to use WebServiceContext in the web service endpoint. Which of the following is the correct way to get WebServiceContext object ? (Choose one) 

A. @WebService 

public class MyService { 

@WebServiceContext 

WebServiceContext ctxt; 

public String echo(String str) { 

... 

B. @WebService 

public class MyService { 

WebServiceContext ctxt; 

public String echo(String str) { ctxt = jndi.lookup("java:com/env/WebServiceContext"); } 

C. @WebService 

public class MyService { 

@Inject 

WebServiceContext ctxt; 

public String echo(String str) { 

... 

D. @WebService 

public class MyService { 

@Resource 

WebServiceContext ctxt; 

public String echo(String str) { 

... 

Answer:


Q16. A developer needs to write a Web service that supports user sessions that timeout after 120 seconds. Which configuration file is correct for the developer use? (Choose one) 

A. web.xml 

B. server.xml 

C. ejb-jar.xml 

D. service-config.xml 

Answer:


Q17. A company is implementing an accounting system, where every transaction is monitored and audited. They must implement message-oriented Web services in their accounting package to integrate various modules. All errors in computation or transmission must be logged. Which technology will they use? 

A. SOAP 

B. REST 

C. JSON 

D. JSP 

Answer:


Q18. Given that a developer implemented a web service using Stateless Session EJB: 

If a web service client invokes increment web service method twice consecutively, what must be the returned value after the second invocation ? (Choose one) 

A. 0 

B. 1 

C. 2 

D. 3 

E. Undefined 

Answer:


Q19. Given the JAX-RS root resource class fragment: 

Choose the statement that best describes the configuration that would be required to support the access control constraint shown: 

A. No further configuration is required - the JavaEE runtime will pick up the security constraint and configure the web container to match. 

B. The developer will have to configure the web container to require authenticated access to the URLs corresponding to this resource, so the proper information can be propagated to the EJB container. 

C. The developer will have to turn on authentication in the web container configuration file, so that all incoming requests are authenticated in order to be processed. 

D. The developer will have to configure the web container to require authenticated access to the URLs corresponding to this resource, and then map web-tier roles to ejb-tier roles, since the JAX-RS and EJB runtimes cannot use the same set of roles. 

Answer:


Q20. An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer has stringent security requirements that require suppliers to verify their identity. Data integrity and confidentiality must be maintained between the client and the server. Which two meet all of these requirements? (Choose two.) 

A. X.509 and XKMS 

B. XACML and XKMS 

C. SSL and mutual authentication 

D. XML Encryption and XML Digital Signature 

E. Private network and XML Signature 

Answer: CD