aiotestking uk

1Z0-897 Exam Questions - Online Test


1Z0-897 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which two statements are true about elements in a WSDL document? (Choose two.) 

A. Operation is an abstract set of port types supported by one or more endpoints. 

B. Service is an abstract set of operations supported by one or more endpoints. 

C. Message is an abstract description of an action supported by the service. 

D. Operation is an abstract description of an action supported by the service. 

E. Binding is a single endpoint defined as a combination of an operation and a network address. 

F. Message is an abstract, typed definition of the data being communicated. 

Answer: DF 

Q2. A company has contracted a developer to create their new accounting system. The system the developer will replace runs a monolithic web application using one web server and one database server. Technical requirements state the developer must write the business logic in Java, deploy to the application server and push the presentation logic onto the web servers. What are three characteristics of services in the proposed Service Oriented Architecture? (Choose three.) 

A. Services are coarse grained. 

B. Services are finely grained. 

C. Services are loosely coupled. 

D. Services are tightly coupled. 

E. Clients must be implemented in the Java technology. 

F. Services are platform agnostic, network-addressable web APIs. 

Answer: ACF 

Q3. Given the following web service: 

How many web methods are there in the above web service? (Choose one) 

A. 1 

B. 2 

C. 3 

D. 4 

E. 5 

Answer:

Q4. When a SOAP envelope is optimized on the wire, the following can be said about the optimized infoset : (Choose one) 

A. optimized infoset contains xop:Include elements with href attribute pointing to attachment data 

B. optimized infoset contains mtom:Import with location attribute pointing to attachment data C. optimized infoset doesn't have any specific elements for MIME attachment. 

D. optimzed infoset's element contain cid:Content-ID as the text and Content-ID refers to the associated attachment 

Answer:

Q5. In designing the security for your enterprise application with multiple Web services, you don't want that each of the services handle user authentication by itself. Then which of the following you can use in your design? 

A. enable secure conversation for each service 

B. a centralized Policy Decision Point (PDP) via XACML 

C. a Security Token Service (STS) 

D. use transport level security with SSL 

Answer:

Q6. An organization has business logic implemented in EJB components. Current clients use container-managed, role-based security to access the business logic using RMI. Management has determined that the business logic must be made available to non-RMI clients using a Web service. Which container-managed Web service security mechanism would the development team?use to allow Web service clients to use the current security model? (Choose one) 

A. XKMS 

B. XACML 

C. XML Digital Signature 

D. HTTP Basic Authentication 

E. annotations mapped to the JAX-WS runtime 

Answer:

Q7. A team of developers is designing RESTful Web services for a new application. What are three properties of the services? (Choose three.) 

A. They can be stateful. 

B. They can be stateless. 

C. Components communicate by exchanging representations of the resource. 

D. Components communicate by directly performing operations on the resource. 

E. They require WSDL service API definitions. 

F. Responses can be labeled as cacheable or non-cacheable. 

Answer: BCF 

Q8. A developer needs to write a Web service that supports user sessions that timeout after 120 seconds. Which configuration file is correct for the developer use? (Choose one) 

A. web.xml 

B. server.xml 

C. ejb-jar.xml 

D. service-config.xml 

Answer:

Q9. An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer has stringent security requirements that require suppliers to verify their identity. Data integrity and confidentiality must be maintained between the client and the server. Which two technologies can be used to meet the requirements? (Choose two) 

A. XACML and XKMS 

B. SSL with mutual authentication 

C. Message level security with WS-Security 

D. Private network and XML Signature 

Answer: BC 

Q10. Which statement is true about StAX? 

A. StAX provides client parsing control with memory usage similar to DOM. 

B. StAX allows clients to start, pause and resume the parsing process. 

C. StAX is the only XML parsing approach supported with JAX-WS. 

D. StAX is a more efficient version of SAX, based on newer XML technology. 

Answer: