Q1. What is an advantage of enabling Addressing feature on an endpoint?
A. Addressing ensures reliable transfer of messages between client address and the service address.
B. Addressing ensures the message exchanges between the client and service are properly secured.
C. Addressing enables the optimization of messages exchanged between the client and the service.
D. Addressing provides transport-neutral way to address the endpoints and messages.
Answer: D
Q2. Which two statements are true about public key digital signatures applied to Web services? (Choose two)
A. The receiver verifies that the message matches the digital signature using its own private key.
B. The sender creates a digital signature using its own private key and sends that signature along with the original document.
C. The sender creates a digital signature using its own public key and sends that signature along with the original document.
D. The receiver verifies that the message matches the digital signature using the sender's public key.
Answer: BD
Q3. Which of the following can be used on the SEI's method parameter so that the corresponding generated schema type is wsiap:swaref ? (Choose one)
A. @XMLSchemaType
B. @SwaRef
C. @XmlMimeType
D. @XMLAttachmentRef
Answer: D
Q4. A developer creates a Web service for his company's inventory service. He uses servlet container to deploy the web service and wants to enable basic authentication for all web service invocations. Where does the developer configure security requirements for the above case?
A. sun-jaxws.xml
B. web.xml
C. webservices.xml
D. domain.xml
Answer: B
Q5. Choose three ways to enable MTOM on a web service endpoint deployed in an EE container ? (Choose three)
A. enabled by the container automatically
B. by specifying @MTOM annotation on the endpoint's class
C. by specifying <enable-mtom> in webservices.xml deployment descriptor
D. by specifying a wsoma:MTOM policy in WSDLE. by specifying <mtom> element in sun-jaxws.xml
Answer: BCD
Q6. An MTOM optimized infoset+attachment on the wire for a large binary data saves around X% in size when compared to original infoset, where X is: (Choose one)
A. 10%
B. 20%
C. 30%
D. 60%
Answer: C
Q7. In designing the security for your enterprise application with multiple Web services, you don't want that each of the services handle user authentication by itself. Then which of the following you can use in your design?
A. enable secure conversation for each service
B. a centralized Policy Decision Point (PDP) via XACML
C. a Security Token Service (STS)
D. use transport level security with SSL
Answer: C
Q8. Which of the following option represents the behavior of the endpoint, when the addressing feature is enabled on the service with the use of @Addressing() annotation.
A. The endpoint accepts only messages containing Addressing headers and rejects any messages not containing Addressing headers.
B. The endpoint accepts any messages with or without any Addressing headers and does not validate addressing headers because "required" annotation element is not true.
C. The endpoint accepts messages only if the messages contain wsa:Action header but does not require presence of any other addressing headers.
D. The endpoints accepts messages with or without addressing headers. If the message contains wsa:Action header, it validates all other addressing headers in the message.
Answer: D
Q9. Choose the types of Enterprise Beans that can be made into JAX-RS root resources (Choose two):
A. Stateful Session Beans
B. Stateless Session Beans
C. Message-Driven Beans
D. Singleton Beans
Answer: BD
Q10. A developer needs to write a Web service that supports user sessions that timeout after 120 seconds. Which configuration file is correct for the developer use? (Choose one)
A. web.xml
B. server.xml
C. ejb-jar.xml
D. service-config.xml
Answer: A