Want to Pass 1Z0-897 Exam In Next HOURS? Get it now →
October 11, 2017

Simulation 1Z0-897 questions pool Reviews & Tips

Exam Code: 1Z0-897 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Java Platform, Enterprise Edition 6 Web Services Developer Certified Expert Exam
Certification Provider: Oracle
Free Today! Guaranteed Training- Pass 1Z0-897 Exam.

Q1. Which of the following option represents the behavior of the endpoint, when the addressing feature is enabled on the service with the use of @Addressing() annotation. 

A. The endpoint accepts only messages containing Addressing headers and rejects any messages not containing Addressing headers. 

B. The endpoint accepts any messages with or without any Addressing headers and does not validate addressing headers because "required" annotation element is not true. 

C. The endpoint accepts messages only if the messages contain wsa:Action header but does not require presence of any other addressing headers. 

D. The endpoints accepts messages with or without addressing headers. If the message contains wsa:Action header, it validates all other addressing headers in the message. 

Answer:


Q2. In designing the security for your enterprise application with multiple Web services, you don't want that each of the services handle user authentication by itself. Then which of the following you can use in your design? 

A. enable secure conversation for each service 

B. a centralized Policy Decision Point (PDP) via XACML 

C. a Security Token Service (STS) 

D. use transport level security with SSL 

Answer:


Q3. An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer has stringent security requirements that require suppliers to verify their identity. Data integrity and confidentiality must be maintained between the client and the server. Which two meet all of these requirements? (Choose two.) 

A. X.509 and XKMS 

B. XACML and XKMS 

C. SSL and mutual authentication 

D. XML Encryption and XML Digital Signature 

E. Private network and XML Signature 

Answer: CD 


Q4. Which three statements about parsers are true? (Choose three.) 

A. SAX and StAX are bi-directional. 

B. DOM and StAX are bi-directional. 

C. StAX is a push API, whereas SAX is pull. 

D. SAX is a push API, whereas StAX is pull. 

E. SAX and StAX are read-only. 

F. SAX and DOM can write XML documents. 

G. StAX and DOM can write XML documents. 

Answer: BDG 


Q5. Which two statements are true about creating a Web service with JAX-WS? (Choose two.) 

A. Stateless Web services must be created with HTTP servlet endpoints. 

B. Creating the portable artifacts by hand is slow, but makes a service easier to maintain. 

C. All Java-based endpoints share a common packaging model. 

D. EJBs can serve as endpoints if hosted in a container with runtime and service support. 

E. JAX-WS supports creating services from source and compiled code without a WSDL. 

Answer: DE 


Q6. A student developer has created a new library of math functions to share with friends in a linear algebra class. The developer is having difficulty getting people to come over to the dorm to see the new code library, so he decides to deploy it as a Web service so that everyone can enjoy the features via the Internet. One of the functions has this WSDL definition: 

<portType name="MyMathLib"><operation name="incCtr"><input message="tns:incCtr"/></operation></portType> 

Which two statements are true about this Web service? (Choose two.) 

A. This is an asynchronous receive. 

B. This indicates a one-way message exchange pattern 

C. The client must use SOAPFaultException to display any errors. 

D. It must send a SOAP fault back to the sender. 

E. It must NOT send a SOAP fault back to the sender. 

Answer: BE 


Q7. A Web service needs to encrypt certain SOAP headers when responding. Which statement about this encryption is true? 

A. The Web service runtime is the appropriate place for such encryption. 

B. The Web service business logic is the appropriate place for such encryption. 

C. Either the Web service business logic or runtime is appropriate for such encryption. 

D. Neither the Web service business logic nor runtime is appropriate for such encryption. 

E. Transport level security protocol like SSL should be used to meet the requirements without code changes. 

Answer:


Q8. Given the resource class fragment: Choose the code fragment below that would secure access only to the Resource update() method (Choose one): 

A. <security-constraint> 

<web-resource-collection> 

<url-pattern>/rest</url-pattern> 

<http-method>GET</http-method> 

<http-method>POST</http-method> 

</web-resource-collection> 

B. <security-constraint> 

<web-resource-collection> 

<url-pattern>/rest</url-pattern> 

<http-method>POST</http-method> 

</web-resource-collection> 

C. <security-constraint> 

<web-resource-collection> 

<url-pattern>/rest/id</url-pattern> 

<http-method>POST</http-method> 

<http-method>GET</http-method> 

</web-resource-collection> 

D. <security-constraint>D.<security-constraint> 

<web-resource-collection> 

<url-pattern>/id</url-pattern> 

<http-method>POST</http-method> 

</web-resource-collection> 

Answer:


Q9. A developer is creating a web service endpoint using a stateless session EJB. 

What must be the value for <ejb-link> for the above service in the webservices.xml ? (Choose one) 

A. CounterEJB 

B. Counter 

C. CounterService 

D. CounterPort 

Answer:


Q10. Which of the following is NOT true about configuring handlers on a Web Service endpoint? (Choose one) 

A. EE container automatically processes the handlers packaged in the application and configures it on the applicable endpoint 

B. Handlers can be configured using @HandlerChain annotation on endpoints configured with @WebService 

C. Handlers can be configured using @HandlerChain annotation on endpoints configured with @WebServiceProvider 

D. Handlers can be configured for endpoints in the deployment descriptor (webservices.xml) 

Answer:



see more free 1Z0-897 exam dumps