1Z0-897 Exam - Java Platform, Enterprise Edition 6 Web Services Developer Certified Expert Exam

certleader.com

Q1. A company is building a customer relationship management system that is to be deployed on a customer's network, and they want software functions to be reused and combined in different modules in the system. The Director of Technology has determined that the new system should utilize both Web services and a Service Oriented Architecture (SOA). Which two statements about Web services in an SOA are correct? (Choose two.) 

A. A Web service must be discovered from a UDDI registry in an SOA. 

B. SOA and Web services both use the HTTP protocol at the transport layer. 

C. A Web service must publish itself to a UDDI registry to become part of an SOA. 

D. SOA is a way to design a system and Web services are a possible implementation. 

E. SOA is used for stateless invocations, and Web services for stateful invocations. 

F. SOA emphasizes the concept of service encapsulation and Web services fulfill a service contract. 

Answer: DF 

Q2. Given the class: 

Choose the option that describes what would happen if this class were deployed (Choose one): 

A. Any HTTP GET or POST request with the URL "/resource" would result in a call to getName(). 

B. Any HTTP GET or POST request with URLs that begin with "/resource" would result in a call to getName(). 

C. A runtime error would result, since a method cannot be responsible for both GET and POST requests. 

D. A compile error would result, since a method cannot be responsible for both GET and POST requests. 

Answer:

Q3. What is an advantage of enabling Addressing feature on an endpoint? 

A. Addressing ensures reliable transfer of messages between client address and the service address. 

B. Addressing ensures the message exchanges between the client and service are properly secured. 

C. Addressing enables the optimization of messages exchanged between the client and the service. 

D. Addressing provides transport-neutral way to address the endpoints and messages. 

Answer:

Q4. An airline built and deployed a back-end application to manage reservations. To support interoperability with as large a base of standalone client applications as possible, the services provided by this back-end application are exposed as XML-based restful web services. Management just added a new requirement that AJAX-based web application clients be supported, too. One of the developers suggested that it is enough to extend the existing application to support both XML-based and JSON-based restful web services. Assuming the developer is correct, choose the sentence that best describes an attempt to introduce this ability as this developer suggests (Choose one): 

A. The attempt will fail, because JAX-RS does not support both XML- and JSON- based restful services in parallel. 

B. The attempt will be trivial to implement, since JAX-RS just needs for the application to specify that both XML- and JSON-based interaction will be supported. 

C. The attempt can succeed, but it will require a significant amount of new code, since JAX-RS does support both XML- and JSON-based interaction - but not single resource can support both kinds of interaction simultaneously. 

D. The attempt will fail, because there is more to the difference between XML-based and JSON-based interactions than just the data representation used. 

Answer:

Q5. When a SOAP envelope is optimized on the wire, the following can be said about the optimized infoset : (Choose one) 

A. optimized infoset contains xop:Include elements with href attribute pointing to attachment data 

B. optimized infoset contains mtom:Import with location attribute pointing to attachment data 

C. optimized infoset doesn't have any specific elements for MIME attachment. 

D. optimzed infoset's element contain cid:Content-ID as the text and Content-ID refers to the associated attachment 

Answer:

Q6. In the code fragment below, the client will use os to upload data to the web service provider. 

Choose the statement that must be placed in line 5, to ensure this fragment works as intended. (Choose one) 

A. connection.setDoOutput(true); 

B. connection.setAllowUserInteraction(true); 

C. connection.setIfModifiedSince(new Date().getTime()); 

D. connection.setUseCaches(false); 

Answer:

Q7. A developer creates a Web service for his company's inventory service. He uses servlet container to deploy the web service and wants to enable basic authentication for all web service invocations. Where does the developer configure security requirements for the above case? 

A. sun-jaxws.xml 

B. web.xml 

C. webservices.xml 

D. domain.xml 

Answer:

Q8. Where can a developer specify confidentiality or integrity constraints on communications with a Enterprise Bean exposed as a JAX-RS root resource?(Choose one) 

A. As annotations on the EJB exposed as a root resource. 

B. In the deployment descriptor for the EJB exposed as a root resource. 

C. In the deployment descriptor for the web application that is hosting the JAX-RS resource. 

D. In the vendor-specific configuration file for the container that is hosting the JAX-RS resource. 

Answer:

Q9. Choose the statement that best describes the use of Enterprise Beans as JAX-RS root resources: 

A. An Enterprise Bean can be made a JAX-RS root resource only if EJB-specific features such as transaction management or security validation are not used. 

B. JAX-RS imposes no limitations on the characteristics ofthose Enterprise Beans that can be exposed as JAX-RSresource classes. 

C. An Enterprise Bean that is exposed as a JAX-RS root resourcecan no longer be used directly as a remote bean itself - thebean implementation class can be accessed via the remote EJBdistributed framework (RMI), or a JAX-RS root resource, but not both concurrently within the same application. 

D. An Enterprise Bean that is exposed as a JAX-RS root resource supports all the same features as a JAX-RS resource that it supports as an EJB. 

Answer:

Q10. Which of the following security technology is not covered in Metro project? (Choose one.) 

A. WS-Trust 

B. WS-SecurityPolicy 

C. WS-SecureConversation 

D. XACML 

Answer: