1Z0-897 | 10 Tips For Update 1Z0-897 examcollection


Q51. Given that: 

What is X in the above code ? (Choose one) 

A. byte[] 

B. DataHandler 

C. Image 

D. Byte[] 

Answer:

Q52. Assume the code is free of gross flaws and syntax errors. Which two statements are true? (Choose two.) 

A. Line 8 specifies that addInventory accepts either a valid total or quantity. 

B. Line 1 indicates the portType is LogInventory. 

C. Line 3 shows the method is mapped to the WSDL operation called "checkProduct". 

D. Line 4 means that a method is not expected to return a value unless requested. 

E. Line 7 implies WSDL operation and method name are the same. 

Answer: BE 

Q53. Which security technologies are not included in WS-Security? 

A. encryption 

B. handshake for credential exchange and session establishment 

C. security tokens 

D. digital signatures 

Answer:

Q54. Given the JAX-RS root resource class fragment: 

Choose the statement that best describes the configuration that would be required to support the access control constraint shown: 

A. No further configuration is required - the JavaEE runtime will pick up the security constraint and configure the web container to match. 

B. The developer will have to configure the web container to require authenticated access to the URLs corresponding to this resource, so the proper information can be propagated to the EJB container. 

C. The developer will have to turn on authentication in the web container configuration file, so that all incoming requests are authenticated in order to be processed. 

D. The developer will have to configure the web container to require authenticated access to the URLs corresponding to this resource, and then map web-tier roles to ejb-tier roles, since the JAX-RS and EJB runtimes cannot use the same set of roles. 

Answer:

Q55. Choose the types of Enterprise Beans that can be made into JAX-RS root resources (Choose two): 

A. Stateful Session Beans 

B. Stateless Session Beans 

C. Message-Driven Beans 

D. Singleton Beans 

Answer: BD 

Q56. Which three statements are true about JAXP APIs? (Choose three.) 

A. They are a part of Java SE 6. 

B. They allow Java developers to access and process XML data without having to know XML or XML processing. 

C. They do NOT support validation of XML documents against schemas. 

D. It supports the Streaming API for XML. 

E. It requires the Streaming API for XML. 

F. They provide developers with a vendor and parser-implementation independent API to process XML. 

Answer: ADF 

Q57. Which statement is true about StAX? 

A. StAX provides client parsing control with memory usage similar to DOM. 

B. StAX allows clients to start, pause and resume the parsing process. 

C. StAX is the only XML parsing approach supported with JAX-WS. 

D. StAX is a more efficient version of SAX, based on newer XML technology. 

Answer:

Q58. Which of the following WS-Security token profiles is not supported in Metro? 

A. X509 Token Profile 

B. Kerberos Token Profile 

C. SAML Token Profile 

D. SOAP with Attachments (SWA) profile 

E. Right Expression Language (REL) Token Profile 

Answer:

Q59. A Web service needs to encrypt certain SOAP headers when responding. Which statement about this encryption is true? 

A. The Web service runtime is the appropriate place for such encryption. 

B. The Web service business logic is the appropriate place for such encryption. 

C. Either the Web service business logic or runtime is appropriate for such encryption. 

D. Neither the Web service business logic nor runtime is appropriate for such encryption. 

E. Transport level security protocol like SSL should be used to meet the requirements without code changes. 

Answer:

Q60. An organization has business logic implemented in EJB components. Current clients use container-managed, role-based security to access the business logic using RMI. Management has determined that the business logic must be made available to non-RMI clients using a Web service. 

Which container-managed Web service security mechanism would the development team? use to allow Web service clients to use the current security model? (Choose one) 

A. XKMS 

B. XACML 

C. XML Digital Signature 

D. HTTP Basic Authentication 

E. annotations mapped to the JAX-WS runtime 

Answer: