Exambible 1Z0-897 Questions are updated and all 1Z0-897 answers are verified by experts. Once you have completely prepared with our 1Z0-897 exam prep kits you will be ready for the real 1Z0-897 exam without a problem. We have Replace Oracle 1Z0-897 dumps study guide. PASSED 1Z0-897 First attempt! Here What I Did.
Q1. Given the class:
Choose the option that describes what would happen if this class were deployed (Choose one):
A. Any HTTP GET or POST request with the URL "/resource" would result in a call to getName().
B. Any HTTP GET or POST request with URLs that begin with "/resource" would result in a call to getName().
C. A runtime error would result, since a method cannot be responsible for both GET and POST requests.
D. A compile error would result, since a method cannot be responsible for both GET and POST requests.
Q2. In designing the security for your enterprise application with multiple Web services, you don't want that each of the services handle user authentication by itself. Then which of the following you can use in your design?
A. enable secure conversation for each service
B. a centralized Policy Decision Point (PDP) via XACML
C. a Security Token Service (STS)
D. use transport level security with SSL
Q3. Which two statements are true about public key digital signatures applied to Web services? (Choose two)
A. The receiver verifies that the message matches the digital signature using its own private key.
B. The sender creates a digital signature using its own private key and sends that signature along with the original document.
C. The sender creates a digital signature using its own public key and sends that signature along with the original document.
D. The receiver verifies that the message matches the digital signature using the sender's public key.
Q4. What are three best practices that can be implemented when generating WS-I Basic Profile compliant Web services? (Choose three.)
A. Send arrays of nulls to ensure .NET and Java clients receive the same data.
B. Define data types early in the integration cycle.
C. Use complex data types to reduce the number of items exchanged.
D. Test interoperability at every stage of development.
E. Insert conformance headers in all SOAP messages.
F. Keep data types simple for speed and stability.
Q5. An engineer is studying the architecture of the JAXB implementation. What are three components in its design? (Choose three.)
A. Schema compiler.
B. Built-in SAX parser
C. Schema generator.
D. Built-in DOM parser.
E. Binding runtime framework.
F. Schema interpreter.
Q6. In which order do LogicalHandlers and SOAPHandlers configured on a Web Service endpoint execute on an incoming message ? (Choose one)
A. SOAPHandlers in the order specified in configuration are executed first and later the LogicalHandlers specified in the order get executed
B. LogicalHandlers in the order specified in configuration are executed first and later the SOAPHandlers specified in the order get executed
C. All the handlers are executed in the order specified in the configuration
D. All the handlers are executed in the reverse order specified in the configuration.
Q7. An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer has stringent security requirements that require suppliers to verify their identity. Data integrity and confidentiality must be maintained between the client and the server. Which two meet all of these requirements? (Choose two.)
A. X.509 and XKMS
B. XACML and XKMS
C. SSL and mutual authentication
D. XML Encryption and XML Digital Signature
E. Private network and XML Signature
Q8. Which of the following two EJB types can be used as web service endpoints ? (Choose two.)
A. Stateful Session EJB
B. Message-Driven EJB
C. Stateless Session EJB
D. Singleton Session EJB
Q9. A Web service needs to encrypt certain SOAP headers when responding. Which statement about this encryption is true?
A. The Web service runtime is the appropriate place for such encryption.
B. The Web service business logic is the appropriate place for such encryption.
C. Either the Web service business logic or runtime is appropriate for such encryption.
D. Neither the Web service business logic nor runtime is appropriate for such encryption.
E. Transport level security protocol like SSL should be used to meet the requirements without code changes.
Q10. A company has contracted a developer to create their new accounting system. The system the developer will replace runs a monolithic web application using one web server and one database server. Technical requirements state the developer must write the business logic in Java, deploy to the application server and push the presentation logic onto the web servers. What are three characteristics of services in the proposed Service Oriented Architecture? (Choose three.)
A. Services are coarse grained.
B. Services are finely grained.
C. Services are loosely coupled.
D. Services are tightly coupled.
E. Clients must be implemented in the Java technology.
F. Services are platform agnostic, network-addressable web APIs.