we provide Top Quality Oracle 1Z0-897 exam prep which are the best for clearing 1Z0-897 test, and to get certified by Oracle Java Platform, Enterprise Edition 6 Web Services Developer Certified Expert Exam. The 1Z0-897 Questions & Answers covers all the knowledge points of the real 1Z0-897 exam. Crack your Oracle 1Z0-897 Exam with latest dumps, guaranteed!

Q31. Which two statements are true about public key digital signatures applied to Web services? (Choose two) A. The receiver verifies that the message matches the digital signature using its own private key. 

B. The sender creates a digital signature using its own private key and sends that signature along with the original document. 

C. The sender creates a digital signature using its own public key and sends that signature along with the original document. 

D. The receiver verifies that the message matches the digital signature using the sender's public key. 

Answer: BD 


Q32. Which of the following is NOT true about configuring handlers on a Web Service endpoint? (Choose one) 

A. EE container automatically processes the handlers packaged in the application and configures it on the applicable endpoint 

B. Handlers can be configured using @HandlerChain annotation on endpoints configured with @WebService 

C. Handlers can be configured using @HandlerChain annotation on endpoints configured with @WebServiceProvider 

D. Handlers can be configured for endpoints in the deployment descriptor (webservices.xml) 

Answer:


Q33. Given the resource class fragment: Choose the code fragment below that would secure access only to the Resource update() method (Choose one): 

A. <security-constraint> 

<web-resource-collection> 

<url-pattern>/rest</url-pattern> 

<http-method>GET</http-method> 

<http-method>POST</http-method> 

</web-resource-collection> 

B. <security-constraint> 

<web-resource-collection> 

<url-pattern>/rest</url-pattern> 

<http-method>POST</http-method> 

</web-resource-collection> 

C. <security-constraint> 

<web-resource-collection> 

<url-pattern>/rest/id</url-pattern> 

<http-method>POST</http-method> 

<http-method>GET</http-method> 

</web-resource-collection> 

D. <security-constraint>D.<security-constraint> 

<web-resource-collection> 

<url-pattern>/id</url-pattern> 

<http-method>POST</http-method> 

</web-resource-collection> 

Answer:


Q34. Where can a developer specify confidentiality or integrity constraints on communications with a Enterprise Bean exposed as a JAX-RS root resource?(Choose one) 

A. As annotations on the EJB exposed as a root resource. 

B. In the deployment descriptor for the EJB exposed as a root resource. 

C. In the deployment descriptor for the web application that is hosting the JAX-RS resource. 

D. In the vendor-specific configuration file for the container that is hosting the JAX-RS resource. 

Answer:


Q35. Which of the following WS-Security token profiles is not supported in Metro? 

A. X509 Token Profile 

B. Kerberos Token Profile 

C. SAML Token Profile 

D. SOAP with Attachments (SWA) profile 

E. Right Expression Language (REL) Token Profile 

Answer:


Q36. When working directly with SOAP, which two statements are true about the encoding of compound values? (Choose two.) 

A. Compound values cannot be encoded. 

B. A compound value may NOT contain other compound values. 

C. Members of a compound value are encoded as accessor elements. 

D. Accessors with names that are local to their containing types have unqualified names. 

Answer: CD 


Q37. An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer has stringent security requirements that require suppliers to verify their identity. Data integrity and confidentiality must be maintained between the client and the server. Which two meet all of these requirements? (Choose two.) 

A. X.509 and XKMS 

B. XACML and XKMS 

C. SSL and mutual authentication 

D. XML Encryption and XML Digital Signature 

E. Private network and XML Signature 

Answer: CD 


Q38. Where can a developer specify confidentiality or integrity constraints on communications with a Enterprise Bean exposed as a JAX-RS root resource?(Choose one) 

A. As annotations on the EJB exposed as a root resource. 

B. In the deployment descriptor for the EJB exposed as a root resource. 

C. In the deployment descriptor for the web application that is hosting the JAX-RS resource. 

D. In the vendor-specific configuration file for the container that is hosting the JAX-RS resource. 

Answer:


Q39. A team of developers is designing RESTful Web services for a new application. What are three properties of the services? (Choose three.) 

A. They can be stateful. 

B. They can be stateless. 

C. Components communicate by exchanging representations of the resource. 

D. Components communicate by directly performing operations on the resource. 

E. They require WSDL service API definitions. 

F. Responses can be labeled as cacheable or non-cacheable. 

Answer: BCF 


Q40. What are two features of a WSDL 1.1 document? (Choose two.) 

A. Service defines a collection of related endpoints. 

B. Service describes the message's payload using XML. 

C. Service assigns an Internet address to a specific binding. 

D. Porttype declares complex data types and elements used elsewhere. 

E. Porttype elements are used to group a set of abstract operations. 

F. Porttype defines a concrete protocol and data format specification. 

Answer: AE