Your success in Oracle 1Z0-897 is our sole target and we develop all our 1Z0-897 braindumps in a way that facilitates the attainment of this target. Not only is our 1Z0-897 study material the best you can find, it is also the most detailed and the most updated. 1Z0-897 Practice Exams for Oracle 1Z0-897 are written to the highest standards of technical accuracy.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Oracle 1Z0-897 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 1Z0-897 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/1Z0-897-exam-dumps.html
Q31. What are three best practices that can be implemented when generating WS-I Basic Profile compliant Web services? (Choose three.)
A. Send arrays of nulls to ensure .NET and Java clients receive the same data.
B. Define data types early in the integration cycle.
C. Use complex data types to reduce the number of items exchanged.
D. Test interoperability at every stage of development.
E. Insert conformance headers in all SOAP messages.
F. Keep data types simple for speed and stability.
Answer: BDF
Q32. XML Signature and XML Encryption provide the foundation for message level security in Web services. Which statement about XML signature is NOT true?
A. use detached signatures, where the digital signature covers sibling elements or external data
B. use enveloping signatures, where the digital signature element encloses the data to be signed
C. use enveloping signatures, where the digital signature is a child element of the data to be signed
D. use enveloped signatures, where the digital signature is a child element of the data to be signed
Answer: C
Q33. Given the class:
Choose the URL path that would result in a call to getToken()? (Choose one)
A. /id
B. /resource/id
C. /resource/id/token
D. /resource/token
Answer: B
Q34. Choose the code fragment that corresponds to a resource delegating processing of a request to a subresource correctly, when processing the URL "/parent/child" (Choose one):
A. @Path("/parent") class Parent {
@Path("/child")
Child getChild() { return new Child(); }
}
class Child {
@GET String getName() { return "name"; }
}
B. @Path("/parent")
class Parent {
@GET @Path("/child")
Child getChild() { return new Child(); }
}
class Child {
@GET String getName() { return "name"; }
}
C. @Path("/parent")
class Parent {
@Path("/child")
Child getChild() { return new Child(); }
}
@Path("/child")
class Child {
@GET String getName() { return "name"; }
}
D. @Path("/parent")
class Parent {
@Path("/child")
Child getChild() { return new Child(); }
}
class Child {
String getName() { return "name"; }
}
Answer: A
Q35. When a SOAP envelope is optimized on the wire, the following can be said about the optimized infoset : (Choose one)
A. optimized infoset contains xop:Include elements with href attribute pointing to attachment data
B. optimized infoset contains mtom:Import with location attribute pointing to attachment data
C. optimized infoset doesn't have any specific elements for MIME attachment.
D. optimzed infoset's element contain cid:Content-ID as the text and Content-ID refers to the associated attachment
Answer: A
Q36. A developer is tasked with analyzing a new Web services project and must decide to use either SOAP or REST. Based on requirements, the developer determines the service must be stateful and have a documented interface and data types that clients can discover dynamically. Which two statements are true? (Choose two.)
A. The SOAP approach consists of resources identified by unique URIs.
B. SOAP services are self-documenting via the WSDL.
C. Either SOAP or REST are suitable for the Web service.
D. REST fully documents data types via the functional interface GET and POST.
E. RESTful services are stateless by definition.
Answer: BE
Q37. A Web service needs to encrypt certain SOAP headers when responding. Which statement about this encryption is true?
A. The Web service runtime is the appropriate place for such encryption.
B. The Web service business logic is the appropriate place for such encryption.
C. Either the Web service business logic or runtime is appropriate for such encryption.
D. Neither the Web service business logic nor runtime is appropriate for such encryption.
E. Transport level security protocol like SSL should be used to meet the requirements without code changes.
Answer: A
Q38. An organization has business logic implemented in EJB components. Current clients use container-managed, role-based security to access the business logic using RMI. Management has determined that the business logic must be made available to non-RMI clients using a Web service. Which container-managed Web service security mechanism would the development team?use to allow Web service clients to use the current security model? (Choose one)
A. XKMS
B. XACML
C. XML Digital Signature
D. HTTP Basic Authentication
E. annotations mapped to the JAX-WS runtime
Answer: D
Q39. Where can a developer specify confidentiality or integrity constraints on communications with a Enterprise Bean exposed as a JAX-RS root resource?(Choose one)
A. As annotations on the EJB exposed as a root resource.
B. In the deployment descriptor for the EJB exposed as a root resource.
C. In the deployment descriptor for the web application that is hosting the JAX-RS resource.
D. In the vendor-specific configuration file for the container that is hosting the JAX-RS resource.
Answer: C
Q40. Which of the following can be used on the SEI's method parameter so that the corresponding generated schema type is wsiap:swaref ? (Choose one)
A. @XMLSchemaType
B. @SwaRef
C. @XmlMimeType
D. @XMLAttachmentRef
Answer: D