Your success in Oracle 1Z0-897 is our sole target and we develop all our 1Z0-897 braindumps in a way that facilitates the attainment of this target. Not only is our 1Z0-897 study material the best you can find, it is also the most detailed and the most updated. 1Z0-897 Practice Exams for Oracle 1Z0-897 are written to the highest standards of technical accuracy.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Oracle 1Z0-897 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 1Z0-897 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/1Z0-897-exam-dumps.html

Q1. Which of the following is NOT true about configuring handlers on a Web Service endpoint? (Choose one) 

A. EE container automatically processes the handlers packaged in the application and configures it on the applicable endpoint 

B. Handlers can be configured using @HandlerChain annotation on endpoints configured with @WebService 

C. Handlers can be configured using @HandlerChain annotation on endpoints configured with @WebServiceProvider 

D. Handlers can be configured for endpoints in the deployment descriptor (webservices.xml) 

Answer:


Q2. A developer wants to use WebServiceContext in the web service endpoint. Which of the following is the correct way to get WebServiceContext object ? (Choose one) 

A. @WebService 

public class MyService { 

@WebServiceContext 

WebServiceContext ctxt; 

public String echo(String str) { 

... 

B. @WebService 

public class MyService { 

WebServiceContext ctxt; 

public String echo(String str) { ctxt = jndi.lookup("java:com/env/WebServiceContext"); } 

C. @WebService 

public class MyService { 

@Inject 

WebServiceContext ctxt; 

public String echo(String str) { 

... 

D. @WebService 

public class MyService { 

@Resource 

WebServiceContext ctxt; 

public String echo(String str) { 

... 

Answer:


Q3. Which two code fragments are valid for adding an attachment in SAAJ? (Choose two.) 

A. AttachmentPart attachment = 

request.createAttachementPart(); 

String stringContent = Update total; 

attachment.setContent(stringContent,text/plain); 

attachment.setContentID(update_total); 

request.addAttachmentPart(attachment); 

B. Attachment attachment = 

request.createAttachement(); 

String stringContent = Update total; 

attachment.setContent(stringContent,text/plain); 

attachment.setContentID(update_total); 

request.addAttachment(attachment); 

C. URL url = new URL(http://eshop.com/products/tb.jpg); 

DataHandler datahandler = new DataHandler(url); 

AttachmentPart attachment = 

request.createAttachmentPart(dataHandler); 

attachment.setContentID (attached_image); 

request.addAttachmentPart(attachment); 

D. URL url = new URL(http://eshop.com/products/tb.jpg); 

DataHandler datahandler = new DataHandler(url); 

Attachment attachment = 

request.createAttachment(dataHandler); 

attachment.setContentID (attached_image); 

request.addAttachment(attachment); 

E. Attachment attachment = 

request.newAttachement(); 

String stringContent = Update total; 

attachment.setContent(stringContent,text/plain); 

attachment.setContentID(update_total); 

request.setAttachment(attachment); 

Answer: AC 


Q4. A developer creates the following web service: Assuming that he packages the class in a war file without deployment descriptors, the web service is hosted by a EE container relative to module context at ? (Choose one) 

A. "/Invoice" 

B. "/InvoicePort" 

C. "/InvoiceService" 

D. "/InvoiceWebService" 

Answer:


Q5. HTTP clients can provide authentication information to the server via the "Authorization" header in the HTTP request. Choose the alternative, if any, that would serve as the definition for a resource method that would allow a JAX-RS resource to obtain this authentication data (Choose one): 

A. It is impossible for a JAX-RS resource to obtain this information, since low-level HTTP data is not presented to the JAX-RS application layer. 

B. @GET @Path("/authInfo") 

public String getAuthInfo( String authenticate ) { 

return authenticate; 

C. @GET @Path("/authInfo/{AUTHENTICATE}") 

public String getAuthInfo( 

@PathParam("Authorization") String auth ) { 

return authenticate; 

D. @GET @Path("/authInfo") 

public String getAuthInfo( 

@HeaderParam("Authorization") String auth ) { 

return authenticate; 

Answer:


Q6. Which two statements are true about public key digital signatures applied to Web services? (Choose two) 

A. The receiver verifies that the message matches the digital signature using its own private key. 

B. The sender creates a digital signature using its own private key and sends that signature along with the original document. 

C. The sender creates a digital signature using its own public key and sends that signature along with the original document. 

D. The receiver verifies that the message matches the digital signature using the sender's public key. 

Answer: BD 


Q7. Choose the types of Enterprise Beans that can be made into JAX-RS root resources (Choose two): 

A. Stateful Session Beans 

B. Stateless Session Beans 

C. Message-Driven Beans 

D. Singleton Beans 

Answer: BD 


Q8. An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer has stringent security requirements that require suppliers to verify their identity. Data integrity and confidentiality must be maintained between the client and the server. Which two meet all of these requirements? (Choose two.) 

A. X.509 and XKMS 

B. XACML and XKMS 

C. SSL and mutual authentication 

D. XML Encryption and XML Digital Signature 

E. Private network and XML Signature 

Answer: CD 


Q9. Given the following web service: 

How many web methods are there in the above web service? (Choose one) 

A. 1 

B. 2 

C. 3 

D. 4 

E. 5 

Answer:


Q10. Which two statements are true about WSIT client development and using the WSIT configuration file? (Choose two.) 

A. Client configuration files do NOT contain information security features, such as authentication. 

B. The file contains the URL for the WSDL. 

C. To maintain interoperability, the configuration file must not name packages. 

D. A WSIT client uses the file as a WSDL proxy is available from any WSIT compliant service. 

E. The wsimport tool uses the file to access the WSDL and build stubs to access a service. 

Answer: BE