13948632-sun-cx310220-

120
CH@N Sun Certified Developer for Java Web Services Number : 310-220 Passing Score : 800 Time Limit : 120 min File Version : 1.0 Sun 310-220 Sun Certified Developer for Java Web Services 345 Q&A Version 2.73

Upload: debojyotis

Post on 11-Nov-2015

251 views

Category:

Documents


16 download

DESCRIPTION

scjp

TRANSCRIPT

  • CH@N

    Sun Certified Developer for Java Web Services

    Number: 310-220Passing Score: 800Time Limit: 120 minFile Version: 1.0

    Sun 310-220

    Sun Certified Developer for Java Web Services

    345 Q&A

    Version 2.73

  • CH@N

    Exam A

    QUESTION 1Which connection mode allows a JAX-RPC client to make a Web service method call and then continueprocessing in the same thread, without waiting for a response?

    A. call-backB. solicit-responseC. request-responseD. non-blocking RPC

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 2Which three are true about JAX-RPC Web services? (Choose three.)

    A. EJB based endpoints can use container-managed transactions.B. Servlet-based endpoints can use container-managed transactions.C. Client-initiated transactions are propagated to EJB based endpoints.D. EJB based endpoints can programmatically demarcate transactions.E. Client-initiated transactions are propagated to Servlet-based endpoints.F. Servlet-based endpoints can programmatically demarcate transactions.

    Answer: ADFSection: (none)

    Explanation/Reference:

    QUESTION 3When working with EJB based endpoints, which is true?

    A. They must use JAAS.B. They can use message handlers.C. They must use message handlers.D. They cannot use message handlers.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 4A developer is given a WSDL for an existing Web service. What is the correct sequence of steps thatshould be taken to use that Web service?

    A. parse the WSDL using JAXP, connect to the service using RMI, and then parse the XML using SAXB. generate stubs and interfaces using JAXM, bind to the stubs, and then call methods on the interfaceC. generate stubs and interfaces using JAX-RPC, bind to the stubs, and then call methods on the interface

  • CH@N

    D. receive the service using RMI, parse the XML using JAXP, create Java objects using JAXR, and thenreturn those Java objects

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 5A developer needs to write a Web service that supports user sessions that timeout after 120 seconds.Which configuration file should the developer use?

    A. web.xmlB. server.xmlC. ejb-jar.xmlD. service-config.xml

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 6A developer creates an endpoint interface for an existing stateless session bean. Which is the correctmapping approach?

    A. RMIB. HandlersC. WSDL-to-JavaD. Java-to-WSDL

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 7According to the WS-I Basic Profile 1.0a, which two messaging styles must be supported? (Choose two.)

    A. rpc-literalB. rpc-encodedC. point-to-pointD. document-literalE. publish-subscribe

    Answer: ADSection: (none)

    Explanation/Reference:

  • CH@N

    QUESTION 8Click the Task button.

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 9Given:

    Which endpoint method declaration is generated by this service?

    A. public float getHighBid(String itemID);B. public float getHighBid(String itemID)

    throws InvalidItemID;C. public float getHighBid(String itemID)

    throws RemoteException;

  • CH@N

    D. public float getHighBid(String itemID)throws RemoteException, InvalidItemID;

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 10Click the Task button.

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 11Given:

    xmlns:xsd="http://schemas.xmlsoap.org/wsdl/"xmlns:book="http://www.sun.com/books"...

  • CH@N

    These namespace aliases and schema appear in the WSDL file for a document-style Web service.

    Which is a valid message element for this WSDL file?

    A.

    B.

    C.

    D.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 12Given the type declaration in a WSDL description for a Web service:

    The Java code generated by a JAX-RPC service endpoint interface consists of a PurchaseOrder JavaBean.

    Which property should the PurchaseOrder JavaBean contain?

    A. _any of type java.lang.StringB. PurchaseOrder of type java.lang.ObjectC. complexType of type java.lang.Object[]D. _any of type javax.xml.soap.SOAPElement

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 13Given:

    1. public boolean handleRequest(MessageContext context){

  • CH@N

    2. try{3. SOAPMessageContext soapCntxt = (SOAPMessageContext)context;4. SOAPMessage message = soapCntxt.getMessage();5. message.writeTo(logStream);6. }catch(javax.xml.soap.SOAPException se){7. throw new javax.xml.rpc.JAXRPCException(se);8. }9. }

    The handleRequest method (lines 1-9) is implemented by a JAX-RPC handler used for logging.

    Given that the method encounters an error and throws a JAXRPCException, which is true?

    A. If the method is implemented by a client-side handler, it will cause a SOAP fault to be generated.B. If the method is implemented by a server-side handler, it will cause a SOAP fault to be generated.C. If the method is implemented by a client-side handler, the message will continue to be processed by the

    handler chain.D. If the method is implemented by a server-side handler, the message will continue to be processed by

    the handler chain.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 14According to UDDI 2.04, which protocol must be used to update, modify, or delete data structures in a UDDIregistry?

    A. IIOPB. HTTPC. SMTPD. HTTPS

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 15According to the WS-I Basic Profile 1.0a, a conformant WSDL 1.1 portType definition is allowed to use twotype operations (that is, Message-Exchange Patterns). Which two are allowed? (Choose two.)

    A. one-wayB. notificationC. solicit-responseD. request-response

    Answer: ADSection: (none)

    Explanation/Reference:

  • CH@N

    QUESTION 16Which two describe the UDDI Inquiry API? (Choose two.)

    A. It requires user authentication.B. It can be used to query the Internet.C. It does NOT require user authentication.D. It can be used to search a UDDI registry.

    Answer: CDSection: (none)

    Explanation/Reference:

    QUESTION 17Which element is used to define new XML Schema complex types within a WSDL 1.1 document?

    A. typesB. messageC. portTypeD. definitions

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 18Which is true about WSDL 1.1?

    A. It does NOT recommend a specific type systemB. It recommends the use of XSD as the type system.C. It recommends the use of DTD as the type system.D. It recommends the use of XSD and DTD as the type system

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 19Click the Task button.

  • CH@N

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 20Click the Task button.

    A.

  • CH@N

    B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 21A company receives orders as XML documents. When the order is received and the XML document isprocessed, the document instance itself is not needed for further processing.

    Which technology should the developer use to process the order?

    A. JAXBB. JDBCC. SAAJD. JAX-RPC

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 22A developer has a requirement to extract the XML namespace of an element using SAX2. Which methodmust be used?

    A. charactersB. endDocumentC. endPrefixMappingD. startPrefixMapping

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 23Click the Task button.

  • CH@N

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 24Which three describe unmarshal-time validation in JAXB? (Choose three.)

    A. It must be supported by all JAXB implementations.B. It is invoked using the Validator.validate method.C. It is enabled or disabled using the Unmarshaller.setValidating method.D. It enables a application to receive information about validation errors and warnings that are detected

    while unmarshalling a Java content tree into XML.E. It enables an application to receive information about validation errors and warnings that are detected

    while unmarshalling XML data into a Java content tree.

    Answer: ACESection: (none)

    Explanation/Reference:

    QUESTION 25Which is a super type of the javax.xml.soap.SOAPBody type?

    A. java.lang.StringB. org.w3c.dom.NodeC. org.w3c.dom.DocumentD. javax.xml.soap.SOAPEnvelope

  • CH@N

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 26A developer is using the XSLT APIs in JAXP 1.2. A TransformerFactory object is instantiated and used tocreate a Transformer. A Source object is used as the input to the Transformer. Which two are true?(Choose two.)

    A. The Source object must be created from a SAX reader or from a DOM node.B. The Source object can be created from a SAX reader, a DOM node, or an InputStream.C. If the Transformer is created without any specific instructions, then it copies the Source to the Result.D. If the Transformer is created without any specific instructions, then it throws a TransformerException.

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 27Given the SAAJ 1.1 code snippet:

    10. Name name = soapFactory.createName("symbol");11. SOAPElement symbol = bodyElement.addChildElement(name);12. symbol.addTextNode("SUNW");

    Which XML fragment is added to the SOAP message?

    A. SUNWB. symbol:SUNWC.

    SUNW

    D. SUNW

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 28A Web service needs to translate XML documents received from external partners to internal XMLrepresentations. What can the developer use to implement the service?

    A. XSLTB. JDBCC. SAAJD. JAX-RPC

    Answer: A

  • CH@N

    Section: (none)

    Explanation/Reference:

    QUESTION 29Which two describe the uses for JAXR 1.0 Concept? (Choose two.)

    A. It can be used to parse a WSDL document for generating a corresponding Java class.B. It can be used to define namespaces for external identifiers, such as D-U-N-S Numbers.C. It can be used to define the hierarchical tree structure and detailed elements of a ClassificationScheme.D. It can be used to define the hierarchical tree structure of a ClassificationScheme, but cannot be used for

    defining its detailed elements.

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 30Which two are true about JAXR 1.0? (Choose two.)

    A. Every JAXR RegistryObject has a unique key.B. It provides interfaces for managing life cycle of registry objects.C. It provides a businessEntity data structure for storing publisher assertions.D. It provides a bindingTemplate interface that is used to determine if a service is deployed behind a

    firewall.

    Answer: ABSection: (none)

    Explanation/Reference:

    QUESTION 31Which two statements are true about the properties used to configure a JAXR ConnectionFactory? (Choosetwo.)

    A. They cannot be configured by the client.B. A JAXR provider may define a set of provider-specific properties.C. Configuration properties must never be qualified by a package name.D. There are a set of standard properties that all JAXR providers must support.E. All of the properties are implementation-specific and vary between JAXR providers.

    Answer: BDSection: (none)

    Explanation/Reference:

    QUESTION 32Which describes the mapping of a UDDI tModel in the JAXR 1.0 specification?

  • CH@N

    A. JAXR APIs cannot be used with a UDDI registry using tModels.B. UDDI tModels are mapped to JAXR ServiceBinding interface.C. UDDI tModels are mapped to JAXR ServiceBinding and JAXR Organization.D. UDDI tModels are mapped to JAXR ClassificationScheme and JAXR Concept.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 33Which three security technologies are used by WS-Security? (Choose three.)

    A. SAMLB. XACMLC. XML EncryptionD. XML CanonicalizationE. XML Digital Signatures

    Answer: CDESection: (none)

    Explanation/Reference:

    QUESTION 34Which two mechanisms can a Web service, deployed in a J2EE 1.4 compatible application server, use forauthentication? (Choose two.)

    A. HTTP digest authentication, where the client sends a one-way digest of the passwordB. symmetric HTTPS, where both the client and server can authenticate each other by requesting and

    verifying the X.509 certificateC. HTTP Basic Authentication, where the username and password are passed as HTTP headers that are

    uu-encoded, but not encryptedD. form-based authentication, where the username and password fields are passed using the j_username

    and j_password respectively

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 35An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer hasstringent security requirements that require suppliers to verify their identity. Data integrity and confidentialitymust be maintained between the client and the server. Which two meet all of these requirements? (Choosetwo.)

    A. X.509 and XKMSB. XACML and XKMSC. SSL and mutual authenticationD. XML Encryption and XML Digital Signature

  • CH@N

    Answer: CDSection: (none)

    Explanation/Reference:

    QUESTION 36How does a JAX-RPC client specify usernames and passwords to use HTTP Basic Authentication with aWeb service?

    A. by setting username and password properties in a StubB. by adding username and password parameters to a CallC. by using a JAX-RPC handler to add usernames and passwords to the HTTP headersD. by using a JAX-RPC handler to add usernames and passwords to the SOAP headers

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 37Which mechanism guarantees data integrity between a client and a Web service?

    A. SAMLB. XACMLC. Basic AuthenticationD. XML Digital Signature

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 38Which three techniques describe how XML Digital Signatures can be applied to an XML document?(Choose three.)

    A. use detached signatures, where the digital signature covers sibling elements or external dataB. use enveloping signatures, where the digital signature element encloses the data to be signedC. use enveloped signatures, where the digital signature is a child element of the data to be signedD. use enveloping signatures, where the digital signature is a child element of the data to be signedE. use enveloping signatures, where the digital signature element is a child element of the data to be

    signed

    Answer: ABCSection: (none)

    Explanation/Reference:

    QUESTION 39Two companies communicate using Web services in a business transaction.

  • CH@N

    Which mechanism ensures that business data cannot be renounced, or a transaction denied, by eitherone?

    A. integrity provided by public key certificates and digital signaturesB. confidentiality provided by asymmetric or symmetric cryptographyC. identity management provided by private keys and certificate authoritiesD. non-repudiation provided though public key cryptography by digital signing

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 40Which two operations are supported by an XML Key Management Specification (XKMS) compliant service?(Choose two.)

    A. generation, registration, and revocation of keysB. retrieval of public keys and validation of certificatesC. distribution and management of Kerberos service ticketsD. granting a Kerberos ticket granting ticket (TGT) to Web services

    Answer: ABSection: (none)

    Explanation/Reference:

    QUESTION 41Click the Task button.

    A.B.

  • CH@N

    C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 42Which are J2EE components?

    A. JMS, EJB, JSPB. EJB, JSP, ServletC. JMS, JDBC, JAXRD. JMS, JSP, JAX-RPC

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 43Which is true about the J2EE 1.4 platform?

    A. It requires support for the WS-I Basic Profile 1.0a.B. It recommends support for the WS-I Basic Profile 1.0a.C. It does NOT require support for the WS-I Basic Profile 1.0a.D. It does NOT discuss support for the WS-I Basic Profile 1.0a.

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 44What are three benefits of using EJB based endpoints? (Choose three.)

    A. support for client-initiated transactionsB. method-level, declarative access controlC. support for container-managed transactionsD. container-based, lifecycle management of endpoint instancesE. automatic support for long-lived sessions between a service and a service client

    Answer: BCDSection: (none)

    Explanation/Reference:

    QUESTION 45Which two are required to be supported by a J2EE 1.4 compatible application server? (Choose two.)

  • CH@N

    A. JAXB 1.0 technology for a web moduleB. JAXP 1.2 technology for a Java applet clientC. JSP 2.0 and Servlet 2.4 technologies for an EJB moduleD. JAX-RPC 1.1 and SAAJ 1.2 technologies for an EJB moduleE. JAX-RPC 1.1 and SAAJ 1.2 technologies for a Java applet clientF. JAX-RPC 1.1 and SAAJ 1.2 technologies for a J2EE application client

    Answer: DFSection: (none)

    Explanation/Reference:

    QUESTION 46Which two describe how the J2EE platform simplifies the use of JAXR? (Choose two.)

    A. It supports declarative configuration of JAXR connection factory properties.B. It provides an extensible typing system for data obtained from a variety of registry implementations.C. It allows a registry operator to proactively inform a registry client of changes to previously accessed

    registry information.D. It provides automatic lifecycle management of JAXR Connection objects obtained using a connection

    factory accessed from JNDI.

    Answer: ADSection: (none)

    Explanation/Reference:

    QUESTION 47Click the Task button.

    A.

  • CH@N

    B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 48Enterprise A invokes a Web service provided by enterprise B with some parameters, and receives aresponse. A developer is making this interaction asynchronous so that A does not have to wait for B tofinish processing. Which two actions must be taken to fulfill this requirement? (Choose two.)

    A. establish a Web service endpoint for enterprise A to receive the responseB. partition the endpoint implementation in interaction and processing layersC. convert all Web service methods to use XML documents as parameters and return valuesD. embed a correlation identifier in the request so that enterprise B can associate the response with it

    Answer: ADSection: (none)

    Explanation/Reference:

    QUESTION 49To accept multiple types of XML documents, which two types can be used by WSDL 1.1 part element?(Choose two.)

    A. xsd:qnameB. xsd:anyURIC. xsd:stringD. xsd:anyType

    Answer: CDSection: (none)

    Explanation/Reference:

    QUESTION 50What is a benefit of validating an XML document on the sender's side?

    A. It ensures that the recipients are able to validate the document.B. It ensures that the document conforms to the document's schema.C. It ensures that the recipients are able to map the document's elements to the same Java types.D. It ensures that all types that are used in the document conform to the primitive types defined in the XML

    schema specification.

    Answer: BSection: (none)

    Explanation/Reference:

  • CH@N

    QUESTION 51For a J2EE component, which code fragment is the correct and portable way of accessing a Web service?

    A. // Use the service implementation class to get the StubOrderService_Impl impl = new OrderService_Impl();Stub stub = (Stub) impl.getOrderServicePort();OrderService port = (OrderService) stub;// Call business methodOrder myorder = port.getOrderDetails(OrderId);

    B. Context ic = new InitialContext();OrderServiceStub svc = (OrderServiceStub)ic.lookup("java:comp/env/svc/OrderService");// Lookup the Service Endpoint InterfaceOrderService port = svc.getOrderServicePort();// Call business methodOrder myorder = port.getOrderDetails(OrderId);

    C. Context ic = new InitialContext();Service svc = (Service)ic.lookup("java:comp/env/svc/OrderService");// Lookup the Service Endpoint InterfaceOrderService port = (OrderService)svc.getPort(OrderService.class);// Call business methodOrder myorder = port.getOrderDetails(OrderId);

    D. ServiceFactory sf = ServiceFactory.newInstance();QName qname = new QName("urn:OrderService","OrderSvc");// Create service with the WSDL URL and the service qnameService svc = sf.createService(wsdlURL, qname);QName qnamePort = new QName("urn:OrderService","OrderService");OrderService port = (OrderService) svc.getPort(qnamePort,OrderService.class);// Call business methodOrder myorder = port.getOrderDetails(OrderId);

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 52Where is the Kerberos ticket embedded in a SOAP header processed?

    A. Web service interaction layerB. Web service processing layerC. Web service interaction and processing layersD. It is an HTML issue and it is NOT related to Web services.

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 53

  • CH@N

    Given

    Which two are true? (Choose two.)

    A. The attribute with the value Doe is bound to the urn:mycompany namespace.B. The attribute with the value Frank is bound to the urn:mycompany namespace.C. The attribute with the value Doe is bound to the urn:partnercompany namespace.D. The attribute with the value Frank is bound to the urn:partnercompany namespace.

    Answer: ADSection: (none)

    Explanation/Reference:

    QUESTION 54Given:

    Assuming that no other namespace declarations exist, which two elements use the long type that isdefined in the http://www.w3.org/2001/XMLSchema namespace? (Choose two.)

    A. B.

  • CH@N

    C. J2EE 1.2 version of application.xmlone EJB module with J2EE 1.4 version of ejb-jar.xmlone EJB module with J2EE 1.3 version of ejb-jar.xmlone web module with J2EE 1.3 version of ejb-jar.xml

    D. J2EE 1.3 version of application.xmlone EJB module with J2EE 1.4 version of ejb-jar.xmlone EJB module with J2EE 1.2 version of ejb-jar.xmlone web module with J2EE 1.2 version of ejb-jar.xml

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 56Given:

    JohnSmith

    Which two are true? (Choose two.)

    A. The element fname and lname cannot be bound to any namespace.B. The element fname and lname are bound to the urn:mycompany namespace.C. The namespace identified by the prefix ns2 can be bound to the element name and its descendants.D. The namespace identified by the prefix ns1 can be bound to the element employees and its

    descendants.

    Answer: CDSection: (none)

    Explanation/Reference:

    QUESTION 57Given:

    Assume all XML fragments are well-formed.

    According to the WS-I Basic Profile 1.0a, which type definition can be used to define an array of longs?

  • CH@N

    A.

    B.

    C.

    D.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 58Which two are commonly used as SOAP headers? (Choose two.)

    A. security informationB. transaction informationC. postal address informationD. stock quote request information

    Answer: ABSection: (none)

    Explanation/Reference:

    QUESTION 59What is a characteristic of a document-style Web service?

    A. It requires a rigid contract.B. It cannot make full use of XML.C. It is the only option available for asynchronous messaging.D. It can be used to replace multiple parameters in a Web service method with a single parameter.

    Answer: DSection: (none)

    Explanation/Reference:

  • CH@N

    QUESTION 60Click the Task button.

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 61Which describes the use of the SOAP 1.1 actor attribute?

    A. It is ignored.B. It indicates the recipient of a header block.C. It indicates the final recipient of the message.D. It indicates which recipient processes the Body element.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 62Which describes SOAP attachments?

    A. They must be compressed.B. They must be serialized to XML.C. They can contain binary format data.

  • CH@N

    D. They can be contained in the SOAP body.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 63Given:

    Which two XML fragments, when inserted into this soap:Envelope, result in a WS-I Basic Profile 1.0aconformant SOAP message? (Choose two.)

    A.

    Fred

    33

    B.

    Fred33

    C.

    Fred

    6

    D. 6

    Fred

    E. 6

    33

    Fred

    Answer: BDSection: (none)

  • CH@N

    Explanation/Reference:

    QUESTION 64An enterprise uses Web services to manage its supply chain consisting of a number of partners to processorders. The enterprise internally uses a number of systems, each of which occasionally makes these Webservice calls in different stages of order processing. Which pattern can consolidate all of these Web serviceinteractions in the enterprise?

    A. CommandB. Composite EntityC. Intercepting FilterD. Business DelegateE. Web Service Broker

    Answer: ESection: (none)

    Explanation/Reference:

    QUESTION 65A Web service that is implemented as a servlet-based endpoint can maintain state in the HttpSessionobject by implementing which interface?

    A. javax.rmi.RemoteB. javax.xml.rpc.ServiceC. javax.servlet.ServletContextD. javax.xml.rpc.server.ServiceLifecycle

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 66In a service-oriented architecture, which role does UDDI play?

    A. It rigorously defines the interface the Web services provide.B. It defines the semantic behavior of the participating Web services.C. It provides a location where services can be dynamically discovered.D. It ensures that a client is able to invoke Web services over the Internet.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 67Which two can be used for fine-grained access controls in a servlet-based Web service endpoint? (Choosetwo.)

  • CH@N

    A. Use HTTPS with mutual authentication for all data exchanges.B. Use the isUserInRole method to check if the authenticated user is in the logical role.C. Use the getUserPrincipal method to check the Principal for the authenticated user.D. Place the WSDL file in the WEB-INF/classes directory to secure the Web service from invocation by

    malicious clients.

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 68A developer is writing a one-way Web service. An error occurs when the service executes. Which is trueabout the Web service?

    A. It must time-out.B. It can send a SOAP fault back to the sender.C. It must send a SOAP fault back to the sender.D. It must NOT send a SOAP fault back to the sender.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 69An organization has all its Web services published in a UDDI registry.

    Which two are true? (Choose two.)

    A. All services interoperate with each other.B. Applications can look up services in the registry server and reuse them.C. It allows for loose coupling between services interacting with each other.D. Applications using the UDDI registry must specify the business process required to gain access to the

    published services.

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 70A developer is using the SAX parser to extract the value of an element in an XML document. Which methodshould be used?

    A. endElementB. charactersC. startElementD. startPrefixMapping

    Answer: BSection: (none)

  • CH@N

    Explanation/Reference:

    QUESTION 71A developer is using the XSLT APIs in JAXP 1.2. A TransformerFactory object is instantiated and used tocreate a Transformer. A Source object is used as the input to the Transformer. Which two are true?(Choose two.)

    A. The Source object must be created from a SAX reader or from a DOM node.B. The Source object can be created from a SAX reader, a DOM node, or an InputStream.C. If the Transformer is created without any specific instructions, then it copies the Source to the Result.D. If the Transformer is created without any specific instructions, then it throws a TransformerException.

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 72Which three describe unmarshal-time validation in JAXB? (Choose three.)

    A. It must be supported by all JAXB implementations.B. It is invoked using the Validator.validate method.C. It is enabled or disabled using the Unmarshaller.setValidating method.D. It enables a application to receive information about validation errors and warnings that are detected

    while unmarshalling a Java content tree into XML.E. It enables an application to receive information about validation errors and warnings that are detected

    while unmarshalling XML data into a Java content tree.

    Answer: ACESection: (none)

    Explanation/Reference:

    QUESTION 73Which three describe the on-demand validation in JAXB API? (Choose three.)

    A. It must be supported by all JAXB implementations.B. It is only available to the JAXB implementation and is not available to client applications.C. It enables an application to validate the Java content tree based on schema validation constraints.D. It enables an application to receive immediate feedback about modifications to a Java content tree.E. It enables an application to receive information about validation errors and warnings that are detected in

    the Java content tree.

    Answer: ACESection: (none)

    Explanation/Reference:

    QUESTION 74

  • CH@N

    A developer is creating an application where an XML file needs to be parsed to access only a singleelement. Which technology should be used to minimize memory requirements?

    A. XSLTB. JAXBC. SAX2D. DOM Level 2

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 75Click the Task button.

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 76Which describes the SAAJ API?

    A. It is used to parse XML schemas.B. It is used for unmarshalling WSDL documents to Java classes.

  • CH@N

    C. It is used for manipulating SOAP messages in JAX-RPC handlers and JAXR implementations.D. It mandates the use of the SOAPConnection object and marshals the data contained in Java classes to

    create WSDL documents.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 77Which SAAJ 1.2 type is used to represent SOAP message header blocks?

    A. org.omg.dom.DocumentB. javax.xml.soap.SOAPPartC. javax.xml.soap.DetailEntryD. javax.xml.soap.SOAPHeaderElement

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 78While constructing a valid SOAPMessage object, which two are optional? (Choose two.)

    A. SOAPPartB. SOAPBodyC. SOAPHeaderD. SOAPEnvelopeE. AttachmentPart

    Answer: CESection: (none)

    Explanation/Reference:

    QUESTION 79Click the Task button.

  • CH@N

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 80Which describes a J2EE security realm?

    A. an individual (or application program) identity that is defined in the application serverB. a collection of users and groups that are controlled by the same authentication policyC. an abstract name for the permission to access a particular set of resources in an applicationD. a set of authenticated users that are classified by common traits and defined in the application server

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 81Which two are required to be supported by a J2EE 1.4 compatible application server? (Choose two.)

    A. JAXB 1.0 technology for a web moduleB. JAXP 1.2 technology for a Java applet client

  • CH@N

    C. JSP 2.0 and Servlet 2.4 technologies for an EJB moduleD. JAX-RPC 1.1 and SAAJ 1.2 technologies for an EJB moduleE. JAX-RPC 1.1 and SAAJ 1.2 technologies for a Java applet clientF. JAX-RPC 1.1 and SAAJ 1.2 technologies for a J2EE application client

    Answer: DFSection: (none)

    Explanation/Reference:

    QUESTION 82What can a developer do to improve the interoperability of Web services developed using the J2EEplatform?

    A. restrict access only to clients that can locate a service using JNDIB. use only servlet-based endpoints when exposing services to non-Java clientsC. leverage the platform support for WS-I Basic Profile 1.0a when creating a serviceD. add a service description element to the WSDL file that describes the service endpoint

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 83Click the Task button.

    A.B.C.D.

  • CH@N

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 84A developer writes a Web service that uses MIME binding. Which is true?

    A. The Web service cannot be deployed behind a firewall.B. The Web service is compliant with WS-I Basic Profile 1.0a.C. The Web service is NOT compliant with WS-I Basic Profile 1.0a.D. The J2EE 1.4 platform prohibits the use of SOAP with attachments.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 85Given:

    5. HelloIF_Stub stub = (HelloIF_Stub)6. (new HelloWorldService_Impl().getHelloIFPort());7. stub._setProperty(Stub.ENDPOINT_ADDRESS_PROPERTY,

    8. System.getProperty("endpoint"));9. String callBack = stub.sayHelloBack("JAXRPC Sample");10. System.out.println(callBack);

    Which line(s) result in the first remote call?

    A. line 9B. line 10C. lines 7 and 8D. lines 5 and 6

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 86How do Web services fit into a Service Oriented Architecture (SOA)?

    A. A Web service must be discovered from a UDDI registry in a SOA.B. SOA and Web services both use the HTTP protocol at the transport layer.C. A Web service must publish itself to a UDDI registry to become part of a SOA.D. SOA is an architectural style and Web services provide an implementation strategy.

    Answer: DSection: (none)

  • CH@N

    Explanation/Reference:

    QUESTION 87A stateful business process needs to be exposed as a Web service that is implemented as an EJB basedendpoint. What can be used for maintaining state in the Web service?

    A. the container-generated EJBHome and EJBLocalHomeB. the container-generated EJBObject and EJBLocalObjectC. a custom mechanism that associates Web service messages using a correlation-idD. the Enterprise Beans' EJBContext that is accessed using the getCallerIdentity method

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 88A J2EE application contains business logic composed of EJB components.

    All current clients are Java applications accessing the business logic using RMI. Some clients are remote(running in different JVMs) and some are local (running in the same JVM). Which two will be true if the EJBcomponents are exposed as Web services? (Choose two.)

    A. Declarative security can be used for all clients.B. Current local clients must switch from RMI to Web service access.C. Non-Java clients can access the business logic using Web services.D. Current remote clients must switch from RMI to Web service access.

    Answer: ACSection: (none)

    Explanation/Reference:

    QUESTION 89Which two can be used for fine-grained access controls in a servlet-based Web service endpoint? (Choosetwo.)

    A. Use HTTPS with mutual authentication for all data exchanges.B. Use the isUserInRole method to check if the authenticated user is in the logical role.C. Use the getUserPrincipal method to check the Principal for the authenticated user.D. Place the WSDL file in the WEB-INF/classes directory to secure the Web service from invocation by

    malicious clients.

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 90In a Web service client, which design pattern is most appropriate to obtain the reference to a Web service?

  • CH@N

    A. FacadeB. CommandC. Service LocatorD. Business Delegate

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 91Which is true about UDDI data structures?

    A. All data structures include a categoryBag element.B. The identifierBag element must associate a valid UUID with a data structure.C. Only the businessEntity data structure includes the identifierBag element.D. Some data structures do NOT have an identifierBag or categoryBag element.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 92A developer uses the delete_tModel function to delete five tModels. Which two describe the behavior of thesystem after the delete_tModel is executed? (Choose two.)

    A. The delete_tModel logically deletes the tModels .B. The tModels cannot be accessed since they are permanently deleted.C. The deleted tModels still appear in the results returned by find_tModel.D. The deleted tModels are omitted from any results returned by find_tModel.

    Answer: ADSection: (none)

    Explanation/Reference:

    QUESTION 93What is the purpose of the binding element in a WSDL 1.1 document?

    A. It defines a collection of related endpoints.B. It defines the IP address of the machine where the service is deployed.C. It defines an abstract, typed definition of the data that is being communicated.D. It defines a concrete protocol and data format specification for a particular port type.

    Answer: DSection: (none)

    Explanation/Reference:

  • CH@N

    QUESTION 94Which is true about WSDL 1.1?

    A. It does NOT recommend a specific type systemB. It recommends the use of XSD as the type system.C. It recommends the use of DTD as the type system.D. It recommends the use of XSD and DTD as the type system

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 95According to the WSDL 1.1 and WS-I Basic Profile 1.0a, which types definition uses an existing schema?

    A.

    B.

    C.

    D.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 96What is the purpose of a WSDL 1.1 document?

    A. It defines an XML-based structure for describing Web service endpoints.B. It defines an XSLT-based structure for describing Web service endpoints.C. It defines an XML-based lightweight message protocol that is used by Web service endpoints.D. It defines an XSLT-based lightweight message protocol that is used by Web service endpoints.

    Answer: ASection: (none)

    Explanation/Reference:

  • CH@N

    QUESTION 97What is the functionality of search APIs defined in the UDDI 2.04 specification?

    A. It is impossible to perform a case-sensitive search on services.B. It provides a mechanism to perform a case-sensitive search on services.C. It provides a mechanism to get a list of current users on the UDDI registry.D. It provides a mechanism to get a list of services ordered by their creation date.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 98Which Java type can be used to represent arbitrary XML data in a JAX-RPC service endpoint interface?

    A. org.w3c.dom.DocumentB. javax.xml.soap.SOAPPartC. javax.xml.soap.SOAPElementD. javax.xml.soap.SOAPException

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 99Click the Task button.

  • CH@N

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 100A JAX-RPC client is using a stub to connect to a service. The stub implementation supports only thestandard properties supported in the JAX-RPC Stub interface. The client must set the endpoint addressproperty on the stub.

    Given:

    stub._setProperty("HTTPLOCATION","http://localhost:8080/services/mySvc");

    What is the result?

    A. The application throws an application-specific exception.B. The application throws a java.rmi.RemoteException.C. The application throws a javax.xml.rpc.JAXRPCException.D. The value "http://localhost:8080/services/mySvc" is assigned to the "HTTPLOCATION" property.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 101Given:

    1. public boolean handleRequest(MessageContext context){2. try{3. SOAPMessageContext soapCntxt = (SOAPMessageContext)context;4. SOAPMessage message = soapCntxt.getMessage();5. message.writeTo(logStream);6. }catch(javax.xml.soap.SOAPException se){7. throw new javax.xml.rpc.JAXRPCException(se);8. }9. }

    The handleRequest method (lines 1-9) is implemented by a JAX-RPC handler.

    Given that the logStream is a reference to some type of java.io.OutputStream, which two are true?(Choose two.)

    A. If the handler is associated with a JAX-RPC generated stub, it will write outgoing SOAP messages tothe logStream object.

    B. If the handler is associated with a JAX-RPC generated stub, it will write incoming SOAP messages tothe logStream object.

    C. If the handler is associated with a JAX-RPC service endpoint, it will write outgoing SOAP messages tothe logStream object.

  • CH@N

    D. If the handler is associated with a JAX-RPC service endpoint, it will write incoming SOAP messages tothe logStream object.

    Answer: ADSection: (none)

    Explanation/Reference:

    QUESTION 102Given:

    A developer is using a JAX-RPC implementation to generate an endpoint interface from a WSDLdocument. The Book complex type is referenced by the WSDL part of an input message.

    Which two Java types can represent the complex type as a parameter in the endpoint interface? (Choosetwo.)

    A. StringB. SOAPElementC. StringBufferD. a Java class named Book

    Answer: BDSection: (none)

    Explanation/Reference:

    QUESTION 103Given:

    1. public void startElement(String namespaceURI, String localName,2. String qName, Attributes atts){3. System.out.println(localName);4. }5. 6. 8. 9.

    A content handler implements the startElement method.

    Which output would the handler generate using SAX2 to parse the XML document in lines 5-9?

    A. EnvelopeBody

    B. soap:Envelopesoap:Body

  • CH@N

    C. EnvelopeBodyEnvelope

    D. soap:Envelopesoap:Bodysoap:Envelope

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 104A developer has a requirement to create a JAX-RPC client for an existing WS-I Basic Profile 1.0a compliantWeb service in a heterogeneous environment. Which is the correct mapping approach?

    A. RMIB. HandlersC. WSDL-to-JavaD. Java-to-WSDL

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 105A developer is writing a Web service that adds an item to an ordered queue. Within the service call there isno need to consult any back-end systems. Clients must be told their position in the queue as soon aspossible. There are no other requirements. Which connection mechanism should the developer choose?

    A. notification Web service messagingB. synchronous Web service messagingC. one-way RPC Web service messagingD. solicit-response Web service messaging

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 106Which two are true of JAX-RPC Web services? (Choose two.)

    A. EJB based endpoints are always invoked one thread at a time.B. Servlet-based endpoints are always invoked one thread at a time.C. EJB based endpoints may be invoked by multiple threads at the same time.D. Servlet-based endpoints may be invoked by multiple threads at the same time.

    Answer: ADSection: (none)

  • CH@N

    Explanation/Reference:

    QUESTION 107A developer needs to write a Web service that supports user sessions that timeout after 120 seconds.Which configuration file should the developer use?

    A. web.xmlB. server.xmlC. ejb-jar.xmlD. service-config.xml

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 108Which statement describes JAX-RPC Dynamic Interface Invocation (DII)?

    A. DIl clients use typed interfaces to invoke the Web service.B. DII lets clients access a Web service without a WSDL file.C. DII clients are bound at design-time to a single Web service.D. DII requires the client to statically configure the Web service proxy.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 109Which two are valid JAX-RPC clients? (Choose two.)

    A. UDDIB. JSPsC. SOAPD. WSDLE. stateful session bean

    Answer: BESection: (none)

    Explanation/Reference:

    QUESTION 110When working with a JAX-RPC message handler chain, which is true?

    A. None of the handlers in a chain can modify the SOAP headers.B. Only the first handler in a chain can modify the SOAP headers.C. Handlers processing incoming messages are invoked in the same order as handlers processing

    outgoing messages.

  • CH@N

    D. Handlers processing incoming messages are invoked in the reverse order as handlers processingoutgoing messages.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 111Which two operations are supported by an XML Key Management Specification (XKMS) compliant service?(Choose two.)

    A. generation, registration, and revocation of keysB. retrieval of public keys and validation of certificatesC. distribution and management of Kerberos service ticketsD. granting a Kerberos ticket granting ticket (TGT) to Web services

    Answer: ABSection: (none)

    Explanation/Reference:

    QUESTION 112Which two apply to digital signatures applied to an XML document? (Choose two.)

    A. The receiver verifies that the message matches the digital signature using its own private key.B. The receiver verifies that the message matches the digital signature using the sender's public key.C. The sender creates a digital signature using its own private key and sends that signature along with the

    original document.D. The sender creates a digital signature using its own public key and sends that signature along with the

    original document.

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 113A company builds a Web service to process images. These images are large files that are sent as SOAPattachments. Securing the images is not important. However, the accompanying SOAP messages containsensitive client data, including credit card numbers. A developer needs to choose a security mechanism forthis Web service. Which security mechanism secures the sensitive data with the least overhead?

    A. KerberosB. mutual authenticationC. message-level securityD. transport-level security

    Answer: CSection: (none)

    Explanation/Reference:

  • CH@N

    QUESTION 114Given:

    10. 11. 12.13. 14. 15.

    16.17.

    A JAX-RPC Web service deployed in a web container is secured using mutual authentication over SSL.

    Which XML element needs to be inserted at line 12 and line 16 in the web.xml descriptor respectively?

    A. HTTPS and MUTUALB. SECURED and HTTPSC. CONFIDENTIAL and BASICD. CONFIDENTIAL and CLIENT-CERT

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 115Which security specification can be used to allow single sign-on across multiple Web services?

    A. SSLB. SAMLC. XKMSD. XACML

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 116Given:

  • CH@N

    The digital signature described is applied using which technique?

    A. attachedB. detachedC. envelopedD. enveloping

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 117Which four factors impact the security of a Web service deployed on the J2EE platform? (Choose four.)

    A. the use of intermediaries and SOAP nodesB. the transport protocol used by the Web serviceC. the transaction throughput processed by the serviceD. the programming language used by the service consumerE. the nonrepudiation requirements of the business transactionF. the use of the Web service in the context of business-to-business or EAI

    Answer: ABEFSection: (none)

    Explanation/Reference:

    QUESTION 118Two companies communicate using Web services in a business transaction.

    Which mechanism ensures that business data cannot be renounced, or a transaction denied, by eitherone?

    A. integrity provided by public key certificates and digital signaturesB. confidentiality provided by asymmetric or symmetric cryptographyC. identity management provided by private keys and certificate authoritiesD. non-repudiation provided though public key cryptography by digital signing

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 119Given:

  • CH@N

    xmlns:xsd="http://www.w3.org/2001/XMLSchema"xmlns:ns1="http://sun.cert/">

    root9b3e64e326537b4e8c0ff19e953f9673

    SUNW

    Which describes this SOAP message?

    A. It is NOT well-formed.B. It contains a mandatory header block.C. It is WS-I Basic Profile 1.0a compliant.D. It does NOT contain the correct namespace declarations.

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 120Given:

    Engineering 287277

    Which is true?

    A. The name element is NOT bound to any namespace.B. The costId element is NOT bound to any namespace.C. The employee element is NOT bound to any namespace.D. The department and deptName elements are NOT bound to any namespace.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 121Click the Task button.

  • CH@N

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 122Given:

    JohnSmith

    Which two are true? (Choose two.)

    A. The element fname and lname cannot be bound to any namespace.B. The element fname and lname are bound to the urn:mycompany namespace.C. The namespace identified by the prefix ns2 can be bound to the element name and its descendants.D. The namespace identified by the prefix ns1 can be bound to the element employees and its

    descendants.

    Answer: CDSection: (none)

  • CH@N

    Explanation/Reference:

    QUESTION 123Given:

    Which two element definitions, when inserted into the given schema fragment, result in a correct schematype definition? (Choose two.)

    A. B. C. D.

    Answer: ACSection: (none)

    Explanation/Reference:

    QUESTION 124A Web service needs to encrypt certain SOAP headers when responding.

    Which is true?

    A. The Web service interaction layer is the appropriate place for such encryption.B. The Web service processing layer is the appropriate place for such encryption.C. Either the Web service interaction or processing layer are appropriate for such encryption.D. Neither the Web service interaction nor processing layer are appropriate for such encryption.

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 125A Web service is developed using the J2EE API and deployed in a J2EE application. Which two are true?(Choose two.)

    A. The Web service has no knowledge of the client's programming model.B. An EJB in another application server can consume this service only if the service is deployed as a

    stateless session bean endpoint.

  • CH@N

    C. The Web service can always determine that the client is using stubs, Dynamic Invocation Interface, ordynamic proxies to consume the service.

    D. The SOAP requests generated by clients for this Web service are logically equivalent for clients usingstubs, Dynamic Invocation Interface, or dynamic proxies.

    Answer: ADSection: (none)

    Explanation/Reference:

    QUESTION 126Given:

    5. File f = new File("stylesheet.xsl")6. FileInputStream fis = new FileInputStream(f);7. StreamSource src = new StreamSource(fis);8. TransformerFactory tf = TransformerFactory.newInstance();9. // insert code here

    Which code fragment, inserted at line 9, enables the reuse of stylesheet.xsl to improve performance?

    A. Templates templates = tf.newTemplates(fis);B. Templates templates = tf.newTemplates(src);C. Transformer transformer = tf.newTransformer(src);D. Transformer transformer = tf.newTransformer();

    transformer.transform(src, result);

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 127Enterprise A invokes a Web service provided by enterprise B with some parameters, and receives aresponse. A developer is making this interaction asynchronous so that A does not have to wait for B tofinish processing. Which two actions must be taken to fulfill this requirement? (Choose two.)

    A. establish a Web service endpoint for enterprise A to receive the responseB. partition the endpoint implementation in interaction and processing layersC. convert all Web service methods to use XML documents as parameters and return valuesD. embed a correlation identifier in the request so that enterprise B can associate the response with it

    Answer: ADSection: (none)

    Explanation/Reference:

    QUESTION 128An enterprise has a requirement to create a Web service to accept purchase orders. The order datacontains some authorization information that is specific to each order (such as, who can access which partsof the order). Keeping in mind future enhancements in types of orders that the enterprise needs to accept,which two design strategies provide the most flexibility? (Choose two.)

  • CH@N

    A. a Web service interface with one method per accepted XML document type for a purchase orderB. a procedure-style Web service method that lists all data elements and all possible access control

    optionsC. a document-style Web service method that accepts all types of XML documents representing purchase

    ordersD. a Web service interface with one method for each combination of data elements and the access control

    options

    Answer: ACSection: (none)

    Explanation/Reference:

    QUESTION 129Given:

    11. public BulkResponse findCallerAssociations(12. Collection findQualifiers,13. Boolean confirmedByCaller,14. Boolean confirmedByOtherParty,15. Collection associationTypes);...36. BusinessQueryManager queryMngr =37. registry.getBusinessQueryManager();38. BulkResponse response =39. queryMngr.findCallerAssociations(null,40. Boolean.TRUE,Boolean.FALSE,null);

    A developer has established a JAXR connection to a UDDI registry. The developer executes thefindCallerAssocations method that is defined in lines 11-15. The context for the method invocation is shownin lines 36-40. The invocation on line 39-40 will return a BulkRespone object.

    Which is true about the BulkResponse object?

    A. It contains a Collection of Association objects that the other party has confirmed with the caller.B. It contains a Collection of Organization objects that have confirmed the associations with the caller.C. It contains a Collection of Association objects that the other party has NOT yet confirmed with the caller.D. It contains a Collection of Key objects representing UUID keys for organizations that have confirmed the

    associations with the caller.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 130Which is true about J2EE 1.4 compatible application servers?

    A. They must support at least Level 0 of the JAXR 1.0 API.B. They must support at least Level 1 of the JAXR 1.0 API.C. They must support both Level 0 and 1 of the JAXR 1.0 API.D. They are NOT required to support either Level 0 or Level 1 of the JAXR 1.0 API.

    Answer: ASection: (none)

  • CH@N

    Explanation/Reference:

    QUESTION 131Which two describe the uses for JAXR 1.0 Concept? (Choose two.)

    A. It can be used to parse a WSDL document for generating a corresponding Java class.B. It can be used to define namespaces for external identifiers, such as D-U-N-S Numbers.C. It can be used to define the hierarchical tree structure and detailed elements of a ClassificationScheme.D. It can be used to define the hierarchical tree structure of a ClassificationScheme, but cannot be used for

    defining its detailed elements.

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 132Which describes the JAXR 1.0 BusinessQueryManager object?

    A. It can only be used with UDDI registries.B. It allows clients to search for information through interfaces defined in JAXR infomodel.C. It allows clients to search and update information through interfaces defined in JAXR infomodelD. It mandates the implementation of DeclarativeQueryManager, allowing clients to use SQL syntax for

    queries.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 133Click the Task button.

  • CH@N

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 134Click the Task button.

  • CH@N

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 135Which is true about a JAX-RPC SOAP handler?

    A. Its methods are invoked by a JAX-RPC HandlerChain.B. It must be deployed on both the client and server endpoint.C. It must maintain state, based on the content of SOAP messages.D. It is destroyed if any of its methods throw a SOAPFaultException.

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 136According to the WS-I Basic Profile 1.0a, which is true about the SOAP1.1 encodingStyle attribute?

    A. It can occur anywhere in a message.B. It can only be declared on children Header elements.C. It can be declared on any children of the Body element of rpc-literal messages.D. It cannot be used with elements qualified by the http://schemas.xmlsoap.org/soap/envelope namespace.

  • CH@N

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 137Which two fault codes are specified by the SOAP 1.1 specification? (Choose two.)

    A. FaultB. ClientC. ServerD. Header

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 138According to the JAX-RPC 1.1 specification, which two are true with respect to SOAP 1.1 header blockprocessing? (Choose two.)

    A. A header block can be processed by one or more JAX-RPC handlers.B. All header blocks must be processed before a Web service endpoint can return a response.C. Information in a header block can be passed to a service endpoint implementation as a parameter for

    processing.D. An intermediary may choose NOT to process a mandatory header block if it does NOT understand the

    header block.

    Answer: ACSection: (none)

    Explanation/Reference:

    QUESTION 139Given:

    Assuming that no other namespace declarations exist, which two elements use the long type that isdefined in the http://www.w3.org/2001/XMLSchema namespace? (Choose two.)

  • CH@N

    A. B.

  • CH@N

    C. MontyDuke

    D. MontyDuke

    Answer: CDSection: (none)

    Explanation/Reference:

    QUESTION 142Which two describe the role of XML schemas in Web services? (Choose two.)

    A. DTDs provide stricter data typing than XML schemas.B. XML schemas can be used to validate the organization of XML documents.C. Many XML technologies used by Web services are defined using XML schemas.D. XML schemas cannot be used to validate the data contained in XML documents.

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 143Given:

    Which describes this WSDL extract?

    A. The extract is WS-I Basic Profile 1.0a compliant because both port element names are different.B. The extract is NOT WS-I Basic Profile 1.0a compliant because both port elements point to the same

    location.C. The extract is WS-I Basic Profile 1.0a compliant because both port elements point to different binding

    elements.D. The extract is NOT WS-I Basic Profile 1.0a compliant because it contains two port elements in the same

    service.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 144A developer is using the SAX parser to extract the value of an element in an XML document. Which methodshould be used?

  • CH@N

    A. endElementB. charactersC. startElementD. startPrefixMapping

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 145In addition to SAX2 and DOM Level 2, which is supported by JAXP 1.2?

    A. XSLTB. JAXBC. SAAJD. JDBC

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 146Which describes the SAAJ API?

    A. It is used to parse XML schemas.B. It is used for unmarshalling WSDL documents to Java classes.C. It is used for manipulating SOAP messages in JAX-RPC handlers and JAXR implementations.D. It mandates the use of the SOAPConnection object and marshals the data contained in Java classes to

    create WSDL documents.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 147A developer has a requirement to extract the XML namespace of an element using SAX2. Which methodmust be used?

    A. charactersB. endDocumentC. endPrefixMappingD. startPrefixMapping

    Answer: DSection: (none)

    Explanation/Reference:

  • CH@N

    QUESTION 148Click the Task button.

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 149Given:

    8. public void marshallCollection(Collection collection)

    9. throws Exception {10. JAXBContext context = JAXBContext.newInstance("test.jaxb");11. Marshaller marshaller = context.createMarshaller();12. marshaller.setProperty(Marshaller.JAXB_FORMATTED_OUTPUT,13. new Boolean(true));14. marshaller.marshal(collection,15. new FileOutputStream("jaxbFile"));16. }

    What is the functionality of the code?

    A. It marshals the data contained in jaxbFile to collection.B. It marshals the data contained in jaxbFile to collection with line breaks and indentation.C. It marshals the data contained in the collection to jaxbFile with line breaks and indentation.D. It marshals the data contained in collection and creates a Java class file called jaxbFile with proper code

    formatting.

  • CH@N

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 150Given:

    10. SOAPHeader header = message.getSOAPHeader();11. Name headerName = soapFactory.createName("Claim",12. "wsi", "http://ws-i.org/schemas/conformanceClaim/");13. SOAPHeaderElement headerElement =14. header.addHeaderElement(headerName);15. headerElement.addAttribute(soapFactory.createName(16. "conformsTo"), "http://ws-i.org/profiles/basic1.0/");

    What is the functionality of the code?

    A. It retrieves the SOAPHeader object from a message and adds a new SOAPHeaderElement object to it.B. It retrieves the SOAPHeader object from the SOAP-ENV, assigns a new attribute to it, and creates a

    new message.C. It creates a new SOAPHeaderElement object, assigns it to a new SOAPHeader object, and creates a

    new message.D. It creates a SOAPHeader object, assigns a new SOAPHeaderElement object to it, and assigns the new

    SOAPHeader object to a message.

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 151A developer is creating an application where an XML file needs to be parsed to access only a singleelement. Which technology should be used to minimize memory requirements?

    A. XSLTB. JAXBC. SAX2D. DOM Level 2

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 152Given:

    11. public BulkResponse findCallerAssociations(12. Collection findQualifiers,13. Boolean confirmedByCaller,14. Boolean confirmedByOtherParty,15. Collection associationTypes);...

  • CH@N

    36. BusinessQueryManager queryMngr =37. registry.getBusinessQueryManager();38. BulkResponse response =39. queryMngr.findCallerAssociations(null,40. Boolean.TRUE,Boolean.FALSE,null);

    A developer has established a JAXR connection to a UDDI registry. The developer executes thefindCallerAssocations method that is defined in lines 11-15. The context for the method invocation is shownin lines 36-40. The invocation on line 39-40 will return a BulkRespone object.

    Which is true about the BulkResponse object?

    A. It contains a Collection of Association objects that the other party has confirmed with the caller.B. It contains a Collection of Organization objects that have confirmed the associations with the caller.C. It contains a Collection of Association objects that the other party has NOT yet confirmed with the caller.D. It contains a Collection of Key objects representing UUID keys for organizations that have confirmed the

    associations with the caller.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 153Which is true about J2EE 1.4 compatible application servers?

    A. They must support at least Level 0 of the JAXR 1.0 API.B. They must support at least Level 1 of the JAXR 1.0 API.C. They must support both Level 0 and 1 of the JAXR 1.0 API.D. They are NOT required to support either Level 0 or Level 1 of the JAXR 1.0 API.

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 154Which describes the JAXR 1.0 BusinessQueryManager object?

    A. It can only be used with UDDI registries.B. It allows clients to search for information through interfaces defined in JAXR infomodel.C. It allows clients to search and update information through interfaces defined in JAXR infomodelD. It mandates the implementation of DeclarativeQueryManager, allowing clients to use SQL syntax for

    queries.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 155A JAXR client has established connection with a UDDI registry and needs to get a service binding from theregistry. Which steps are required to accomplish this task?

  • CH@N

    A. find the appropriate concept and then find the service binding that is associated with that conceptB. find the appropriate authentication token and then find the service binding that is associated with that

    authentication tokenC. find the appropriate organization, get the tModel associated with that organization, and then find the

    service binding that is associated with the tModelD. find the appropriate organization, find the services that are associated with that organization, and then

    find the service binding that is associated with the service

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 156In a service-oriented architecture, what role does WSDL play?

    A. It defines the semantic behavior of the Web service.B. It defines the interface that the Web service provides.C. It ensures that a client is able to invoke the Web service over the Internet.D. It provides a location where the Web service can be discovered dynamically.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 157A supplier has an EJB based endpoint that accepts various types of purchase order documents. All of thedocuments' types are defined by the clients who send the purchase orders. Which two will increase theXML parsing performance at the supplier? (Choose two.)

    A. using one-way callsB. turning off XML validationC. caching entity references for each purchase order typeD. using a servlet-based endpoint instead of the EJB based endpoint

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 158Click the Exhibit button.

    Which two code snippets retrieve the faultcode, faultstring, and faultactor from the message? (Choose two.)

    A. SOAPFault newFault = body.getFault();Name code = newFault.getFaultCodeAsName();String string = newFault.getFaultString();String actor = newFault.getFaultActor();

  • CH@N

    B. SOAPFault newFault=body.getFault();Element code = newFault.getElementsByTagName("faultcode");Element string =newFault.getElementsByTagName("faultstring");Element actor =newFault.getElementsByTagName("faultactor");

    C. SOAPFault newFault = body.getFault();NodeList code = newFault.getElementsByTagName("faultcode");NodeList string =newFault.getElementsByTagName("faultstring");NodeList actor =newFault.getElementsByTagName("faultactor");

    D. Node newFault =body.getElementsByTagName("SOAP-ENV:Fault");Node code = newFault.getElementsByTagName("faultcode");Node string = newFault.getElementsByTagName("faultstring");Node actor = newFault.getElementsByTagName("faultactor");

    Answer: ACSection: (none)

    Explanation/Reference:

    QUESTION 159A J2EE application contains business logic composed of EJB components.

    All current clients are Java applications accessing the business logic using RMI. Some clients are remote(running in different JVMs) and some are local (running in the same JVM). Which two will be true if the EJBcomponents are exposed as Web services? (Choose two.)

    A. Declarative security can be used for all clients.B. Current local clients must switch from RMI to Web service access.C. Non-Java clients can access the business logic using Web services.D. Current remote clients must switch from RMI to Web service access.

    Answer: ACSection: (none)

    Explanation/Reference:

    QUESTION 160A Web service that is implemented as a servlet-based endpoint can maintain state in the HttpSessionobject by implementing which interface?

    A. javax.rmi.RemoteB. javax.xml.rpc.ServiceC. javax.servlet.ServletContextD. javax.xml.rpc.server.ServiceLifecycle

    Answer: DSection: (none)

    Explanation/Reference:

  • CH@N

    QUESTION 161Which two architectures should be used to expose a Web service interface for a legacy enterprise system?(Choose two.)

    A. write an EJB based or a servlet-based endpoint that uses a J2EE connector to access the legacyenterprise system

    B. write an entity bean that accepts incoming XML messages and uses a J2EE connector to access thelegacy enterprise system

    C. write an EJB based or a servlet-based endpoint that uses a socket connection or a proprietary API toaccess the legacy enterprise system

    D. write a standalone application that accesses the legacy enterprise system, translates its data to theequivalent XML representation and persists the data in an XML database

    Answer: ACSection: (none)

    Explanation/Reference:

    QUESTION 162Which correctly describes the element named jaxrpc-mapping-file in thewebservices.xml descriptor?

    A. It points to a file that can only be created by the application deployer.B. It points to a file that maps the container's configuration information to the corresponding JAX-RPC

    properties.C. It points to a file that must always be named jaxrpc-ri.xml and must always be placed in the WEB-INF

    directory.D. It points to a file that contains information that correlates the mapping between the Java interfaces and

    the WSDL for the Web service.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 163Given:

    This WSDL fragment defines the XML document sent in a one-way document-exchange style Web service.

    Which is a possible JAX-RPC service endpoint interface for this Web service?

  • CH@N

    A. public interface UpDateBookInfo extends Remote {public void update(BookInfo bookInfo)throws RemoteException;}

    B. public interface UpDateBookInfo extends Remote {public String update(BookInfo bookInfo)throws RemoteException;}

    C. public interface UpDateBookInfo extends Remote {public BookInfo update(BookInfo bookInfo)throws RemoteException;}

    D. public interface UpDateBookInfo extends Remote {public void update(String author,String title)throws RemoteException;}

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 164A document-style service defines a document passed to the Web service using xsd:anyType in the WSDLfile that describes the service. How should the document be parsed?

    A. use java.util.regexB. use java.util.StringTokenizerC. use javax.xml.soap.SOAPHeaderD. use javax.xml.soap.SOAPElement

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 165A developer implements a logging system using a SOAP handler created using the JAX-RPC and SAAJAPIs. Which elements of the HTTP messages exchanged in a J2EE Web service interaction can beaccessed using these APIs?

    A. the SOAP header elementsB. the SOAP header and HTTP header elementsC. the entire SOAP message and any attachments it containsD. all of the SOAP message, including attachments, and all of the HTTP elements

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 166A client sends a required SOAP header in a SOAP message. The server-side process determines that

  • CH@N

    information in the header is invalid and generates a SOAP fault.

    What is the appropriate fault code for this type of SOAP fault?

    A. ClientB. ServerC. MustUnderstandD. VersionMismatch

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 167Given:

    10. File xml = new File("purchaseorder.xml");11. File xsl = new File("purchaseorder.xsl");12.

    Which code snippet inserted at line 12 causes the XSL stylesheet to be applied to the XML?

    A. SAXParserFactory factory = SAXParserFactory.newInstance();SAXParser obj = factory.newSAXParser();obj.parse(xml,xsl);

    B. DocumentBuilderFactory factory =DocumentBuilderFactory.newInstance();Transformer obj = factory.newTransformer(new StreamSource(xsl));obj.parse(xml,xsl);

    C. TransformerFactory factory =TransformerFactory.newInstance();DocumentBuilder obj = factory.newDocumentBuilder();obj.transform(new StreamSource(xml), new StreamResult(System.out));

    D. TransformerFactory factory =TransformerFactory.newInstance();Transformer obj =factory.newTransformer(new(StreamSource(xsl)));obj.transform(new StreamSource(xml), new StreamResult(System.out));

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 168Which two describe the HTTP protocol-specific information that can be defined in a WSDL 1.1. document?(Choose two.)

    A. an address for the portB. an address for the message queueC. an indication that the service is deployed behind a firewallD. an address relative to the base address defined by the port

    Answer: AD

  • CH@N

    Section: (none)

    Explanation/Reference:

    QUESTION 169According to the WS-I Basic Profile 1.0a, which UDDI type must be associated with a tModel thatrepresents a WSDL 1.1 document?

    A. xmlSpecB. wsdlSpecC. soapSpecD. categoryBag

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 170What is the purpose of UDDI bindingTemplate?

    A. It contains the single sign-on token.B. It contains the information for invoking a registered business API.C. It contains information about the service running behind a firewall.D. It processes the runtime bindingTemplate information to retrieve the login token.

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 171According to the WS-I Basic Profile 1.0a, if the use attribute of the WSDL1.1 SOAP binding body element is omitted, what is its default value?

    A. rpcB. literalC. encodedD. document

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 172According to the WS-I Basic Profile 1.0a, which is true about the restriction placed on the WSDLarrayType?

    A. It can only be used by array declaration wrappers.

  • CH@N

    B. It must be used as an attribute in an array declaration.C. It must NOT be used as an attribute in an array declaration.D. It must be used as the value of the type attribute in an array declaration wrapper.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 173Which two describe the UDDI Inquiry API? (Choose two.)

    A. It requires user authentication.B. It can be used to query the Internet.C. It does NOT require user authentication.D. It can be used to search a UDDI registry.

    Answer: CDSection: (none)

    Explanation/Reference:

    QUESTION 174Which element is used to define new XML Schema complex types within a WSDL 1.1 document?

    A. typesB. messageC. portTypeD. definitions

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 175Which two are true about SOAP encoding of compound values? (Choose two.)

    A. Compound values cannot be encoded.B. A compound value should only be encoded as a single reference.C. Members of a compound value are encoded as accessor elements.D. Accessors with names that are local to their containing types have unqualified names.

    Answer: CDSection: (none)

    Explanation/Reference:

    QUESTION 176According to the WS-I Basic Profile 1.0a, what are three valid child elements of a Fault element? (Choose

  • CH@N

    three.)

    A. actorB. detailC. faultcodeD. faultdetailE. faultstring

    Answer: BCESection: (none)

    Explanation/Reference:

    QUESTION 177Click the Task button.

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 178According to the WS-I Basic Profile 1.0a, which restriction is placed on processing mandatory headerblocks?

    A. A receiver can ignore the mandatory header.B. All of the headers must be processed at one time.C. A receiver must handle messages in such a way that it appears that all checking of mandatory header

    blocks is performed before any actual processing.D. A receiver must NOT handle messages in such a way that it appears that all checking of mandatory

    header blocks is performed before any actual processing.

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 179What is a characteristic of a document-style Web service?

    A. It requires a rigid contract.B. It cannot make full use of XML.C. It is the only option available for asynchronous messaging.D. It can be used to replace multiple parameters in a Web service method with a single parameter.

    Answer: D

  • CH@N

    Section: (none)

    Explanation/Reference:

    QUESTION 180Which two statements are true? (Choose two.)

    A. A header block targeted to an intermediary node must be forwarded to the next node.B. A header block targeted to an intermediary node must NOT be forwarded to the next node.C. An intermediary in a SOAP message exchange cannot add additional headers to a SOAP message.D. An intermediary in a SOAP message exchange can add additional header blocks to a SOAP message.

    Answer: BDSection: (none)

    Explanation/Reference:

    QUESTION 181Which two APIs are used to create J2EE components? (Choose two.)

    A. EJBB. JSPC. JMSD. JAXBE. SAAJ

    Answer: ABSection: (none)

    Explanation/Reference:

    QUESTION 182While constructing a valid SOAPMessage object, which two are optional? (Choose two.)

    A. SOAPPartB. SOAPBodyC. SOAPHeaderD. SOAPEnvelopeE. AttachmentPart

    Answer: CESection: (none)

    Explanation/Reference:

    QUESTION 183Which two describe how the J2EE platform simplifies the use of JAXR? (Choose two.)

    A. It supports declarative configuration of JAXR connection factory properties.B. It provides an extensible typing system for data obtained from a variety of registry implementations.

  • CH@N

    C. It allows a registry operator to proactively inform a registry client of changes to previously accessedregistry information.

    D. It provides automatic lifecycle management of JAXR Connection objects obtained using a connectionfactory accessed from JNDI.

    Answer: ADSection: (none)

    Explanation/Reference:

    QUESTION 184Which are J2EE components?

    A. JMS, EJB, JSPB. EJB, JSP, ServletC. JMS, JDBC, JAXRD. JMS, JSP, JAX-RPC

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 185Which two are true about J2EE 1.4 compatible application servers? (Choose two.)

    A. They must include a UDDI registry.B. They must support the latest versions of all J2EE APIs.C. They must include a JMS provider that supports point-to-point and publish-subscribe messaging.D. They allow developers to use multiple DOM implementations with no changes to the parsing code.

    Answer: CDSection: (none)

    Explanation/Reference:

    QUESTION 186Given that a JAX-RPC client needs to support WS-I Basic Profile 1.0a, which is true about JAX-RPChandlers?

    A. They can be used to add a WS-I Basic Profile 1.0a conformance header block to outgoing messages.B. They must be used to add a WS-I Basic Profile 1.0a conformance header block to outgoing messages.C. They must NOT be used to add a WS-I Basic Profile 1.0a conformance header block to outgoing

    messages.D. They should NOT be used to add a WS-I Basic Profile 1.0a conformance header block to outgoing

    messages.

    Answer: ASection: (none)

    Explanation/Reference:

  • CH@N

    QUESTION 187Which is false?

    A. A J2EE component accesses a purchase order Web service. The URL to access the purchase orderWeb service can be changed while deploying the J2EE component.

    B. A J2EE Web service method can invoke another Web service method by directly opening a socketconnection and exchanging SOAP messages.

    C. A Web service endpoint can be reconfigured during deployment to use an alternate database withoutchanging its implementation code.

    D. A J2EE Web service method invokes another Web service method deployed on the same J2EEapplication server. The security context established because of HTTP basic authentication must bepassed to the second Web service invocation by the application server.

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 188A chess website lets its users play chess with other players on the Internet.

    The website needs to add a new web method that lets members write simple programs to observe anongoing game. The Web service uses the game ID and the move ID (0 for the last played move) as theinput, and returns the corresponding move.

    Which Web service method offers the least complex solution and has the best performance?

    A. a procedure-style Web service method that takes the game ID and the move ID as input, and returns astring for the move

    B. a document-style Web service method that takes an XML document containing the game ID and themove ID as input, and returns an XML document containing the move

    C. an asynchronous procedure-style Web service method that takes integer parameters game ID and themove ID, and a Web reference for callback as input; the server sends a string for the move at a latertime for all the callbacks

    D. an asynchronous document-style Web service method that takes an XML document containing thegame ID, the move ID, and a web reference for the callback as input; the server sends an XMLdocument containing the move at a later time for all the callbacks

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 189A J2EE Web service is designed to be synchronous, request-response, and HTTP-based. New businessrequirements indicate that the implementation store the request data to be batch-processed. The newservice only needs to send a message back to the client acknowledging receipt of the data in the HTTPresponse. Which J2EE technology can be added in the service implementation to facilitate this change?

    A. JavaServer Faces (JSF)B. Java Activation Framework (JAF)C. Remote Method Invocation using IIOP (RMI-IIOP)D. Java Message Service (JMS) and Message Driven Beans (MDB)

  • CH@N

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 190For a Web service client that is written in Java, which two can result in a RemoteException? (Choose two.)

    A. a SOAP faultB. an incorrect configuration of stubsC. an out-of-memory error on the clientD. a communication failure due to a network error

    Answer: ADSection: (none)

    Explanation/Reference:

    QUESTION 191A customer's workflow application has many coarse-grained Web services that act on different parts of theincoming purchase order. The purchase order document can evolve over a period of time to includeappropriate information for various suppliers. Each part of the workflow only accesses parts of thedocument. Which technique should be used to implement this workflow?

    A. use a document-style processing modelB. use JAXB to map the incoming message to Java objects at each stepC. map the document manually to individual Java objects for further processingD. map the incoming document to a database schema and write the business logic in entity beans

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 192A developer has a requirement to expose a Web service interface to an existing order processing system.Which is the appropriate design?

    A. only a new interaction layerB. only a new processing layerC. a new interaction layer and a new processing layerD. a new interaction layer and a facade processing layer that use the existing order processing systemE. a new processing layer and a facade interaction layer that use the existing order processing system

    Answer: DSection: (none)

    Explanation/Reference:

  • CH@N

    QUESTION 193A Web service provides two service methods. One method is for all company employees. The other methodis only for managers. Which service endpoint type can be used with J2EE declarative security to build thisWeb service?

    A. servlet endpointB. stateless session bean endpointC. stateless session bean or servlet endpointD. no service endpoint types support this functionality

    Answer: BSection: (none)

    Explanation/Reference:

    QUESTION 194A developer has a requirement to create a JAX-RPC client for an existing WS-I Basic Profile 1.0a compliantWeb service in a heterogeneous environment. Which is the correct mapping approach?

    A. RMIB. HandlersC. WSDL-to-JavaD. Java-to-WSDL

    Answer: CSection: (none)

    Explanation/Reference:

    QUESTION 195When using SOAP with the HTTP protocol, which is true?

    A. One-way RPC sends an HTTP response back to the client.B. One-way RPC does NOT send an HTTP response back to the client.C. Synchronous request-response guarantees ordering of requests from multiple clients.D. Asynchronous request-response does NOT send an HTTP response back to the client.

    Answer: ASection: (none)

    Explanation/Reference:

    QUESTION 196Which two J2EE component technologies can be used to create Web services? (Choose two.)

    A. servletsB. entity beansC. stateful session beansD. stateless session beans

    Answer: ADSection: (none)

  • CH@N

    Explanation/Reference:

    QUESTION 197Click the Task button.

    A.B.C.D.

    Answer: Section: (none)

    Explanation/Reference:

    QUESTION 198What is a function of JAX-RPC handlers?

    A. translate WSDLB. manipulate HTTP headersC. enforce SSL requirementsD. manipulate message headers

    Answer: DSection: (none)

    Explanation/Reference:

    QUESTION 199A stateful Web service is implemented as an EJB based endpoint. What are two ways to maintain thatstate? (Choose two.)

    A. by using URL re-writingB. by adding a session cookie to the HTTP headersC. by adding a conversation id to the SOAP headersD. by requiring clients to send a client id parameter to all methods

    Answer: CDSection: (none)

    Explanation/Reference:

    QUESTION 200Which three security technologies are used by WS-Security? (Choose three.)

    A. SAMLB. XACMLC. XML EncryptionD. XML Canonicalization

  • CH@N

    E. XML Digital Signatures

    Answer: CDESection: (none)

    Explanation/Reference:

    QUESTION 201Which two mechanisms can a Web service, deployed in a J2EE 1.4 compatible application server, use forauthentication? (Choose two.)

    A. HTTP digest authentication, where the client sends a one-way digest of the passwordB. symmetric HTTPS, where both the client and server can authenticate each other by requesting and

    verifying the X.509 certificateC. HTTP Basic Authentication, where the username and password are passed as HTTP headers that are

    uu-encoded, but not encryptedD. form-based authentication, where the username and password fields are passed using the j_username

    and j_password respectively

    Answer: BCSection: (none)

    Explanation/Reference:

    QUESTION 202Which four factors impact the security of a Web service deployed on the J2EE platform? (Choose four.)

    A. the use of intermediaries and SOAP nodesB. the transport protocol used by the Web serviceC. the transaction throughput processed by the serviceD. the programming language used by the service consumerE.