We provide real 1Z0-897 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Oracle 1Z0-897 Exam quickly & easily. The 1Z0-897 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Oracle 1Z0-897 dumps pdf and vce product and material, you can easily pass the 1Z0-897 exam.
Q1. Which two statements are true about WSIT client development and using the WSIT configuration file? (Choose two.)
A. Client configuration files do NOT contain information security features, such as authentication.
B. The file contains the URL for the WSDL.
C. To maintain interoperability, the configuration file must not name packages.
D. A WSIT client uses the file as a WSDL proxy is available from any WSIT compliant service.
E. The wsimport tool uses the file to access the WSDL and build stubs to access a service.
Q2. Given the following web service:
How many web methods are there in the above web service? (Choose one)
Q3. Given that StockQuoteService is a Service class and StockQuoteProvider is a corresponding SEI for a web service. Which of the following options enable MTOM feature for proxy for the StockQuoteProvider SEI ? (Choose one)
A. proxy = new StockQuoteService().getStockQuoteProvider()
B. proxy = new StockQuoteService().getStockQuoteProvider(new MTOMFeature())
C. proxy = new StockQuoteService(new MTOMFeature()).getStockQuoteProvider()
D. proxy = new StockQuoteService().getStockQuoteProvider(new RespectBindingFeature())
Q4. Which two statements are true about the I-Stack and annotations technologies? (Choose two.)
A. With 64-bit Java, JAXB compatible parameters are preferred for performance.
B. @WebMethod is required for private methods, but public methods are exposed in any service automatically.
C. Declaring business methods final is a good way to protect the integrity of the implementation class.
D. Method parameters and return types must be compatible with the JAXB 2.0.
E. JAX-WS uses annotations to invoke Web service requests at runtime.
Q5. Which security technologies are not included in WS-Security?
B. handshake for credential exchange and session establishment
C. security tokens
D. digital signatures
Q6. An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer has stringent security requirements that require suppliers to verify their identity. Data integrity and confidentiality must be maintained between the client and the server. Which two meet all of these requirements? (Choose two.)
A. X.509 and XKMS
B. XACML and XKMS
C. SSL and mutual authentication
D. XML Encryption and XML Digital Signature
E. Private network and XML Signature
Q7. A developer is creating a web service endpoint using a stateless session EJB for the business logic of an application. Choose two methods to select role based access control for the business logic ? (Choose two)
A. Using method-permission element in ejb-jar.xml
B. Using .htaccess file in the application's ear
C. Using <security-role> element in web.xml
D. By specifying security annotations like @RolesAllowed in the EJB class
Q8. A developer is writing a Web service method that needs to accept multiple types of requests. Based on the request's content, the service performs time-consuming steps, such as verifying the user's account, checking credit ratings, and building a list of offers. Which two approaches are appropriate to use in this situation? (Choose two.)
A. A synchronous, document-style approach.
B. A synchronous, procedure-style approach.
C. An asynchronous, document-style approach.
D. An asynchronous, procedure-style approach.
E. HTTP and HTTPS.
F. SMTP or other asynchronous protocol.
Q9. Choose three ways to enable MTOM on a web service endpoint deployed in an EE container ? (Choose three)
A. enabled by the container automatically
B. by specifying @MTOM annotation on the endpoint's class
C. by specifying <enable-mtom> in webservices.xml deployment descriptor
D. by specifying a wsoma:MTOM policy in WSDLE. by specifying <mtom> element in sun-jaxws.xml
Q10. XML Signature and XML Encryption provide the foundation for message level security in Web services. Which statement about XML signature is NOT true?
A. use detached signatures, where the digital signature covers sibling elements or external data
B. use enveloping signatures, where the digital signature element encloses the data to be signed
C. use enveloping signatures, where the digital signature is a child element of the data to be signed
D. use enveloped signatures, where the digital signature is a child element of the data to be signed