1.
P a g e | 1
1Z0 7
0‐897
Java
a EE 6 W
Web Serv
vices Dev
veloper Certified Expert
t Exam
Ora e
acle
To purch
hase Full version o Practic exam click belo
of
ce
ow;
www.ce
ertshome.com/1
1Z0‐897‐
‐practice
e‐test.ht
tml
OR
0‐897
FO Oracle 1Z0
Exam Can
E
ndidates W
WWW.CERT
TSHOME.CO
OM/ Offer Two
rs
Products:
First is 1
1Z0‐897 Exam
m Questions
s And Answe
ers in PDF Format.
•
An Easy to use Prod
duct that Con
ntains Real 1Z0‐897 Exa
am Question
ns.
•
Secondly
y We have 1
1Z0‐897 Exam Practice T
Tests.
•
tain Real 1Z
Z0‐897 Exam Question but in a Self‐Assess
m
ns
sment Envir
ronment. Th
here are
They also Cont
ltiple Practic
ce Modes, R
Reports, you
u can Check your Histor
ry as you Take the Test Multiple Tim
mes and
Mul
Man
ny More Fea
atures. Thes
se Products are Prepare
ed by Cisco S
Subject Mat
tter Experts,
, Who know
w what it
Take
es to Pass 1
1Z0‐897 Exa
am. Moreover, We Prov
vide you 100
0% Surety o
of Passing 1Z
Z0‐897 Exam
m in First
Atte
empt or We
e Will give y
you your Mo
oney Back. Both Products Come W
With Free DE
EMOS, So go
o Ahead
and Try Yoursel
lf The Variou
us Features of the Product.
2. P a g e | 2
Question:
: 1
e
a
s.
ort
An airline built and deployed a back‐end application to manage reservations To suppo
interoperability with as large a b
base of stand
dalone client applications as possible the service
t
s
e,
es
‐end applicati
ion are expos
sed as XML‐b
based restful w
web services. Managemen
nt
provided by this back‐
just added a new requirement tha AJAX‐based web application clients be supported, too. One o
at
d
of
the developers sugges
sted that it is
s enough to e
extend the ex
xisting applica
ation to supp
port both XML‐
d JSON‐based
d restful web services. Ass
suming the de
eveloper is co
orrect, choose
e the sentenc
ce
based and
that best describes an attempt to in
ntroduce this ability as this
s developer suggests (Choose one):
A. The att
tempt will fail, because JAX
X‐RS does not support bot
th XML‐ and J
JSON‐ based r
restful service
es
in parallel
l.
B. The att
tempt will be trivial to imp
plement, since
e JAX‐RS just needs for the
e application to specify that
both XML
L‐ and JSON‐b
based interact
tion will be su
upported.
C. The att
tempt can succeed, but it will require a significant amount of ne
ew code, sinc
ce JAX‐RS doe
es
support b
both XML‐ and JSON‐based interaction ‐ but not sin
ngle resource
e can support
t both kinds o
of
interactio
on simultaneo
ously.
D. The att
tempt will fail, because there is more to
o the differen
nce between XML‐based a
and JSONbase
ed
interactio
ons than just t
the data representation us
sed.
Answer: B
B
: 2
Question:
A compan
ny is refactor
ring an existin
ng website to
o use Web se
ervices clients. The application retrieve
es
lists of parts and displa
ays them to t
the users in a browser win
ndow. Previou
usly, the data
a was stored a
as
he web serve
er and, in ord
der to access the files, the
e user would simply click o
on a hyperlin
nk.
files on th
Now the d
data must be
e dynamically generated vi
ia a service th
hat another d
developer has
s created. The
ey
want the easiest way to refactor their webs
e
y
site to use W
Web services. Which three client‐sid
de
technolog
gies should th
hey use? (Cho
oose three.)
A. SOAP
B. REST
ript
C. Javascr
D. XML
E. JSON
F. JAVA
B,C,E
Answer: B
Question:
: 3
In the cod
de fragment b
below, the clie
os to upload d
data to the we
eb service pro
ovider.
ent will use o
3. P a g e | 3
Choose th statement that must b placed in line 5, to en
he
t
be
nsure this fra
agment work as intended.
ks
(Choose o
one)
ction.setDoOu
utput(true);
A. connec
B. connec
ction.setAllow
wUserInteract
tion(true);
C. connec
ction.setIfMod
difiedSince(new Date().get
tTime());
D. connec
ction.setUseC
Caches(false);
A
Answer: A
: 4
Question:
e resource class fragment:
Given the
Choose th
he code fragm
ment below t
that would secure access only to the Resource update() metho
od
(Choose o
one):
A. <securi
ity‐constraint
t>
<web‐reso
ource‐collection>
<url‐patte
ern>/rest</ur
rl‐pattern>
<http‐met
thod>GET</h
http‐method>
>
<http‐met
thod>POST</
/http‐method
d>
</web‐res
source‐collec
ction>
B. <securi
ity‐constraint
t>
<web‐reso
ource‐collection>
<url‐patte
ern>/rest</ur
rl‐pattern>
<http‐met
thod>POST</
/http‐method
d>
</web‐res
source‐collec
ction>
C. <securi
ity‐constraint
t>
<web‐reso
ource‐collection>
<url‐patte
ern>/rest/id</
/url‐pattern>
>
<http‐met
thod>POST</
/http‐method
d>
<http‐met
thod>GET</h
http‐method>
>
</web‐res
source‐collec
ction>
D. <securi
ity‐constraint
t>D.<security
y‐constraint>
<web‐reso
ource‐collection>
<url‐patte
ern>/id</url‐p
pattern>
4. P a g e | 4
<http‐method>POST</http‐method>
</web‐resource‐collection>
Answer: B
Question: 5
An organization has business logic implemented in EJB components. Current clients use container‐
managed, role‐based security to access the business logic using RMI. Management has determined
that the business logic must be made available to non‐RMI clients using a Web service. Which
container‐managed Web service security mechanism would the development team? use to allow
Web service clients to use the current security model? (Choose one)
A. XKMS
B. XACML
C. XML Digital Signature
D. HTTP Basic Authentication
E. annotations mapped to the JAX‐WS runtime
Answer: D
Question: 6
A developer creates a Web service for his company's inventory service. He uses servlet container to
deploy the web service and wants to enable basic authentication for all web service invocations.
Where does the developer configure security requirements for the above case?
A. sun‐jaxws.xml
B. web.xml
C. webservices.xml
D. domain.xml
Answer: B
Question: 7
Choose the option that best describe the deployer's choices, when deploying an EJB that is also
exposed as a RESTful web service using JAX‐RS (Choose one):
A. The EJB can only be deployed to a web container, since RESTful access to the EJB requires a web
container to support the HTTP interaction needed.
B. The EJB can be deployed to any EJB or web container that would support local references to the
EJB from the JAX‐RS runtime in the ejb container.
C. The EJB can be deployed to any EJB or web container that would support local references to the
EJB from the JAX‐RS runtime in the web container.
D. The EJB can be deployed to an EJB or web container that is visible to the JAX‐RS runtime, even on
an application server separate from the JAX‐RS runtime, since EJBs support local or remote
interactions via RMI.
Answer: C
5. P a g e | 5
Question:
: 8
Given the
e JAX‐RS root resource clas
ss fragment:
Choose th
he statement
t that best de
escribes the c
configuration
n that would be required t
to support th
he
access con
ntrol constraint shown:
ther configur
ration is required ‐ the Jav
vaEE runtime
e will pick up the security constraint an
nd
A. No furt
configure
the web container to mat
tch.
B. The de
eveloper will have to conf
figure the we container to require a
eb
authenticated access to th
d
he
URLs corr
responding t this resource, so the proper information can be propagated to the EJ
to
JB
container
r.
C. The developer will h
have to turn on authentication in the w
web containe
er configuration file, so that
all incoming requests a
are authenticated in order
r to be proces
ssed.
D. The de
eveloper will have to conf
figure the we container to require a
eb
authenticated access to th
d
he
URLs corr
responding to
o this resourc
ce, and then map web‐tier roles to ejb
b‐tier roles, since the JAXR
RS
and EJB ru
untimes cann
not use the sa
ame set of roles.
Answer: B
B
Question:
: 9
A develop needs to write a Web service th supports user sessions that time
per
o
hat
s
eout after 12
20
seconds. W
Which configuration file is
s correct for the developer
r use? (Choos
se one)
A. web.xm
ml
B. server.x
xml
C. ejb‐jar.xml
D. service
e‐config.xml
Answer: A
A
Question:
: 10
A develop
per creates th
he following w
web service:
Assuming
g that he pack
kages the clas
ss in a war file
e without dep
ployment des
scriptors, the
e web service is
hosted by
y a EE contain
ner relative to
o module context at ? (Cho
oose one)
A. "/Invoice"
B. "/Invoic
cePort"
C. "/Invoic
ceService"
D. "/InvoiceWebServic
ce"
C
Answer: C
Question:
: 11
6. P a g e | 6
A developer is creating a web service endpoint using a stateless session EJB for the business logic of
an application. Choose two methods to select role based access control for the business logic ?
(Choose two)
A. Using method‐permission element in ejb‐jar.xml
B. Using .htaccess file in the application's ear
C. Using <security‐role> element in web.xml
D. By specifying security annotations like @RolesAllowed in the EJB class
Answer: A,D
7. P a g e | 7
CERT
TSHOME Exam F
E
Features:
:
-
CERTSHO
C
OME offers over 3500 Certification exams for professionals.
s
0
50000+ Cu
5
ustomer fee
edbacks inv
volved in Pr
roduct.
A
Average 10
00% Succe Rate.
ess
O
Over 170 G
Global Certification Ve
endors Cove
ered.
S
Services of Professional & Certified E
Experts av
vailable via support.
F
Free 90 da
ays update to match real exam scenarios.
es
Instant Dow
wnload Ac
ccess! No S
Setup requi
ired.
E
Exam Histo and Pro
ory
ogress rep
ports.
V
Verified an
nswers rese
earched by industry ex
y
xperts.
S
Study Material update on regula basis.
ed
ar
Q
Questions / Answers a downloa
are
adable in PDF format.
P
Practice / E
Exam are do
ownloadabl in Practice Test So
le
oftware form
mat.
C
Customize your exam based on your object
e
m
tives.
S
Self-Asses
ssment feat
tures.
G
Guaranteed Success
d
s.
F
Fast, helpfu support 2
ul
24x7.
View list of All certification exa
t
ams offered
d;
www.ce
ertshome.c
com/all_certifications
s.php
Downloa Any Van
ad
nder Exam DEMO.
www.ce
ertshome.c
com/all_certifications
s-2.php
Contact Us any Tim click bel
me
low;
www.ce
ertshome.c
com/contac
ctus.php
AND MA
ANY Other
rs... See Co
omplete Lis Here........
st