Assessment 1Z0-897 is referred to as seeing that Oracle is extremely certified as well as well-known exam associated with Oracle. Assessment Oracle 1Z0-897 will probably established believe that the particular job hopefuls whove been thriving around check-up include further typical ability as well as natural talent that is certainly important to preserve as well as widen the company system that will out of the way web pages using attraction with safe guarding out of the way correct associated with entry or even obtain as well as customer layout as well as teleworkers.

2016 Nov 1Z0-897 training

Q21. Choose the types of Enterprise Beans that can be made into JAX-RS root resources (Choose two): 

A. Stateful Session Beans 

B. Stateless Session Beans 

C. Message-Driven Beans 

D. Singleton Beans 

Answer: BD 


Q22. Which two statements are true about public key digital signatures applied to Web services? (Choose two) 

A. The receiver verifies that the message matches the digital signature using its own private key. 

B. The sender creates a digital signature using its own private key and sends that signature along with the original document. 

C. The sender creates a digital signature using its own public key and sends that signature along with the original document. 

D. The receiver verifies that the message matches the digital signature using the sender's public key. 

Answer: BD 


Q23. In designing the security for your enterprise application with multiple Web services, you don't want that each of the services handle user authentication by itself. Then which of the following you can use in your design? 

A. enable secure conversation for each service 

B. a centralized Policy Decision Point (PDP) via XACML 

C. a Security Token Service (STS) 

D. use transport level security with SSL 

Answer:


Q24. An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer has stringent security requirements that require suppliers to verify their identity. Data integrity and confidentiality must be maintained between the client and the server. Which two meet all of these requirements? (Choose two.) 

A. X.509 and XKMS 

B. XACML and XKMS 

C. SSL and mutual authentication 

D. XML Encryption and XML Digital Signature 

E. Private network and XML Signature 

Answer: CD 


Q25. Given the following web service: 

How many web methods are there in the above web service? (Choose one) 

A. 1 

B. 2 

C. 3 

D. 4 

E. 5 

Answer:


Up to date 1Z0-897 practice question:

Q26. In the following situation, Client C sends a SOAP request to Service S and the response is to be processed by a third party response processor R. Which of the following SOAP headers in the request message convey the intention? Assume the endpoint reference of Service S is 

A. <s11:Header> 

<wsa:Action>http://example.com/action/process</wsa:Action> 

<wsa:ReplyTo> 

<wsa:Address>http://www.w3.org/2005/08/addressing/none</wsa:Address> 

<wsa:ReplyTo> 

</s11:Header> 

B. <s11:Header> 

<wsa:Action>http://example.com/action/process</wsa:Action> 

<wsa:ReplyTo> 

<wsa:Address>http://www.w3.org/2005/08/addressing/anonymous</wsa:Address> 

<wsa:ReplyTo> 

</s11:Header> 

C. <s11:Header> 

<wsa:Action>http://example.com/action/process</wsa:Action> 

<wsa:ReplyTo> 

<wsa:Address>http://example.com/responseprocessor</wsa:Address> 

<wsa:ReplyTo> 

</s11:Header> 

D. <s11:Header> 

<wsa:Action>http://example.com/action/process</wsa:Action> 

<wsa:ReplyTo> 

<wsa:Address>http://example.com/service</wsa:Address> 

<wsa:ReplyTo> 

</s11:Header> 

Answer:


Q27. A developer creates a Web service for his company's inventory service. He uses servlet container to deploy the web service and wants to enable basic authentication for all web service invocations. Where does the developer configure security requirements for the above case? 

A. sun-jaxws.xml 

B. web.xml 

C. webservices.xml 

D. domain.xml 

Answer:


Q28. Choose the JAX-RS type that is used to produce URLs to resources, given the resource class, to incorporate into resource responses (Choose one): 

A. UriBuilder 

B. UriInfo 

C. UriMapper 

D. Producer 

Answer:


Q29. Given that a web service endpoint is based on the stateless session EJB: 

Which is true about the security roles of clients of MrBean? (Choose one) 

A. Only EJB clients must be in role A. 

B. Only Web Service clients must be in role A. 

C. Both EJB and web service clients must be in role A. 

D. Both EJB and web service clients must NOT be in role A. 

Answer:


Q30. Which security technologies are not included in WS-Security? 

A. encryption 

B. handshake for credential exchange and session establishment 

C. security tokens 

D. digital signatures 

Answer: