Our pass rate is high to 98.9% and the similarity percentage between our 1Z0-897 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Oracle 1Z0-897 exam in just one try? I am currently studying for the Oracle 1Z0-897 exam. Latest Oracle 1Z0-897 Test exam practice questions and answers, Try Oracle 1Z0-897 Brain Dumps First.


♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Oracle 1Z0-897 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 1Z0-897 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/1Z0-897-exam-dumps.html

Q1. What are two valid facts about WS-I? (Choose two.) 

A. The I-Stack is a great development tool. 

B. The WS-I promotes and supports generic protocols for the interoperable exchange of messages. 

C. The WS-I governs languages and protocols such as SOAP, WSDL, and UDDI. 

D. The WS-I specifies specific rules that address either weaknesses in component specifications or issues of how to combine the collected technology. 

E. The WS-I has been a guiding force in creating StAX. 

Answer: BD 


Q2. Where can a developer specify confidentiality or integrity constraints on communications with a Enterprise Bean exposed as a JAX-RS root resource?(Choose one) 

A. As annotations on the EJB exposed as a root resource. 

B. In the deployment descriptor for the EJB exposed as a root resource. 

C. In the deployment descriptor for the web application that is hosting the JAX-RS resource. 

D. In the vendor-specific configuration file for the container that is hosting the JAX-RS resource. 

Answer:


Q3. Given the JAX-RS root resource class fragment: Choose the statement that best describes the configuration that would be required to support the access control constraint shown: 

A. No further configuration is required - the JavaEE runtime will pick up the security constraint and configure the web container to match. 

B. The developer will have to configure the web container to require authenticated access to the URLs corresponding to this resource, so the proper information can be propagated to the EJB container. 

C. The developer will have to turn on authentication in the web container configuration file, so that all incoming requests are authenticated in order to be processed. 

D. The developer will have to configure the web container to require authenticated access to the URLs corresponding to this resource, and then map web-tier roles to ejb-tier roles, since the JAX-RS and EJB runtimes cannot use the same set of roles. 

Answer:


Q4. Which two statements are true about creating a Web service with JAX-WS? (Choose two.) 

A. Stateless Web services must be created with HTTP servlet endpoints. 

B. Creating the portable artifacts by hand is slow, but makes a service easier to maintain. 

C. All Java-based endpoints share a common packaging model. 

D. EJBs can serve as endpoints if hosted in a container with runtime and service support. 

E. JAX-WS supports creating services from source and compiled code without a WSDL. 

Answer: DE 


Q5. Which two statements are true about public key digital signatures applied to Web services? (Choose two) 

A. The receiver verifies that the message matches the digital signature using its own private key. 

B. The sender creates a digital signature using its own private key and sends that signature along with the original document. 

C. The sender creates a digital signature using its own public key and sends that signature along with the original document. 

D. The receiver verifies that the message matches the digital signature using the sender's public key. 

Answer: BD 


Q6. In the following situation, Client C sends a SOAP request to Service S and the response is to be processed by a third party response processor R. Which of the following SOAP headers in the request message convey the intention? Assume the endpoint reference of Service S is 

A. <s11:Header> 

<wsa:Action>http://example.com/action/process</wsa:Action> 

<wsa:ReplyTo> 

<wsa:Address>http://www.w3.org/2005/08/addressing/none</wsa:Address> 

<wsa:ReplyTo> 

</s11:Header> 

B. <s11:Header> 

<wsa:Action>http://example.com/action/process</wsa:Action> 

<wsa:ReplyTo> 

<wsa:Address>http://www.w3.org/2005/08/addressing/anonymous</wsa:Address> 

<wsa:ReplyTo> 

</s11:Header> 

C. <s11:Header> 

<wsa:Action>http://example.com/action/process</wsa:Action> 

<wsa:ReplyTo> 

<wsa:Address>http://example.com/responseprocessor</wsa:Address> 

<wsa:ReplyTo> 

</s11:Header> 

D. <s11:Header> 

<wsa:Action>http://example.com/action/process</wsa:Action> 

<wsa:ReplyTo> 

<wsa:Address>http://example.com/service</wsa:Address> 

<wsa:ReplyTo> 

</s11:Header> 

Answer:


Q7. Which three statements about parsers are true? (Choose three.) 

A. SAX and StAX are bi-directional. 

B. DOM and StAX are bi-directional. 

C. StAX is a push API, whereas SAX is pull. 

D. SAX is a push API, whereas StAX is pull. 

E. SAX and StAX are read-only. 

F. SAX and DOM can write XML documents. 

G. StAX and DOM can write XML documents. 

Answer: BDG 


Q8. Choose the option that best describe the deployer's choices, when deploying an EJB that is also exposed as a RESTful web service using JAX-RS (Choose one): 

A. The EJB can only be deployed to a web container, since RESTful access to the EJB requires a web container to support the HTTP interaction needed. 

B. The EJB can be deployed to any EJB or web container that would support local references to the EJB from the JAX-RS runtime in the ejb container. 

C. The EJB can be deployed to any EJB or web container that would support local references to the EJB from the JAX-RS runtime in the web container. 

D. The EJB can be deployed to an EJB or web container that is visible to the JAX-RS runtime, even on an application server separate from the JAX-RS runtime, since EJBs support local or remote interactions via RMI. 

Answer:


Q9. When a SOAP envelope is optimized on the wire, the following can be said about the optimized infoset : (Choose one) 

A. optimized infoset contains xop:Include elements with href attribute pointing to attachment data 

B. optimized infoset contains mtom:Import with location attribute pointing to attachment data C. optimized infoset doesn't have any specific elements for MIME attachment. 

D. optimzed infoset's element contain cid:Content-ID as the text and Content-ID refers to the associated attachment 

Answer:


Q10. Choose three ways to enable MTOM on a web service endpoint deployed in an EE container ? (Choose three) 

A. enabled by the container automatically 

B. by specifying @MTOM annotation on the endpoint's class 

C. by specifying <enable-mtom> in webservices.xml deployment descriptor 

D. by specifying a wsoma:MTOM policy in WSDLE. by specifying <mtom> element in sun-jaxws.xml 

Answer: BCD