Realtests.C2180-371.116 questions Number: C2180-371 Passing Score: 800 Time Limit: 120 min File Version: 5.2 http://www.gratisexam.com/ C2180-371 Web Services Development for IBM WebSphere Application Server V7.0 I have changed answers of Q2, Q11, Q31, Q44, Q59 and Q87. Added s and Exhibits most of the questions. Best stuff I have ever used for my exam preparation. I love Examcollection guys. These are the most accurate study questions. Just focus on these and sit in your exam. Still valid, Hurry up guys study and pass this one.
Exam A QUESTION 1 Refer to the message in the exhibit. Replace the??? in the message with the appropriate namespace. A. http://www.w3.org/2003/05/soap-envelope B. http://schemas.xmlsoap.org/soap/envelope/ C. http://schemas.xmlsoap.org/soap12/envelope/ D. http://schemas.xmlsoap.org/soap11/envelope/ /Reference: : QUESTION 2 A company has a high business value JAX-WS provider Web Service and cannot afford to lose any messages. What kind of quality of service should be used in conjunction with WS-Reliable Messaging? A. Managed persistent B. Managed non-persistent C. Unmanaged non-persistent D. Managed persistent and Transaction (enabletransactionaloneway) E. Managed non-persistent and Transaction (enabletransactionaloneway) F. Unmanaged non-persistent and Transaction (enabletransactionaloneway) Correct Answer: D /Reference: : QUESTION 3 Why would a developer prefer to use SOAP Web services over REST Web services? A. To provide message level security B. To allow integration with Web 2.0 applications C. To be able to use XML to format response messages D. To be able to use the HTTP or HTTPS transport protocols /Reference: : QUESTION 4 Which of the following business scenarios is the LEAST appropriate for Web services?
http://www.gratisexam.com/ A. Expanding the reach of your company information. B. Providing transactional services such as credit card payment processing. C. Making existing services available to a business process to orchestrate services. D. Enabling interoperability between heterogeneous services to create time-critical solutions. Correct Answer: D /Reference: : QUESTION 5 What is the LEAST appropriate scenario for Web services? A. To integrate legacy systems B. To propagate security context C. To expose fine grained operations D. To use with process choreography E. For B2B (business to business) applications /Reference: : QUESTION 6 What is the biggest advantage of using Web services to create SOA solutions? A. They are implemented using Java and XML B. They support a client-server programming model C. They are used to create tightly coupled applications D. They are implemented using standardized technologies Correct Answer: D /Reference: valid answer. QUESTION 7 The following methods are to be published as Web services to be invoked via SOAP messages and validated with a schema: public void my Method(int x, float y); public void my Method(int x); public void someothermethod(int x, float y);which WSDL style should be used? A. RPC/literal B. RPC/encoded
C. Document/encoded D. Document/literal E. Document/literal wrapped /Reference: : QUESTION 8 Which WSDL style is suited to sending binary tree nodes as part of a SOAP message? A. RPC/literal B. RPC/encoded C. Document/encoded D. Document/literal E. Document/literal wrapped Correct Answer: B /Reference: : QUESTION 9 A customer requires a Web service which ensures message delivery. Which transport should be proposed? A. SOAP/TCP B. SOAP/JMS C. SOAP/HTTP D. SOAP/SMTP E. SOAP/HTTPS Correct Answer: B /Reference: : QUESTION 10 When creating a Web service which requires reliable delivery of SOAP messages, which transport should be used? A. SOAP/TCP B. SOAP/JMS C. SOAP/HTTP D. SOAP/SMTP E. SOAP/HTTPS Correct Answer: B /Reference:
: QUESTION 11 The WS-I Simple SOAP Binding Profile V1.0 mandates that a message must serialize the envelope according to which specification? A. XML 1.0 B. WSDL 1.1 C. SOAP 1.1 D. HTTP 1.0 /Reference: : QUESTION 12 Which specification provides recommendations on the use of encodings to maximize interoperability? A. SAAJ V1.2 B. JAX-RPC V1.0 C. WS-Coordination D. WS-I Basic Profile (BP) V1.1 Correct Answer: D /Reference: : QUESTION 13 Which of the following is MOST likely to improve the performance of SOAP-based Web services? A. Use message level security B. Use fine-grained Web services C. Use document/literal instead of RPC/encoded D. Avoid stale data in the UDDI registry by turning off caching /Reference: : QUESTION 14 An RPC/encoded Web service experiences poor performance at high message volumes. What can a developer do to improve this performance? A. Turn off marshalling B. Use binary encoding C. Use RPC/literal encoding D. Use document/literal encoding E. Redesign to use more granular messaging D
/Reference: : QUESTION 15 How can a developer ensure that a fault will occur if the service does not recognize a SOAP header entry containing a transaction number? A. Set the fault Code value to soap: Transaction B. Include a Fault element in the SOAP message C. Include a must Understand attribute in the header entry D. Include a detail element containing application-specific elements according to the XML Schema /Reference: : QUESTION 16 What must be included in a SOAP fault message when an error occurs due to a value in the message Body element? A. A detail element B. A Body fault code C. An application-specific fault code D. A fault string element with a value of "Body" /Reference: : QUESTION 17 Which of the following are the benefits of using the UDDI Registry? A. Enable service governance B. Maintain the lifecycle of services C. Encourage service reuse in an organization D. Document management and access control E. Allow service consumers to discover services E /Reference: : QUESTION 18 A developer has created a new Web service but now he wants to publicize the details of it so it can be discovered by other consumers. What technology(ies) or product(s) can the developer use? A. UDDI B. a custom registry
C. WS-Management D. WS-Metadata Exchange E. Web Services Distributed Management F. Web Sphere Service Registry and Repository BF /Reference: : QUESTION 19 Refer to the exhibits. http://www.gratisexam.com/ A. The header block will be forwarded to the next SOAP node after being processed. B. The header block will be forwarded to the next SOAP node without being processed. C. The header block will be removed after being processed and the message will be forwarded to the next SOAP node. D. The header block will be removed without being processed and the message will be forwarded to the next SOAP node. /Reference: : QUESTION 20 Refer to WSDL extract in the exhibit. What does the soap: binding element specify? A. The message will be in an XML document B. SOAP will be used as a transport protocol C. The binding is defined by the NewWSDLFile type
D. The binding is bound to the SOAP protocol format Correct Answer: D /Reference: : QUESTION 21 Refer to the WSDL extract in the Exhibit. What type of operation is this? A. One-way B. Notification C. Solicit response D. Publish/subscribe E. Request/response Correct Answer: B /Reference: : QUESTION 22 Which of the following standards does the WS-Organization recommend for Web services according to WS-I Basic Profile (BP)1.1? A. WSDL 1.1, SOAP 1.1 B. WSDL 1.1, SOAP 1.1, MTOM C. WSDL 1.1, SOAP 1.1, SOAP 1.2 D. WSDL 1.1, SOAP 1.1, SOAP 1.2, MTOM E. WSDL 1.1, SOAP 1.1, SOAP with Attachments /Reference: : QUESTION 23 According to WS-I Basic Profile (BP), which of the following encodings should be used to ensure interoperability? A. rpc/literal B. rpc/encoded C. doc/literal D. doc/encoded C
/Reference: : QUESTION 24 Select the scenario where the specification WS-Make Connection should be used. A. To return responses back on a separate connection in a request and response flow. For example, enabling WS-Addressing to specify a new address to deliver a response. B. To establish a connection for out-of-band communication with 3rd endpoint. For example, in using WS- Secure Conversation with another business endpoint, a token can be obtained from a 3rd party provider. C. To tunnel through a firewall and establish a back channel for messages to be sent to a previously unaddressable endpoint. For example, with WS-ReliableMessagingreestablishing a connection through a firewall for acknowledgements. D. To create a separate connection to an endpoint to gain metadata about an endpoint prior to the initial request. For example, creating a connection to a separate endpoint to retrieve WSPolicy information about how to establish connectivity to a web services endpoint. /Reference: : QUESTION 25 Which of the following are TRUE statements about the WS-I Basic Security Profile (BSP)? A. BSP focuses on both SOAP-level constructs as well as TLS and SSL B. BSP only focuses on SOAP-level constructs and does not reference TLS and SSL C. BSP V1.0 focuses on WS-Security features while BSP V1.1 focuses on adding in other standards which use WS-Security such as WS-Secure Conversation and WS-Trust D. BSP V1.0 focuses on WS-Security V1.0 features while BSP V1.1 focuses on WS-Security V1.1 features such as encrypted headers, signature confirmation, and thumbprint references E. BSP V1.0 focuses on the following binary security tokens: Username Token, X.509 Certificate Token, and REL Token. BSP V1.1 adds support for Kerberos Token and SAML Token (as well as the prior tokens in BSP V1.0) D /Reference: : QUESTION 26 Which of the following options for sending binary data are compliant to either WS-I Basic Profile (BP) V1.1 or V1.2? A. SOAP with Attachments B. Base64 encode the data inline C. Direct Internet Message Encapsulation (DIME) D. Message Transmission Optimization Mechanism (MTOM) / XML-Binary Optimized Packaging (XOP) Correct Answer: BD
/Reference: : QUESTION 27 A developer is building a JAX-WS Web service to be deployed on IBM Web Sphere Application Server V7.0. The service consumers are financial institutions with client applications using Microsoft.NET V3.5. The service will be used to retrieve image files and send them to the financial institutions. What is the recommended approach to send the image files? A. SOAP with Attachments B. Direct Internet Message Encapsulation (DIME) C. Message Transmission Optimization Mechanism (MTOM) D. Message Handlers and the SOAP with Attachments API for Java (SAAJ) /Reference: : QUESTION 28 A developer is creating a JAX-WS Web service. The Web service will be used to send cheque image file from the provider to the requestor. Given the following extract: @MTOM(enabled=true, threshold=50) @Web Service(name="Image Service", target Namespace="http://com.test.ImageService") public class Image Provider { What does the threshold parameter indicate? A. The minimum number of attachments that can be sent in the message B. The maximum number of attachments that can be sent in the message C. The maximum size in bytes for each attachment to be sent using MTOM. D. The minimum size in bytes for each attachment before MTOM is used. Smaller attachments will use base64 inline encoding. E. The maximum size in bytes for each attachment before MTOM streams to disk. Smaller attachments will keep the attachment in-memory. Correct Answer: D /Reference: : QUESTION 29 An online retailer would like to expand the supply chain Web service application by adding new third party suppliers. Some of the key non-functional requirements include: support for vendor interoperability, loose coupling, long running processes, and to coordinate the order fulfillment across multiple suppliers. The application logic needs to be able to adjust the business processes to accommodate the success or failure of downstream suppliers being able to satisfy the request. Which of the following quality of service standards should be used for the Web services? A. WS-Activity Session B. WS-Business Activity C. WS-Reliable Messaging D. WS-Atomic Transaction
E. WS-Business Transaction Correct Answer: B /Reference: : QUESTION 30 A bank would like to design a JAX-WS Web service to transfer funds. The server will be deployed to IBM Web Sphere Application Server V7.0.Two key requirements are to ensure: 1) the request is only sent once 2) cross vendor interoperability What is the best way to accomplish this? A. Use WS-Security B. Use WS-Atomic Transaction C. Use WS-Reliable Messaging D. Add a handler to implement the duplication detection logic E. Implement application code in the Web service to detect duplication /Reference: : QUESTION 31 A company is developing a travel portal application using three Web services to complete the booking process for flights, hotels and car rental. The booking process is successful only if all three Web services are successful in completing the booking of flights, hotels and car rental. Which of the following statement is true for the Web service client implementation to accomplish the booking process requirement? A. Enable WS-Coordination only for the 3 Web services B. Enable WS-Atomic Transaction only for the 3 Web services C. Create a global transaction using Java Transaction API (JTA) User Transaction interface D. Create a global transaction using Java Transaction API (JTA) User Transaction interface and enable WS-Atomic Transaction for the 3 Web services Correct Answer: D /Reference: : QUESTION 32 A media company would like to provide an online Web service to encode video in a different format for a fee. The encoding could take hours or days to finish based on the length of the video. The client machine may be restarted after submitting the request and should be able to receive the encoded video. Web services client implementation: 1) Asynchronous invocation 2) Wire level asynchronous invocation 3) Using two one way messages, one for request and one for response Quality of service: a) WS-Reliable Messaging b) WS-Reliable Messaging with Transaction enabled (enabletransactionaloneway) What is the correct way to call the Web service including the qualities of service? A. (1) with (a) B. (1) with (b) C. (2) with (a) D. (2) with (b) E. (3) with (a)
F. (3) with (b) Correct Answer: F /Reference: : QUESTION 33 A company is planning to deploy a key business function implemented as a JAX-WS Web service. The Web service will be consumed by IBMWebSphere Application Server V7.0 and Microsoft.NET clients. Currently, theweb services is secured by WS-Security. What is the BEST way to communicate policy to the consumers? A. Export the Policy Set and publish the Policy Set on a web site for download B. Enable the provider to export WS-Security Policy annotated WSDL via HTTP GET C. Enable the provider to export WS-Security Policy annotated WSDL via WS-Policy Exchange D. Enable the provider to export WS-Security Policy annotated WSDL via WS-Metadata Exchange Correct Answer: B /Reference: : QUESTION 34 Using the WSDL editor, how can a developer create anew message for an operation input? A. 1. In the Graph view, right-click on space below the message column 2. Select New -> Message 3. Provide the name of the new message and click OK B. 1. In the Design view, right-click on the input message under the operation table 2. Select Set Message -> New Message 3. Provide the name of the new message and click OK C. 1. In the Design view, select the input message under the operation table 2. Click on the Add message icon in the tool bar 3. Provide the name of the new message and click OK D. 1. In the Graph view, right-click on the name of the input message 2. Select New -> Message 3. Provide the name of the new message and click OK Correct Answer: B /Reference: : QUESTION 35 A developer uses wsimport to generate Web service client artifacts. What will the wsdllocation attribute do? A. It will specify the WSDL location in the generated artifacts. B. It will specify the location of the WSDL from which to generate the Web service client artifacts C. It will specify the relative location of the WSDL file from which to generate the Web service client artifacts D. It will ensure that the WSDL is packaged appropriately in the EAR file. /Reference:
: QUESTION 36 Refer to the exhibit. A developer uses the Web service client wizard in IBM Rational Application Developer. What will be different in the generated artifacts? A. Additional methods will be generated to invoke the Web service. B. A JAX-RPC handler is created to handle the response from the Web service. C. The ibm_webserviceclient_bnd.xmi file specify that the invocation is asynchronous. D. There is no change in the generated artifacts, only the methods called from the actual client will vary. /Reference: : QUESTION 37 What can be used to test and publish Web services to IBM UDDI? A. Web Services Explorer B. IBM UDDI Test Registry C. Universal Test Client (UTC) D. Web services sample test JSPs
/Reference: : QUESTION 38 Which of the following can be changed using Web Services Explorer? A. Endpoint URL B. Policy Set Attachment C. Adding HTTP Headers D. Adding SOAP Headers E. Input values to the request F. JSR-109 Deployment Descriptors DE /Reference: : QUESTION 39 In IBM Rational Application Developer V7.5, which tool is BEST for testing JAX-WS application with MTOM attachments? A. TCP/IP Monitor B. Web Services Explorer C. Generated Test JSP Client D. Universal Test Client (UTC) /Reference: : QUESTION 40 A developer suspects there is a problem in JAX-B serialization in the client side. Which tool can be used to test the Web Services by bypassing JAXB? A. WSDL Explorer B. TCP/IP Monitor C. Generated Test JSP Client D. Universal Test Client (UTC) /Reference: : QUESTION 41 Which IBM Rational Application Developer V7.5 tool can be used to validate the SOAP messages against WS-I standards? A. TCP/IP Monitor B. Profiling Monitor C. Web Services Explorer
D. Universal Test Client (UTC) /Reference: : QUESTION 42 Which of the following is a supported method for validating WS-I compliance using IBM Rational Application Developer V7.5? http://www.gratisexam.com/ A. Use the TCP/IP Monitor to save and review the WS-I message log B. Use the Web Services Explorer to load the Web service and select Validate Service C. Use the Universal Test Client (UTC) to invoke the Web service and view the response source D. Use the Profiling tools to profile the execution of the Web service and define a Watch for the SOAP messages /Reference: : QUESTION 43 Refer to the exhibit. Weather? Web service is configured under the WeatherBeanWeb context. From the diagram in the exhibit, what is the correct URI for TCP/IP Monitor to work? A. http://localhost/weatherbeanweb/services/weather
B. http://localhost:9083/weatherbean/services/weather C. http://localhost:9090/weatherbean/services/weather D. http://localhost:9083/weatherbeanweb/services/weather E. http://localhost:9090/weatherbeanweb/services/weather Correct Answer: D /Reference: : QUESTION 44 Which of the following scenarios can be BEST monitored using TCP/IP Monitor? A. SOAP/JMS B. WS-Coordination messages C. synchronous message exchange pattern over HTTP D. synchronous message exchange pattern over HTTPS/SSL /Reference: : QUESTION 45 Refer to the Exhibit. While creating a new TCP/IP Monitor on IBM Rational Application DeveloperV7.5, if the HTTP option is selected, which one of the following is a valid statement? A. The TCP/IP Monitor ensures that the SOAP traffic is WS-I Compliant B. All the requests are sent byte for byte and the TCP/IP Monitor will not translate or modify any requests that it forwards C. The requests from the Web browser are modified so that the HTTP header points to the remote machine and separated if multiple requests are received in the same connection. D. The TCP/IP Monitor gets a handle of the SOAP envelop and if a WS-Addressing header exists, modifies the wsa:to header to specify the end point of the remote machine dynamically
/Reference: : QUESTION 46 Which of the following is TRUE of the endptenabler command? A. It requires an EJB Java archive (JAR) file as input B. It creates a bottom-up Web service from a stateless session EJB C. It generates IBM-specific deployment classes for a Web service application D. It adds a HTTP or JMS router module to an EJB-based Web service application Correct Answer: D /Reference: : QUESTION 47 A developer has a Web service-enabled EnterpriseJavaBean Java archive (JAR) module within an EAR file. Which of the following command line tools will add one or more router modules to the EAR file? A. Wsadmin B. Wsdeploy C. Ejbdeploy D. Endptenabler Correct Answer: D /Reference: : QUESTION 48 Which one of the following is NOT a standard property of the Binding Provider class from the JAX- WS API? A. The SOAP Action B. The endpoint address C. A timeout value for the HTTP request D. The ability to maintain HTTP session state E. A username and password for basic authentication /Reference: : QUESTION 49 Which one of the mechanisms CANNOT be used directly by the JAX-WS dynamic APIs for Dispatch or Provider? A. Source B. Data Source
C. Input Stream D. JAXB Objects E. SOAP Message /Reference: : QUESTION 50 A developer is writing a Web service operation namedgetquote?select the proper code to obtain the HTTP Query String used in the request: A. public String get Quote (String input String, Message Context mc) { mc.get (MessageContext.QUERY_STRING);... B. public String get Quote (String input String, WebServiceContext wc) { wc.getmessagecontext().get (MessageContext.QUERY_STRING);... C. @Resource private WebServiceContext context; Public String get Quote (String input String) { context.getmessagecontext().get(messagecontext.query_string);... D. @WebServiceContext private WebServiceContext context; Public String get Quote (String input String) { context.getmessagecontext().get(messagecontext.query_string);... E. @Resource private Resource context; Public String get Quote (String input String) { ((Message Context)context).get(MessageContext.QUERY_STRING);... /Reference: : QUESTION 51 JAX-WS 2.x does not have a mechanism to validate incoming requests as part of the specification. However, it can be implemented using JAXB 2.x APIs and using a JAX-WS provider. Which of the following uses the recommended mechanism for turning on schema validation for a request? A. A B. B C. C D. D /Reference: right answer. QUESTION 52 Which of the following are ways to add or customize an HTTP header to a Web service request in IBM Web Sphere Application ServerV7.0. A. Specify the values to be set on a policy set and attach the policy set to the client reference B. Use a JAX-WS Logical Handler and get/set the HTTP headers from the JAXWSMessageContext C. Use a JAX-WS Protocol Handler and get/set the HTTP headers from the JAX-WS Message Context D. Create a Hash Map containing the transport headers and set the Hash Map on thejax-ws Service under a property named REQUEST_TRANSPORT_PROPERTIES
E. Create a Hash Map containing the transport headers and set the Hash Map on the JAX-WS Binding Provider under a property namedrequest_transport_properties E /Reference: : QUESTION 53 A developer would like to create a generic endpoint implementation to handle XML-based Web service and use it to host multiple endpoints. Which of the following annotations would BEST be used to support that Service Implementation Bean? A. @Web Method B. @Web Service C. @Service Mode D. @WebServiceProvider Correct Answer: D /Reference: : QUESTION 54 A developer is using the Web container programming model as per JSR109. Which statement regarding the Service Implementation Bean is true? A. The class can be final B. The class must define finalize() method C. The class must have a default public constructor D. The class can save client specific state across method calls using instance variables /Reference: : QUESTION 55 JSR109 defines the life cycle of a Service Implementation Bean in the Web container. Which sequence of statements below is TRUE? A. 1. The Web container calls the method annotated with javax.annotation.postconstruct annotation. 2. The web container creates a new instance of the Service Implementation Bean. 3. The web container may pool method ready instances of a Service Implementation Bean and dispatch a method request on any instance in a method ready state. 4. For the web container with JAX-WS runtime, the method annotated javax. annotation. Pre Destroy is called. B. 1. The web container creates a new instance of the Service Implementation Bean. 2. For web containers with JAX-WS runtime, the container calls the method annotate with javax.annotation.postconstruct annotation. 3. The web container may pool method ready instances of a Service Implementation Bean and dispatch a method request on any instance in a method ready state. 4. For the web container with JAX-WS runtime, the method annotated with javax. annotation. PreDestroy is called. C. 1. The web container creates a new instance of the Service Implementation Bean. 2. For web containers with JAX-WS runtime, the container calls the method annotated with
javax.annotation.postconstruct annotation. 3. The web container may pool method ready instances of a Service Implementation Bean and dispatch a method request on any instance in a method ready state. 4. For the web container with JAX-WS runtime, the method annotated with javax. annotation. PrePassivate. is called. D. 1. The Web container calls the method annotated with javax.annotation.postactivate annotation. 2. The container creates a new instance of the Service Implementation Bean. 3. The web container may pool method ready instances of a Service Implementation Bean and dispatch a method request on any instance in a method ready state. 4. For the web container with JAX-WS runtime, the method annotated with javax. annotation. PrePassivate is called. Correct Answer: B /Reference: : QUESTION 56 Refer to the exhibit. Which statement is TRUE? A. Returning true from the handle Message() method tells the JAX-WS runtime that processing of the handler chain should end. B. Returning true from the handle Message() method tells the JAX-WS runtime that processing should move to the next handler in the chain C. The handle Message() method should be replaced by handle Request() andhandleresponse() methods for a JAX-WS runtime D. The signature of handle Message should be public void handle Message(LogicalMessageContext context) Correct Answer: B /Reference: : QUESTION 57 Refer to the exhibit. A developer is creating a Web service from the WSDL file, using IBM Rational Application Developer: When creating a top-down JavaBean, which of the following artifacts would be generated?
A. Service Endpoint Interface and Implementation class only B. Service Endpoint Interface and GetAccountBalance.java, GetAccountBalanceResponse.java C. Service Endpoint Interface, Implementation class, GetAccountBalance.java, GetAccountBalanceResponse.java D. Implementation class, GetAccountBalance.java, GetAccountBalanceResponse.java /Reference: : QUESTION 58 JAX-WS is the successor to JAX-RPC. Which of the following are reasons why a developer may chose to migrate from JAX-RPC to JAXWS in IBM Web Sphere Application Server V7.0? A. JAX-RPC is deprecated in Java EE 5. All Web services within a Java EE 5 module need to be JAX- WS-based Web services. B. A JAX-RPC service is returning attachments to clients and many of the new clients will be Microsoft.NET clients. C. A JAX-RPC developed Web service would like to leverage WS-ReliableMessagingin order to ensure reliable and interoperable Web services. D. A JAX-RPC developer wants to expose a service defined as WSDL 2.0 in order to upgrade to the next level of Web services specifications. E. A JAX-RPC Web service needs to take advantage of WS-Addressing and needs to return a endpoint reference pointing to another Web service. F. A JAX-RPC Web service developer wants to schema validate a message using JAXB by using a JAX- WS provider combined with JAXB. Correct Answer: BCF /Reference: nicely executed answered. QUESTION 59 Which of the possible files can be used to modify the mappings from WSDL to Java for a JAXWS- based application? A. WSDL B. XML schema C. JAX-B binding file D. JAX-WS binding file E. JSR 109 mapping metadata file CD /Reference: : QUESTION 60 Refer to the exhibit. Based on the WSDL document and applying JAX-WS mapping rules, what does the method signature for the operation look like (without the JAX-WS annotations)? A. public String test(string mystring1);
B. public String Wrapper test(string Wrapper mystring1); C. public ResponseDataType test( RequestDataType param1); D. public ResponseDataTypeWrapper test(requestdatatypewrapper param1); /Reference: : QUESTION 61 Which interface in SAAJ generically represents any literal part in a SOAP message? A. Javax.xml.soap.Text B. Javax.xml.soap.Node C. Javax.xml.soap.DetailEntry D. Javax.xml.soap.SOAPElement E. Javax.xml.soap.SOAPBodyElement Correct Answer: D /Reference: : QUESTION 62 Which statement is true about SAAJ? A. It is an XML standard for exchanging user, resource and service provisioning information. B. It is an XML standard for exchanging authentication and authorization data between security domains. C. It aims to create a simple extension of SOAP to allow for asynchronous or long-running Web services. D. It is used for SOAP messaging, providing a standard way to send XML documents over the Internet. Correct Answer: D /Reference: : QUESTION 63 Which of the following are ways for a JAX-WS-based service to enable the usage of MTOM for binary data? A. @MTOM(enabled=true) B. @Attachments(mtom=true) C. @MTOMAttachments(enabled=true) D. @Binding Type(value=javax.xml.ws.soap.SOAPBinding.SOAP11HTTP,mtom=true) E. @Binding Type(value=javax.xml.ws.soap.SOAPBinding.SOAP11HTTP_MTOM_BINDING) E /Reference: :
QUESTION 64 Application developer has a multitude of ways to specify to use MTOM when sending a Web services request. Which of the following will enable MTOM on the client side? A. Service svc = Service. create(service Name); svc.createdispatch(port Name, Source. class, PAYLOAD); dispatch.setmtomenabled(true); B. Service svc = Service. create(service Name); MTOMFeature mtom = new MTOMFeature(); MtomSample proxy = svc.getport(port Name, MtomSample.class, mtom); C. Service svc = Service. create(servicename); svc.setmtomenabled(true); D. Service svc = Service. create(service Name); svc.addport(portname, SOAPBinding.SOAP11HTTP_MTOM_BINDING, endpointurl); E. Service svc = Service.create(serviceName); MtomSample proxy= svc.getport(portname, MtomSample.class); BindingProvider bp = (BindingProvider) proxy; ((SOAPBinding) bp.getbinding ().setmtomenabled(true); Correct Answer: BDE /Reference: : QUESTION 65 The following classes are generated when developing ajax-ws unmanaged client from a WSDL using IBM Rational Application Developer:HelloBean.java HelloBeanPortProxy.java, Hello Bean Service. java Method1.javaMethod1Response.javaObjectFactory.javapackage-info.java Which of the following WSDLs was used as the input? A. A B. B C. C D. D /Reference: : QUESTION 66 A developer works for a software vendor that specializes in making customizable software for companies in the insurance business to communicate with health care providers. The vendor wants to allow their clients to customize a set of Web services to change and alter the types of information that gets passed on Web services requests. Therefore, there is a requirement for real-time dynamic processing of metadata to drive Web service requests. The developer needs to build a Web service than can respond with the needed flexibility for changing the interface. Which type of client best accomplishes the objective? A. Static clients B. Dispatch clients C. Dynamic proxy polling clients D. Dynamic proxy callback clients Correct Answer: B /Reference: :
QUESTION 67 A developer uses com.ibm.jaxws.thinclient_7.0.0.jar to invoke a Web service with: A. EJB clients. B. managed clients. C. unmanaged clients. D. dynamic web based clients. /Reference: : QUESTION 68 When the Web service target is expected to change considerably in terms of its location and Request/ Response format, which clients should be used? A. Managed dynamic proxy B. Unmanaged static stub C. Unmanaged dynamic proxy D. Dynamic Invocation Interface Correct Answer: D /Reference: : QUESTION 69 Which client retrieves Call Instance from the javax.xml.rpc.call interface? A. Managed static stub B. Unmanaged static stub C. Unmanaged dynamic proxy D. Dynamic Invocation Interface Correct Answer: D /Reference: : QUESTION 70 What is the name of the dispatch class method for asynchronous invoke? A. Invoke B. invoke sync C. invokeoneway D. invokenoblock Correct Answer: B /Reference:
: QUESTION 71 Refer to the exhibit. Which of the following ways enable asynchronous wire-level behavior? A. Policy Set B. JSR109 deployment descriptor C. JAX-WS API for WS-Addressing D. WSDL Asynchronous Message Exchange Pattern (MEP) Setting E. Setting an asynchronous Message Exchange Pattern setting as a property on thejax-ws BindingProvider E /Reference: Properly answered. QUESTION 72 A developer created a bottom-up JAX-WS Web service and requested the WSDL file to be generated. Where has IBM Rational Application Developer V7.5 packaged the Web service? http://www.gratisexam.com/ A. If a Java bean in a Java project was used for the bottom-up generation, the generated files are placed in the Java project. B. If a Java bean in a Java project was used for the bottom-up generation, the generated files are placed in a Dynamic Web project. C. If a Stateful session bean in an EJB project was used for the bottom-up generation, the generated files are placed in the EJB project. D. If a Stateless session bean in an EJB project was used for the bottom-up generation, the generated files are placed in a Service project Correct Answer: B /Reference:
: QUESTION 73 When creating a new JAX-WS Web service using the Web Service Wizard in IBM Rational Application Developer V7.5, the developer selected the option to create the deployment descriptor. In which directory will the webservices.xml file be generated? A. Web Content/WEB-INF B. Web Content/META-INF C. WebContent/webservices D. WebContent/WEB-INF/wsdl /Reference: : QUESTION 74 Before deploying a Stateless Session EJB-based JAX-WS Web service on IBM Web Sphere Application Server V7.0, a developer decided to create a Web service router module. Why would the developer need a router module? A. The Web service needs to support an HTTP endpoint protocol. B. The Web service has defined Handlers, and a router module enables the handlers. C. The Web service needs to support routing of requests among several service providers based on business rules defined in the service level agreement. D. Creating the router module is only needed if any JAX-RPC Web services are available in the same EJB project. /Reference: : QUESTION 75 A developer has deployed a new JAX-WS Web service. The context root is set to web root and the service name is service name? Using a Web browser, what URL can be used to verify that the service is running? A. http://host:port/webroot/servicename B. http://host:port/services/servicename C. http://host:port/webroot/servicename?wsdl D. http://host:port/webroot/services/servicename E. http://host:port/webroot/services/servicename?wsdl C /Reference: : QUESTION 76 Refer to the exhibit.
A developer has a JAX-WS Web service provider implementation which has two operations, as shown in the exhibit. The developer wants to enable LTPA with HTTPS protection for the web service. This can be accomplished by attaching: A. Two policy sets: one with LTPA enabled; and one with "SSL transport" policy to the service B. A policy set with "WS-Security" policy LTPA enabled and "SSL transport" policy to the port C. A policy set with "WS-Security" policy LTPA enabled and "SSL transport" policy to the service D. A policy set with "WS-Security" policy LTPA enabled and "SSL transport" policy to the operation "A" only E. A policy set with "WS-Security" policy LTPA enabled and "SSL transport" policy to the operation "B" only F. A policy set with "WS-Security" policy LTPA enabled to the service and set to "CONFIDENTIAL" in web.xml Correct Answer: BCF /Reference: : QUESTION 77 A developer has finished working on the implementation of a Web service using IBM Rational Application Developer V7.5. What are the appropriate ways to create a policy set with just an LTPA token? A. Use the Policy Set editor in IBM Rational Application Developer V7.5 to create a new policy set with an LTPA token B. Use the Administrative Console to create a new policy set with an LTPA token, export it and import into IBM Rational Application Developer V7.5 C. Make a copy of the "LTPA WSSecurity default" policy set in IBM Rational Application Developer V7.5 workspace and use the policy set editor to disable WS-Security protection in the copy. D. Make a copy of the "LTPA WSSecurity default" policy set using wsadmin scripts and disable WS- Security protection in the copy, export the copy and import into IBM Rational Application Developer V7.5 E. Make a copy of the "LTPA WSSecurity default" policy set using Administrative Console and disable WS-Security protection in the copy, export the copy and import into IBM Rational Application Developer V7.5 Correct Answer: BDE /Reference: : QUESTION 78 The project has finished its development phase and is ready to move to the quality assurance phase. What is the recommended way to migrate the quality of service configuration from the development to the quality
assurance environment? A. Recreate the policy sets using wsadmin scripts B. Recreate the policy sets using the Administrative Console C. Recreate the policy sets using IBM Rational Application Developer V7.5 D. Copy the policy sets? files from the development to the quality assurance environment E. Export the policy set from the development environment and import into the quality assurance environment Correct Answer: E /Reference: : QUESTION 79 A developer wants to automate their build process for testing, and would like to import a policy set, A. zip. Which of the following wsadmin tasks correctly identifies the syntax the developer would use? B. AdminTask.importPolicySet('[-file /tmp/x.zip]') C. AdminTask.policySetImport('[-file /tmp/x.zip]') D. AdminTask.importPolicySet('[-import File /tmp/x.zip]') E. AdminTask.policySetImport('[-import File /tmp/x.zip]') /Reference: nicely answered. QUESTION 80 Which three protocols can the Endpoint Listeners in the service integration bus (SIBus) of IBM Web Sphere Application Server V7.0 be configured to get invoked with? A. RMI/IIOP B. RMI/JRMP C. SOAP/JMS D. SOAP/SMTP E. SOAP/HTTP F. SOAP/HTTPS EF /Reference: : QUESTION 81 A developer has exposed an internal-hosted service (an inbound service) to the outside world using a Service Integration Bus (SIBus).When an incoming request for the service is received, what usually happens? A. Incoming requests are received at an endpoint, then passed to an inbound port and sent on to the service destination. Responses follow the same path in reverse. B. Incoming requests are received at a port destination, then passed to an inbound port and sent on to the service destination. Responses follow the same path in reverse.
C. Incoming requests are received at an endpoint, then passed to a mediation point and sent on to the service destination. Responses use a port destination to reach the client. D. Incoming requests are received at a port destination, then passed to a mediation point and sent on to the service destination. Responses use a port destination to reach the client. /Reference: : QUESTION 82 When choosing to encrypt a SOAP message using policy sets in IBM Web Sphere Application Server V7.0, the options a developer has are: A. Body, XPath expression B. Body, Header, Qname C. Body, Qname, XPath expression D. Header, Qname, XPath expression /Reference: : QUESTION 83 In IBM Web Sphere Application Server V7.0, 'trust method' is part of which collection? A. Caller B. Add timestamp C. Required Integrity D. Required Confidentiality /Reference: : QUESTION 84 A developer needs to ensure message integrity and confidentiality of a Web service deployed on IBM Web Sphere Application Server V7.0. Which of the following policy sets could be used? A. WSHTTPS default B. SSL WSTransaction C. Secure Conversation D. WSReliableMessaging default E. Username Secure Conversation F. WS-I Reliable Secure Profile (RSP) default EF /Reference:
: QUESTION 85 A developer is creating a JAX-WS client application. In what ways can the developer enable Web service security? A. Bindings B. Policy sets C. XML Encryption D. Secure Conversation E. Web Services Security API Correct Answer: BE /Reference: : QUESTION 86 The web service is implemented as EJB and authorization is enabled at EJB method level, and Caller configuration is enabled for Web Service Security. Which identity is used for authorization check? A. Transport level identity is always used B. Message level identity is always used C. Both transport level and message identities D. Either transport level identity or message level identity Correct Answer: B /Reference: : QUESTION 87 A developer would like to restrict access to some operations of a Web service to a certain group of users. Which is the most appropriate implementation choice for the Web service? A. JavaBean B. Entity Bean C. Message Driven Bean D. Stateful Session Bean E. Stateless Session Bean Correct Answer: E /Reference: : QUESTION 88 Which of the following situations is the best candidate for message-level security?
http://www.gratisexam.com/ A. Basic authentication is required B. Untrusted intermediaries are involved C. Confidentiality of the message is only required from point-to-point D. Client-side and server-side authentication through certificates is required Correct Answer: B /Reference: : QUESTION 89 For a Web service request passing through multiple SOAP intermediaries, how would end-to-end security be provided? A. SSL B. Mutual Authentication C. WS-Security standards D. HTTP Basic Authentication /Reference: : QUESTION 90 A developer is designing a Web service which must ensure the integrity and confidentiality of the message from the provider to the consumer. The SOAP message will be routed by an Enterprise Service Bus (ESB) to reach its final destination. What should the developer use to complete the task? A. WS-Security B. Federated Trust C. Secure Socket Layer D. Asymmetric key encryption /Reference: : QUESTION 91 Developer is designing a Web service. The message will contain sensitive data which must only be processed by the final destination. The SOAP message will be routed through an external organization Enterprise Service Bus (ESB) to reach its final destination. What level of security is required? A. Federated Trust
B. Message-level security C. Transport-level security D. Secure Socket Layer (SSL) Correct Answer: B /Reference: correct answer. QUESTION 92 Which of the following characteristic is NOT true forws-secureconversation? A. It uses derived keys to sign and encrypt the message B. It uses asymmetric cryptography to encrypt a message C. It uses a Security Context Token which contains a timeout D. It uses WS-Trust protocol to establish a security context between the consumer and provider Correct Answer: B /Reference: : QUESTION 93 Which of the following statements most appropriately describe WS-Secure Conversation? A. Context and secret must be established (authenticated) for every message exchange B. It is mutually exclusive to SSL C. It replaces the OASIS Web Services Security: SOAP Message Security 1.1 standard D. It defines extensions to allow security context establishment and sharing, and session key derivation E. It allows contexts to be established and potentially more efficient keys or new key material to be exchanged Correct Answer: DE /Reference: : QUESTION 94 Which of the following scenarios are typical for usingws-security Kerberos Token Profile? A. Social networking B. End-to-end security C. Internet Single Sign On D. Intranet Single Sign On Correct Answer: BD /Reference: : QUESTION 95
Which statement is true for WS-Security Kerberos Token Profile? A. It leverages the SPNEGO protocol B. It can only be used for authentication C. It can be used to provide session-based security D. It can be used to provide asymmetric cryptography protection /Reference: : QUESTION 96 Which of the following is a valid timestamp to use in a SOAP header according to the Basic Security Profile (BSP) v1.0? A. 2009-06-24T08:42:00Z 2009-06-24T09:00:00Z B. 2009-06-24T09:00:00Z C. 2009-06-24T08:42:00Z D. 2009-06-24T08:42:00Z 2009-06-24T10:00:00Z true /Reference: : QUESTION 97 A developer is building a secure Web service to be deployed on IBM Web Sphere Application Server V7.0. The service will be accessed by a Microsoft.NET client. What should the developer be aware of, at a minimum, to ensure interoperability between the client and the service? A. The level of WS-* specifications each platform supports B. The Basic Security Profile v1.0 prohibits the use of SSL v2 C. The Kerberos security token cannot be used as it is not compatible with Microsoft.NET D. There are no issues between Microsoft.NET and the Web Sphere platforms, allws-security constructs are interoperable. /Reference: correct answer. QUESTION 98 When would a developer NOT need to run the wsdeploy command to deploy a Web service application on IBM Web Sphere Application Server V7.0? A. If the Web services application contains a deployment descriptor but no deployment classes. B. If the Web services application contains only JAX-RPC services but no deployment classes. C. If the Web services application contains only JAX-WS services but no deployment classes. D. If the Web services application contains both JAX-WS and JAX-RPC services but no deployment classes.
/Reference: : QUESTION 99 Which command should be used to install a JAX-WS application using the command line? A. wsgen B. wsdeploy C. wsimport D. wsadmin Correct Answer: D /Reference: : QUESTION 100 Which of the following can be changed in the JSR-109 deployment descriptors for JAX-WS Web service? A. Endpoint URL B. WSDL Location C. Request timeout D. MTOM Configuration E. Handler Configuration F. WSDL to Java mappings Correct Answer: BDE /Reference: appropriate answer. QUESTION 101 A developer has an @WebServiceRef annotation defined in a web service client. @WebServiceRef (name="java:comp/env/service/addressbookservice", AddressBookService.class)AddressBookPort port;... Address address = port.getaddress (John Doe); What element in the deployment descriptor defines the value of "name"? A. <service-ref> B. <service-name> C. <service-ref-name> D. <service-interface> E. <service-interface-name> /Reference: : QUESTION 102 Quality of services for JAX-WS can be enabled by attaching policy sets. Which of the following are valid attachment points for policy sets?
A. Service B. Operation C. Application Server D. Java EE Application E. Target endpoint URL BD /Reference: : QUESTION 103 A developer is creating a new Web service from a Java bean. Which of the following tasks CANNOT be performed using the Create Web Service Wizard in IBM Rational Application Developer V7.5? A. Enable MTOM support B. Specify custom bindings files C. Publish the Web service to a UDDI registry D. Associate the Web service project with an EAR E. Configure TCP/IP Monitor to monitor SOAP messages Correct Answer: B /Reference: correct answer. QUESTION 104 A user wants to specify the WSDL style of a newjax-ws Web service based on a JavaBean. Using the Web service generation wizard, which of the following are valid combinations? A. RPC Encoded B. RPC Wrapped C. Document Bare D. Document Literal E. Document Wrapped E /Reference: : QUESTION 105 Refer to the exhibit.
What could be preventing the developer from modifying some properties in the wizard? A. The Java Bean contains an @Web Service annotation B. The delegate class for the Web service already exists C. The developer had selected JAX-RPC for the Web services runtime D. The Web project containing the Java bean is at the J2EE 1.4 level /Reference: : QUESTION 106 Refer to the exhibit.
Using the JavaBean in Exhibit 1, the developer runs the following: wsgen -class path.\classes wsdl test.bookwhat artifacts are generated when the command completes? A. GetIsbn.class, GetIsbnResponse.class B. GetIsbnRequest.class, GetIsbnResponse.class C. BookService.wsdl, GetIsbnRequest.class, GetIsbnResponse.class D. BookService_schema1.xsd, BookService.wsdl, GetIsbn.class, GetIsbnResponse.class E. BookService_schema1.xsd, BookService.wsdl, GetIsbnRequest.class,GetIsbnResponse.class Correct Answer: D /Reference: : QUESTION 107 Refer to the exhibit, and identify the WSDL elements shown by the arrows. A. Message part, port, port type B. Endpoint, interface, message part C. Port, operation, response message D. Port type, response element, service /Reference: : QUESTION 108 The TCP/IP Monitor can be used to check the following: A. SOAP/JMS B. HTTP Header C. WSDL document D. SOAP messages E. WS-I Compliance Correct Answer: BDE
/Reference: : QUESTION 109 A developer used wsimport to generate the skeleton code for a Web service implementation. What is the purpose of the generated Object Factory class? A. The Object Factory class is the generated Service Endpoint Interface class B. The Object Factory class is the generated service provider class that is used by thejax-ws client. C. The Object Factory class takes the target Namespace value and creates the directory structure. D. The Object Factory class allows you to programmatically construct new instances of the Java representation for XML content. Correct Answer: D /Reference: appropriate answer. QUESTION 110 Which of the following is used to invoke a Web service from an unmanaged client? A. JAX-WS dispatch API B. Deployment descriptor C. @Resource annotation D. @WebServiceRef annotation E. Service and Interface classes E /Reference: : QUESTION 111 A company is migrating their current JAX-WS Web service running on IBM Web Sphere Application Server V6.1 with the Feature Pack for Web Services to V7.0. The company wants to continue to support V6.1 service consumers. If the Web service has WS-Atomic Transaction enabled, what settings should be configured to support the widest range of clients? A. Set the WS-Atomic Transaction to "Never" in WS-Transaction policy of the policy set B. Set the WS-Atomic Transaction to "Supports" in WS-Transaction policy of the policy set C. Set the WS-Atomic Transaction to "Mandatory" in WS-Transaction policy of the policy set D. Set the "Default WS-Tx specification level" to "1.0" in application policy set bindings E. Set the "Default WS-Tx specification level" to "1.1" in application policy set bindings Correct Answer: BD /Reference: : QUESTION 112 Refer to the exhibit.
A Web service is generated from the WSDL using IBM Rational Application Developer. Which of the following are valid request response wrappers that would be generated from the WSDL? A. SetWeather.java, GetWeather.java B. GetForecast.java, GetForecastResponse.java C. GetDayForecast.java, GetDayForecastResponseResponse.java D. GetTemperaturesRequest.java, GetTemperaturesResponse.java Correct Answer: B /Reference: : QUESTION 113 A financial institution needs to expose a Web service tore turn the customer name using JavaBean with annotations. Which of the following is a valid Web service implementation? A. A B. B C. C D. D Correct Answer: B /Reference: : QUESTION 114 Which one of these steps does NOT apply when a developer is setting a JAX-WS Web service to be SOAP 1.2 compliant? A. Use a JAX-WS Binding Type annotation B. Set a property on the SOAP Binding object C. Specify wsdl:xsoap1.2 as a flag during wsgen D. Specify in the WSDL to use a SOAP 1.2 SOAP binding in the WSDL binding
Correct Answer: B /Reference: : QUESTION 115 Which of the following is TRUE about specifying the SOAP version in JAX-WS? service via SOAP 1.2 A. The JAX-WS @Binding Type annotation of SOAP12 indicates to expose the Web service via SOAP 1.2 on both HTTP and JMS B. A Web service implementation defined with a JAX-WS @Web Service annotation defaults to expose the endpoint via SOAP 1.1 only. C. A Web service implementation defined with a JAX-WS @Web Service annotation defaults to expose the endpoint via SOAP 1.2 only. D. A Web service implementation defined with a JAX-WS @Web Service annotation defaults to expose the endpoint via both SOAP 1.1 and SOAP 1.2. C /Reference: : QUESTION 116 Which statements below are TRUE in IBM Web Sphere Application Server V7.0? A. JAX-WS and JAX-RPC both offer support for SOAP with attachments B. JAX-WS only supports MTOM and JAX-RPC only supports SOAP with Attachments. C. JAX-RPC supports WSDL 1.1 and SOAP 1.1 only. JAX-WS adds support for bothwsdl 2.0 and SOAP 1.2. D. JAX-RPC does not validate any SOAP messages. However JAX-WS, with its inclusion of JAXB, validates all SOAP messages. E. JAX-WS based Web services add native support for WS-Addressing whereas JAX-RPC only offers Web Sphere-specific APIs to use WS-Addressing. E /Reference: : http://www.gratisexam.com/