• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

Sample Questions for 288 - Need answers

 
Greenhorn
Posts: 7
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi,

I would like to know the answers for the sample mock exam questions 288 which is listed below


Which encoding style for Web service messages BEST balances performance and relative ease-of-use for the developer?

A.
RPC encoded
B.
RPC literal
C.
Document encoded
D.
Non-wrapped document literal
1Which of the following is a required element of a web service?

A.
UDDI
B.
WSDL
C.
WSIL
D.
SOAP
E.
XML
Which of the following is the correct WSDL Element order as required by WS-I?

A.
wsdl:import, wsdl ocumentation, wsdl:message, wsdl:types
B.
wsdl:message, wsdl:types, wsdl:import, wsdl ocumentation
C.
wsdl:types,wsdl ocumentation, wsdl:import, wsdl:message
D.
wsdl ocumentation, wsdl:import, wsdl:types,wsdl:message
Which of the following soap encoding mechanisms would provide the MOST performance benefit to a web service?

A.
SOAP RPC
B.
SOAP RPC Literal
C.
Document Literal Encoding
D.
IIOP Type Encoding
E.
HTTP Type Encoding
Acme organization assembles and sells via the internet, computers that are built JIT. Acme wants to be able to have users 'build' their computers online, using parts provided by Acme partners. The Web Service will allow the users to choose parts listed by the partners and when they have completed selecting all of the parts and have 'submitted' their orders, have the system schedule the work, and order all of the parts from the appropriate vendors automatically. Based on this scenario, which of the following statements is true?

A.
Partners must provide the Web Services implementing ordering and inventory
B.
Client Platform must support JMS
C.
The existing work scheduling would have to be written in Java
D.
The order management would need to expose its APIs to the internet.
E.
All of the Web Services would have to use XML over HTTP.
When choosing which parts of an application to expose for use as a Web Service, which of the following criteria is LEAST important?

A.
Whether the client is based on .NET, Java or other
B.
Number of Web Service calls required to complete a task
C.
Security requirements of the business aspect being exposed
D.
Whether the service will need to be available via the intranet or Internet.
If a SOAPException is thrown, which of the following fault messages would be returned?

A.
SOAP-ENV:Client
B.
SOAP-ENV:Server
C.
SOAP-ENV:VersionMismatch
D.
SOAP-ENV:MustUnderstand
Web Services can be provided using a number of protocols. Which of the following protocols would provide the HIGHEST level of interoperability?

A.
SOAP
B.
RMI
C.
JMS
D.
SMTP
A developer uses WebSphere Studio Application Developer V5.1 to create an EJB Web Service from a WSDL document. If that developer uses the wizard to select SOAP over JMS, which of the following will NOT be generated?

A.
EJB implementation
B.
Router EJB project
C.
Router WAR project
D.
service endpoint interface
A developer creates a Web Service from a JavaBean. Which of the following statements are true?

(Select 2)

A.
static methods can be exposed
B.
document/literal can NOT be used
C.
an SEI is always generated
D.
security can be enabled
E.
security can NOT be enabled
How could a developer easily test JavaBeans that WebSphere Studio Application Developer V5.1 generates from an XML schema?

A.
Use the XSL Debugger to step through the schema
B.
Use Web Services Explorer to load and exercise the JavaBeans
C.
Run the Universal Test Client against the JavaBean for the root XML element
D.
Use the generated test program and run or debug it as a Java application
E.
Generate a test program and then run it under JUnit
A developer creates a Web Service from a Stateless Session Bean. Which option is not available in the wizard?

A.
Select methods
B.
Select encoding scheme
C.
Select signing certificate
D.
Select transport
Which of the following approaches for development of Web Services using WebSphere Studio Application Developer V5.1 is NOT bottom-up?

A.
ISD
B.
JavaBean
C.
WSDL
D.
EJB
E.
URL
In the Graph View of the WSDL editor, which of the following are NOT shown by default?

A.
Messages
B.
Port Types
C.
Bindings
D.
Services
A new EJB Web Service uses a JMS transport protocol. The developer must create a message-driven EJB to route requests to each EJB. To carry this out from WebSphere Studio Application Developer V5.1, he could use:

(Select 2)

A.
Endpoint enabler
B.
WSDL Explorer
C.
Web Services wizard
D.
Web Services Explorer
E.
Web Deployment Descriptor Editor
What will the developer see when working in the Graph view of the WSDL editor?

A.
Bindings linked to Messages having input and output parts
B.
Ports linked to Port Types having operations related to Messages
C.
Port Types linked to Ports having Bindings linked to Messages
D.
Services having Port Types linked to Ports having Bindings
A Web Service uses an EJB to retrieve a large binary JPEG file as a response value. The Web Service uses SOAP messaging protocol over an HTTP transport. The developer must minimize the size of the response. Choose the BEST approach.

A.
Convert the JPEG file into an XML element attribute using base 64 encoding
B.
Convert the JPEG file into XML character data using base 64 encoding
C.
Use SOAP attachments over MIME
D.
Set the response in an HTTP cookie
E.
Use UTF-8 encoding
A developer is creating a skeleton EJB from a WSDL file. Which of the following statements are NOT true?

A.
The only supported run-time is WebSphere 5.0.2.
B.
The Web Service must be started manually.
C.
The Web Service can be tested before a proxy is generated.
D.
The generated proxy provides a remote procedure call interface
JavaBeans generated from an XML schema must be contained in a WebSphere Studio Application Developer V5.1 project that is configured to work with Java source code. Which of the following projects would be suitable?

(Select 3)

A.
XML
B.
Web
C.
Enterprise Application
D.
Java
E.
EJB
F.
Simple
Which of the following Web Services run-time environments are JAX-RPC (JSR-101) compliant?

(Select 2)

A.
IBM WebSphere 5.0.2
B.
IBM SOAP
C.
IBM Axis 1.0
D.
Apache Axis 1.0
E.
Apache XML RPC
A fat client application quotes retail prices for printing large orders of custom-printed T-shirts. Authorized screen-printing shops use the application to search vendor catalogs for comparative wholesale prices. The vendor catalogs are published on the Internet as secured Web Services advertised through UDDI. They implement a common UDDI T-model. The most appropriate transport protocol for the client is:

A.
JTA messaging
B.
JMS messaging
C.
HTTPS
D.
SNMP
E.
SMTP
How many WSDL files are created by the Web Services wizard in WebSphere Studio Application Developer V5.1 for an EJB Web Service using the WebSphere 5.02 run-time environment?

A.
1
B.
2
C.
3
D.
4
Which of the following elements should a WSDL document contain so that it can be used by Web Services client wizards to generate client proxies?

A.
Fault
B.
Service
C.
Header
D.
Binding
Which of the following can be used by Web Services Client creation wizards in WebSphere Studio Application Developer V5.1 to create Java client proxies and stubs?

(Select 2)

A.
UDDI document
B.
WSDL document
C.
WSIL Document
D.
webservicesclient.xml
E.
webservices.xml
When using the find_service method of the UDDIProxy interface of the UDDI4J API, what parameter cannot be specified?

A.
The number of services to return
B.
A particular business instance
C.
Publisher assertions keys
D.
tModel uuid_key values
E.
A list of category references

A business partner has provided you with a WSDL document describing a web service they are running. Which of the following do you still require before you can expect that your invocations of the service are successful?

(Select 3)

A.
the business meanings of the parameters or return values.
B.
the invariant conditions that are enforced by the service.
C.
the transport on which the service operates.
D.
the QoS characteristics of the service.
E.
the endpoint of the service.

Before invoking the Web Service User-Defined Function wizard to create a user-defined function that accesses a Web Service, what must be defined?

A.
a database deployment descriptor in the DB Servers view
B.
a SQL-to-SOAP mapping in the Data Definitions view
C.
a Web Service User-Defined Function proxy
D.
a stored procedure
E.
a DB2 database in the Data Definitions view
A Web Service application developer has created a Web Service with a JAX-RPC endpoint. Which of the following tasks need to be done in order to bind the port components with the endpoint implementations?

(Select 2)

A.
Define the port component in web.xml
B.
Define the Service endpoint class in WSDL
C.
Define the Service endpoint class in web.xml
D.
Associate the Service endpoint class with the port-component in webservices.xml using servlet-link
E.
Associate the Service endpoint class defined in WSDL with the port component
Other than the standard J2EE deployment descriptor files, which Web Service deployment descriptor file of the following is required so that a Web Service project can be deployed in WebSphere Studio Application Developer V5.1 Test Environment or WebSphere Application Server?

A.
web.xml
B.
MANIFEST.MF
C.
webservices.xml
D.
application.xmi
E.
jax-rpc.xml
Which of the following are TRUE about webservices.xml? This file defines:

(Select 2)

A.
port's name, bean classes and Service Endpoint Interface (SEI)
B.
WebSphere Application Server 5.0.2 specific bindings
C.
Web Services security
D.
the WSDL file of the service it uses
E.
data sources, if any, used by the Web Service
Which of the following are TRUE about Endpoint Enabler tool?

(Select 2)

A.
It manages the lifecyle of the Web Service Endpoint implementation
B.
It provides transaction and security services to endpoint implementations
C.
It can be used to create modules that support SOAP over both JMS and HTTP.
D.
It provides programmatic controls to Web Service implementations to choose a type of transport.
E.
It can be used to add transports only to Web Services deployed as J2EE applications
Which of the following are TRUE about packaging Web Services as a J2EE application?

(Select 2)

A.
The Web Service endpoints are defined in J2EE Application deployment descriptor (application.xml)
B.
Web Services with JAX-RPC service endpoints are packaged in WAR files.
C.
Web Service clients can be deployed only as J2EE enterprise applications
D.
Web Services with Stateless Session Bean service endpoints are packaged in an EJB JAR file.
E.
The transaction and security services of a J2EE container are not available to Web Services.

Which of the following is true of UDDI publisher assertions? A publisher assertion:

(Select 3)

A.
allows for associations to be formed between several businessEntity structures
B.
contains rules that a publisher is valid
C.
references a group of businessEntity structures
D.
defines a group of publish structures
E.
is accessed by the Web Services Explore Manage Publisher Assertions icon

Which of the following statements are TRUE with respect the the web services command line tools in WebSphere Studio Application Developer v5.1?

(Select 2)

A.
wsdeploy can be used to prepare a WAR file for deployment in WebSphere as a JAX-RPC service
B.
wsconfig can be used to alter the descriptor of a deployed web service
C.
wscompile can be used to generate deployment code for a JAX-RPC service
D.
wsgen can be used to generate a Java bean skeleton from a WSDL file
A developer mistakenly adds three erroneous identifiers in the Web Services Explorer UDDI Publish page while entering information for a new business. She wants to remove all identifiers from the page before publishing it. How could she BEST delete all the identifiers?

A.
Select the row and then click the Categories Remove link
B.
Click the Refresh icon without saving the business element
C.
Click the Select All option box in the categories header and then click the Remove link
D.
Click the Select Row option box in each category row and then click the Remove link
E.
Set the Publication format to Simple and back to Advanced to make the categories disappear
Which of the following statements are TRUE of the Universal Test Client (UTC)?

(Select 2)

A.
UTC cannot be used to invoke Web Services that use the Apache SOAP or Axis runtimes.
B.
If using the WebSphere Application Server 5.0.2 Web Services runtime, the generated ServiceLocator and SoapBindingStub classes can be accessed through UTC to invoke a Web Service
C.
UTC uses the Web Services Invocation Language(WSIL) APIs to discover and invoke a Web Service
D.
UTC can be used to explore and test WSDL documents
E.
UTC can be used to test the methods of Web Services client stub objects without developing or generating a test client application
A developer wants to test methods on a Web Service using its client stub. The client stub is a JAX-RPC static stub that has been generated for the IBM WebSphere 5.0.2 runtime. The developer launches the Universal Test Client against the generated ServiceLocator class. Which of the following is an appropriate next step for her to take towards the goal of invoking methods on the web service?

A.
Under Object References, expand the reference for the ServiceLocator object. Then select and invoke the method that returns an instance of the SoapBindingStub. Select the option to Work with Object for the stub object.
B.
Under EJB References, expand the reference for the EJB that underlies the web service, and select the object corresponding to its Home interface.
C.
Under Object References, expand the reference for the ServiceLocator object. Then select and invoke its getPorts() method. Select the option to Work with Object for the getPorts() return object.
D.
Navigate to the JNDI Explorer page of the UTC. Browse and find the JNDI entry for the Web Service, and select it.
Which of the following statements is NOT TRUE about the Unit Test UDDI Registry capability?

A.
The UDDI Unit Test registry supports the publisher assertion and service projection features of UDDI Version 2
B.
Once a UDDI Unit Test registry is created, you can browse and publish entities to it using the Web Services Explorer
C.
A UDDI Unit Test registry can contain user-defined categories
D.
A UDDI Unit Test registry can be replicated


Which of the following is TRUE about testing a Web Service with SOAP bindings using Web Services Explorer?

(Select 3)

A.
Web Services Deployment Descriptors are used by Web Services Explorer to test Web Services
B.
Web Services Explorer acts as a Web Service client
C.
SOAP exchanges can be monitored as the service is tested
D.
SOAP envelopes that require complex types cannot be tested
E.
Forms or direct data input in Source panes can be used to feed data
A developer wants to analyze SOAP traffic between a Web Service and its clients for WS-I incompatibilities. She has already generated a proxy and a sample application, and set up the TCP/IP monitor to direct the sample application traffic through it. She invokes a method on the Web Service, and saves the WS-I message log file generated by the TCP/IP monitor. Which of the following methods is MOST suitable for viewing WS-I incompatibilities listed in the log file?

A.
Open and view the log file using an XML editor
B.
Save the log file to one of the projects in the workspace, and view any WS-I incompliances in the task pane
C.
Open and view the log file using the WSDL editor
D.
Open and view the log file using the Web Services Explorer

A developer wants to use the TCP/IP Monitor to examine the HTTP requests and responses being sent between a Web Service client and a SOAP Web Service. He has configured the TCP/IP Monitor to listen for requests on port 9081 and then forward these requests to the test server hosting the Web Service on port 9080. Which of the following additional changes need to be made in order to successfully view the SOAP traffic between the client and the Web Service?

A.
Change the web browser request URL to use port 9081 instead of 9080.
B.
Change the Web Service client code to use an endpoint address of 9081 instead of 9080.
C.
Configure the Web Service to use HTTPS instead of HTTP.
D.
Change the Web Service implementation code to listen on port 9081.
What WS-Security authentication mechanisms does IBM WebSphere Application Server V5.0.2 support by default?

(Select 2)

A.
Form-based
B.
Client certificate-based
C.
usernameToken
D.
Binary token
E.
Basic

A Web Service designer could promote message confidentiality through the use of:

(Select 2)

A.
Canonical checksums
B.
Security tokens
C.
XML encryption
D.
Role-based certificates
E.
Attachments
Which of the following statements about an intermediary is NOT true?

A.
It may re-insert the header that it has processed.
B.
It must remove the header entry intended for it.
C.
It must keep the original message routing.
D.
It should generate a fault message when an error occurs.

A developer using WebSphere Studio Application Developer V5.1 wants to associate a security role with all authenticated users. She would invoke the Security page of the Deployment Descriptor Editor for the desired J2EE application and then set the checkbox labeled:

A.
"Users/Groups" and add all users
B.
"Everyone"
C.
"All authenticated users"
D.
"All authorized users"

Signing parts of a SOAP message is used to:

A.
authorize the message sender
B.
reduce message length
C.
verify the message receiver
D.
promote message integrity
Which of the following is TRUE of public key cryptography?

A.
Data encrypted with the sender's private key can only be decrypted by the SENDER'S PRIVATE KEY
B.
Data encrypted with the sender's public key can only be decrypted by the SENDER'S PRIVATE KEY
C.
Data encrypted with the sender's private key can only be decrypted by the RECEIVER'S PUBLIC KEY
D.
Data encrypted with the sender's public key can only be decrypted by the RECEIVER'S PRIVATE KEY
Please refer to the exhibit. Which JAX-RPC client invocation style does this code snippet exemplify?

A.
Stub
B.
Dynamic Proxy
C.
Dynamic Invocation Interface
D.
SoapBindingStub

EXHIBIT:
Service service = ServiceFactory.newInstance().createService(null);
Call call = service.createCall();
URL u = new URL ("http://localhost:6080/AddresBookService/services/AddressBook");

call.setTargetEndpointAddress(u);
call.setProperty(Call.SOAPACTION_USE_PROPERTY, Boolean.TRUE);
call.setProperty(Call.SOAPACTION_URI_PROPERTY, "getAddress");
call.setProperty (Call.ENCODINGSTYLE_URI_PROPERTY,"http://schemas.xmlsoap.org/soap/encoding/");
call.setOperationName(new QName("urn:address-book", "getQuote"));
call.addParameter("name", XMLType.XSD_STRING, ParameterMode.IN);
call.setReturnType("urn:address", AddressBook.class);

Object result = call.invoke(new Object[] {name = "John Doe"});

Which of the following are true of Web Services for J2EE (JSR-109)?

(Select 2)

A.
It defines deployment descriptors for Web Services on both the server and client side
B.
It defines a new type of archive file for Web Services archives
C.
It defines a programming model for an Entity EJB as an implementation of a Web Service
D.
It defines a programming model for a Stateless Session EJB as an implementation of a Web Service
E.
It is part of J2EE 1.3 specification
A Java Web Service has the following characteristics: The Service Endpoint Interface of the Web Service is unlikely to change, but the location of the service endpoint itself might change. Which JAX-RPC client invocation style is most suitable for accessing this Web Service?

A.
Stub
B.
Dynamic Proxy
C.
Dynamic Invocation Interface
D.
Service Locator
E.
SOAP Binding Stub
Which of the following Java types does not have a JAX-RPC supported mapping?

A.
Java arrays
B.
java.util.Hashtable
C.
Java primitive types
D.
Java beans
E.
java.lang.String
Which of the following statements concerning the mapping of WSDL to Java as defined by JAX-RPC is NOT CORRECT?

A.
Each WSDL <portType> element is mapped to a Java interface called the Service Endpoint Interface (SEI)
B.
Each <operation> within the <portType> is mapped to a Java method in the SEI
C.
The <message> elements of the <operation> are mapped to parameters and return types of the methods of the SEI
D.
WSDL faults are mapped to a set of return codes defined as constants
E.
Complex return types must implement java.io.Serializable.
Which of the following is NOT currently part of the implementation of a Web Service (as opposed to its deployment artifacts) according to Web Services for J2EE (JSR-109)?

A.
a stateless session EJB or JAX-RPC Service endpoint that implements the methods as described in the WSDL
B.
a WSDL document
C.
a service instance called a Port
D.
a description of security attributes

thanks
Evan
 
reply
    Bookmark Topic Watch Topic
  • New Topic