A company's new investment management Java application and a legacy stock trader application need to communicate, but they use different JMS implementations. A developer decides to implement a JMS bridge to solve the problem. Which two advantages does this pattern provide? (Choose two.)
A. It converts the interface of a class into another interface that clients expect.
B. It decouples an abstraction from its implementation so that the two can vary independently.
C. It dynamically attaches additional responsibilities to an object.
D. It optimizes network traffic.
E. It is vendor independent.
A developer is asked to consult on a Web services project and assist the team with a good design approach on a new project. The team members disagree on whether to use WSDL or Java first.
Several members are skilled with XML and see a schema and WSDL as the correct place to start. The team has also learned the deadline for this project has been moved up and another team plans to reuse their code. Which statement is
true about the proper course of action to take in this situation?
A. Java should be used first because it is a strongly typed language and will result in a robust WSDL.
B. WSDL should be used first because it will make the code easier to reuse for the other team.
C. Java should be used first because it is often the fastest and easiest approach.
D. WSDL should be used first because the team knows XML Schema.
A developer is creating a session bean EJB endpoint for a new application. Which three statements are true about the service? (Choose three.)
A. It needs to be packaged as a WAR file.
B. It needs to be packaged as a JAR file.
C. It needs to be packaged as a .lib file.
D. The class must not be final or abstract.
E. It must implement the javax.ejb.SessionBean or javax.ejb.EntityBean interface.
F. It can be declared an EJB via the @Stateless annotation.
A developer who recently added message optimization support to the company's Web services is tasked with explaining how the next crop of WSIT client applications will use the feature. Which statement is true?
A. Client developers should have experience with the SAAJ and MIME types to use MTOM with the service.
B. The clients should use the service WSDL to discover and satisfy the interoperability requirements.
C. Adding message optimization is a manual step when the WSDL is available on HTTPS.
D. The encryption for optimization requires a client keystore.
Given:
1.
try { // Call Web service Operation
2.
org.me.calculator.client.CalculatorWS port =
3.
service.getCalculatorWSPort();
4.
// TODO initialize WS operation arguments here
5.
int i = 3;
6.
int j = 4;
7.
// TODO process result here
8.
int result = port.add(i, j);
9.
out.println("
Result: " + result);
10.
11.
} catch (Exception ex) {
12.
out.println("
Exception: " + ex);
13.
}
Assume Reliable Messaging is used and the code is correct except for what is missing at line 10.
Which code fragment must be placed at line 10?
A. Close the port object with ((Closeable)port).close(); after testing result is positive.
B. Close the port with port.close();
C. Closing the port object is optional, but port.close(); will work.
D. Close the port object with ((Closeable)port).close();
A purchase order Web service is designed to be synchronous, request-response, and HTTP- based. The existing service processes the request immediately. Because of new business requirements, the service can take up to ten days to perform a credit check before processing the order. Which two design changes need to be made? (Choose two.)
A. The client needs to use dynamic proxies instead of stubs.
B. The client needs to develop and deploy a Web service to accept callbacks.
C. The service only needs to change the WSDL from rpc-literal to document-literal.
D. The client and the service need to establish a mechanism to correlate the messages.
E. Given delays of up to ten days, a polling strategy is more efficient than callback.
Two companies communicate using Web services in a business transaction. Which mechanism is designed to ensure that business data CANNOT be renounced, or a transaction denied, by either one?
A. integrity provided by public key certificates and digital signatures
B. confidentiality provided by asymmetric or symmetric cryptography
C. identity management provided by private keys and certificate authorities
D. non-repudiation provided though public key cryptography by digital signing
Given:
1.
@WebService(name="LogInventory")
2.
public class InventoryReader {
3.
@WebMethod(operationName=check)
4.
@OneWay
5.
public void checkProduct(String name);
6.
@WebMethod
7.
public void addInventory(
8.
@WebParam(name="total") int quantity)
9.
throws InventoryException;
10.
}
Assume the code is free of gross flaws and syntax errors.
Which two statements are true? (Choose two.)
A. Line 8 specifies that addInventory accepts either a valid total or quantity.
B. Line 1 indicates the portType is LoginInventory.
C. Line 3 shows the method is mapped to the WSDL operation called checkProduct.
D. Line 4 means that a method is not expected to return a value unless requested.
E. Line 6 implies WSDL operation and method name are the same.
A developer new to Web services is researching how a client can connect to a service. It is clear that some models provide better abstraction while others offer more power when working with messages. What is the correct reason to choose the Dispatch interface?
A. Dispatch is a high-level API that helps hide the complexity of XML.
B. REST services can be consumed with the Dispatch API and XML/HTTP bindings.
C. The Dispatch interface supports the use JAXP to bind data.
D. The Dispatch interface is represented internally as a SOAP message.
Given the Java fragment and schema:
1.
//-- Java code fragment
2.
public enum USState {MA, NH}
3.
//-- Schema fragment
4.
5.
6.
7.
8.
9.
10.
// .NET auto generated code from schema
11.
public enum usState { NH, MA }
Which statement is true about .Net and WCF interoperability for this data?
A. Based on the fragment, enumerations map well between Java and .Net.
B. The subtle differences in the variable names make it clear these enumerations are NOT interoperable.
C. The XML schema reveals the type on the enumeration is lost across the platforms.
D. This exchange would be interoperable if the annotation @XmlEnum was applied to the Java method.
An engineer is studying the architecture of the JAXB implementation. What are three components in its design? (Choose three.)
A. schema compiler
B. built-in SAX parser
C. schema generator
D. built-in DOM parser
E. binding runtime framework
F. schema interpretor
Which two statements are true about digital signatures applied to an XML document? (Choose two.)
A. The receiver verifies that the message matches the digital signature using its own private key.
B. The receiver can use an XML Digital Signature for non-repudiation of unsigned data.
C. The sender creates a digital signature using its own private key and sends that signature along with the original document.
D. The sender creates a digital signature using its own public key and sends that signature along with the original document.
E. The receiver verifies that the message matches the digital signature using the sender's public key.
A student developer has created a new library of math functions to share with friends in a linear algebra class. The developer is having difficulty getting people to come over to the dorm to see the new code library, so he decides to deploy it as a Web service so that everyone can enjoy the features via the Internet. One of the functions has this WSDL definition:
Which two statements are true about this Web service? (Choose two.)
A. This is an asynchronous receive.
B. This is an asynchronous send.
C. The client must use SOAPFaultException to display any errors.
D. It must send a SOAP fault back to the sender.
E. It must NOT send a SOAP fault back to the sender.
A company has contracted a developer to create their new accounting system. The system the developer will replace runs a monolithic web application using one web server and one database server. Technical requirements state the developer must write the business logic in Java, deploy to the application server and push the presentation logic onto the web servers. What are three characteristics of services in the proposed Service Oriented Architecture? (Choose three.)
A. Services are coarse grained.
B. Services are finely grained.
C. Services are loosely coupled.
D. Services are tightly coupled.
E. Clients must be implemented in the Java technology.
F. Services are platform agnostic, network-addressable web APIs.
An enterprise has a requirement to create a Web service to accept purchase orders. The order data contains some authorization information that is specific to each order (such as, who can access which parts of the order).
Keeping in mind future enhancements in types of orders that the enterprise needs to accept, which two design solutions provide the most flexibility? (Choose two .)
A. a Web service interface with one method per accepted XML document type for a purchase order
B. a procedure-style Web service method that lists all data elements and all possible access control options.
C. a document-style Web service method that accepts all types of XML documents representing purchase orders.
D. a Web service interface with one method for each combination of data elements and the access control options.