It is more faster and easier to pass the Oracle 1Z0-897 exam by using High value Oracle Java Platform, Enterprise Edition 6 Web Services Developer Certified Expert Exam questuins and answers. Immediate access to the Most recent 1Z0-897 Exam and find the same core area 1Z0-897 questions with professionally verified answers, then PASS your exam with a high score now.

Q9. If you are developing a Web Service starting from WSDL 1.1, how would you declare in wsdl that the Web Service requires the use of Addressing in a standard and interoperable way. 

A. Declare a policy as 

<wsp:Policy> 

<wsam:Addressing wsp:Optional="true"> 

<wsp:Policy/> 

</wsam:Addressing> 

</wsp:Policy> 

and attach it the corresponding wsdl:portType so that it applies to all the wsdl:operations in its 

scope. 

B. Declare a policy as 

<wsp:Policy> 

<wsam:Addressing wsp:Optional="true"> 

<wsp:Policy/> 

</wsam:Addressing> 

</wsp:Policy> 

and attach it the corresponding wsdl:binding so that it applies to all the wsdl:operations in its 

scope. 

C. Declare a policy as 

<wsp:Policy> 

<wsam:Addressing> 

<wsp:Policy/> 

</wsam:Addressing> 

</wsp:Policy> 

and attach it the corresponding wsdl:binding so that it applies to all the wsdl:operations in its 

scope. 

D. Declare a policy as 

<wsp:Policy> 

<wsam:Addressing> 

<wsp:Policy/> 

</wsam:Addressing> 

</wsp:Policy> 

and attach it the corresponding wsdl:service so that it applies to all the wsdl:ports in the service scope. 

Answer:


Q10. In designing the security for your enterprise application with multiple Web services, you don't want that each of the services handle user authentication by itself. Then which of the following you can use in your design? 

A. enable secure conversation for each service 

B. a centralized Policy Decision Point (PDP) via XACML 

C. a Security Token Service (STS) 

D. use transport level security with SSL 

Answer:


Q11. Assume the code is free of gross flaws and syntax errors. Which two statements are true? (Choose two.) 

A. Line 8 specifies that addInventory accepts either a valid total or quantity. 

B. Line 1 indicates the portType is LogInventory. 

C. Line 3 shows the method is mapped to the WSDL operation called "checkProduct". 

D. Line 4 means that a method is not expected to return a value unless requested. 

E. Line 7 implies WSDL operation and method name are the same. 

Answer: BE 


Q12. A developer is asked to consult on a Web services project and assist the team with a good design approach on a new project. The team members disagree on whether to use WSDL or Java first. Several members are skilled with XML and see a schema and WSDL as the correct place to start. The team has also learned the deadline for this project has been moved up and another team plans to reuse their code. Which statement is true about the proper course of action to take in this situation? 

A. Java should be used first because it is a strongly typed language and will result in a robust WSDL. 

B. WSDL should be used first because it will make the code easier to reuse for the other team. 

C. Java should be used first because it is often the fastest and easiest approach. 

D. WSDL should be used first because the team knows XML Schema. 

Answer:


Q13. A company is refactoring an existing website to use Web services clients. The application retrieves lists of parts and displays them to the users in a browser window. Previously, the data was stored as files on the web server and, in order to access the files, the user would simply click on a hyperlink. Now the data must be dynamically generated via a service that another developer has created. They want the easiest way to refactor their website to use Web services. Which three client-side technologies should they use? (Choose three.) 

A. SOAP 

B. REST 

C. Javascript 

D. XML 

E. JSON 

F. JAVA 

Answer: BCE 


Q14. HTTP clients can provide authentication information to the server via the "Authorization" header in the HTTP request. Choose the alternative, if any, that would serve as the definition for a resource method that would allow a JAX-RS resource to obtain this authentication data (Choose one): 

A. It is impossible for a JAX-RS resource to obtain this information, since low-level HTTP data is not presented to the JAX-RS application layer. 

B. @GET @Path("/authInfo") 

public String getAuthInfo( String authenticate ) { 

return authenticate; 

C. @GET @Path("/authInfo/{AUTHENTICATE}") 

public String getAuthInfo( 

@PathParam("Authorization") String auth ) { 

return authenticate; 

D. @GET @Path("/authInfo") 

public String getAuthInfo( 

@HeaderParam("Authorization") String auth ) { 

return authenticate; 

Answer:


Q15. What are three best practices that can be implemented when generating WS-I Basic Profile compliant Web services? (Choose three.) 

A. Send arrays of nulls to ensure .NET and Java clients receive the same data. 

B. Define data types early in the integration cycle. 

C. Use complex data types to reduce the number of items exchanged. 

D. Test interoperability at every stage of development. 

E. Insert conformance headers in all SOAP messages. 

F. Keep data types simple for speed and stability. 

Answer: BDF 


Q16. Given stock quote web service endpoint: 

and the corresponding client side artifacts for the above web service are : 

StockQuoteService is the Service class and StockQuoteProvider is the corresponding SEI. 

Which of the following two options enable addressing feature for proxy for the StockQuoteProvider SEI ? (Choose two) 

A. proxy = new StockQuoteService().getStockQuoteProvider() 

B. proxy = new StockQuoteService().getStockQuoteProvider(new AddressingFeature()) 

C. proxy = new StockQuoteService().getStockQuoteProvider(new AddressingFeature(false)) 

D. proxy = new StockQuoteService().getStockQuoteProvider(new AddressingFeature(false, true)) 

Answer: AB