Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Sun 310-231 Exam - Cheat-Test.com

Free 310-231 Sample Questions:

1. A student developer has created a new library of math functions to share with friends in a linear algebra class. The developer is having difficulty getting people to come over to the dorm to see the new code library, so he decides to deploy it as a Web service so that everyone can enjoy the features via the Internet.
One of the functions has this WSDL definition:
<portType name="MyMathLib">
<operation name="incCtr">
<input message="tns:incCtr"/>
</operation>
</portType>
Which two statements are true about this Web service? (Choose two.)
A. This is an asynchronous receive.
B. This is an asynchronous send.
C. The client must use SOAPFaultException to display any errors.
D. It must send a SOAP fault back to the sender.
E. It must NOT send a SOAP fault back to the sender.
Answer: BE

2. According to the WS-I Basic Profile 1.1, which two statements are true about the targetNamespace attribute for xsd:schema elements that are children of WSDL 1.1 type element? (Choose two.)
A. Its value must be valid unless it has xsd:import, xsd:annotation, or both as its only child elements.
B. Its value must be empty unless it has xsd:import, xsd:annotation, or both as its only child elements.
C. It should have same the value as the namespace attribute on the wsdl:import element in a document being imported.
D. It must have same the value as the namespace attribute on the wsdl:import element in a document being imported.
Answer: AD

3. A team of developers is designing RESTful Web services for a new application.
What are three properties of the services? (Choose three.)
A. They can be stateful.
B. They can be stateless.
C. Components communicate by exchanging representations of the resource.
D. Components communicate by directly performing operations on the resource.
E. They require WSDL service API definitions.
F. Responses can be labeled as cacheable or non-cacheable.
Answer: BCF

4. A developer plans to refactor some of the company's existing Java EE 5 business services, moving them out of the existing monolithic application and into Web services.
What are two benefits of exposing existing Java EE 5 functionality as a Web service? (Choose two.)
A. improved manageability
B. more finely-grained
C. enhanced security
D. loose coupling of functionality
E. self-describing
F. automatic session management
Answer: DE

5. A developer is creating an XML schema using the xsd:all operator.
Given the code:
<types>
<schema targetNamespace="http://sun.cert/types"
xmlns:tns="http://sun.cert/types"
xmlns:xsd="http://www.w3.org/2001/XMLSchema">
<xsd:complexType name="Person">
<xsd:all>
<!-- insert code here -->
</xsd:all>
</xsd:complexType>
</schema>
</types>
Which two element definitions, when inserted into the given schema fragment, result in a correct schema type definition? (Choose two.)
A. <xsd:element name="first" type="xsd:string"/>
B. <xsd:element name="items" type="xsd:long" maxOccurs="5"/>
C. <xsd:element name="last" type="xsd:string" minOccurs="1" maxOccurs="1"/>
D. <xsd:element name="first" type="xsd:string" minOccurs="0" maxOccurs="5"/>
E. <xsd:element name="last" type="xsd:string" minOccurs="1" maxOccurs="5"/>
F. <xsd:element name="ssn" type="xsd:string" minOccurs="1" maxOccurs="unlimited"/>
Answer: AC

6. A team of developers is describing a set of endpoints in their new SOA application.
Given the WSDL extract:
<service name="InventoryServices">
<port name="PurchaseOrder" binding="tns:POBinding">
<soap:address location="http://192.168.0.2:8080/inventory"/>
</port>
<port name="Invoice" binding="tns:InvoiceBinding">
<soap:address location="http://192.168.0.2:8080/inventory"/>
</port>
</service>
Which statement is true about this WSDL extract?
A. The extract is WS-I Basic Profile 1.1 compliant because both port element names are different.
B. The extract is NOT WS-I Basic Profile 1.1 compliant because both port elements point to the same location.
C. The extract is WS-I Basic Profile 1.1 compliant because both port elements point to different binding elements.
D. The extract is NOT WS-I Basic Profile 1.1 compliant because it contains two port elements in the same service.
E. The extract is WS-I Basic Profile 1.1 conformant because both port element names are different.
F. The extract is WS-I Basic Profile 1.1 conformant because the port, binding, and service element
combinations are unique.
Answer: B

7. Which two statements are true about the role of XML schemas in Web services? (Choose two.)
A. DTDs provide stricter data typing than XML schemas.
B. XML schemas can be used to validate the organization of XML documents.
C. XML schemas contain a vocabulary, content model and data types.
D. DTDs are easier to map to Java than XML schemas, and so remain more popular.
E. The W3C recommends that XML schemas be referred to as XSD.
F. The W3C has designated that XML schemas be referred to as WXS.
Answer: BC

8. A developer must describe a message that contains multiple parts using non-primitive data types.
Which two code fragments produce equivalent composite message structure definitions? (Choose two.)
A. <types>
<schema .... >
<complexType name="FOO" type="tns:FOOType"/>
<element name="FOOType">
.
.
.
</element >
<complexType name="BAR" type="tns:BARType"/>
<element name="BARType">
.
.
.
</element >
</schema>
</types>
<message name="FOO">
<part name="FOO" complexType="tns:FOO"/>
<part name="BAR" complexType="tns:BAR"/>
</message>
B. <types>
<schema .... >
<element name="FOO" type="tns:FOOType"/>
<complexType name="FOOType">
.
.
.
</complexType>
<element name="BAR" type="tns:BARType"/>
<complexType name="BARType">
.
.
.
</complexType>
</schema>
</types>
<message name="FOO">
<part name="FOO" element="tns:FOO"/>
<part name="BAR" element="tns:BAR"/>
</message>
C. <types>
<schema .... >
.
.
.
<complexType name="Composite">
<choice>
<element name="FOO" minOccurs="1" maxOccurs="1" type="tns:FOOType"/>
<element name="BAR" minOccurs="0" maxOccurs="unbounded" type="tns:BARType"/>
</choice>
</complexType>
</schema>
</types>
<message name="FOO">
<part name="composite" type="Composite"/>
</message>
D. <types>
<schema .... >
.
.
.
<complexType name="Composite">
<choice>
<element name="FOO" minOccurs="1" maxOccurs="1" type="tns:FOOType"/>
<element name="BAR" minOccurs="0" maxOccurs="unbounded" type="tns:BARType"/>
</choice>
</complexType>
</schema>
</types>
<message name="FOO">
<part name="composite" type="tns:Composite"/>
</message>
Answer: BD

9. The WSIT project implements a number of WS-* specifications to aid developers in creating secure and interoperable services.
What are two parts of the WS-specifications? (Choose two.)
A. WS-ReliableMessaging
B. WS-Bootstrapping
C. WS-Eventing
D. WS-Policy
E. WS-WSITrust
Answer: AD

10. A developer is analyzing an existing Web service with performance problems. The analysis reveals the service employs SOAP over HTTP. When the size of the encoded binary files grew with changing business requirements, the service slowed.
What are two effective solutions for this problem? (Choose two.)
A. Separating the XML and binary content with WS-Filtering implemented in WSIT will improve efficiency.
B. XML documents larger than 1 KB with binary encoding should be optimized.
C. WS-Addressing can ease congestion by routing messages over other protocols.
D. For existing services, the most effective solution is to increase the available bandwidth.
E. MTOM can reduce both processing and bandwidth required by SOAP with attachments.
Answer: BE

11. Given:
1. try { // Call Web service Operation
2. org.me.calculator.client.CalculatorWS port =
3. service.getCalculatorWSPort();
4. // TODO initialize WS operation arguments here
5. int i = 3;
6. int j = 4;
7. // TODO process result here
8. int result = port.add(i, j);
9. out.println("<p>Result: " + result);
10.
11. } catch (Exception ex) {
12. out.println("<p>Exception: " + ex);
13. }
Assume Reliable Messaging is used and the code is correct except for what is missing at line 10.
Which code fragment must be placed at line 10?
A. Close the port object with ((Closeable)port).close(); after testing result is positive.
B. Close the port with port.close();
C. Closing the port object is optional, but port.close(); will work.
D. Close the port object with ((Closeable)port).close();
Answer: D

12. Which two statements are true about Java clients that use a security token service (STS) supported by the security features of WSIT? (Choose two.)
A. The client only requires a keystore.
B. STS requires a default user name configuration.
C. Using an STS-issued token requires a keystore and a truststore.
D. HTTPS must be configured.
E. An authorized client receives a token digitally signed by the STS.
Answer: CE

13. A developer who recently added message optimization support to the company's Web services is tasked with explaining how the next crop of WSIT client applications will use the feature.
Which statement is true?
A. Client developers should have experience with the SAAJ and MIME types to use MTOM with the service.
B. The clients should use the service WSDL to discover and satisfy the interoperability requirements.
C. Adding message optimization is a manual step when the WSDL is available on HTTPS.
D. The encryption for optimization requires a client keystore.
Answer: B

14. A company uses Web services to exchange mortgage and credit data as well as digital versions of associated documents. The data is confidential and it is common for the service and client to exchange applications, credit results, reports and more in a request/response format. Recently, the company has become concerned about the substantial cost of processing and message encryption with a PKI approach.
What can be done to cut costs?
A. use MTOM to optimize the messages and provide data confidentiality via XML Digital Signature
B. because of the weak adoption of WS-SecureConversation on Java platforms, consider using Kerberos
C. use HTTPS as it is both economical and adequate
D. use WS-SecureConversation and MTOM to reduce the processing overhead
Answer: D

15. Given the Java fragment and schema:
1. //-- Java code fragment
2. public class PurchaseOrder{
3. public javax.xml.datatype.XMLGregorianCalendar orderDate;
4. }
5. //-- Schema fragment
6. <xs:complexType name="purchaseOrder">
7. <xs:sequence>
8. <xs:element name="orderDate" type="xs:anySimpleType"
9. minOccurs="0"/>
10. </xs:sequence>
11. </xs:complexType>
Which two statements are true about .Net and WCF interoperability for this data? (Choose two.)
A. The GregorianCalendar maps to an equivalent date type in both Java and .Net.
B. .Net will generate code with the calendar as a string that functions as well as a date.
C. .Net will generate code with the calendar as a string that is not type equivalent.
D. Use of the @XmlSchemaType annotation causes .Net to properly map to a date.
E. Casting in the case of WSIT services is an effective approach for the WCF client.
Answer: CD


© 2014 Cheat-Test.com, All Rights Reserved