2013年10月29日星期二

Guide de formation plus récente de SUN 310-231

Vous pouvez comparer un peu les Q&As dans les autres sites web que lesquelles de Pass4Test, c'est pas difficile à trouver que la Q&A SUN 310-231 est plus complète. Vous pouvez télécharger le démo gratuit à prendre un essai de la qualité de Pass4Test. La raison de la grande couverture des questions et la haute qualité des réponses vient de l'expérience riche et la connaissances professionnelles des experts de Pass4Test. La nouvelle Q&A de SUN 310-231 lancée par l'équipe de Pass4Test sont bien populaire par les candidats.

Pass4Test vous offre un choix meilleur pour faire votre préparation de test SUN 310-231 plus éfficace. Si vous voulez réussir le test plus tôt, il ne faut que ajouter la Q&A de SUN 310-231 à votre cahier. Pass4Test serait votre guide pendant la préparation et vous permet à réussir le test SUN 310-231 sans aucun doute. Vous pouvez obtenir le Certificat comme vous voulez.

Le produit de Pass4Test peut assurer les candidats à réussir le test SUN 310-231 à la première fois, mais aussi offrir la mise à jour gratuite pendant un an, les clients peuvent recevoir les ressources plus nouvelles. Pass4Test n'est pas seulement un site, mais aussi un bon centre de service.

Pas besoin de beaucoup d'argent et de temps, vous pouvez passer le test SUN 310-231 juste avec la Q&A de SUN 310-231 offerte par Pass4Test qui vous offre le test simulation bien proche de test réel.

Code d'Examen: 310-231
Nom d'Examen: SUN (Sun Certified Developer for Java Web Services 5)
Questions et réponses: 96 Q&As

La solution offerte par Pass4Test comprenant un test simulation bien proche de test réel SUN 310-231 peut vous assurer à réussir 100% le test SUN 310-231. D'ailleur, le service de la mise à jour gratuite est aussi pour vous. Maintenant, vous pouvez télécharger le démo gratuit pour prendre un essai.

310-231 Démo gratuit à télécharger: http://www.pass4test.fr/310-231.html

NO.1 A developer plans to refactor some of the company's existing Java EE 5 business services, moving
them out of the existing monolithic application and into Web services.
What are two benefits of exposing existing Java EE 5 functionality as a Web service? (Choose two.)
A. improved manageability
B. more finely-grained
C. enhanced security
D. loose coupling of functionality
E. self-describing
F. automatic session management
Answer: DE

SUN   certification 310-231   certification 310-231   certification 310-231   310-231

NO.2 A student developer has created a new library of math functions to share with friends in a linear algebra
class. The developer is having difficulty getting people to come over to the dorm to see the new code
library, so he decides to deploy it as a Web service so that everyone can enjoy the features via the
Internet. One of the functions has this WSDL definition:
<portType name="MyMathLib">
<operation name="incCtr">
<input message="tns:incCtr"/>
</operation>
</portType>
Which two statements are true about this Web service? (Choose two.)
A. This is an asynchronous receive.
B. This is an asynchronous send.
C. The client must use SOAPFaultException to display any errors.
D. It must send a SOAP fault back to the sender.
E. It must NOT send a SOAP fault back to the sender.
Answer: BE

SUN   310-231   310-231   310-231 examen   certification 310-231   certification 310-231

NO.3 A company's new investment management Java application and a legacy stock trader application
need to communicate, but they use different JMS implementations. A developer decides to implement a
JMS bridge to solve the problem.
Which two advantages does this pattern provide? (Choose two.)
A. It converts the interface of a class into another interface that clients expect.
B. It decouples an abstraction from its implementation so that the two can vary independently.
C. It dynamically attaches additional responsibilities to an object.
D. It optimizes network traffic.
E. It is vendor independent.
Answer: BE

SUN   310-231 examen   310-231   certification 310-231   310-231

NO.4 A company has contracted a developer to create their new accounting system. The system the
developer will replace runs a monolithic web application using one web server and one database server.
Technical requirements state the developer must write the business logic in Java, deploy to the
application server and push the presentation logic onto the web servers.
What are three characteristics of services in the proposed Service Oriented Architecture? (Choose three.)
A. Services are coarse grained.
B. Services are finely grained.
C. Services are loosely coupled.
D. Services are tightly coupled.
E. Clients must be implemented in the Java technology.
F. Services are platform agnostic, network-addressable web APIs.
Answer: ACF

certification SUN   310-231   310-231

NO.5 }
Assume Reliable Messaging is used and the code is correct except for what is missing at line 10.
Which code fragment must be placed at line 10?
A. Close the port object with ((Closeable)port).close(); after testing result is positive.
B. Close the port with port.close();
C. Closing the port object is optional, but port.close(); will work.
D. Close the port object with ((Closeable)port).close();
Answer: D

SUN examen   310-231   310-231   310-231
12. Which two statements are true about Java clients that use a security token service (STS) supported
by the security features of WSIT? (Choose two.)
A. The client only requires a keystore.
B. STS requires a default user name configuration.
C. Using an STS-issued token requires a keystore and a truststore.
D. HTTPS must be configured.
E. An authorized client receives a token digitally signed by the STS.
Answer: CE

SUN   310-231   310-231   certification 310-231
13. A developer who recently added message optimization support to the company's Web services is
tasked with explaining how the next crop of WSIT client applications will use the feature.
Which statement is true?
A. Client developers should have experience with the SAAJ and MIME types to use MTOM with the
service.
B. The clients should use the service WSDL to discover and satisfy the interoperability requirements.
C. Adding message optimization is a manual step when the WSDL is available on HTTPS.
D. The encryption for optimization requires a client keystore.
Answer: B

certification SUN   310-231   certification 310-231

NO.6 A company is building a customer relationship management system that is to be deployed on a
customer's network, and they want software functions to be reused and combined in different modules in
the system. The Director of Technology has determined that the new system should utilize both Web
services and a Service Oriented Architecture (SOA).
Which two statements about Web services in an SOA are correct? (Choose two.)
A. A Web service must be discovered from a UDDI registry in an SOA.
B. SOA and Web services both use the HTTP protocol at the transport layer.
C. A Web service must publish itself to a UDDI registry to become part of an SOA.
D. SOA is a way to design a system and Web services are a possible implementation.
E. SOA is used for stateless invocations, and Web services for stateful invocations.
F. SOA emphasizes the concept of service encapsulation and Web services fulfill a service contract.
Answer: DF

SUN   certification 310-231   310-231 examen   certification 310-231   310-231 examen

NO.7 out.println("<p>Exception: " + ex);

NO.8 Which two statements are true about the role of XML schemas in Web services? (Choose two.)
A. DTDs provide stricter data typing than XML schemas.
B. XML schemas can be used to validate the organization of XML documents.
C. XML schemas contain a vocabulary, content model and data types.
D. DTDs are easier to map to Java than XML schemas, and so remain more popular.
E. The W3C recommends that XML schemas be referred to as XSD.
F. The W3C has designated that XML schemas be referred to as WXS.
Answer: BC

SUN   310-231   310-231 examen   310-231

NO.9 Given:
1. try { // Call Web service Operation
2. org.me.calculator.client.CalculatorWS port =
3. service.getCalculatorWSPort();
4. // TODO initialize WS operation arguments here
5. int i = 3;
6. int j = 4;
7. // TODO process result here
8. int result = port.add(i, j);
9. out.println("<p>Result: " + result);
10.
11. } catch (Exception ex) {

NO.10 A developer must describe a message that contains multiple parts using non-primitive data types.
Which two code fragments produce equivalent composite message structure definitions? (Choose two.)
A. <types>
<schema .... >
<complexType name="FOO" type="tns:FOOType"/>
<element name="FOOType">
.
.
.
</element >
<complexType name="BAR" type="tns:BARType"/>
<element name="BARType">
.
.
.
</element >
</schema>
</types>
<message name="FOO">
<part name="FOO" complexType="tns:FOO"/>
<part name="BAR" complexType="tns:BAR"/>
</message>
B. <types>
<schema .... >
<element name="FOO" type="tns:FOOType"/>
<complexType name="FOOType">
.
.
.
</complexType>
<element name="BAR" type="tns:BARType"/>
<complexType name="BARType">
.
.
.
</complexType>
</schema>
</types>
<message name="FOO">
<part name="FOO" element="tns:FOO"/>
<part name="BAR" element="tns:BAR"/>
</message>
C. <types>
<schema .... >
.
.
.
<complexType name="Composite">
<choice>
<element name="FOO" minOccurs="1" maxOccurs="1" type="tns:FOOType"/>
<element name="BAR" minOccurs="0" maxOccurs="unbounded" type="tns:BARType"/>
</choice>
</complexType>
</schema>
</types>
<message name="FOO">
<part name="composite" type="Composite"/>
</message>
D. <types>
<schema .... >
.
.
.
<complexType name="Composite">
<choice>
<element name="FOO" minOccurs="1" maxOccurs="1" type="tns:FOOType"/>
<element name="BAR" minOccurs="0" maxOccurs="unbounded" type="tns:BARType"/>
</choice>
</complexType>
</schema>
</types>
<message name="FOO">
<part name="composite" type="tns:Composite"/>
</message>
Answer: BD

certification SUN   310-231   310-231 examen   310-231 examen   310-231   310-231

NO.11 A company uses Web services to exchange mortgage and credit data as well as digital versions of
associated documents. The data is confidential and it is common for the service and client to exchange
applications, credit results, reports and more in a request/response format. Recently, the company has
become concerned about the substantial cost of processing and message encryption with a PKI
approach.
What can be done to cut costs?
A. use MTOM to optimize the messages and provide data confidentiality via XML Digital Signature
B. because of the weak adoption of WS-SecureConversation on Java platforms, consider using Kerberos
C. use HTTPS as it is both economical and adequate
D. use WS-SecureConversation and MTOM to reduce the processing overhead
Answer: D

SUN   310-231 examen   310-231   310-231

NO.12 The WSIT project implements a number of WS-* specifications to aid developers in creating secure and
interoperable services.
What are two parts of the WS-specifications? (Choose two.)
A. WS-ReliableMessaging
B. WS-Bootstrapping
C. WS-Eventing
D. WS-Policy
E. WS-WSITrust
Answer: AD

SUN examen   certification 310-231   310-231   certification 310-231

NO.13 A team of developers is designing RESTful Web services for a new application.
What are three properties of the services? (Choose three.)
A. They can be stateful.
B. They can be stateless.
C. Components communicate by exchanging representations of the resource.
D. Components communicate by directly performing operations on the resource.
E. They require WSDL service API definitions.
F. Responses can be labeled as cacheable or non-cacheable.
Answer: BCF

SUN examen   310-231 examen   certification 310-231   310-231   310-231 examen   310-231 examen

NO.14 A developer is creating an XML schema using the xsd:all operator.
Given the code:
<types>
<schema targetNamespace="http://sun.cert/types"
xmlns:tns="http://sun.cert/types"
xmlns:xsd="http://www.w3.org/2001/XMLSchema">
<xsd:complexType name="Person">
<xsd:all>
<!-- insert code here -->
</xsd:all>
</xsd:complexType>
</schema>
</types>
Which two element definitions, when inserted into the given schema fragment, result in a correct schema
type definition? (Choose two.)
A. <xsd:element name="first" type="xsd:string"/>
B. <xsd:element name="items" type="xsd:long" maxOccurs="5"/>
C. <xsd:element name="last" type="xsd:string" minOccurs="1" maxOccurs="1"/>
D. <xsd:element name="first" type="xsd:string" minOccurs="0" maxOccurs="5"/>
E. <xsd:element name="last" type="xsd:string" minOccurs="1" maxOccurs="5"/>
F. <xsd:element name="ssn" type="xsd:string" minOccurs="1" maxOccurs="unlimited"/>
Answer: AC

SUN   310-231   310-231   certification 310-231   certification 310-231

NO.15 Given the Java fragment and schema:
1. //-- Java code fragment
2. public class PurchaseOrder{
3. public javax.xml.datatype.XMLGregorianCalendar orderDate;
4. }
5. //-- Schema fragment
6. <xs:complexType name="purchaseOrder">
7. <xs:sequence>
8. <xs:element name="orderDate" type="xs:anySimpleType"
9. minOccurs="0"/>
10. </xs:sequence>
11. </xs:complexType>
Which two statements are true about .Net and WCF interoperability for this data? (Choose two.)
A. The GregorianCalendar maps to an equivalent date type in both Java and .Net.
B. .Net will generate code with the calendar as a string that functions as well as a date.
C. .Net will generate code with the calendar as a string that is not type equivalent.
D. Use of the @XmlSchemaType annotation causes .Net to properly map to a date.
E. Casting in the case of WSIT services is an effective approach for the WCF client.
Answer: CD

certification SUN   certification 310-231   certification 310-231   310-231   310-231 examen

NO.16 Given the Java fragment and schema:
1. //-- Java code fragment
2. public enum USState {MA, NH}
3. //-- Schema fragment
4. <xs:simpleType name=xsState?
5. <xs:restriction base=xs:string?
6. <xs:enumeration value=NH?/>
7. <xs:enumeration value=MA?/>
8. </xs:restriction>
9. </xs:simpleType>
10. // .NET auto generated code from schema
11. public enum usState { NH, MA }
Which statement is true about .Net and WCF interoperability for this data?
A. Based on the fragment, enumerations map well between Java and .Net.
B. The subtle differences in the variable names make it clear these enumerations are NOT interoperable.
C. The XML schema reveals the type on the enumeration is lost across the platforms.
D. This exchange would be interoperable if the annotation @XmlEnum was applied to the Java method.
Answer: A

certification SUN   310-231   310-231

NO.17 A developer is analyzing an existing Web service with performance problems. The analysis reveals
the service employs SOAP over HTTP. When the size of the encoded binary files grew with changing
business requirements, the service slowed.
What are two effective solutions for this problem? (Choose two.)
A. Separating the XML and binary content with WS-Filtering implemented in WSIT will improve efficiency.
B. XML documents larger than 1 KB with binary encoding should be optimized.
C. WS-Addressing can ease congestion by routing messages over other protocols.
D. For existing services, the most effective solution is to increase the available bandwidth.
E. MTOM can reduce both processing and bandwidth required by SOAP with attachments.
Answer: BE

SUN   310-231 examen   certification 310-231   310-231

NO.18 A team of developers is describing a set of endpoints in their new SOA application.
Given the WSDL extract:
<service name="InventoryServices">
<port name="PurchaseOrder" binding="tns:POBinding">
<soap:address location="http://192.168.0.2:8080/inventory"/>
</port>
<port name="Invoice" binding="tns:InvoiceBinding">
<soap:address location="http://192.168.0.2:8080/inventory"/>
</port>
</service>
Which statement is true about this WSDL extract?
A. The extract is WS-I Basic Profile 1.1 compliant because both port element names are different.
B. The extract is NOT WS-I Basic Profile 1.1 compliant because both port elements point to the same
location.
C. The extract is WS-I Basic Profile 1.1 compliant because both port elements point to different binding
elements.
D. The extract is NOT WS-I Basic Profile 1.1 compliant because it contains two port elements in the same
service.
E. The extract is WS-I Basic Profile 1.1 conformant because both port element names are different.
F. The extract is WS-I Basic Profile 1.1 conformant because the port, binding, and service element
combinations are unique.
Answer: B

SUN   310-231   310-231

NO.19 According to the WS-I Basic Profile 1.1, which two statements are true about the targetNamespace
attribute for xsd:schema elements that are children of WSDL 1.1 type element? (Choose two.)
A. Its value must be valid unless it has xsd:import, xsd:annotation, or both as its only child elements.
B. Its value must be empty unless it has xsd:import, xsd:annotation, or both as its only child elements.
C. It should have same the value as the namespace attribute on the wsdl:import element in a document
being imported.
D. It must have same the value as the namespace attribute on the wsdl:import element in a document
being imported.
Answer: AD

SUN   310-231   310-231   310-231   certification 310-231   310-231 examen

Il faut une bonne préparation et aussi une série de connaissances professionnelles complètes pour réussir le test SUN 310-231. La ressourece providée par Pass4Test peut juste s'accorder votre demande.

没有评论:

发表评论