1.
An airline built and deployed a back-end application to manage reservations. To support interoperability with as large a base of standalone client applications as possible, the services provided by this back-end application are exposed as XML-based restful web services. Management just added a new requirement that AJAX-based web application clients be supported, too. One of the developers suggested that it is enough to extend the existing application to support both XML-based and JSON-based restful web services. Assuming the developer is correct, choose the sentence that best describes an attempt to introduce this ability as this developer suggests (Choose one):
2.
In the code fragment below, the client will use os to upload data to the web service provider. Choose the statement that must be placed in line 5, to ensure this fragment works as intended. (Choose one)
3.
Given the resource class fragment: Choose the code fragment below that would secure access only to the Resource update() method (Choose one):
4.
A developer creates a Web service for his company's inventory service. He uses servlet container to deploy the web service and wants to enable basic authentication for all web service invocations. Where does the developer configure security requirements for the above case?
5.
Choose the option that best describe the deployer's choices, when deploying an EJB that is also exposed as a RESTful web service using JAX-RS (Choose one):
6.
Given the JAX-RS root resource class fragment: Choose the statement that best describes the configuration that would be required to support the access control constraint shown:
7.
A developer needs to write a Web service that supports user sessions that timeout after 120 seconds. Which configuration file is correct for the developer use? (Choose one)
8.
A developer creates the following web service: Assuming that he packages the class in a war file without deployment descriptors, the web service is hosted by a EE container relative to module context at ? (Choose one)
9.
Which of the following security technology is not covered in Metro project? (Choose one.)
10.
A Web service needs to encrypt certain SOAP headers when responding. Which statement about this encryption is true?