2013년 8월 12일 월요일

SUN 자격증 310-231 시험문제와 답

ITExamDump 제공 SUN 310-231시험덤프자료가 광범한 시험준비인사들의 찬양을 받은지 하루이틀일이 아닙니다.이렇게 많은 분들이ITExamDump 제공 SUN 310-231덤프로 시험을 통과하여 자격증을 취득하였다는것은ITExamDump 제공 SUN 310-231덤프가 믿을만한 존재라는것을 증명해드립니다. 덤프에 있는 문제만 열심히 공부하시면 시험통과 가능하기에 시간도 절약해줄수있어 최고의 믿음과 인기를 받아왔습니다. SUN 310-231 시험을 봐야 하는 분이라면ITExamDump를 한번 믿어보세요. ITExamDump도움으로 후회없이 멋진 IT전문가로 거듭날수 있을것입니다.


우리ITExamDump 사이트에SUN 310-231관련자료의 일부 문제와 답 등 문제들을 제공함으로 여러분은 무료로 다운받아 체험해보실 수 있습니다. 여러분은 이것이야 말로 알맞춤이고, 전면적인 여러분이 지금까지 갖고 싶었던 문제집이라는 것을 느끼게 됩니다.


시험 번호/코드: 310-231

시험 이름: SUN (Sun Certified Developer for Java Web Services 5)

ITExamDump를 선택함으로, ITExamDump는 여러분SUN인증310-231시험을 패스할 수 있도록 보장하고,만약 시험실패시 ITExamDump에서는 덤프비용전액환불을 약속합니다.


ITExamDump의 제품을 구매하시면 우리는 일년무료업데이트 서비스를 제공함으로 여러분을 인증시험을 패스하게 도와줍니다. 만약 인증시험내용이 변경이 되면 우리는 바로 여러분들에게 알려드립니다.그리고 최신버전이 있다면 바로 여러분들한테 보내드립니다. ITExamDump는 한번에SUN 310-231인증시험을 패스를 보장합니다.


빨리 ITExamDump 덤프를 장바구니에 넣으시죠. 그러면 100프로 자신감으로 응시하셔서 한번에 안전하게 패스하실 수 있습니다. 단 한번으로SUN 310-231인증시험을 패스한다…… 여러분은 절대 후회할 일 없습니다.


SUN인증 310-231시험은 등록하였는데 시험준비는 아직이라구요? SUN인증 310-231시험일이 다가오고 있는데 공부를 하지 않아 두려워 하고 계시는 분들은 이 글을 보는 순간 시험패스에 자신을 가지게 될것입니다. 시험준비 시간이 적다고 하여 패스할수 없는건 아닙니다. ITExamDump의SUN인증 310-231덤프와의 근사한 만남이SUN인증 310-231패스에 화이팅을 불러드립니다. 덤프에 있는 문제만 공부하면 되기에 시험일이 며칠뒤라도 시험패스는 문제없습니다. 더는 공부하지 않은 자신을 원망하지 마시고 결단성있게ITExamDump의SUN인증 310-231덤프로 시험패스에 고고싱하세요.


ITExamDump는 고객님의 IT자격증취득의 작은 소원을 이루어지게 도워드리는 IT인증시험덤프를 제공해드리는 전문적인 사이트입니다. ITExamDump 표 SUN인증310-231시험덤프가 있으면 인증시험걱정을 버리셔도 됩니다. ITExamDump 표 SUN인증310-231덤프는 시험출제 예상문제를 정리해둔 실제시험문제에 가장 가까운 시험준비공부자료로서 공을 들이지않고도 시험패스가 가능합니다.


310-231 덤프무료샘플다운로드하기: http://www.itexamdump.com/310-231.html


NO.1 Given the Java fragment and schema:
1. //-- Java code fragment
2. public class PurchaseOrder{
3. public javax.xml.datatype.XMLGregorianCalendar orderDate;
4. }
5. //-- Schema fragment
6. <xs:complexType name="purchaseOrder">
7. <xs:sequence>
8. <xs:element name="orderDate" type="xs:anySimpleType"
9. minOccurs="0"/>
10. </xs:sequence>
11. </xs:complexType>
Which two statements are true about .Net and WCF interoperability for this data? (Choose two.)
A. The GregorianCalendar maps to an equivalent date type in both Java and .Net.
B. .Net will generate code with the calendar as a string that functions as well as a date.
C. .Net will generate code with the calendar as a string that is not type equivalent.
D. Use of the @XmlSchemaType annotation causes .Net to properly map to a date.
E. Casting in the case of WSIT services is an effective approach for the WCF client.
Answer: CD

SUN   310-231덤프   310-231   310-231   310-231

NO.2 Given the Java fragment and schema:
1. //-- Java code fragment
2. public enum USState {MA, NH}
3. //-- Schema fragment
4. <xs:simpleType name=xsState?
5. <xs:restriction base=xs:string?
6. <xs:enumeration value=NH?/>
7. <xs:enumeration value=MA?/>
8. </xs:restriction>
9. </xs:simpleType>
10. // .NET auto generated code from schema
11. public enum usState { NH, MA }
Which statement is true about .Net and WCF interoperability for this data?
A. Based on the fragment, enumerations map well between Java and .Net.
B. The subtle differences in the variable names make it clear these enumerations are NOT interoperable.
C. The XML schema reveals the type on the enumeration is lost across the platforms.
D. This exchange would be interoperable if the annotation @XmlEnum was applied to the Java method.
Answer: A

SUN pdf   310-231 dump   310-231덤프   310-231   310-231

NO.3 Which two statements are true about the role of XML schemas in Web services? (Choose two.)
A. DTDs provide stricter data typing than XML schemas.
B. XML schemas can be used to validate the organization of XML documents.
C. XML schemas contain a vocabulary, content model and data types.
D. DTDs are easier to map to Java than XML schemas, and so remain more popular.
E. The W3C recommends that XML schemas be referred to as XSD.
F. The W3C has designated that XML schemas be referred to as WXS.
Answer: BC

SUN시험문제   310-231최신덤프   310-231 dumps   310-231   310-231자격증   310-231

NO.4 A company has contracted a developer to create their new accounting system. The system the
developer will replace runs a monolithic web application using one web server and one database server.
Technical requirements state the developer must write the business logic in Java, deploy to the
application server and push the presentation logic onto the web servers.
What are three characteristics of services in the proposed Service Oriented Architecture? (Choose three.)
A. Services are coarse grained.
B. Services are finely grained.
C. Services are loosely coupled.
D. Services are tightly coupled.
E. Clients must be implemented in the Java technology.
F. Services are platform agnostic, network-addressable web APIs.
Answer: ACF

SUN자격증   310-231   310-231   310-231   310-231

NO.5 The WSIT project implements a number of WS-* specifications to aid developers in creating secure and
interoperable services.
What are two parts of the WS-specifications? (Choose two.)
A. WS-ReliableMessaging
B. WS-Bootstrapping
C. WS-Eventing
D. WS-Policy
E. WS-WSITrust
Answer: AD

SUN인증   310-231기출문제   310-231시험문제   310-231최신덤프

NO.6 According to the WS-I Basic Profile 1.1, which two statements are true about the targetNamespace
attribute for xsd:schema elements that are children of WSDL 1.1 type element? (Choose two.)
A. Its value must be valid unless it has xsd:import, xsd:annotation, or both as its only child elements.
B. Its value must be empty unless it has xsd:import, xsd:annotation, or both as its only child elements.
C. It should have same the value as the namespace attribute on the wsdl:import element in a document
being imported.
D. It must have same the value as the namespace attribute on the wsdl:import element in a document
being imported.
Answer: AD

SUN   310-231   310-231   310-231

NO.7 out.println("<p>Exception: " + ex);

NO.8 A team of developers is designing RESTful Web services for a new application.
What are three properties of the services? (Choose three.)
A. They can be stateful.
B. They can be stateless.
C. Components communicate by exchanging representations of the resource.
D. Components communicate by directly performing operations on the resource.
E. They require WSDL service API definitions.
F. Responses can be labeled as cacheable or non-cacheable.
Answer: BCF

SUN pdf   310-231   310-231

NO.9 A team of developers is describing a set of endpoints in their new SOA application.
Given the WSDL extract:
<service name="InventoryServices">
<port name="PurchaseOrder" binding="tns:POBinding">
<soap:address location="http://192.168.0.2:8080/inventory"/>
</port>
<port name="Invoice" binding="tns:InvoiceBinding">
<soap:address location="http://192.168.0.2:8080/inventory"/>
</port>
</service>
Which statement is true about this WSDL extract?
A. The extract is WS-I Basic Profile 1.1 compliant because both port element names are different.
B. The extract is NOT WS-I Basic Profile 1.1 compliant because both port elements point to the same
location.
C. The extract is WS-I Basic Profile 1.1 compliant because both port elements point to different binding
elements.
D. The extract is NOT WS-I Basic Profile 1.1 compliant because it contains two port elements in the same
service.
E. The extract is WS-I Basic Profile 1.1 conformant because both port element names are different.
F. The extract is WS-I Basic Profile 1.1 conformant because the port, binding, and service element
combinations are unique.
Answer: B

SUN   310-231 pdf   310-231   310-231덤프

NO.10 A developer is creating an XML schema using the xsd:all operator.
Given the code:
<types>
<schema targetNamespace="http://sun.cert/types"
xmlns:tns="http://sun.cert/types"
xmlns:xsd="http://www.w3.org/2001/XMLSchema">
<xsd:complexType name="Person">
<xsd:all>
<!-- insert code here -->
</xsd:all>
</xsd:complexType>
</schema>
</types>
Which two element definitions, when inserted into the given schema fragment, result in a correct schema
type definition? (Choose two.)
A. <xsd:element name="first" type="xsd:string"/>
B. <xsd:element name="items" type="xsd:long" maxOccurs="5"/>
C. <xsd:element name="last" type="xsd:string" minOccurs="1" maxOccurs="1"/>
D. <xsd:element name="first" type="xsd:string" minOccurs="0" maxOccurs="5"/>
E. <xsd:element name="last" type="xsd:string" minOccurs="1" maxOccurs="5"/>
F. <xsd:element name="ssn" type="xsd:string" minOccurs="1" maxOccurs="unlimited"/>
Answer: AC

SUN   310-231   310-231

NO.11 A developer must describe a message that contains multiple parts using non-primitive data types.
Which two code fragments produce equivalent composite message structure definitions? (Choose two.)
A. <types>
<schema .... >
<complexType name="FOO" type="tns:FOOType"/>
<element name="FOOType">
.
.
.
</element >
<complexType name="BAR" type="tns:BARType"/>
<element name="BARType">
.
.
.
</element >
</schema>
</types>
<message name="FOO">
<part name="FOO" complexType="tns:FOO"/>
<part name="BAR" complexType="tns:BAR"/>
</message>
B. <types>
<schema .... >
<element name="FOO" type="tns:FOOType"/>
<complexType name="FOOType">
.
.
.
</complexType>
<element name="BAR" type="tns:BARType"/>
<complexType name="BARType">
.
.
.
</complexType>
</schema>
</types>
<message name="FOO">
<part name="FOO" element="tns:FOO"/>
<part name="BAR" element="tns:BAR"/>
</message>
C. <types>
<schema .... >
.
.
.
<complexType name="Composite">
<choice>
<element name="FOO" minOccurs="1" maxOccurs="1" type="tns:FOOType"/>
<element name="BAR" minOccurs="0" maxOccurs="unbounded" type="tns:BARType"/>
</choice>
</complexType>
</schema>
</types>
<message name="FOO">
<part name="composite" type="Composite"/>
</message>
D. <types>
<schema .... >
.
.
.
<complexType name="Composite">
<choice>
<element name="FOO" minOccurs="1" maxOccurs="1" type="tns:FOOType"/>
<element name="BAR" minOccurs="0" maxOccurs="unbounded" type="tns:BARType"/>
</choice>
</complexType>
</schema>
</types>
<message name="FOO">
<part name="composite" type="tns:Composite"/>
</message>
Answer: BD

SUN pdf   310-231   310-231

NO.12 A company uses Web services to exchange mortgage and credit data as well as digital versions of
associated documents. The data is confidential and it is common for the service and client to exchange
applications, credit results, reports and more in a request/response format. Recently, the company has
become concerned about the substantial cost of processing and message encryption with a PKI
approach.
What can be done to cut costs?
A. use MTOM to optimize the messages and provide data confidentiality via XML Digital Signature
B. because of the weak adoption of WS-SecureConversation on Java platforms, consider using Kerberos
C. use HTTPS as it is both economical and adequate
D. use WS-SecureConversation and MTOM to reduce the processing overhead
Answer: D

SUN dump   310-231   310-231   310-231자격증

NO.13 }
Assume Reliable Messaging is used and the code is correct except for what is missing at line 10.
Which code fragment must be placed at line 10?
A. Close the port object with ((Closeable)port).close(); after testing result is positive.
B. Close the port with port.close();
C. Closing the port object is optional, but port.close(); will work.
D. Close the port object with ((Closeable)port).close();
Answer: D

SUN   310-231 dump   310-231   310-231시험문제
12. Which two statements are true about Java clients that use a security token service (STS) supported
by the security features of WSIT? (Choose two.)
A. The client only requires a keystore.
B. STS requires a default user name configuration.
C. Using an STS-issued token requires a keystore and a truststore.
D. HTTPS must be configured.
E. An authorized client receives a token digitally signed by the STS.
Answer: CE

SUN   310-231   310-231
13. A developer who recently added message optimization support to the company's Web services is
tasked with explaining how the next crop of WSIT client applications will use the feature.
Which statement is true?
A. Client developers should have experience with the SAAJ and MIME types to use MTOM with the
service.
B. The clients should use the service WSDL to discover and satisfy the interoperability requirements.
C. Adding message optimization is a manual step when the WSDL is available on HTTPS.
D. The encryption for optimization requires a client keystore.
Answer: B

SUN   310-231   310-231 pdf   310-231   310-231인증

NO.14 A student developer has created a new library of math functions to share with friends in a linear algebra
class. The developer is having difficulty getting people to come over to the dorm to see the new code
library, so he decides to deploy it as a Web service so that everyone can enjoy the features via the
Internet. One of the functions has this WSDL definition:
<portType name="MyMathLib">
<operation name="incCtr">
<input message="tns:incCtr"/>
</operation>
</portType>
Which two statements are true about this Web service? (Choose two.)
A. This is an asynchronous receive.
B. This is an asynchronous send.
C. The client must use SOAPFaultException to display any errors.
D. It must send a SOAP fault back to the sender.
E. It must NOT send a SOAP fault back to the sender.
Answer: BE

SUN최신덤프   310-231   310-231   310-231 pdf

NO.15 A developer plans to refactor some of the company's existing Java EE 5 business services, moving
them out of the existing monolithic application and into Web services.
What are two benefits of exposing existing Java EE 5 functionality as a Web service? (Choose two.)
A. improved manageability
B. more finely-grained
C. enhanced security
D. loose coupling of functionality
E. self-describing
F. automatic session management
Answer: DE

SUN   310-231덤프   310-231시험문제

NO.16 A company is building a customer relationship management system that is to be deployed on a
customer's network, and they want software functions to be reused and combined in different modules in
the system. The Director of Technology has determined that the new system should utilize both Web
services and a Service Oriented Architecture (SOA).
Which two statements about Web services in an SOA are correct? (Choose two.)
A. A Web service must be discovered from a UDDI registry in an SOA.
B. SOA and Web services both use the HTTP protocol at the transport layer.
C. A Web service must publish itself to a UDDI registry to become part of an SOA.
D. SOA is a way to design a system and Web services are a possible implementation.
E. SOA is used for stateless invocations, and Web services for stateful invocations.
F. SOA emphasizes the concept of service encapsulation and Web services fulfill a service contract.
Answer: DF

SUN시험문제   310-231시험문제   310-231

NO.17 Given:
1. try { // Call Web service Operation
2. org.me.calculator.client.CalculatorWS port =
3. service.getCalculatorWSPort();
4. // TODO initialize WS operation arguments here
5. int i = 3;
6. int j = 4;
7. // TODO process result here
8. int result = port.add(i, j);
9. out.println("<p>Result: " + result);
10.
11. } catch (Exception ex) {

NO.18 A developer is analyzing an existing Web service with performance problems. The analysis reveals
the service employs SOAP over HTTP. When the size of the encoded binary files grew with changing
business requirements, the service slowed.
What are two effective solutions for this problem? (Choose two.)
A. Separating the XML and binary content with WS-Filtering implemented in WSIT will improve efficiency.
B. XML documents larger than 1 KB with binary encoding should be optimized.
C. WS-Addressing can ease congestion by routing messages over other protocols.
D. For existing services, the most effective solution is to increase the available bandwidth.
E. MTOM can reduce both processing and bandwidth required by SOAP with attachments.
Answer: BE

SUN dump   310-231덤프   310-231   310-231   310-231

NO.19 A company's new investment management Java application and a legacy stock trader application
need to communicate, but they use different JMS implementations. A developer decides to implement a
JMS bridge to solve the problem.
Which two advantages does this pattern provide? (Choose two.)
A. It converts the interface of a class into another interface that clients expect.
B. It decouples an abstraction from its implementation so that the two can vary independently.
C. It dynamically attaches additional responsibilities to an object.
D. It optimizes network traffic.
E. It is vendor independent.
Answer: BE

SUN덤프   310-231   310-231자격증   310-231기출문제

여러분은 우리. ITExamDump의SUN 310-231시험자료 즉 덤프의 문제와 답만 있으시면SUN 310-231인증시험을 아주 간단하게 패스하실 수 있습니다.그리고 관련 업계에서 여러분의 지위상승은 자연적 이로 이루어집니다. ITExamDump의 덤프를 장바구니에 넣으세요. 그리고 ITExamDump에서는 무료로 24시간 온라인상담이 있습니다.


댓글 없음:

댓글 쓰기