2013年12月12日星期四

Best SUN 310-231 test training guide

You can free download part of ITCertKing's exercises and answers about SUN certification 310-231 exam as a try, then you will be more confident to choose our ITCertKing's products to prepare your SUN certification 310-231 exam. Please add ITCertKing's products in you cart quickly.

ITCertKing is a website to provide a targeted training for SUN certification 310-231 exam. ITCertKing is also a website which can not only make your expertise to get promoted, but also help you pass SUN certification 310-231 exam for just one time. The training materials of ITCertKing are developed by many IT experts' continuously using their experience and knowledge to study, and the quality is very good and have very high accuracy. Once you select our ITCertKing, we can not only help you pass SUN certification 310-231 exam and consolidate their IT expertise, but also have a one-year free after-sale Update Service.

Exam Code: 310-231
Exam Name: SUN (Sun Certified Developer for Java Web Services 5)
One year free update, No help, Full refund!
Total Q&A: 96 Questions and Answers
Last Update: 2013-12-11

Take advantage of the ITCertKing's SUN training materials to prepare for the exam, let me feel that the exam have never so easy to pass. This is someone who passed the examination said to us. With ITCertKing SUN 310-231 exam certification training, you can sort out your messy thoughts, and no longer twitchy for the exam. ITCertKing have some questions and answers provided free of charge as a trial. If I just said, you may be not believe that. But as long as you use the trial version, you will believe what I say. You will know the effect of this exam materials.

ITCertKing SUN 310-231 exam information are cheap and fine. We use simulation questions and answers dedication to our candidates with ultra-low price and high quality . We sincerely hope that you can pass the exam. We provide you with a convenient online service to resolve any questions about SUN 310-231 exam questions for you.

Through the SUN certification 310-231 exam method has a lot of kinds, spend a lot of time and energy to review the SUN certification 310-231 exam related professional knowledge is a kind of method, through a small amount of time and money ITCertKing choose to use the pertinence training and exercises is also a kind of method.

ITCertKing have a strong It expert team to constantly provide you with an effective training resource. They continue to use their rich experience and knowledge to study the real exam questions of the past few years. Finally ITCertKing's targeted practice questions and answers have advent, which will give a great help to a lot of people participating in the IT certification exams. You can free download part of ITCertKing's simulation test questions and answers about SUN certification 310-231 exam as a try. Through the proof of many IT professionals who have use ITCertKing's products, ITCertKing is very reliable for you. Generally, if you use ITCertKing's targeted review questions, you can 100% pass SUN certification 310-231 exam. Please Add ITCertKing to your shopping cart now! Maybe the next successful people in the IT industry is you.

ITCertKing not only provide the products which have high quality to each candidate, but also provides a comprehensive after-sales service. If you are using our products, we will let you enjoy one year of free updates. So that you can get the latest exam information in time. We will be use the greatest efficiency to service each candidate.

310-231 Free Demo Download: http://www.itcertking.com/310-231_exam.html

NO.1 A team of developers is describing a set of endpoints in their new SOA application.
Given the WSDL extract:
<service name="InventoryServices">
<port name="PurchaseOrder" binding="tns:POBinding">
<soap:address location="http://192.168.0.2:8080/inventory"/>
</port>
<port name="Invoice" binding="tns:InvoiceBinding">
<soap:address location="http://192.168.0.2:8080/inventory"/>
</port>
</service>
Which statement is true about this WSDL extract?
A. The extract is WS-I Basic Profile 1.1 compliant because both port element names are different.
B. The extract is NOT WS-I Basic Profile 1.1 compliant because both port elements point to the same
location.
C. The extract is WS-I Basic Profile 1.1 compliant because both port elements point to different binding
elements.
D. The extract is NOT WS-I Basic Profile 1.1 compliant because it contains two port elements in the same
service.
E. The extract is WS-I Basic Profile 1.1 conformant because both port element names are different.
F. The extract is WS-I Basic Profile 1.1 conformant because the port, binding, and service element
combinations are unique.
Answer: B

SUN   310-231   310-231 practice test   310-231 exam simulations   310-231 original questions

NO.2 A developer must describe a message that contains multiple parts using non-primitive data types.
Which two code fragments produce equivalent composite message structure definitions? (Choose two.)
A. <types>
<schema .... >
<complexType name="FOO" type="tns:FOOType"/>
<element name="FOOType">
.
.
.
</element >
<complexType name="BAR" type="tns:BARType"/>
<element name="BARType">
.
.
.
</element >
</schema>
</types>
<message name="FOO">
<part name="FOO" complexType="tns:FOO"/>
<part name="BAR" complexType="tns:BAR"/>
</message>
B. <types>
<schema .... >
<element name="FOO" type="tns:FOOType"/>
<complexType name="FOOType">
.
.
.
</complexType>
<element name="BAR" type="tns:BARType"/>
<complexType name="BARType">
.
.
.
</complexType>
</schema>
</types>
<message name="FOO">
<part name="FOO" element="tns:FOO"/>
<part name="BAR" element="tns:BAR"/>
</message>
C. <types>
<schema .... >
.
.
.
<complexType name="Composite">
<choice>
<element name="FOO" minOccurs="1" maxOccurs="1" type="tns:FOOType"/>
<element name="BAR" minOccurs="0" maxOccurs="unbounded" type="tns:BARType"/>
</choice>
</complexType>
</schema>
</types>
<message name="FOO">
<part name="composite" type="Composite"/>
</message>
D. <types>
<schema .... >
.
.
.
<complexType name="Composite">
<choice>
<element name="FOO" minOccurs="1" maxOccurs="1" type="tns:FOOType"/>
<element name="BAR" minOccurs="0" maxOccurs="unbounded" type="tns:BARType"/>
</choice>
</complexType>
</schema>
</types>
<message name="FOO">
<part name="composite" type="tns:Composite"/>
</message>
Answer: BD

SUN demo   310-231   310-231

NO.3 }
Assume Reliable Messaging is used and the code is correct except for what is missing at line 10.
Which code fragment must be placed at line 10?
A. Close the port object with ((Closeable)port).close(); after testing result is positive.
B. Close the port with port.close();
C. Closing the port object is optional, but port.close(); will work.
D. Close the port object with ((Closeable)port).close();
Answer: D

SUN test questions   310-231 braindump   310-231   310-231
12. Which two statements are true about Java clients that use a security token service (STS) supported
by the security features of WSIT? (Choose two.)
A. The client only requires a keystore.
B. STS requires a default user name configuration.
C. Using an STS-issued token requires a keystore and a truststore.
D. HTTPS must be configured.
E. An authorized client receives a token digitally signed by the STS.
Answer: CE

SUN practice test   310-231   310-231 demo   310-231 study guide
13. A developer who recently added message optimization support to the company's Web services is
tasked with explaining how the next crop of WSIT client applications will use the feature.
Which statement is true?
A. Client developers should have experience with the SAAJ and MIME types to use MTOM with the
service.
B. The clients should use the service WSDL to discover and satisfy the interoperability requirements.
C. Adding message optimization is a manual step when the WSDL is available on HTTPS.
D. The encryption for optimization requires a client keystore.
Answer: B

SUN answers real questions   310-231 answers real questions   310-231 study guide   310-231 pdf   310-231   310-231 braindump

NO.4 A company has contracted a developer to create their new accounting system. The system the
developer will replace runs a monolithic web application using one web server and one database server.
Technical requirements state the developer must write the business logic in Java, deploy to the
application server and push the presentation logic onto the web servers.
What are three characteristics of services in the proposed Service Oriented Architecture? (Choose three.)
A. Services are coarse grained.
B. Services are finely grained.
C. Services are loosely coupled.
D. Services are tightly coupled.
E. Clients must be implemented in the Java technology.
F. Services are platform agnostic, network-addressable web APIs.
Answer: ACF

SUN   310-231   310-231   310-231 dumps

NO.5 A company is building a customer relationship management system that is to be deployed on a
customer's network, and they want software functions to be reused and combined in different modules in
the system. The Director of Technology has determined that the new system should utilize both Web
services and a Service Oriented Architecture (SOA).
Which two statements about Web services in an SOA are correct? (Choose two.)
A. A Web service must be discovered from a UDDI registry in an SOA.
B. SOA and Web services both use the HTTP protocol at the transport layer.
C. A Web service must publish itself to a UDDI registry to become part of an SOA.
D. SOA is a way to design a system and Web services are a possible implementation.
E. SOA is used for stateless invocations, and Web services for stateful invocations.
F. SOA emphasizes the concept of service encapsulation and Web services fulfill a service contract.
Answer: DF

SUN   310-231 practice test   310-231 test   310-231   310-231   310-231

NO.6 A developer is analyzing an existing Web service with performance problems. The analysis reveals
the service employs SOAP over HTTP. When the size of the encoded binary files grew with changing
business requirements, the service slowed.
What are two effective solutions for this problem? (Choose two.)
A. Separating the XML and binary content with WS-Filtering implemented in WSIT will improve efficiency.
B. XML documents larger than 1 KB with binary encoding should be optimized.
C. WS-Addressing can ease congestion by routing messages over other protocols.
D. For existing services, the most effective solution is to increase the available bandwidth.
E. MTOM can reduce both processing and bandwidth required by SOAP with attachments.
Answer: BE

SUN certification   310-231 test questions   310-231   310-231 certification training

NO.7 Given the Java fragment and schema:
1. //-- Java code fragment
2. public class PurchaseOrder{
3. public javax.xml.datatype.XMLGregorianCalendar orderDate;
4. }
5. //-- Schema fragment
6. <xs:complexType name="purchaseOrder">
7. <xs:sequence>
8. <xs:element name="orderDate" type="xs:anySimpleType"
9. minOccurs="0"/>
10. </xs:sequence>
11. </xs:complexType>
Which two statements are true about .Net and WCF interoperability for this data? (Choose two.)
A. The GregorianCalendar maps to an equivalent date type in both Java and .Net.
B. .Net will generate code with the calendar as a string that functions as well as a date.
C. .Net will generate code with the calendar as a string that is not type equivalent.
D. Use of the @XmlSchemaType annotation causes .Net to properly map to a date.
E. Casting in the case of WSIT services is an effective approach for the WCF client.
Answer: CD

SUN demo   310-231 original questions   310-231   310-231 test

NO.8 Given the Java fragment and schema:
1. //-- Java code fragment
2. public enum USState {MA, NH}
3. //-- Schema fragment
4. <xs:simpleType name=xsState?
5. <xs:restriction base=xs:string?
6. <xs:enumeration value=NH?/>
7. <xs:enumeration value=MA?/>
8. </xs:restriction>
9. </xs:simpleType>
10. // .NET auto generated code from schema
11. public enum usState { NH, MA }
Which statement is true about .Net and WCF interoperability for this data?
A. Based on the fragment, enumerations map well between Java and .Net.
B. The subtle differences in the variable names make it clear these enumerations are NOT interoperable.
C. The XML schema reveals the type on the enumeration is lost across the platforms.
D. This exchange would be interoperable if the annotation @XmlEnum was applied to the Java method.
Answer: A

SUN   310-231 test   310-231 exam prep   310-231 demo

NO.9 A team of developers is designing RESTful Web services for a new application.
What are three properties of the services? (Choose three.)
A. They can be stateful.
B. They can be stateless.
C. Components communicate by exchanging representations of the resource.
D. Components communicate by directly performing operations on the resource.
E. They require WSDL service API definitions.
F. Responses can be labeled as cacheable or non-cacheable.
Answer: BCF

SUN   310-231   310-231 exam simulations

NO.10 Which two statements are true about the role of XML schemas in Web services? (Choose two.)
A. DTDs provide stricter data typing than XML schemas.
B. XML schemas can be used to validate the organization of XML documents.
C. XML schemas contain a vocabulary, content model and data types.
D. DTDs are easier to map to Java than XML schemas, and so remain more popular.
E. The W3C recommends that XML schemas be referred to as XSD.
F. The W3C has designated that XML schemas be referred to as WXS.
Answer: BC

SUN   310-231   310-231   310-231 pdf   310-231 exam simulations

NO.11 The WSIT project implements a number of WS-* specifications to aid developers in creating secure and
interoperable services.
What are two parts of the WS-specifications? (Choose two.)
A. WS-ReliableMessaging
B. WS-Bootstrapping
C. WS-Eventing
D. WS-Policy
E. WS-WSITrust
Answer: AD

SUN   310-231   310-231   310-231   310-231 exam simulations

NO.12 According to the WS-I Basic Profile 1.1, which two statements are true about the targetNamespace
attribute for xsd:schema elements that are children of WSDL 1.1 type element? (Choose two.)
A. Its value must be valid unless it has xsd:import, xsd:annotation, or both as its only child elements.
B. Its value must be empty unless it has xsd:import, xsd:annotation, or both as its only child elements.
C. It should have same the value as the namespace attribute on the wsdl:import element in a document
being imported.
D. It must have same the value as the namespace attribute on the wsdl:import element in a document
being imported.
Answer: AD

SUN exam dumps   310-231 practice test   310-231   310-231 certification   310-231 questions

NO.13 A developer is creating an XML schema using the xsd:all operator.
Given the code:
<types>
<schema targetNamespace="http://sun.cert/types"
xmlns:tns="http://sun.cert/types"
xmlns:xsd="http://www.w3.org/2001/XMLSchema">
<xsd:complexType name="Person">
<xsd:all>
<!-- insert code here -->
</xsd:all>
</xsd:complexType>
</schema>
</types>
Which two element definitions, when inserted into the given schema fragment, result in a correct schema
type definition? (Choose two.)
A. <xsd:element name="first" type="xsd:string"/>
B. <xsd:element name="items" type="xsd:long" maxOccurs="5"/>
C. <xsd:element name="last" type="xsd:string" minOccurs="1" maxOccurs="1"/>
D. <xsd:element name="first" type="xsd:string" minOccurs="0" maxOccurs="5"/>
E. <xsd:element name="last" type="xsd:string" minOccurs="1" maxOccurs="5"/>
F. <xsd:element name="ssn" type="xsd:string" minOccurs="1" maxOccurs="unlimited"/>
Answer: AC

SUN   310-231   310-231 study guide   310-231

NO.14 A company uses Web services to exchange mortgage and credit data as well as digital versions of
associated documents. The data is confidential and it is common for the service and client to exchange
applications, credit results, reports and more in a request/response format. Recently, the company has
become concerned about the substantial cost of processing and message encryption with a PKI
approach.
What can be done to cut costs?
A. use MTOM to optimize the messages and provide data confidentiality via XML Digital Signature
B. because of the weak adoption of WS-SecureConversation on Java platforms, consider using Kerberos
C. use HTTPS as it is both economical and adequate
D. use WS-SecureConversation and MTOM to reduce the processing overhead
Answer: D

SUN   310-231   310-231 demo   310-231

NO.15 A developer plans to refactor some of the company's existing Java EE 5 business services, moving
them out of the existing monolithic application and into Web services.
What are two benefits of exposing existing Java EE 5 functionality as a Web service? (Choose two.)
A. improved manageability
B. more finely-grained
C. enhanced security
D. loose coupling of functionality
E. self-describing
F. automatic session management
Answer: DE

SUN   310-231 pdf   310-231 study guide   310-231

NO.16 Given:
1. try { // Call Web service Operation
2. org.me.calculator.client.CalculatorWS port =
3. service.getCalculatorWSPort();
4. // TODO initialize WS operation arguments here
5. int i = 3;
6. int j = 4;
7. // TODO process result here
8. int result = port.add(i, j);
9. out.println("<p>Result: " + result);
10.
11. } catch (Exception ex) {

NO.17 A student developer has created a new library of math functions to share with friends in a linear algebra
class. The developer is having difficulty getting people to come over to the dorm to see the new code
library, so he decides to deploy it as a Web service so that everyone can enjoy the features via the
Internet. One of the functions has this WSDL definition:
<portType name="MyMathLib">
<operation name="incCtr">
<input message="tns:incCtr"/>
</operation>
</portType>
Which two statements are true about this Web service? (Choose two.)
A. This is an asynchronous receive.
B. This is an asynchronous send.
C. The client must use SOAPFaultException to display any errors.
D. It must send a SOAP fault back to the sender.
E. It must NOT send a SOAP fault back to the sender.
Answer: BE

SUN   310-231 answers real questions   310-231   310-231   310-231

NO.18 out.println("<p>Exception: " + ex);

NO.19 A company's new investment management Java application and a legacy stock trader application
need to communicate, but they use different JMS implementations. A developer decides to implement a
JMS bridge to solve the problem.
Which two advantages does this pattern provide? (Choose two.)
A. It converts the interface of a class into another interface that clients expect.
B. It decouples an abstraction from its implementation so that the two can vary independently.
C. It dynamically attaches additional responsibilities to an object.
D. It optimizes network traffic.
E. It is vendor independent.
Answer: BE

SUN   310-231 dumps   310-231

ITCertKing offer the latest MSC-321 exam material and high-quality LOT-405 pdf questions & answers. Our 000-350 VCE testing engine and ST0-237 study guide can help you pass the real exam. High-quality 600-199 dumps training materials can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.itcertking.com/310-231_exam.html

没有评论:

发表评论