310-231 Free Dumps Study Materials
Question 16: }
Assume Reliable Messaging is used and the code is correct except for what is missing at line 10.
Which code fragment must be placed at line 10?
A. Close the port object with ((Closeable)port).close(); after testing result is positive.
B. Close the port with port.close();
C. Closing the port object is optional, but port.close(); will work.
D. Close the port object with ((Closeable)port).close();
Correct Answer: D
12. Which two statements are true about Java clients that use a security token service (STS) supported
by the security features of WSIT? (Choose two.)
A. The client only requires a keystore.
B. STS requires a default user name configuration.
C. Using an STS-issued token requires a keystore and a truststore.
D. HTTPS must be configured.
E. An authorized client receives a token digitally signed by the STS.
Correct Answer: CE
13. A developer who recently added message optimization support to the company's Web services is
tasked with explaining how the next crop of WSIT client applications will use the feature.
Which statement is true?
A. Client developers should have experience with the SAAJ and MIME types to use MTOM with the
service.
B. The clients should use the service WSDL to discover and satisfy the interoperability requirements.
C. Adding message optimization is a manual step when the WSDL is available on HTTPS.
D. The encryption for optimization requires a client keystore.
Correct Answer: B