Loading ...
Global Do...
News & Politics
1
0
Try Now
Log In
Pricing
Examsoon.com The World Renowned IT Certification Material Provider Exam : IBM 000-257 Title : Test 257,ent apdevwwibm rtnl apdev for wbsph software v6.0 Version : Demo Examsoon.com The World Renowned IT Certification Material Provider Important Note, Please Read Carefully Other examsoon products All examsoon IT Exam Products Our products of Offline Testing Engine Use the offline Testing engine product to practice the questions in an exam environment. Build a foundation of knowledge which will be useful also after passing the exam. examsoon Testing Engine Guarantee Examsoon provides the most competitive quality of all exams for the customers, we guarantee your success at the first attempt with only our Certification Question&Answers, if you do not pass the exam at the first time, we will not only arrange FULL REFUND for you, but also provide you another exam of your claim, ABSOLUTELY FREE!. Features 1. Comprehensive questions with complete details 2. Instant Downloadable in PDF form. 3. Verified Answers Researched by Industry Experts 4. Questions accompanied by exhibits 5. Drag and Drop questions as experienced in the Actual Exams. 6. These questions and answers are backed by our GUARANTEE. 7. Questions updated on regular basis. 8. Like actual certification exams our product is in multiplechoice questions (MCQs). ExamSoon.com The World Renowned IT Certification Material Provider Help you pass any IT Exams 1. In an enterprise application EJB_A invokes a method on EJB_B. How must the EJB run-as security identity be configured in the EJB deployment descriptor for the current setting to allow EJB_A to invoke EJB_B? A. Set run-as on EJB_A to role_A. B. Set run-as on EJB_A to role_B. C. Set run-as on EJB_B to role_A. D. Set run-as on EJB_B to role_B. Answer: B 2. A web module defines a J2EE security role, Managers. Using the appropriate deployment descriptor editor, the developer then binds this role to the User Registry user, supervisors. What file would need to be explored to find this specified association? A. application.xml B. web.xml C. ibm-application-bnd.xmi D. ibm-web-bnd.xmi Answer: C 3. A developer wants to use form-based authentication to secure resources in a Web application. In the Web deployment descriptor editor, the developer has set the Authentication method to FORM and configured appropriate security roles. What additional entries need to be configured to protect the resources? A. Specify a Login page and create a Security Constraint defining the URL patterns of the resources to be secured and appropriate Authorized roles. B. Specify Login and Error pages and create a Security Constraint defining the URL patterns of the resources to be secured and appropriate Authorized roles. C. Specify Login and Error pages. D. Specify a Login page. Answer: B 4. A developer is implementing security requirements for a Web module. Which HTTP Methods would be the MOST likely to cover these requirements? A. GET and POST B. GET and PUT C. GET, POST and PUT D. GET, POST, PUT and DELETE Answer: A 5. While configuring a datasource in the EAR deployment descriptor editor, the drop-down boxes that allow ExamSoon.com The World Renowned IT Certification Material Provider Help you pass any IT Exams a JAAS authentication alias to be specified are empty. How can the JAAS authentication alias be configured in order for it to be visible in the drop down box? A. Add a J2EE security role with associated users in the EAR deployment descriptor editor. B. Add the required JAAS authentication alias in the EAR deployment descriptor editor. C. Add the JAAS authentication alias to the datasource reference in the EJB deployment descriptor editor. D. Use the WebSphere V6 administrative console to add the JAAS authentication alias. Answer: B 6. If a developer wants to create a Web service that must conform to all supported WS-I profiles, the developer should: A. Set the WS-I Compliance preferences to "Require compliance" before creating the Web service. B. Set the WS-I Compliance preferences to "Suggest compliance" before creating the Web service and disable related warnings in the Problems view. C. Use the New WS-I Compliant Web Service wizard to create the Web service. D. Check the "Require WS-I compliance" checkbox in the New Web Service wizard. Answer: A 7. A developer runs a Web service client in an unmanaged environment using a generated Java proxy. The client throws an Exception indicating that it failed to create an InitialContext. The same proxy class used in a managed environment works fine. If the developer did not modify the generated code, what is a likely cause of the problem? A. The security context for the JNDI manager cannot be propagated in an unmanaged environment. B. The transaction context can not be propagated in an unmanaged environment. C. The Web service being invoked uses the SOAP over JMS binding. D. Java proxies generated by the wizard can only be run in a managed environment. Answer: C 8. A developer is creating a client to invoke a secured Web service. The service requires that the body of the SOAP request be encrypted. What type of element in the WS Extension page of the client's Deployment Descriptor should the developer configure? A. Integrity B. Confidentiality C. Security Token D. Timestamp Answer: B 9. Which of the following EJB components can be used as the basis for bottom-up Web services development in Rational Application Developer? A. Message-driven bean ExamSoon.com The World Renowned IT Certification Material Provider Help you pass any IT Exams B. Stateful session bean C. Stateless session bean D. Container-managed entity bean Answer: C 10. A client uses a generated Java proxy to make a call to a Web service. Invoking the method on the proxy results in a RemoteException. What is a likely cause? A. The server hosting the Web service is unavailable. B. An application exception was thrown by the Web service. C. A handler on the client was configured incorrectly. D. The client was run in an unmanaged environment. Answer: A 11. A developer has two J2EE applications that are loosely coupled via Web services. The two applications are designated as the service application and the client application. The Web service is referenced and called from a Web module in the client application. In which set of files would a developer configure JAX-RPC handlers? A. The service application's webservices.xml and the service application's web.xml files B. The client application's webservices.xml and the service application's ejb-jar.xml files C. The client application's webservices.xml and the service application's web.xml files D. The service application's webservices.xml and the client application's web.xml files Answer: D 12. A developer can assign container-managed relationship (CMR) fields by: A. Coding the ejbCreate() method. B. Coding the ejbPostCreate() method. C. Mapping the primary key to the foreign key. D. Generating the code with the relationship wizard. Answer: B 13. The relationship fields for a 1:1 container-managed relationship EJB must be of the same type as: A. The local interface of the related EJB. B. The remote interface of the related EJB. C. The primary key of the underlying table. D. The foreign key of the underlying table. Answer: A 14. A stateless session EJB has been created that uses EJB inheritance. A developer is testing the newly created child EJB using the Universal Test Client (UTC). The developer has invoked the create method on the child EJB's home interface and is now working with a reference to the child EJB's remote component ExamSoon.com The World Renowned IT Certification Material Provider Help you pass any IT Exams interface. When the developer expands the child EJB's remote component interface reference within the UTC, the methods inherited from the parent EJB are not displayed. What should the developer do in order to be able to see the inherited methods? A. Select "Load Class" under the "Utilities" section of the Universal Test Client and load the parent EJB's remote component interface. B. Select "Cast Class" under the "Utilities" section of the Universal Test Client and cast the reference to the parent EJB's remote component interface. C. Select "Method Visibility" under the child EJB's remote component interface. On the screen that appears, enable the checkbox beside the parent EJB's remote component interface. D. Use the JNDI Explorer to find the parent EJB's home interface, invoke the associated create method, and then cast the remote component interface that is returned to the child EJB's remote component interface type. Answer: C 15. A developer is creating a CMP EJB using an existing database and has begun generating the RDB to EJB mapping by creating a new backend folder. The next step the developer should take is to: A. Specify attributes for the EJB. B. Map attributes to columns. C. Create a bottom up mapping. D. Create a top down mapping. Answer: C 16. Which method in an entity bean would a developer have to code business logic in, if the bean contains references to resources that cannot be serialized? A. ejbRemove() B. ejbStore() C. ejbPassivate() D. ejbFindByPrimaryKey() Answer: C 17. A developer is working with read-only EJBs that will have exclusive access to the data store. The BEST way to provide better response time at the expense of increased memory utilization is to use the bean cache section of the EJB deployment descriptor to set: A. Activate at ONCE and load at ACTIVATION. B. Activate at ONCE and load at TRANSACTION. C. Activate at TRANSACTION and load at ONCE. D. Activate at TRANSACTION and load at TRANSACTION. Answer: A ExamSoon.com The World Renowned IT Certification Material Provider Help you pass any IT Exams 18. Which of the following is an advantage of using the Snippets view to generate code for invoking a method on a Session Bean? A. The Service Locator pattern is used and the home is cached. B. The Service Locator pattern is used and individual bean instances are cached. C. The generated code does not require try-catch blocks to handle errors. D. The bean on which the method is invoked can be determined at runtime. Answer: A 19. An application uses container-managed persistence EJBs to update a DB2 database. If database support for handling collisions is required, which of the following access intent policies will provide the best performance? A. wsOptimisticUpdate B. wsPessimisticUpdate-WeakestLockAtLoad C. wsPessimisticUpdate D. wsPessimisticUpdate-Exclusive Answer: B 20. When creating a message-driven bean, which interface, if any, can be generated? A. The home interface B. The remote interface C. The listenerPort interface D. No interface can be generated Answer: D Examsoon.com was founded in 2006. The safer,easier way to help you pass any IT Certification exams . We provide high quality IT Certification exams practice questions and answers(Q&A). Especially Adobe, Apple, Citrix, Comptia, EMC, HP, Juniper, LPI, Nortel, Oracle, SUN, Vmware and so on. And help you pass any IT Certification exams at the first try. we guarantee your success at the first attempt with only our Certification Question&Answers, if you do not pass the exam at the first time, we will not only arrange FULL REFUND for you, but also provide you another exam of your claim, ABSOLUTELY FREE! You can reach us at any of the email addresses listed below. EMAIL: examsoon(at)hotmail.Com Examsoon.com The World Renowned IT Certification Material Provider