READ Free Dumps For Oracle- 1z0-897
Question ID 4438 | An organization has business logic implemented in EJB components. Current clients use container-managed, role-based security to access the business logic using RMI. Management has determined that the business logic must be made available to non-RMI clients using a Web service. Which container-managed Web service security mechanism would the development team?use to allow Web service clients to use the current security model? (Choose one) |
Option A | A. XKMS |
Option B | B. XACML |
Option C | C. XML Digital Signature |
Option D | D. HTTP Basic Authentication |
Option E | E. annotations mapped to the JAX-WS runtime |
Correct Answer | D |
Question ID 4439 | A developer creates a Web service for his company's inventory service. He uses servlet container to deploy the web service and wants to enable basic authentication for all web service invocations. Where does the developer configure security requirements for the above case? |
Option A | A. sun-jaxws.xml |
Option B | B. web.xml |
Option C | C. webservices.xml |
Option D | D. domain.xml |
Correct Answer | B |