Choose three ways to enable MTOM on a web service endpoint deployed in an EE container ? (Choose three)
An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer has stringent security requirements that require suppliers to verify their identity. Data integrity and confidentiality must be maintained between the client and the server. Which two technologies can be used to meet the requirements? (Choose two)
Where can a developer specify confidentiality or integrity constraints on communications with a Enterprise Bean exposed as a JAX-RS root resource?(Choose one)
In designing the security for your enterprise application with multiple Web services, you don't want that each of the services handle user authentication by itself.Then which of the following you can use in your design?
A Java EE application contains business logic composed of EJB beans. All current clients are Java applications accessing the business logic using RMI. Some clients are remote (running in different JVMs) and some are local (running in the same JVM). Which of the following two occur if EJB components are exposed asWeb services? (Choose two.)
Given that a web service endpoint is based on the stateless session EJB:Which is true about the security roles of clients of MrBean? (Choose one)