IBM认证考试

The following methods are to be published as Web services to be invoked via SOAP messages and validated with a schema:  public void myMethod(int x, float y);  public void myMethod(int x);  public void someOtherMethod(int x, float y);  Which WSDL style sh

题目

The following methods are to be published as Web services to be invoked via SOAP messages and validated with a schema:  public void myMethod(int x, float y);  public void myMethod(int x);  public void someOtherMethod(int x, float y);  Which WSDL style should be used?()

  • A、 RPC/literal
  • B、 RPC/encoded
  • C、 Document/encoded
  • D、 Document/literal
  • E、 Document/literal wrapped
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following methods of user authentication is the MOST secure?()

  • A、CHAP
  • B、Kerberos
  • C、TACACS
  • D、EAP

正确答案:B

第2题:

Which of the following archiving methods only backs up data that has changed since the previous full backup?()

  • A、Snapshot
  • B、Incremental
  • C、Copy
  • D、Differential

正确答案:D

第3题:

Which of the following scheduling methods uses more of the risk management concepts:

A ADM

B PDM

C CPM

D PERT

E Gantt


正确答案:D

第4题:

An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()

  • A、NIPS
  • B、Honeypot
  • C、DMZ
  • D、NIDS

正确答案:B

第5题:

Which of the following replication methods is MOST fault tolerant?()

  • A、 Hot site
  • B、 Active/passive clustering at the same site
  • C、 Disk-to-disk replication in the same server
  • D、 Warm site

正确答案:A

第6题:

Which of the following methods can move files in clear text and can be easily intercepted?()

  • A、RSH
  • B、SNMP
  • C、FTP
  • D、TELNET

正确答案:C

第7题:

Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()

  • A、OSPF
  • B、IS-IS
  • C、EIGRP
  • D、BGP

正确答案:D

第8题:

Which one of the following is not an acquisition method?

A advertising

B invitation

C negotiation

D purchase

E all are acquisition methods


正确答案:A

第9题:

Which of the following backup methods should be used nightly to ensure backups capture all necessary data in the LEAST amount of time?()

  • A、Daily
  • B、Incremental
  • C、Normal
  • D、Differential

正确答案:B

第10题:

Which of the following commands will display any user defined verification methods?()

  • A、cldump
  • B、clautover v
  • C、clve c .custom v
  • D、cllscustom t verify

正确答案:D