The document contains multiple choice questions and fill-in-the-blank exercises related to SOAP, UDDI, and web services security. Key topics include the definitions and roles of SOAP and UDDI, the structure of SOAP messages, and security mechanisms like WS-Security and XML Encryption. It also covers service-oriented architecture and the importance of service metadata in web services.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
44 views6 pages
Mid 2 Objective Questions
The document contains multiple choice questions and fill-in-the-blank exercises related to SOAP, UDDI, and web services security. Key topics include the definitions and roles of SOAP and UDDI, the structure of SOAP messages, and security mechanisms like WS-Security and XML Encryption. It also covers service-oriented architecture and the importance of service metadata in web services.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6
Multiple Choice Questions (MCQs) — With Answers
1. SOAP stands for:
a) Service Object Access Protocol b) Simple Object Access Protocol c) Simple Open Access Protocol d) Secure Object Access Protocol Answer: b) Simple Object Access Protocol 2. SOAP messages are typically transported using which protocol? a) FTP b) SMTP c) HTTP d) DNS Answer: c) HTTP 3. Which of the following is the outermost element in a SOAP message? a) Header b) Body c) Envelope d) Fault Answer: c) Envelope 4. The purpose of the SOAP Header is to: a) Contain mandatory application data b) Carry metadata such as authentication or transaction info c) Store binary files d) Specify WSDL schemas Answer: b) Carry metadata such as authentication or transaction info 5. Which of these is a key role in a Service-Oriented Architecture (SOA)? a) Service provider b) Service consumer c) Service registry d) All of the above Answer: d) All of the above 6. Reliable messaging ensures: a) Every message is delivered exactly once or at least once b) Messages are encrypted c) Messages are compressed d) Server loads are balanced Answer: a) Every message is delivered exactly once or at least once 7. Which component is central in enabling communication between services in an enterprise SOA environment? a) Web Browser b) Enterprise Service Bus (ESB) c) SQL Server d) SOAP UI Answer: b) Enterprise Service Bus (ESB) 8. In SOAP, the element used for reporting errors is called: a) Fault b) Error c) Exception d) Reject Answer: a) Fault 9. The SOAP communication model primarily follows a: a) Peer-to-peer model b) Request-response model c) Event-driven model d) Multicast model Answer: b) Request-response model 10. SOAP encoding rules describe: a) The encryption algorithm used b) How application-defined data types are serialized in XML c) How WSDL files are validated d) How HTTP headers are compressed Answer: b) How application-defined data types are serialized in XML
Fill in the blanks — With Answers
1. SOAP stands for Simple Object Access Protocol. 2. A SOAP envelope is the top-level element that contains the header and body of a SOAP message. 3. SOAP as a messaging protocol is platform and language independent. 4. HTTP is the most commonly used transport protocol for SOAP messages. 5. SOAP Fault is used to handle and report errors in SOAP messages. 6. Enterprise Service Bus (ESB) helps integrate and manage communication between distributed services. 7. The SOAP HTTP binding specifies how SOAP messages are mapped to HTTP requests and responses. 8. In Service-Oriented Architecture (SOA), services are loosely coupled and reusable. 9. The three primary roles in SOA are Service Provider, Service Consumer, and Service Registry. 10. The SOA Development Lifecycle includes stages such as analysis, design, implementation, deployment, and governance. Multiple Choice Questions (MCQs) 1. Which protocol is primarily used for discovering and integrating web services? a) HTTP b) SOAP c) UDDI d) FTP 2. In UDDI, which of the following represents the unique identifier for a business entity? a) serviceKey b) bindingKey c) businessKey d) tModelKey 3. UDDI stands for: a) Universal Data Discovery and Integration b) Universal Description, Discovery, and Integration c) Uniform Data Distribution and Integration d) Uniform Description and Data Integration 4. Which of the following is NOT a core component of UDDI architecture? a) White Pages b) Yellow Pages c) Green Pages d) Red Pages 5. Which UDDI component describes how to bind and invoke a web service? a) tModel b) bindingTemplate c) businessService d) businessEntity 6. The __________ protocol is commonly used alongside UDDI to describe web services. a) HTTP b) SOAP c) WSDL d) FTP 7. Which UDDI API set is used for publishing business and service information? a) Inquiry API b) Publish API c) Security API d) Subscription API 8. Which of the following is true about service registries? a) They store the actual service implementation b) They store metadata and references to services c) They execute web services d) They encrypt service data 9. Web Services Notification (WSN) is used for: a) Encrypting web services communication b) Discovering new registries c) Sending and receiving event-based messages d) Verifying WSDL schemas 10. Service discovery helps in: a) Locating available services dynamically b) Encrypting service metadata c) Compressing service data d) Monitoring user logins
Fill in the blanks
1. UDDI stands for Universal Description, Discovery, and Integration. 2. The White Pages of UDDI contain basic business contact information. 3. The bindingTemplate describes how and where a service is accessed. 4. WSDL is used to describe the functionalities offered by a web service. 5. A service registry is a centralized directory where service descriptions are stored. 6. The Yellow Pages categorize services based on industry or business classification. 7. The tModel in UDDI acts as a template to describe service interfaces or specifications. 8. Web services addressing enables message routing to web services endpoints. 9. Notification mechanisms help clients get updates about events or service changes. 10. Service discovery automates the process of locating services on a network. Multiple Choice Questions (MCQs) — With Answers 1. Which of the following is a network-level security mechanism? a) HTTPS b) XML Encryption c) WS-Security d) XML Signature Answer: a) HTTPS 2. Which standard is used for securing XML data by encrypting parts of the XML document? a) XML Signature b) XML Encryption c) WS-Trust d) SOAP Answer: b) XML Encryption 3. The primary purpose of WS-Security is to: a) Create semantic models b) Manage distributed resources c) Secure SOAP messages d) Encrypt network traffic Answer: c) Secure SOAP messages 4. Which of the following is a challenge addressed by semantic interoperability? a) Hardware compatibility b) Different service meanings across systems c) Network latency d) Software versioning Answer: b) Different service meanings across systems 5. Which of these is an application-level security topology? a) IPsec b) SSL/TLS c) WS-SecurityPolicy d) Firewall Answer: c) WS-SecurityPolicy 6. Service metadata typically includes information about: a) The operating system version b) The physical location of servers c) Service interface descriptions and policies d) CPU load of the server Answer: c) Service interface descriptions and policies 7. Which framework is commonly used for enterprise management in distributed systems? a) SNMP b) REST c) WSDL d) SOAP Answer: a) SNMP 8. .NET and J2EE are both platforms that support: a) Only desktop applications b) Only mobile applications c) Web services and enterprise applications d) Only command-line utilities Answer: c) Web services and enterprise applications 9. WS-Metadata Exchange allows services to: a) Share real-time CPU load b) Exchange security certificates c) Dynamically retrieve service metadata d) Synchronize databases Answer: c) Dynamically retrieve service metadata 10. Which standard allows attaching digital signatures to XML data to ensure integrity and authenticity? a) XML Encryption b) XML Signature c) WS-ReliableMessaging d) HTTP Answer: b) XML Signature
Fill in the blanks — With Answers
1. HTTPS provides encryption and secure communication at the network level. 2. XML Encryption is used to encrypt parts or the whole of an XML document. 3. WS-Security secures SOAP messages by adding security tokens and signatures. 4. The semantic interoperability problem arises when different systems interpret the same data differently. 5. Service metadata describes service capabilities, policies, interfaces, and endpoints. 6. The role of metadata is to provide information that describes and enables interaction with services. 7. SNMP (Simple Network Management Protocol) is a standard framework for managing distributed systems. 8. .NET and J2EE both provide environments for developing scalable enterprise and web applications. 9. WS-Metadata Exchange allows a service consumer to retrieve metadata like WSDL or policies dynamically. 10. XML Signature ensures integrity, authentication, and non-repudiation for XML data.