Which two statements are true about WSIT client development and using the WSIT configuration file? (Choose two.)
A.
Client configuration files do NOT contain information security features, such as authentication.
B.
The file contains the URL for the WSDL.
C.
To maintain interoperability, the configuration file must not name packages.
D.
A WSIT client uses the file as a WSDL proxy is available from any WSIT compliant service.
E.
The wsimport tool uses the file to access the WSDL and build stubs to access a service.
https://docs.oracle.com/cd/E19159-01/820-1072/ahiaj/index.html
B) and E) depicts the boottrap function.
B and E
https://docs.oracle.com/cd/E17802_01/webservices/webservices/reference/tutorials/wsit/doc/WSIT_Security_descr3.html :
The service-side WSIT Configuration file that is used when the web service is deployed can be viewed by expanding the Web Pages WEB-INF elements of the application in the tree, and then double-clicking the wsit-..xml file to open it in the editor.
then double-clicking the wsit- package . service .xml file to open it in the editor.
Chapter 7 Using WSIT Security
https://docs.oracle.com/cd/E19159-01/820-1072/6ncp48v3b/index.html#ahici
Service-Side WSIT Configuration Files
https://docs.oracle.com/cd/E19159-01/820-1072/ahifg/index.html