[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-574 Dumps with VCE and PDF 21-30

By | January 25, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-574
100% Free Download! 100% Pass Guaranteed!

Oracle IT Architecture Essentials

Question No: 21

Service Oriented Integration (SOI) exposes capabilities from existing source systems. Which statement best describes the Impact SOI has on existing source systems?

  1. Because SOI exposes only existing capabilities, any new required functionality will be implemented by modifying the existing source systems.

  2. No modifications to existing source systems are allowed because SOA Services expose all the necessary capabilities from the source systems.

  3. Modifications to existing source systems should be avoided, but may be necessary to support SOA Service creation.

  4. To support SOA Service connectivity, modifications will be required for the existing source systems incorporated into the SOI architecture.

Answer: C

Explanation: Some minor modifications may be required to support connectivity, but requiring extensive modifications defeats a major reason for integration.

It must be noted that creating a SOA Service from existing assets generally requires a good deal more than just adding a standards-based interface, i.e. simply service enabling existing assets is insufficient. The SOA Service needs to expose process, functionality, and data that is usable in a broader context than the source of the capability was designed to meet. Therefore, creating a SOA Service usually entails

some amount of aggregation, transformation, or expansion of existing capabilities provided by the source systems. This requires a SOA Services layer between the existing assets and the consumers as illustrated in the figure.

Ensurepass 2018 PDF and VCE

Note: The primary goal of service-oriented integration is to better leverage existing systems within the IT environment by applying service-oriented principles. Ultimately, the

goal is to enable the assembly of composite applications, with little or no custom coding, that include capabilities sourced from existing systems.

Composite applications are applications that pull together data, functionality, and process from

multiple existing sources to solve a business problem or create new business value. Service-oriented integration is the mechanism to expose existing sources of data, functionality, and process so that those sources can be readily consumed by a composite application.

Service construction includes creating entirely new SOA Services and also exposing existing assets as SOA Services.

Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0

Question No: 22

IT Strategies from Oracle (ITSO) Includes multiple Enterprise Technology Strategies. Why are there multiple Enterprise Technology Strategies within ITSO?

  1. Each enterprise Technology Strategy documents the architecture for a particular Oracle product.

  2. Each Enterprise Technology Strategy provides Oracle product details that are important to the technology strategy.

  3. An Enterprise Technology Strategy provides detailed guidance on deploying the oracle products that are important to the technology strategy.

  4. Each Enterprise technology Strategy provides a reference architecture and practical guidance to achieve success with specific new technology.

  5. Each Enterprise Technology Strategy provides industry-vertical reference architecture and practical guidance.

Answer: D

Explanation: IT Strategies from Oracle (ITSO) is a series of documentation and supporting material designed to enable organizations to develop an architecture-centric approach

to enterprise-class IT initiatives. ITSO presents successful technology strategies and solution designs by defining universally adopted architecture concepts, principles, guidelines, standards, and patterns.

ITSO is made up of three primary elements Oracle Reference Architecture (ORA), Enterprise Technology Strategies (ETS) and Enterprise Solution Designs (ESD).

Enterprise Technology Strategies (ETS) offer valuable guidance on the adoption

of horizontal technologies for the enterprise. They explain how to successfully execute on a strategy by addressing concerns pertaining to architecture, technology, engineering, strategy, and governance. An organization can use this material to measure their maturity, develop their strategy, and achieve greater

levels of adoption and success. In addition, each ETS extends the Oracle Reference Architecture by adding the unique capabilities and components provided by that particular technology. It offers a horizontal technology-based perspective of ORA.

Reference: Oracle Reference Architecture, Cloud Foundation Architecture, Release 3.0

Question No: 23

The Mediation Layer in the Logical View of the Service-Oriented Integration architecture provides several capabilities. Which of the following are capabilities provided by the Mediation Layer?

  1. enrichment – adding data elements to a data entity to give the entity increased Information

  2. routing – sending the client request to the appropriate provider (s) based on some criteria

  3. message transformation – converting the request message format to a different message form, appropriate for the provider

  4. choreography – defining the messages that flow back and forth between systems that are participating in a business process

  5. protocol mediation – converting a client request from one protocol to a different protocol used by provider

Answer: B,C,E

Explanation: The Mediation Layer provides loose coupling for the entire architecture. It decouples

the layers of the architecture as well as decoupling external users of the layers from the specific layers in the architecture.

The key capabilities in this layer include:

  • Routing – Routing provides the ability to send the client request to the appropriate provider based on some criteria. The routing may even include sending the client request to multiple providers. This capability facilitates location transparency, versioning, scalability, partitioning, request pipelining, SLA management, etc.

  • Protocol Mediation – Protocol mediation is the ability to handle a client request

    using one protocol (e.g. WS*, JMS, REST) with a provider using a different protocol. This provides protocol decoupling between the provider and the consumer.

    Message Transformation – Message transformation allows a client request using one message format to be handled by a provider that expects a different message format. This provides message format decoupling between the provider and the consumer.

  • Discovery – Discovery is the mechanism by which a client finds a provider of a particular SOA Service. Discovery can occur at design time or runtime.

  • Monitoring – Monitoring captures runtime information about the messages flowing through the mediation layer. Since the mediation layer is an intermediary for message traffic, it provides a centralized monitoring capability.

  • Policy Enforcement – Policy enforcement provides consistent application of policies (e.g. WS-SecurityPolicy) across all messages flowing through the mediation layer. Since the mediation layer is an intermediary for message traffic, it provides a centralized policy enforcement capability.

    Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0

    Question No: 24

    Which one of the following types of access control should be used when access to a resource is dependent upon specific qualities of the user, for example, membership status, frequency of purchases, or level of certification?

    1. role-based access control

    2. rule-based access control

    3. discretionary access control

    4. content-dependent access control

    5. attribute-based access control

    Answer: C

    Explanation: Content dependent access control involves restricting access to content, such as

    documents and emails, based on embedded keywords or certain assigned metadata. It works by inspecting the content and applying rules to determine if access is permitted. This approach is taken by many Data Loss Prevention solutions. It is possible to

    combine content dependent access control with role-based access control in order to restrict access to content by established roles.

    Reference: Oracle Reference Architecture,Security, Release 3.1

    Question No: 25

    BPM and SOA are frequently combined to provide greater business value than either technology provides independently. Which statements are true with regard to combining the BPM Technology Perspective and SOA Technology Perspective?

    1. A Business Process may invoke a SOA Services to perform specific tasks within the process flow.

    2. A Business Process may be exposed as a SOA Service.

    3. When combining SOA and BPM, all the tasks within a Business Process are accomplished via Services.

    4. A Business Process may invoke an SOA Service, but an SOA Service cannot invoke a Business Process.

    5. Every business Process is exposed as a SOA Service.

    Ensurepass 2018 PDF and VCE

    Answer: A,B,D Explanation:

    Note E: BPM processes and sub-processes can (but are not required) themselves be exposed as SOA Services. This enables processes to be composed of SOA Services that are implemented

    as processes. It can be beneficial in two ways. First, it improves reuse of lower level

    system-centric processes (i.e. service orchestrations), and second, it offers a standard interface mechanism with which to invoke all types of business processes.

    Note: BPM and SOA are often used together, as they both support a closer alignment between business and IT, and they both promote agility. BPM targets alignment and agility at the process level, while SOA applies more at the activity level. Hence, business processes and SOA Services can represent business constructs, providing a mapping between the things business does and the way IT helps get it done.

    The convergence of BPM and SOA generally happens via process decomposition. That is when business processes are modeled as, (i.e. decomposed into), activities. All automated activities must be backed by some form of executable code or function call. These functions, if they are deemed worthy, can be engineered as SOA Services following service-oriented design principles. Agility at the process level is attained by changing the process model. Agility at the service level is achieved by deploying services that are loosely coupled and independently managed.

    Question No: 26

    Which of the following interactions does not occur as part of a web-based single sign-on scenario?

    1. A gateway, deployed In the Web Server, intercepts requests destined for protected resource

    2. The user is prompted for login credentials when a protected resource is accessed and the user has not (recently) logged In.

    3. Credentials are passed to the application for validation.

    4. Authorization checks are optionally performed before the user is permitted access to the application.

    5. A cookie is returned, which is used to permit access to other protected resources in that domain

    Answer: C

    Explanation: The application does not handle the validation.

    Question No: 27

    Which are the major categories of ORA Engineering capabilities?

    1. Integrated Development

    2. Asset Management

    3. Event Processing

    4. Service Engineering

    Answer: A,B

    Explanation: The broad categories that define ORA Engineering are:

  • Integrated development

    This covers a wide range of engineering capabilities required to model, design and build solutions. These capabilities go beyond simple editing and include advanced capabilities to support round-trip engineering, integrated testing, deployment, and asset management.

  • Asset Management

    Asset Management deals with the visibility, management and governance of assets and asset metadata. It covers the capabilities required to effectively manage enterprise assets.

  • Quality Management

    Quality Management capabilities ensure that the developed solution meets the enterprise standards and pass the exit criteria. Quality Management covers testing, defect management, and continuous integration.

  • Deployment Management

Deployment Management deals with building, packaging, migration, and deployment of assets.

Ensurepass 2018 PDF and VCE

Reference: Oracle Reference Architecture,Software Engineering, Release 3.0

Question No: 28

Enterprise Architecture consists of Business Architecture, Application Architecture, Information, Architecture and Technical Architecture (BAIT). Which statement best describes Oracle Reference Architecture (ORA) in the context of BAIT?

  1. ORA addresses all four (Business, Application, Information, and Technical) equally.

  2. ORA is primarily focused on the Technical Architecture, with some content on the other three aspects- of BAIT.

  3. ORA has content applicable to the Technical Architecture only.

  4. ORA is primarily focused on the Business Architecture, with some content on the other three aspects of BAIT

  5. ORA is primarily focused on the information Architecture, with some limited content on the other three aspects of BAIT.

  6. ORA has content applicable to Information Architecture only.

Answer: A

Explanation: Oracle Reference Architecture(ORA) defines a detailed and consistent reference

architecture for developing and integrating solutions based on current technologies from Oracle and other vendors. The reference architecture offers architecture views, principles, and guidance based on recommendations from technical experts across Oracle. It covers a broad spectrum of concerns pertaining to technology architecture, including middleware, database, hardware, processes, and services.

Ensurepass 2018 PDF and VCE

Question No: 29

Which of the following statements are true?

  1. (OWCS) provides components for reverse proxy, personalization, customization, social computing, and analytics.

  2. Oracle WebCenter (OWC) provides the Resource Tier of the Oracle Reference Architecture User Interaction.

  3. Oracle HTTP Server (OHS) provides the standard communication protocols (for example, HTTP) between the Client Tier and the Service Tier as well as the Message Security between the Client Tier and Service Tier.

  4. Oracle Meta Data Services (OMDS) stores customization, personalization, and other metadata in a repository

  5. Oracle WebLogic Suite (OWLS) is used in Oracle Reference Architecture User Interaction to enable Ontology languages for the Semantic Web

Answer: B,D

Explanation: B: Oracle WebCenter (OWC) – provides the foundation for delivering a modern user

experience for Oracle Fusion Middleware as well as Oracle Fusion Applications. OWC is composed of four main components as illustrated in the figure:

Ensurepass 2018 PDF and VCE

D: Oracle Meta Data Services (OMDS) – stores customization, personalization, and other metadata in a repository. The repository can either be stored in a database or in file-based storage.

Question No: 30

The Oracle Reference Architecture (ORA) includes the concept of Technology Perspectives. Which statements are true concerning ORA and Technology Perspectives?

  1. Each Technology Perspective focuses on a particular set of products and technology.

  2. A Technology Perspectiveincludesboth reference architecture views as well as practical guidance and approaches for successfully implementing the changes required to embrace the products and technology.

  3. The Technology Perspectives can be used individually or in combinations, for example, SOA with BI.

  4. The Technology Perspectives can be used individually or in combinations. When used in combinations, the SOA Technology Perspective must be included.

  5. Each Technology Perspective is part of ORA and is part of an Enterprise Technology Strategy; i.e. a Technology Perspective is the connection between ORA and an Enterprise Technology.

Answer: A,C,D,E

Explanation: Technology perspectives extend the core material by adding the unique capabilities,

components, standards, and approaches that a specific technology strategy offers.(A) SOA, BPM, EPM/BI, and EDA are examples of perspectives for ORA.

Each technology strategy presents unique requirements to architecture that includes specific capabilities, principles, components, technologies, standards, etc. Rather than create another reference architecture for each strategy, ORA was designed to be

extensible to incorporate new computing strategies as they emerge in the industry.

In order to present the reference architecture in the most effective manner, each new technology strategy adds a perspective to ORA. This enables the reference architecture to evolve holistically. New computing strategies extend the core material, providing further insight and detail as needed.

A perspective extends the ORA core collateral by providing views, principles, patterns, and guidelines that are significant to that technology domain yet cohesive with the overall ORA. The perspective includes:

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.