1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 2

The three common goals of Information security are known as the CIA triad. CIA stands for:


Options are :

  • Confidentiality, Integrity and Access Control
  • Confidentiality, Integrity and Authentication
  • Confidentiality, Integrity and Availability (Correct)
  • Confidentiality,Integrity and Authorization
  • Confidentiality, Integrity and Auditing

Answer : Confidentiality, Integrity and Availability

Which of the following is not an objective or function of the WS-Trust standard?


Options are :

  • to exchange tokensin order to mapidentities supplied by service consumers with identities supported by service providers
  • to synchronize Identities across security domains
  • to exchange tokens in order to overcome differencesin supported technology between service consumers and service providers
  • to enable applications to construct trusted SOAP message exchanges (Correct)

Answer : to enable applications to construct trusted SOAP message exchanges

Bottom-up service Identification analyzes existing systems to Identify SOA Services. Top-down
service identification analyzes business processes to identify SOA services.
Which statement best describes the relationship between top down and bottom-up service

identification in Service-Oriented Integration?



Options are :

  • Only a bottom up approach shouldbe used because the goal of SOIis to provide SOA Services exposing existing systems.
  • A bottom-up approach should be used to identify which SOA Services are built; then a topdown approach should be used to determine which SOA Services are used by each composite application.
  • Only a top-down approach should be used because the goal of SOI is composite application assembly.
  • A top-down approach should be used to determine the needed SOA Services; then a bottom-up approach should be used to determine how existing source systems can meet the requirements top-down approach should be used by business, and a bottom-up approach should be used by IT.Theoverlap between the SOA Services Identified by the two methods are the ones that should (Correct)

Answer : A top-down approach should be used to determine the needed SOA Services; then a bottom-up approach should be used to determine how existing source systems can meet the requirements top-down approach should be used by business, and a bottom-up approach should be used by IT.Theoverlap between the SOA Services Identified by the two methods are the ones that should

As part of a company-wide IT Initiative to simplify and rationalize the technology and products
used you have been tasked with defining an Enterprise Architecture. The Enterprise Architecture
will be used to communicate the desired future state where redundant, deprecated, and undesired
technology and products have been eliminated. Oracle products will be included. In the Enterprise
Architecture, it will be products from other vendors, including products that directly compete with
Oracle products.
Which option best describes how IT Strategies from Oracle (ITSO) material can be used while
creating the Enterprise Architecture?


Options are :

  • None of the Above
  • The Oracle Reference Architecture component of ITSO can be readily applied, but the Rest of ITSO cannot, because of product dependencies
  • The ITSO material cannot be used because ITSO applies to Oracle products only.
  • The ITSO material can be used without modification because it has no Oracle product dependencies
  • The ITSO material is not applicable to rationalization of IT asset
  • The Oracle Reference Architecture component of ITSO cannot be applied due to pre dependencies, but the rest of ITSO can be applied.
  • The ITSO material can be used as reference material but will require customization to reflect specific products selected by the company. (Correct)

Answer : The ITSO material can be used as reference material but will require customization to reflect specific products selected by the company.

Which statement best describes the relationship between Oracle Reference Architecture (ORA)
and the Oracle products?


Options are :

  • ORA describes the architecture underlying the Oracle Fusion Applications.
  • ORA describes the architecture built in to the Oracle products.
  • ORA describes an architecture thatis exclusively based on Oracle products.
  • ORA describes a product-agnostic architecture and then maps the Oracle products onto the architecture. (Correct)

Answer : ORA describes a product-agnostic architecture and then maps the Oracle products onto the architecture.

Which four components of the following list should be found in the client tier of the Logical view of
the Oracle Reference Architecture User Interaction?
A. Personalization
B. Communication services
C. State management
D. Customization
E. Collaboration
F. Syndication
G. Controller
H. Rendering


Options are :

  • A,C,D,H
  • A,C,D,F
  • B,C,E,F
  • B,C,G,H (Correct)

Answer : B,C,G,H

Which statements best describe how architecture principles are used within the Oracle Reference
Architecture (ORA)?


Options are :

  • ORA uses multiple architecturalviews where each view has its own architecture principles.
  • ORA documents describe the architectural principles upon which the architecture is based. (Correct)
  • Architecture principles are rules that must be followedin order to comply with the documented architecture.
  • The architecture principles for Oracle products are identified whenever an Oracle product incorporated into the architecture
  • Architecture principles provide recommendations (based on industry best practices) that should be followed.

Answer : ORA documents describe the architectural principles upon which the architecture is based.

Which one of the following types of access control should be used when access to a resource is
dependent upon specific qualities of the user, for example, membership status, frequency of
purchases, or level of certification?


Options are :

  • rule-based access control
  • discretionary access control (Correct)
  • role-based access control
  • attribute-based access control
  • content-dependent access control

Answer : discretionary access control

BPM and SOA are frequently combined to provide greater business value than either technology
provides independently. Which statements are true with regard to combining the BPM Technology
Perspective and SOA Technology Perspective?
A. A Business Process may invoke a SOA Services to perform specific tasks within the process
flow.
B. A Business Process may be exposed as a SOA Service.
C. When combining SOA and BPM, all the tasks within a Business Process are accomplished via
Services.
D. A Business Process may invoke an SOA Service, but an SOA Service cannot invoke a
Business Process.
E. Every business Process is exposed as a SOA Service.


Options are :

  • A,B,C
  • B,D,E
  • B,C,D
  • A,B,D (Correct)

Answer : A,B,D

Interface elements are an important part of modular programming for UI. Which of the following
statements is true with regard to Interface elements?
A. Interface elements are always provided as proprietary packages of widgets from device
vendors and third parties.
B. There is a wide variety of interface elements that can be developed once and used repeatedly
in various user-interface designs.

C. Interface elements are highly standardized and, once developed for one device, they are
sufficiently portable to be reused on other devices without modification.
D. Interface elements implement application-specific functionality and are therefore rarely reusable
across multiple applications.



Options are :

  • B,C (Correct)
  • B,D
  • A,C
  • A,B

Answer : B,C

Conceptually, the ORA model of a "modern UI" defines which three layers from the following list?
A. Unified User Interface layer provides the control and visual elements that define the interaction
that the user has with the system.
B. Integration layer provides connectors to simplify and standardize Interaction with back-end -
terns.
C. Device Management layer provides transformation and transcoding to support a wide variety of
devices.
D. Browser Mediation layer adapts output to conform to the standards and capabilities of each
browser type.
E. User Interface Services layer provides reusable functions specialized to the needs of the end
F. Access and Incorporation layer provides the capability to Incorporate data and functionality from
any number of back-end systems into the user interface.


Options are :

  • A,E,F (Correct)
  • A,B,C
  • A,C,F
  • A,D,F

Answer : A,E,F

Identify the true statements in the following list.
A. The core components of the ORA UI Logical view are grouped into the client tier and the server
tier.
B. The components of the ORA UI Logical view are model, view, and controller.
C. The core components of the ORA UI Logical view are grouped into thedisplaytier and
theresourcestier.
D. In addition to the core components, the Logical view also includes security, communication
protocols, and development tools.


Options are :

  • B,D (Correct)
  • A,B
  • B,C
  • A,D

Answer : B,D

Service Oriented Integration (SOI) exposes capabilities from existing source systems. Which
statement best describes the Impact SOI has on existing source systems?


Options are :

  • To support SOA Service connectivity, modifications will be required for the existing source systems incorporated into the SOI architecture.
  • No modifications to existing source systems are allowed because SOA Services expose all the necessary capabilities from the source systems.
  • Because SOI exposes only existing capabilities, any new required functionality will be implemented by modifying the existing source systems.
  • Modifications to existing source systems should be avoided, but may be necessary to support SOA Service creation. (Correct)

Answer : Modifications to existing source systems should be avoided, but may be necessary to support SOA Service creation.

The Mediation Layer in the Logical View of the Service-Oriented Integration architecture provides
several capabilities. Which of the following are capabilities provided by the Mediation Layer?

A. enrichment - adding data elements to a data entity to give the entity increased Information
B. routing - sending the client request to the appropriate provider (s) based on some criteria
C. message transformation - converting the request message format to a different message form,
appropriate for the provider
D. choreography - defining the messages that flow back and forth between systems that are
participating in a business process
E. protocol mediation - converting a client request from one protocol to a different protocol used by
provider



Options are :

  • B,C,E (Correct)
  • B,D,E
  • B,C,D
  • A,C,E

Answer : B,C,E

Which of the following statements are true about an end-to-end security strategy?
A. End-to-end security and point-to-point security are virtually identical strategies proposed by
different security vendors.
B. End-to-end security strives to protect data at rest, even in temporary queues.
C. End-to-end security often involves some form of message-level protection.
D. When end-to-end security is enabled. Point-to-point transport-level encryption should be
disabledin order to avoid cryptography conflicts between layers.
E. End to-end security is highly beneficial for distributed computing environments where many point-point connections and intermediaries exist, because it offers seamless data protection.


Options are :

  • B,C,E (Correct)
  • A,C,E
  • B,C,D
  • B,D,E

Answer : B,C,E

Where are the components of the client tier of the ORA UI logical architecture hosted?


Options are :

  • on the display device (Correct)
  • on the transcoding engine
  • some components on the web server and some on the display device
  • on the web server

Answer : on the display device

Which of the following are ORA Engineering logical categories?
A. Integrated Development Environment
B. Quality Manager
C. Asset Manager
D. Monitoring and Management


Options are :

  • A,B (Correct)
  • A,C
  • A,D
  • C,B

Answer : A,B

Which statement best describes the relationship between a SOA Service and service
Infrastructure?


Options are :

  • Service infrastructure is a primary part of an SOA Service.
  • Service Infrastructure exposes the Service Interface and may satisfy some capabilities of the Service Implementation. (Correct)
  • Service infrastructure fulfills the Service Contract
  • A SOA Service uses the service infrastructure to generate the Service Interface
  • A SOA Service depends on the service infrastructure to satisfy some required capabilities

Answer : Service Infrastructure exposes the Service Interface and may satisfy some capabilities of the Service Implementation.

Which are the major categories of ORA Engineering capabilities?
A. Integrated Development
B. Asset Management
C. Event Processing
D. Service Engineering


Options are :

  • A,D
  • A,C
  • B,C
  • A,B (Correct)

Answer : A,B

Which of the following statements are true?
A. (OWCS) provides components for reverse proxy, personalization, customization, social
computing, and analytics.
B. Oracle WebCenter (OWC) provides the Resource Tier of the Oracle Reference Architecture
User Interaction.
C. Oracle HTTP Server (OHS) provides the standard communication protocols (for example,
HTTP) between the Client Tier and the Service Tier as well as the Message Security between the
Client Tier and Service Tier.
D. Oracle Meta Data Services (OMDS) stores customization, personalization, and other metadata
in a repository
E. Oracle WebLogic Suite (OWLS) is used in Oracle Reference Architecture User Interaction to
enable Ontology languages for the Semantic Web


Options are :

  • B,C
  • A,D
  • B,D (Correct)
  • A,B

Answer : B,D

Which WebCenter product Improves efficiency and productivity by enabling users to connect with
others, regardless of their location, via web and voice conferencing, instant messaging, presence,
and chat rooms?


Options are :

  • Oracle WebCenter Anywhere
  • Oracle WebCenter Spaces
  • Oracle WebCenter Real-Time Collaboration (Correct)
  • Oracle WebCenter Intelligent Collaboration

Answer : Oracle WebCenter Real-Time Collaboration

Which of the following interactions does not occur as part of a web-based single sign-on scenario?


Options are :

  • Credentials are passed to the application for validation. (Correct)
  • A cookie is returned, which is used to permit access to other protected resources in that domain
  • Authorization checks are optionally performed before the user is permitted access to the application.
  • The user is prompted for login credentials when a protected resource is accessed and the user has not (recently) logged In.
  • A gateway, deployed In the Web Server, intercepts requests destined for protected resource

Answer : Credentials are passed to the application for validation.

Which of the following options best describes the concept of data-driven testing?


Options are :

  • Data-driven testing uses database triggers to initiate and run test cases.
  • Data-driven testing is used to perform functional tests by iterating through data sets in a databank (Correct)
  • Data-driven testing is a strategy used to perform load testing.
  • Data-driven testing uses a single predefined data set to perform repeated testing.

Answer : Data-driven testing is used to perform functional tests by iterating through data sets in a databank

A longer term goal of Service-Oriented Integration (SOI) is to enable composite applications that
are assembled from SOA Services. Which statement best describes the relationship between
composite application assembly and SOA Service engineering?


Options are :

  • SOA Service engineering creates SOA Services following sound engineering principles, while composite application assembly uses SOA Services based on WSPL interfaces.
  • Composite application assembly uses service contracts created by SOA Service engineering and generates requirements that are Inputs to SOA Service engineering. (Correct)
  • Composite application assembly and SOA Service engineering are separate, decoupled efforts without any meaningful Interaction.
  • All SOA Service engineering must be completed prior to any composite application assembly.

Answer : Composite application assembly uses service contracts created by SOA Service engineering and generates requirements that are Inputs to SOA Service engineering.

IT Strategies from Oracle (ITSO) Includes multiple Enterprise Technology Strategies. Why are
there multiple Enterprise Technology Strategies within ITSO?


Options are :

  • An Enterprise Technology Strategy provides detailed guidance on deploying the oracle products that are important to the technology strategy.
  • Each Enterprise Technology Strategy provides Oracle product details that are important to the technology strategy.
  • Each enterprise Technology Strategy documents the architecture for a particular Oracle product.
  • Each Enterprise technology Strategy provides a reference architecture and practical guidance to achieve success with specific new technology. (Correct)
  • Each Enterprise Technology Strategy provides industry-vertical reference architecture and practical guidance.

Answer : Each Enterprise technology Strategy provides a reference architecture and practical guidance to achieve success with specific new technology.

Which of the following are the key drivers for Grid computing?
A. Improved server utilization - Grid computing allows companies to lower costs through the
efficient use of resources.
B. Better agility and flexibility - Businesses experience constant change and the underlying IT
Infrastructure should be agile enough to support that kind of change.
C. OpEx model - Enterprises require pay-as-you-go services to reduce the dependency on capital
expenditure and take advantage of the benefits of operational expenditure.
D. Lower Initial cost-There is a need to reduce the Initial investment at the cost of an increased
operational cost.


Options are :

  • B,C,D
  • A,C,D
  • A,B,C
  • A,B,D (Correct)

Answer : A,B,D

What are the benefits of the browser over traditional user Interfaces (for example, client-server
GUI)?
A. HTML provides a richer interface for end users.

B. Development, maintenance, and support costs are reduced.
C. The browser simplifies application deployment compared to dedicated client server GUI
applications.
D. There is more variety among browsers than among client-server GUIs.
E. The browser provides a richer graphical environment than client-server GUIs.
F. Browsers can support more diverse devices than dedicated client-server GUI application.



Options are :

  • B,C,D
  • B,D,E
  • A,C,F
  • B,C,F (Correct)

Answer : B,C,F

The Oracle Reference Architecture (ORA) includes the concept of Technology Perspectives.
Which statements are true concerning ORA and Technology Perspectives?
A. Each Technology Perspective focuses on a particular set of products and technology.
B. A Technology Perspectiveincludesboth reference architecture views as well as practical
guidance and approaches for successfully implementing the changes required to embrace the
products and technology.
C. The Technology Perspectives can be used individually or in combinations, for example, SOA
with BI.
D. The Technology Perspectives can be used individually or in combinations. When used in
combinations, the SOA Technology Perspective must be included.
E. Each Technology Perspective is part of ORA and is part of an Enterprise Technology Strategy;
i.e. a Technology Perspective is the connection between ORA and an Enterprise Technology.


Options are :

  • A,C,D
  • A,B,C
  • A,C,D,E (Correct)
  • A,B,C,D

Answer : A,C,D,E

Enterprise Architecture consists of Business Architecture, Application Architecture, Information,
Architecture and Technical Architecture (BAIT). Which statement best describes Oracle Reference
Architecture (ORA) in the context of BAIT?


Options are :

  • ORA addresses all four (Business, Application, Information, and Technical) equally. (Correct)
  • ORA has content applicable to Information Architecture only.
  • ORA is primarily focused on the Technical Architecture, with some content on the other three aspects- of BAIT.
  • ORA has content applicable to the Technical Architecture only.
  • ORA is primarily focused on the Business Architecture, with some content on the other three aspects of BAIT
  • ORA is primarily focused on the information Architecture, with some limited content on the other three aspects of BAIT.

Answer : ORA addresses all four (Business, Application, Information, and Technical) equally.

There are various network topologies that can be used when deploying the Service-Oriented
Integration architecture. One deployment option includes three networks: production network,
services network and maintenance network. Which statement best describes the uses of these
three networks?



Options are :

  • The production network provides connectivity to applications and client access to the Mediation Layer- The services networks is used to deploy and configure SOA Services. The maintenance network is used by the operations team to manage the infrastructure.
  • The production networkisused for all production network traffic. The services networks is used to deploy and configure SOA Services. The maintenance network is used by the operations team to manage the infrastructure.
  • The production network is used for all production network traffic. The services network provides connectivity between the Mediation Layer and the SOA Services. The maintenance network is by the operations team to manage the infrastructure.
  • The production network provides connectivity to applications and client access to the Mediation Layer. The services network provides connectivity between the Mediation Layer and the SOA Services. The maintenance network is used by the operations team to manage the infrastructure. (Correct)
  • The production network is used for all production network traffic. The services networks is used to deploy and configure SOA Services. The maintenance network is trusted network, providing administrator access to all hardware and software.

Answer : The production network provides connectivity to applications and client access to the Mediation Layer. The services network provides connectivity between the Mediation Layer and the SOA Services. The maintenance network is used by the operations team to manage the infrastructure.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions