1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 1

Which one of the following types of access control should be used when access to a resource is
dependent upon specific qualities of the user, for example, membership status, frequency of
purchases, or level of certification?


Options are :

  • A. role-based access control
  • attribute-based access control
  • content-dependent access control
  • discretionary access control (Correct)
  • rule-based access control

Answer : discretionary access control

1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 2

nterface elements are an important part of modular programming for UI. Which of the following
statements is true with regard to Interface elements?


Options are :

  • nterface elements implement application-specific functionality and are therefore rarely reusable across multiple applications.
  • Interface elements are always provided as proprietary packages of widgets from device vendors and third parties.
  • There is a wide variety of interface elements that can be developed once and used repeatedly in various user-interface designs. (Correct)
  • Interface elements are highly standardized and, once developed for one device, they are sufficiently portable to be reused on other devices without modification.

Answer : There is a wide variety of interface elements that can be developed once and used repeatedly in various user-interface designs.

There are various network topologies that can be used when deploying the Service-Oriented
Integration architecture. One deployment option includes three networks: production network,
services network and maintenance network. Which statement best describes the uses of these
three networks?


Options are :

  • The production network is used for all production network traffic. The services networks is used to deploy and configure SOA Services. The maintenance network is trusted network, providing administrator access to all hardware and software
  • The production network provides connectivity to applications and client access to the Mediation Layer- The services networks is used to deploy and configure SOA Services. The maintenance network is used by the operations team to manage the infrastructure
  • The production network provides connectivity to applications and client access to the Mediation Layer. The services network provides connectivity between the Mediation Layer and the SOA Services. The maintenance network is used by the operations team to manage the infrastructure. (Correct)
  • The production network is used for all production network traffic. The services network provides connectivity between the Mediation Layer and the SOA Services. The maintenance network is by the operations team to manage the infrastructure
  • The production networkisused for all production network traffic. The services networks is used to deploy and configure SOA Services. The maintenance network is used by the operations team to manage the infrastructure

Answer : The production network provides connectivity to applications and client access to the Mediation Layer. The services network provides connectivity between the Mediation Layer and the SOA Services. The maintenance network is used by the operations team to manage the infrastructure.

Which of the following is not an objective or function of the WS-Trust standard? 


Options are :

  • to exchange tokens in order to overcome differencesin supported technology between service consumers and service providers
  • to enable applications to construct trusted SOAP message exchanges (Correct)
  • to synchronize Identities across security domains
  • to exchange tokensin order to mapidentities supplied by service consumers with identities supported by service providers

Answer : to enable applications to construct trusted SOAP message exchanges

1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 3

A longer term goal of Service-Oriented Integration (SOI) is to enable composite applications that
are assembled from SOA Services. Which statement best describes the relationship between
composite application assembly and SOA Service engineering?


Options are :

  • All SOA Service engineering must be completed prior to any composite application assembly.
  • SOA Service engineering creates SOA Services following sound engineering principles, while composite application assembly uses SOA Services based on WSPL interfaces.
  • Composite application assembly and S O A Service engineering are separate, decoupled efforts without any meaningful Interaction.
  • Composite application assembly uses service contracts created by SOA Service engineering and generates requirements that are Inputs to SOA Service engineering (Correct)

Answer : Composite application assembly uses service contracts created by SOA Service engineering and generates requirements that are Inputs to SOA Service engineering

Which statement best describes the relationship between Oracle Reference Architecture (ORA)
and the Oracle products?


Options are :

  • ORA describes an architecture thatis exclusively based on Oracle products.
  • ORA describes the architecture built in to the Oracle products.
  • ORA describes a product-agnostic architecture and then maps the Oracle products onto the architecture. (Correct)
  • ORA describes the architecture underlying the Oracle Fusion Applications.

Answer : ORA describes a product-agnostic architecture and then maps the Oracle products onto the architecture.

Which of the following statements are true?


Options are :

  • Oracle HTTP Server (OHS) provides the standard communication protocols (for example, HTTP) between the Client Tier and the Service Tier as well as the Message Security between the Client Tier and Service Tier
  • Oracle Meta Data Services (OMDS) stores customization, personalization, and other metadata in a repository
  • Oracle WebCenter (OWC) provides the Resource Tier of the Oracle Reference Architecture User Interaction. (Correct)
  • (OWCS) provides components for reverse proxy, personalization, customization, social computing, and analytics.
  • Oracle WebLogic Suite (OWLS) is used in Oracle Reference Architecture User Interaction to enable Ontology languages for the Semantic Web

Answer : Oracle WebCenter (OWC) provides the Resource Tier of the Oracle Reference Architecture User Interaction.

1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 4

Conventional Management and Monitoring tools focus and produce metrics on which one of the following?


Options are :

  • metrics that focus on understanding the relationship and Interactions between component
  • metrics that capture the combined behavior of several components interacting with the shared component
  • metrics that measure individual resources (Correct)
  • holistically across heterogeneous systems

Answer : metrics that measure individual resources

Enterprise Architecture consists of Business Architecture, Application Architecture, Information,
Architecture and Technical Architecture (BAIT). Which statement best describes Oracle Reference
Architecture (ORA) in the context of BAIT?


Options are :

  • ORA is primarily focused on the Technical Architecture, with some content on the other three aspects- of BAIT.
  • ORA addresses all four (Business, Application, Information, and Technical) equally. (Correct)
  • ORA is primarily focused on the information Architecture, with some limited content on the other three aspects of BAIT.
  • ORA has content applicable to the Technical Architecture only
  • ORA has content applicable to Information Architecture only
  • ORA is primarily focused on the Business Architecture, with some content on the other three aspects of BAIT

Answer : ORA addresses all four (Business, Application, Information, and Technical) equally.

Where are the components of the client tier of the ORA UI logical architecture hosted? 


Options are :

  • on the transcoding engine
  • some components on the web server and some on the display device
  • on the display device (Correct)
  • on the web server

Answer : on the display device

1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 5

Identify the true statements in the following list


Options are :

  • The core components of the ORA UI Logical view are grouped into thedisplaytier and there sources tier.
  • In addition to the core components, the Logical view also includes security, communication protocols, and development tools.
  • The components of the ORA UI Logical view are model, view, and controller.
  • The core components of the ORA UI Logical view are grouped into the client tier and the server tier. (Correct)

Answer : The core components of the ORA UI Logical view are grouped into the client tier and the server tier.

Which are the major categories of ORA Engineering capabilities? 


Options are :

  • Service Engineering
  • Event Processing
  • Asset Management
  • Integrated Development (Correct)

Answer : Integrated Development

Which of the following statements about asset-centric engineering is true?


Options are :

  • Asset-centric engineering promotes an integrated asset management approach in which assets are shared across the enterprise
  • Asset-centric engineering uses multiple enterprise repositories to store and maintain the assets
  • Project assets are maintained at each individual project level in an asset-centric engineering
  • Asset-centric engineering requires that everything related to the assets,including metadata and payload, should be stored in the same repository. (Correct)

Answer : Asset-centric engineering requires that everything related to the assets,including metadata and payload, should be stored in the same repository.

1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 6

The three common goals of Information security are known as the CIA triad. CIA stands for:


Options are :

  • Confidentiality, Integrity and Access Control
  • Confidentiality, Integrity and Availability (Correct)
  • Confidentiality,Integrity and Authorization
  • Confidentiality, Integrity and Authentication
  • Confidentiality, Integrity and Auditing

Answer : Confidentiality, Integrity and Availability

Conceptually, the ORA model of a "modern UI" defines which three layers from the following list?


Options are :

  • Unified User Interface layer provides the control and visual elements that define the interaction that the user has with the system (Correct)
  • Integration layer provides connectors to simplify and standardize Interaction with back-end - terns.
  • Device Management layer provides transformation and transcoding to support a wide variety of devices.
  • Access and Incorporation layer provides the capability to Incorporate data and functionality from any number of back-end systems into the user interface.
  • User Interface Services layer provides reusable functions specialized to the needs of the end
  • Browser Mediation layer adapts output to conform to the standards and capabilities of each browser type.

Answer : Unified User Interface layer provides the control and visual elements that define the interaction that the user has with the system

Which of the following options best describes the concept of data-driven testing? 


Options are :

  • Data-driven testing uses a single predefined data set to perform repeated testing.
  • Data-driven testing is a strategy used to perform load testing.
  • Data-driven testing uses database triggers to initiate and run test cases.
  • Data-driven testing is used to perform functional tests by iterating through data sets in a databank. (Correct)

Answer : Data-driven testing is used to perform functional tests by iterating through data sets in a databank.

1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 1

Which of the following are the implications of the architecture principle, "Asset-centric approach
must be applied to engineering processes"?


Options are :

  • Solutions developed must beintegrated and tested early and often.
  • The development Infrastructure must support asset-centric engineering
  • Existing assets must be reused to fulfill whole or part functionality when available
  • Assets must be associated with meaningful metadata that can be used to discover and interpret the assets. (Correct)

Answer : Assets must be associated with meaningful metadata that can be used to discover and interpret the assets.

The Mediation Layer in the Logical View of the Service-Oriented Integration architecture provides
several capabilities. Which of the following are capabilities provided by the Mediation Layer?


Options are :

  • routing - sending the client request to the appropriate provider (s) based on some criteria (Correct)
  • protocol mediation - converting a client request from one protocol to a different protocol used by provider
  • message transformation - converting the request message format to a different message form, appropriate for the provider
  • choreography - defining the messages that flow back and forth between systems that are participating in a business process
  • enrichment - adding data elements to a data entity to give the entity increased Information

Answer : routing - sending the client request to the appropriate provider (s) based on some criteria

Your company has decided to create an Enterprise Architecture following. The Open Group
Architecture Framework (TOGAF). Which option best describes how the IT Strategies from Oracle (ITSO) library of material relates to this TOGAF-based Initiative?


Options are :

  • The ITSO material can be used as reference material within the TOGAF approach.
  • D. The ITSO material will need to be adapted to the TO GAF approach.
  • C. The TO GAF approach will need to be modified (customized) to incorporate the ITSO material.
  • ITSO has minimal applicability because TO GAF is a complete architecture framework (Correct)
  • E. TOGAF and ITSO are mutually exclusive. One or the other must be chosen as the basis for the company's Enterprise Architecture.

Answer : ITSO has minimal applicability because TO GAF is a complete architecture framework

1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 2

Which of the following statements are true about an end-to-end security strategy? 


Options are :

  • End-to-end security strives to protect data at rest, even in temporary queues.
  • When end-to-end security is enabled. Point-to-point transport-level encryption should be disabledin order to avoid cryptography conflicts between layers.
  • End-to-end security often involves some form of message-level protection. (Correct)
  • End to-end security is highly beneficial for distributed computing environments where many
  • End-to-end security and point-to-point security are virtually identical strategies proposed by different security vendors.

Answer : End-to-end security often involves some form of message-level protection.

Which three primary components form IT Strategies from Oracle (ITSO)?


Options are :

  • Oracle Reference Architecture
  • Oracle Unified Method
  • Maximum Availability Architecture
  • Enterprise Solution Designs (Correct)
  • Enterprise Technology Strategies
  • Oracle Enterprise Architecture Framework

Answer : Enterprise Solution Designs

Which of the following are strategies for alert management with Oracle Enterprise Manager?


Options are :

  • automating fix for common alerts (Correct)
  • removing unwanted alerts
  • controlling the volume of alerts
  • centralized filtering of alerts

Answer : automating fix for common alerts

1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 3

Service-Oriented Integration is based on creating a catalogue of SOA Services that expose
existing capabilities from back-end systems. Which statement best describes how an SOA Service
relates to the existing back-end systems?


Options are :

  • An SOA Service should expose the low-level interface of the back-end system to ensure that all back-end system capabilities are fully exposed
  • Each SOA Service exposes the functionality from only a single back-end system to ensure the decoupling of SOA Services
  • All access to a back end system should be through a single SOA Service to ensure the backend system will net become overloaded by service requests.
  • An SOA Service should expose higher-level business capabilities by encapsulating the lower level Interfaces of the back-end systems. (Correct)
  • Each SOA Service should expose only one isolated capability of the back-end systems to ensure isolation between SOA Service calls in composite applications
  • An SOA Service should connect to at least two back-end systems; otherwise the SOA Service is just duplicating the existing interface to the back-end system

Answer : An SOA Service should expose higher-level business capabilities by encapsulating the lower level Interfaces of the back-end systems.

You need to redesign your application to improve performance. The potential solution requires the
data to be kept in memory for faster access. The in-memory data requires full support for SQL with
BI queries and there is no need to scale out further. Which Oracle product would you choose to
implement your solution?


Options are :

  • Oracle Times Ten (Correct)
  • Oracle TUXEDO
  • Oracle Coherence
  • Oracle VM

Answer : Oracle Times Ten

Bottom-up service Identification analyzes existing systems to Identify SOA Services. Top-down
service identification analyzes business processes to identify SOA services.
Which statement best describes the relationship between top down and bottom-up service identification in Service-Oriented Integration?


Options are :

  • Only a top-down approach should be used because the goal of SOI is composite application assembly.
  • A bottom-up approach should be used to identify which SOA Services are built; then a topdown approach should be used to determine which SOA Services are used by each composite application.
  • Only a bottom up approach shouldbe used because the goal of SOIis to provide SOA Services exposing existing systems.
  • A top-down approach should be used to determine the needed SOA Services; then a bottom-up approach should be used to determine how existing source systems can meet the requirements top-down approach should be used by business, and a bottom-up approach should be used by IT.Theoverlap between the SOA Services Identified by the two methods are the ones that should (Correct)

Answer : A top-down approach should be used to determine the needed SOA Services; then a bottom-up approach should be used to determine how existing source systems can meet the requirements top-down approach should be used by business, and a bottom-up approach should be used by IT.Theoverlap between the SOA Services Identified by the two methods are the ones that should

1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 4

Service Oriented Integration (SOI) exposes capabilities from existing source systems. Which
statement best describes the Impact SOI has on existing source systems?


Options are :

  • No modifications to existing source systems are allowed because SOA Services expose all the necessary capabilities from the source syst
  • Modifications to existing source systems should be avoided, but may be necessary to support SOA Service creation. (Correct)
  • To support SOA Service connectivity, modifica
  • Because SOI exposes only existing capabilities, any new required functionality will be implemented by modifying the existing source systems.

Answer : Modifications to existing source systems should be avoided, but may be necessary to support SOA Service creation.

BPM and SOA are frequently combined to provide greater business value than either technology
provides independently. Which statements are true with regard to combining the BPM Technology
Perspective and SOA Technology Perspective?


Options are :

  • A Business Process may invoke an SOA Service, but an SOA Service cannot invoke a Business Process.
  • A Business Process may be exposed as a SOA Service
  • A Business Process may invoke a SOA Services to perform specific tasks within the process flow. (Correct)
  • Every business Process is exposed as a SOA Service.
  • When combining SOA and BPM, all the tasks within a Business Process are accomplished via Services

Answer : A Business Process may invoke a SOA Services to perform specific tasks within the process flow.

Which four components of the following list should be found in the client tier of the Logical view of
the Oracle Reference Architecture User Interaction?


Options are :

  • Collaboration
  • Controller
  • Communication services
  • Syndication
  • Rendering
  • State management (Correct)
  • Personalization
  • Customization

Answer : State management

1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 5

What shortcomings of the Version Control Systems drive the need for a Metadata Repository?


Options are :

  • Version Control Systems do not allow the asset versions to be rolled back to a previousstate
  • Version Control Systems don't provide the level of consumer tracking and reporting necessary to support software reuse
  • Version Control Systems are not easily searchable
  • Version Control Systems lack robust metadata that allows developers to determine relevance (Correct)

Answer : Version Control Systems lack robust metadata that allows developers to determine relevance

Which of the following interactions does not occur as part of a web-based single sign-on scenario?


Options are :

  • A gateway, deployed In the Web Server, intercepts requests destined for protected resource
  • A cookie is returned, which is used to permit access to other protected resources in that domain
  • Authorization checks are optionally performed before the user is permitted access to the application.
  • The user is prompted for login credentials when a protected resource is accessed and the user
  • Credentials are passed to the application for validation. (Correct)

Answer : Credentials are passed to the application for validation.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions