1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 3

Which statements are correct for service versioning within Service-Oriented Integration? 


Options are :

  • At most two versions of an SOA Service are allowed in production, one current and one thatís deprecated.
  • Service consumers should be allowed to migrate to new versions of SOA Services over time as part of regular maintenance
  • Only one production version of each SOA Service should be allowed. Multiple versions cause service sprawl
  • The architecture must support multiple, concurrent production versions of SOA Services
  • Service consumers should be automatically migrated to new versions of SOA Services by using the mediation layer to perform any necessary translations or transformations.

Answer : Service consumers should be allowed to migrate to new versions of SOA Services over time as part of regular maintenance

Which of the following does Policy Management Compliance refer to? 


Options are :

  • a management approach to direct and control the entire organization by using a combination of management information and hierarchical management control structures
  • a set of processes through which management identifies, analyzes and, where necessary, responds appropriately to risks
  • the demonstration and enforcement of regulatory standards,industry standards, internal best practices
  • a desired behavior, andis associated with one or more Infrastructure components

Answer : the demonstration and enforcement of regulatory standards,industry standards, internal best practices

What are the two primary approaches of visualization? 


Options are :

  • Server Visualization - creating multiple logical virtual machines on top of a single hardware platform
  • Server Sprawl - leads to a disproportionate amount of physical server machines running at very low rates of usage
  • Server Consolidation - abstracting the complexities of the underlying pool of servers by creating aggregated logical machines
  • Server Management - managing the servers by using a single-point management interface

Answer : Server Management - managing the servers by using a single-point management interface

1Z0-518 Oracle EBS R12 Receivables Essentials Practice Exam Set 1

How is Oracle Database Firewall (ODF) used to protect applications from attacks such as SQLInjection?


Options are :

  • ODF is an option for the Oracle Database. A DBA configures this option to inspect database commands and compare them with a set of known attacks. An ODF agent periodically downloads the latest signatures in order to keep up with the latest known types of attacks.
  • ODF is an agent based secure connection component that is installed on the database and on the clients. It creates a VPN-like connection between the two that greatly reduces the likelihood of man-in-the-middle and SQL-injection attacks. An administrator installs ODF and configures it for a specific environment
  • ODF is a feature of Oracle Advanced Security. A database security administrator configures each database realm with a set of acceptable ports and protocols from which database clients can connect. Valid connections are continuously monitored for suspicious activity.
  • ODF is a stand-alone product that is installed in between the client and database. It monitors and/or blocks SQL statements, comparing them against a set of known good or known bad statements.

Answer : ODF is a stand-alone product that is installed in between the client and database. It monitors and/or blocks SQL statements, comparing them against a set of known good or known bad statements.

Which one of the following security strategies protects data in motion but does not address data at
rest or in memory?


Options are :

  • point to point security
  • per (motor security
  • end to end security
  • defense In depth
  • cloud security

Answer : point to point security

Which three primary types of materials form an Enterprise Technology Strategy?


Options are :

  • Business Processes
  • Practitioner Guides
  • ORA Technology Perspective
  • ORA Industry Perspective
  • Data Entities
  • Maturity Model

Answer : Practitioner Guides

Oracle 1Z0-516 EBS R12 General Essential Practice Exam Set 8

Credential mapping is done in order to create the proper credential for a user in order to issue a
request to another system. In a scenario where one Oracle WebLogic Server makes a Web
Service request to another Oracle WebLogic Server, where might credential mapping be
performed?


Options are :

  • . In the WLS platform (OPSS / OWSM agent) making the Web Service request
  • In the service bus, if one is being used
  • In the identity management server
  • In the credential store
  • In the WLS platform (OPSS / OWSM agent) responding to the request
  • . In a Security Token Service, if WS-Trust is being used

Answer : In the WLS platform (OPSS / OWSM agent) responding to the request

Which of the following statements are true concerning, data formats used In Service-Oriented
Integration (SOI)? 


Options are :

  • SOA Services used in SOI should use application-specific data formats to ensure accurate transmission of data entities from the source systems.
  • Binary data formats should not be used because they are costly and difficult to maintain.
  • Data formats should be based on logical representations of business-level entities to facilitate composite application assembly.
  • Application-specific data formats should be translated to and from normalized data formats.
  • XML data formats should not be used because they are too verbose and result in poor performance.
  • Data formats should use third normal form because this is the most efficient format for transmitting data.
  • A single, canonical data model must be created to successfully build an enterprise-wide SOI

Answer : XML data formats should not be used because they are too verbose and result in poor performance.

Which of the following best describes the role of the Managed Target Tier within the Logical view
of the Management and Monitoring architecture?


Options are :

  • . provides access to management content and operations and enables end users to access the appropriate business solution
  • provides Management Repository and Management Engine capabilities
  • contains the named Infrastructure components that are required to be managed and monitored
  • contains configuration details, historical metric data and alert Information, availability Information, and product and patch inventory Information

Answer : contains the named Infrastructure components that are required to be managed and monitored

1Z0-519 Oracle E-Business Suite R12.1 Inventory Essentials Set 2

What capabilities are provided by Oracle Enterprise Repository (OER)?


Options are :

  • O-R Mapping
  • Asset Prescription
  • Asset Versioning
  • Dependency Analysis

Answer : Dependency Analysis

How do you enable risk profiling on the Authentication Service? 


Options are :

  • Risk profiling is a feature of Oracle Adaptive Access Manager (OAAM), OAAM works in conjunction with OAM to provide value-add authentication features. OAAM will assess anomalies based on configurable rules, behavior, and risk analysis and will challenge users when risks ore detected
  • Risk profiling is a feature of Oracle Virtual Directory (OVD). It will assess risk based on login attempts, login devices, login locations, and so on, and take action based on configurable rules. Possible actions include denying access, terminating sessions, and raising alerts. Sample rules are provided out of the box, and additional rules can be added via the IVD administrative console.
  • Risk profiling is a feature of Oracle Identity Manager (OIM). It can be performed on any collection of users, groups, and/or roles. Risk profiling is an available option for OIM 11g. An administrator must install the license and configure the set of identities to profile.
  • Risk profiling is a standard feature of Oracle Access Manager (OAM). It is enabled by default, but configured to only profile administrative Identities. The OAM administrator can configure additional identities individually, or by group, or enable profiling on all users.
  • Risk profiling is a feature of Oracle Advanced Security. This comprehensive suite provides value-odd authentication and authorization capabilities including multi-factor authentication and rule-based authorization. OAS is a separately installed product that integrates with OAM, OIM, and Oracle Entitlements Server (OES).

Answer : Risk profiling is a feature of Oracle Adaptive Access Manager (OAAM), OAAM works in conjunction with OAM to provide value-add authentication features. OAAM will assess anomalies based on configurable rules, behavior, and risk analysis and will challenge users when risks ore detected

Which of the following statements are true about point to point security? 


Options are :

  • SSL/TLS is used sparingly because it is difficult to set up
  • t can be combined with other forms of security such as perimeter security and defensein depth
  • It is often implemented using transport security protocols such as SSL/TLS.
  • It is designed to transport sensitive data over unprotected networks.
  • After data reaches an endpoint, it offers no further protection

Answer : It is designed to transport sensitive data over unprotected networks.

1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 2

What does access to Consolidated Information in Complex Distributed Environments require? 


Options are :

  • architects and engineers to reverse engineer applications to determine dependencies across components
  • siloedIT management and monitoring tools such as event managers and network managers
  • Access to information concerning dynamicinterdependences acrossinfrastructurecomments
  • a strong bottom-up approach to IT management to focus on the status of individual low-level Infrastructure components
  • Following for diagnosing and correlating problems in complex, distributed environments.

Answer : Access to information concerning dynamicinterdependences acrossinfrastructurecomments

Which principle should be applied when considering display devices? 


Options are :

  • The architecture must provide distinct tooling for the unique development of every available device.
  • . Only display devices that support a full-featured user interaction are allowed with this architecture.
  • The architecture must support translation of standard browser code to all possible variations of display devices, allowing the developer to focus on functionality for the end user.
  • The architecture must provide for the development of user Interfaces for a variety of display devices.

Answer : The architecture must provide for the development of user Interfaces for a variety of display devices.

ORA defines the concept of Data Grid. Which of the following is the most accurate definition of Data Grid? 


Options are :

  • . A Data Grid is a tool used to perform ETL (Extract-Transform-Load).
  • A Data Grid is used for data mirroring and data replication
  • A Data Grid is a cluster of databases providing scalability and high availability
  • B. A Data Grid is a system composed of multiple servers that work together to manage Information and related operations such as computations in a distributed environment

Answer : B. A Data Grid is a system composed of multiple servers that work together to manage Information and related operations such as computations in a distributed environment

1Z0-516 Oracle EBS R12 General Ledger Essentials Exam Set 7

Which of the following statements best describes the ideal role of an application owner with
respect to defining application security? 


Options are :

  • The application owner, whenever possible, should elect to deploy applications into a public cloud computing environment. Doing so effectivelydelegatesresponsibility and accountability of concerns to another company. The owner doesn't need to be concerned with security as long as the cloud provider has been certified.
  • The application owner should recommend adherence to common established practices for assessments, classifications, architecture, and policies that have been defined, and are actively maintained, by security experts across the organization. Deviations may be necessary, butapplication owners should strive to be consistent with best practices that have been adopted by the organization
  • A. The application owner must become knowledgeable about security risks, threats, classifications, and policies in order to define security requirements for his or her applications. The more on owner learns about security, the more secure his or her applications will become.
  • The application owner should hire a security expert to define security requirements for his or herapplications, based on current Industry best practices. Actively implementing the latest trends will best ensure a secure application environment

Answer : The application owner should recommend adherence to common established practices for assessments, classifications, architecture, and policies that have been defined, and are actively maintained, by security experts across the organization. Deviations may be necessary, butapplication owners should strive to be consistent with best practices that have been adopted by the organization

The Oracle Reference Architecture (ORA) includes the central layers as well as Technology
Perspectives and Industry perspectives. Which statements best describe how these are related
within ORA?


Options are :

  • The Industry Perspectives are reference architectures for specificindustries, for example, Telco,Pharma.
  • ORA is a collection of reference architectures, some based on technology (Technology Perspectives), and some based on industry verticals (Industry Perspectives).
  • None of the above
  • The Industry Perspectives extend the central layers of ORA toincludeindustry-specific capabilities, components, and so on.
  • The Technology Perspectives provide a view of ORA focused on specific technologies, product and standards.
  • The Technology Perspectives are reference architectures incorporating specific technologies, products, and standards.

Answer : The Industry Perspectives extend the central layers of ORA toincludeindustry-specific capabilities, components, and so on.

Which of the following are capabilities provided by the Monitoring Engine within the Logical view of
the Management and Monitoring architecture?


Options are :

  • Service Monitor
  • Resource Monitor
  • Collection Monitor
  • System Monitor

Answer : System Monitor

1Z0-982 Oracle Enterprise Planning and Budgeting Cloud Test Set 1

In order to support rapid development, which one of the following principles must be applied?


Options are :

  • The architecture must provide a Rapid Application Development framework for user interface development.
  • None
  • The architecture must provide access to the full implementation details of the interface in order permit maximum flexibility in the development process
  • Usability best practices are incorporated into proven user-interface techniques.
  • The architecture must provide guided development of the user interface without needlessly exposing the developer to implementation details

Answer : The architecture must provide guided development of the user interface without needlessly exposing the developer to implementation details

Which statement best describes the role of the Data Movement Layer within the logical view of the
Service-Oriented Integration (SOI) architecture?


Options are :

  • All create, read, update, and delete operations on persistent data are performed via the Data Movement Layer.
  • The Data Movement Layer provides batch and bulk data operations for the architecture
  • The Data Movement Layer provides access to persistent data storage for the architecture
  • All write operations on persistent data are performed via the Data Movement Layer.
  • All read operations on persistent data are performed via the Data Movement Layer

Answer : The Data Movement Layer provides batch and bulk data operations for the architecture

What one the three primary concerns that developers following this architecture should strive to
conform to?


Options are :

  • Localization
  • Federation
  • The Model View-Controller (MVC) pattern
  • Modular development
  • Personalization
  • Internationalization

Answer : The Model View-Controller (MVC) pattern

Oracle 12c SQL Certified Associate 1Z0-071 Real Exam 2019 Set 3

A modular approach has been taken to document the Oracle Reference Architecture (ORA).
Select the statements that are true for this modular approach? 


Options are :

  • ORA is a single-reference architecture but is documented via different views of the architectssome focused on specific technologies (Technology Perspectives), and some on industry verticals (Industry Perspectives).
  • The number of Technology Perspectives and Industry Perspectives will increase over time
  • The technology Perspectives are complete, but the Industry Perspectives will increase over time as more verticals are Included.
  • ORA is a collection of reference architectures, some based on specific technologies (Technology Perspectives), and some on industry verticals (Industry Perspectives).
  • The ORA library has a document dedicated to each Oracle product suite

Answer : The ORA library has a document dedicated to each Oracle product suite

Which of the following statements are true about the XACML standard and architecture? 


Options are :

  • The Policy Information Point (PIP) provides information such as user attributes or environmental data that may be used to make access control decisions.
  • The Policy Enforcement Point (PEP) is where permit / deny access decisions are made.
  • AML assertions can be used to carry XACML authorization decisions
  • XACML defines an XML schema used to represent rules for access control
  • XACML defines a TCP protocol used to communicate messages between Policy Enforcement Points

Answer : The Policy Enforcement Point (PEP) is where permit / deny access decisions are made.

What does Lifecycle Management Provisioning refer to? 


Options are :

  • A comprehensive management and monitoring solution that helps to effectively manage services from an overview level to theindividual component
  • Demonstration and enforcement of regulatory standards. Industry standards, and internal best practices
  • The process of preparing and equipping a network to allow it to provide (new) services to its users
  • Automation of the Installation and configuration of operating systems, infrastructure software, applications, services, virtual servers, and hosts across different platforms, environments, and locations

Answer : Automation of the Installation and configuration of operating systems, infrastructure software, applications, services, virtual servers, and hosts across different platforms, environments, and locations

1Z0-516 Oracle EBS R12 General Ledger Essentials Exam Set 8

Which of the following statements are true about asymmetric key encryption?


Options are :

  • It uses one key that is shared by both parties in the data exchange.
  • It can be used in conjunction with symmetric key encryption in order to securely share a common encryption key
  • It can be used to produce and verify digital signatures.
  • It uses a pair of keys, one public and one private, that are unique and mathematically linked.
  • It is faster than symmetric key encryption

Answer : It can be used in conjunction with symmetric key encryption in order to securely share a common encryption key

A customer has two separate lines of business and each has its own unique resources that
are controlled independently. The customer wants to provide a single user interface at the
enterprise level that, at least from the user's perspective, unifies the separate lines of business
and presents a single consistent view. What is the most suitable architectural arrangement for
such a federated deployment?


Options are :

  • The enterprise implements full client stack and part of the service stack while each LoB deploys the remaining part of the service tierin order to expose uniform interface elements.
  • The enterprise implements full client and service stacks while each LoB deploys a partial service. sufficient to expose uniform interface elements
  • The client tier assimilates the data from the service stack of each line of business.
  • The client tier assimilates the data from the resource stack of each line of business

Answer : The enterprise implements full client stack and part of the service stack while each LoB deploys the remaining part of the service tierin order to expose uniform interface elements.

What is the main benefit of Utility Computing? 


Options are :

  • better security
  • high availability
  • better economics
  • scalability

Answer : better economics

1Z0-516 Oracle EBS R12 General Ledger Essentials Exam Set 9

What does the Java EE Management Specification (JSR 77) provide?


Options are :

  • a structured approach to monitor diverse and heterogeneous shared systems
  • an internet-standard protocol for managing devices on IP networks
  • a standard model for managing a J2EE Platform; it describes a standard data model for monitoring and managing the runtime state of any Java EE Web application server and Its resource
  • a general mechanism for monitoring and managing Java resources

Answer : a standard model for managing a J2EE Platform; it describes a standard data model for monitoring and managing the runtime state of any Java EE Web application server and Its resource

Web Services are a natural fit for building distributed computing platforms. Which of the following
qualities of Web Services make them suitable for distributed computing?


Options are :

  • Web Services are deployed to the web tier of the distributed architecture.
  • UDDI allows services deployed in a distributed infrastructure to be discovered and consumed.
  • WSDL can be used to define components that can be distributed in multiple servers
  • WSDL,SOAPand XML promote language and platform Independence and interoperability

Answer : WSDL,SOAPand XML promote language and platform Independence and interoperability

Which statement best describes the relationship between the Oracle Reference Architecture
(ORA) and Service-Oriented Architecture (SOA)?


Options are :

  • ORA embraces service orientation as a core tenet to consistently and uniformly deal with the complexity of a heterogeneous computing environment common to enterprise IT
  • SOAis an architectural approach that isproduct- and vendor-independent,ORA is essentially a SOA implemented using Oracle products and technology
  • ORA embraces SOA as a core tenet; therefore, adopting ORA means that SOAis adopted as well.
  • ORA is a reference architecture based on architecture principles and best practices. SOA is a marketing term that has become widely and ambiguously used within the industry.
  • ORAincludes many different technology perspectives (for example, BPM, BI) Including SOA. The SOA perspective provides a view of ORA focused on the products and technology applicable to SOA.

Answer : ORA embraces service orientation as a core tenet to consistently and uniformly deal with the complexity of a heterogeneous computing environment common to enterprise IT

1Z0-207 Oracle Comm Billing & Revenue Mgmt Pricing Exam Set 1

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions