1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 5

Which of the following are architecture principles that pertain to the management and monitoring
framework?


Options are :

  • standards-based integration
  • focus on individual resources
  • service aware
  • manual governance processes
  • discoverable

Answer : service aware

Which statement best describes synchronous versus asynchronous communications in a Service
Oriented Integration (SOI) architecture?


Options are :

  • The SOI architecture should use only synchronous communication because SOA Services are inherently synchronous. If a back end system supports only asynchronous communications, the "bridging synchronous and asynchronous communications" integration pattern can be used to convert from asynchronous communication to synchronous communication.
  • The communication within the SOI architecture should be asynchronous and should follow the publish-and-subscribe integration pattern. The publish-and-subscribe pattern is the most flexible and provides the greatest decoupling and message throughput.
  • The SOI architecture should use only asynchronous communication because asynchronous communication provides greater decoupling in the architecture. If a back-end system supports only synchronous communications, the "bridging synchronous and asynchronous communications" integration pattern can be used to convert from synchronous communication to asynchronous communication.
  • Both synchronous and asynchronous communication should be supported by SOI. Synchronous communication provides an easier programming paradigm. Asynchronous communication provides greater decoupling between the requester and the responder.
  • The SOA Services in the SOI architecture should use only synchronous communication because SOA Services are inherently synchronous. All communication with back-end system should be asynchronous to decouple the SOA Services from the back-end systems

Answer : Both synchronous and asynchronous communication should be supported by SOI. Synchronous communication provides an easier programming paradigm. Asynchronous communication provides greater decoupling between the requester and the responder.

1Z0-520 Oracle EBS R12.1 Purchasing Essentials Practice Test Set 7

When mapping Oracle Products onto the Logical view, what is the best approach?


Options are :

  • Use Oracle Enterprise Manager to provide core capabilities required by the three layers for Oracle stack, and use management packs, connectors, and plug ins for non-Oracle stack
  • Use a third-party to provide all capabilities required by the three layersin the Management and Monitoring architecture.
  • Utilize management packs, connectors, and plug-ins to create a customized product mapping for the Logical view.
  • Use an Oracle Enterprise Manager product to provide all the capabilities required by the three layers in the Management and Monitoring architecture.

Answer : Use an Oracle Enterprise Manager product to provide all the capabilities required by the three layers in the Management and Monitoring architecture.

Which statement best describes the reason why the Oracle Reference Architecture defines both a
Service Contract and a Usage Agreement?


Options are :

  • The Usage Agreement defines how to use the SOA Service. The Service Contract defines the functionality provided by the SOA Service.
  • The Usage Agreement is a reusable portion of the Service Contract that can be shared by other Service Contracts.
  • The Service Contract is the reusable portion of the Usage Agreement that can be shared by other Usage Agreements.
  • The Service Contract defines the technical specifics of the SOA Service. The Usage Agreement defines the business aspects of the SOA Service.
  • Defining both Usage Agreement and Service Contract provides a decoupling between service consumers and service providers.

Answer : Defining both Usage Agreement and Service Contract provides a decoupling between service consumers and service providers.

Which of the following statements describes the relationship between Cloud computing and Grid computing? 


Options are :

  • Grid computing is an evolution of the Cloud computing architecture
  • Grid architectures are likely to be used in building Clouds
  • Grid computing and Cloud computing are totally unrelated concepts
  • Grid computing is the same as Cloud computing

Answer : Grid architectures are likely to be used in building Clouds

1Z0-969 Oracle Payroll Cloud 2017 Implementation Essentials Set 2

Which statement best describes the relationship between the Logical View and the Development
view of the Service-Oriented Integration architecture?


Options are :

  • The Logical View defines the layers of the architecture and the capabilities within each layer. The Development View specifies the developer tools that provide the capabilities for each layer
  • The Logical View specifies the developer tools required by each layer in the architecture. The Development View describes the developer impact of the tools specified.
  • The Logical View defines the rationale for layers within the architecture. The Development View specifies the developer tools used for each layer
  • . The two architectural views are Independent and there is no relationship between them
  • The Logical View defines the layers of the architecture and the capabilities within each layer. The Development View describes how aspects of the architecture impact developers following the architecture

Answer : The Logical View defines the layers of the architecture and the capabilities within each layer. The Development View describes how aspects of the architecture impact developers following the architecture

Which of the following is not a characteristic of Cloud computing?


Options are :

  • elastic scaling
  • pay-for-use pricing
  • manual provisioning
  • multi-tenancy

Answer : manual provisioning

You are designing a mission-critical application that requires high performance. Your analysis
concludes that Oracle Exadata would enable you to meet the performance goals. What
characteristics of Oracle Exadata make it possible to provide such superior performance?


Options are :

  • he Oracle Exadata Storage Server returns a query result set rather than entire tables, eliminates network bottlenecks, and frees up database server resources
  • By pushing SQL processing to the Oracle Exadata Storage Server, all the disks can operate in parallel, reducing database server CPU consumption while consuming much less bandwidth to move data between storage and database servers.
  • Oracle Exadata uses direct data placement to ensure very low CPU overhead by directly moving data from the wire to database buffers with no extra data copies being made.
  • Oracle Exadata uses massively parallel architecture to speed up Oracle data warehouses by offloading data-intensive query processing from the databases.

Answer : Oracle Exadata uses massively parallel architecture to speed up Oracle data warehouses by offloading data-intensive query processing from the databases.

1Z1-574 Oracle IT Architecture Essentials Practice Exam Set 6

The principle of "Security as a Service" states that business solution; must be designed to
consume common security services, where possible, as opposed to implementing custom security
logic and replicating copies of security data. Which of the following statements is not an
Implication of this principle?


Options are :

  • Security services must use Web Service (SOAP) interfaces and XML payloads in order to promote Interoperability
  • Security enforcement, decisions, and management must be performed by dedicated, shared services and Infrastructure.
  • Security logic must be externalized as much as possible, i.e., developers must not hand-code security logic into business solutions.
  • Wherever possible, security services must be built upon open standards

Answer : Security logic must be externalized as much as possible, i.e., developers must not hand-code security logic into business solutions.

Conceptually, management and monitoring capabilities consist of which of the following? 


Options are :

  • consolidating administration tasks for a variety of infrastructure components
  • allowing enterprises to define, model, capture, and consolidate monitoringinformation into a single framework
  • skilled architects to perform root-cause analysis
  • homogeneous support for IT management environments

Answer : allowing enterprises to define, model, capture, and consolidate monitoringinformation into a single framework

The Oracle Reference Architecture (ORA) contains both horizontal and vertical architectural
layers. Which statements best describe the layers within ORA?


Options are :

  • Horizontal layers are stateful, whereas vertical layers are stateless
  • Vertical layers are used to depict capabilities applied across all the horizontal layers.
  • Horizontal layers are used to depict that upper layers build on the capabilities provided by lower layers
  • Vertical layers are used to depict enterprise-wide capabilities, whereas horizontal layers departmental capabilities.
  • Lavers only provide a means to partition the capabilities encompassed by ORA and have no significance.
  • Horizontal layers are used to signify that the lower layers can be accessed only via the upper layers.

Answer : Vertical layers are used to depict capabilities applied across all the horizontal layers.

Oracle 1Z0-207 Billing & Revenue Mgmt Pricing Practice Exam Set 5

Which of the following are types of policy considerations designed to affect the way privileges are
assigned to users?


Options are :

  • Principle of Alternating Privilege
  • Defensein Depth
  • Principle of Least Privilege
  • . Separation of Duties
  • Vacation, Job Rotation, and Transfer

Answer : Vacation, Job Rotation, and Transfer

What best describes the best practice deployment of Metadata Repository?


Options are :

  • Every project should deploy its own dedicated Metadata Repository to ensure that the project assets are properly organized.
  • The Source Code Management (SCM) server doubles as a Metadata Repository.
  • A sandbox Metadata Repository for training and testing purposes should not be deployed.
  • The Metadata Repository is deployed as a single enterprise-scoped cluster to promote a single view of the enterprise

Answer : Every project should deploy its own dedicated Metadata Repository to ensure that the project assets are properly organized.

Identify the true statements in the following list.


Options are :

  • Today's RIA standards are provided by the wide variety of industry-standards group including W3C, IEEE, TMF, ISO, and so on.
  • Today's RIA standards are provided primarily by W3C, IETF, JCP and OASIS.
  • ORA UI architecture is based on Apache struts
  • AJAX is the primary standard enabling today's Rich Internet Applications
  • The Internet was invented by AlGore
  • The origins of http and the World Wide Web are attributed to Tim Berners-Lee while he was working on a European physics project.
  • The Internet was invented in the US by the Advanced Research Projects Agency

Answer : The origins of http and the World Wide Web are attributed to Tim Berners-Lee while he was working on a European physics project.

OCA Oracle Database 11g Administrator Certified Associate Set 2

Which of the following combinations represent a true multi-factor authentication mechanism? 


Options are :

  • password and token
  • fingerprint and retina scan
  • password and PIN
  • password and retina scan
  • PIN and token
  • token and fingerprint

Answer : password and retina scan

Which one of the following statements best describes authentication as a service? 


Options are :

  • Authentication is a service offered by the enterprise security framework. Applications access it directly, bypassing local platform security. The authentication service provides a level of abstraction between applications and the various instances of infrastructure (LDAPs, databases) that can be used to verify credentials.
  • Authentication is a service offered by the local computing platform to the application it is hosting. The application uses this service to authenticate users with a local LDAP.
  • Authentication is not a valid example of a security service.
  • Authentication is a service offered by both the local computing platform and the enterprise security framework. The local platform can be configured to direct requests to local LDAPs or common enterprise services, depending on the operating environment (dev/test/production). Meanwhile, the enterprise security framework services can virtualize several shared credential stores into a single shared service

Answer : Authentication is a service offered by both the local computing platform and the enterprise security framework. The local platform can be configured to direct requests to local LDAPs or common enterprise services, depending on the operating environment (dev/test/production). Meanwhile, the enterprise security framework services can virtualize several shared credential stores into a single shared service

Choose the three statements from the following list that accurately reflect architectural principles of
Oracle Reference Architecture User Interaction.


Options are :

  • The architecture must support separating configuration and other types of metadata from the source code
  • The architecture must support end-user access to a wide variety of server-side functionality
  • The architecture must not attempt to replicate the capabilities of traditional client-server GUIs.
  • The architecture must support orchestration of business application functions
  • The architecture must provide the end user with the capability to switch quickly between applications.
  • The architecture must provide secure interaction between the end user and the server-side resources.

Answer : The architecture must provide secure interaction between the end user and the server-side resources.

1Z0-516 Oracle EBS R12 General Ledger Essentials Exam Set 4

The Service-Oriented Integration architecture makes a distinction between technical
orchestrations and business processes. Which statement best describes these two concepts?


Options are :

  • A business process that is implemented within SOIis called a technical orchestration.
  • Business processes are implemented using BPMN, whereas technical orchestrations are Implemented using BPEL.
  • Each business process is implemented by calling a sequence of SOA Services. This sequential calling of SOA Services Is what is known as a technical orchestration
  • A business processes is likely to change when the business changes, whereas a technical orchestration is likely to change when back-end systems change.
  • T
  • A technical orchestration is a low-level implementation detail and has no relationship to business processes

Answer : A business processes is likely to change when the business changes, whereas a technical orchestration is likely to change when back-end systems change.

Which statement best describes the relationship between the Service-Oriented Integ


Options are :

  • AIA is a product specific Implementation of the SOI architecture
  • AIA is an Oracle product that maps to some of the layers and capabilities defined by the SOI architecture.
  • AIA is a traditional Enterprise Application Integration (EAI) architecture; therefore AIA does not follow the SOI architecture.
  • AIAis an Oracle product and the SOI architecture is a product-agnostic architecture; therefore there is no relationship between the two.
  • AIA is one of many Oracle products that maps onto SOI architecture.

Answer : AIA is one of many Oracle products that maps onto SOI architecture.

A customer with an existing WebCenter portal wants to expand his client device list to include a
variety of mobile devices beyond basic browser support. What Oracle products are available to
enable this expansion?


Options are :

  • OWC, OHS, ADF Mobile, and Java ME
  • OWC, OHS, and ADF Mobile
  • OWCIC, ADF Mobile, and Java ME
  • OWCA, ADF Mobile, OPSS, and Java ME

Answer : OWC, OHS, ADF Mobile, and Java ME

Oracle 1Z0-207 Billing & Revenue Mgmt Pricing Practice Exam Set 3

There are a number of ways to classify applications in order to assess business risks and assign
appropriate security policies. Which of the following is not described as a primary means to
classify an application?


Options are :

  • by the applicability of existing laws and regulations pertaining to privacy, auditing, and access control
  • by business criticality, such as revenue-generating applications versus informational applications
  • by the information it handles, such as classified information, personal information, publicly availableinformation, and so on
  • by the user community it serves, such as HR, finance, all employees, general public, and so on
  • by technology and/or vendor, such as .NET versus Java, and so on

Answer : by technology and/or vendor, such as .NET versus Java, and so on

Service composition is the creating of a new SOA Service by aggregating existing SOA Services.
Which statements are correct concerning the use of service composition within the ServiceOriented
Integration architecture?


Options are :

  • The SOI architecture is a layered architecture; therefore service composition is not allowed.
  • Service composition is allowed, even encouraged, by the SOI architecture.
  • Service composition within the SOI architecture is allowed only when the aggregation is over SOA Services from lower layers in the architecture.
  • Service composition is allowed, but is discouraged because service composition leads to complex dependencies.
  • Service composition should be avoided because service aggregation is provided by the Mediation Layer.

Answer : Service composition within the SOI architecture is allowed only when the aggregation is over SOA Services from lower layers in the architecture.

Audit logging is a form of what type of access control mechanism?


Options are :

  • compensating control
  • recovery control
  • corrective control
  • detective control
  • deterrent control
  • preventive control

Answer : detective control

Oracle 1Z0-516 EBS R12 General Essential Practice Exam Set 17

Which of the following environments are typically clustered? 


Options are :

  • Development Environment
  • User Acceptance Testing (UAT) Environment
  • Staging Environment
  • Nonfunctional Testing Environment

Answer : User Acceptance Testing (UAT) Environment

Because each back-end system is running in a separate process, any integration architecture is
required to cross multiple process boundaries. A Service-Oriented Integration (SOI) architecture
also introduces SOA Services that run in their own process, thus adding more process boundaries
to be crossed. What approaches can be employed to reduce the performance impact of crossing
multiple process boundaries?


Options are :

  • There is nothing that can be done because process boundaries are just part of any integration architecture
  • The SOA Services can encapsulate multiple layers of theSOI architecture to reducenumber of service calls, which reduces the number of process boundaries being crossed.
  • Service composition should be used to reduce the number of SOA Services that are exposed to the clients
  • The SOA Services should use XML-based request-and-response messages because XML is a platform- (and hence process-) neutral format.
  • The SOA Services should expose larger-granularity operations to reduce the number of s-calls, which reduces the number of times process boundaries are crossed.

Answer : The SOA Services can encapsulate multiple layers of theSOI architecture to reducenumber of service calls, which reduces the number of process boundaries being crossed.

Which of the following are the three major tiers of the Logical view of the Oracle Management
Reference Architecture?


Options are :

  • Managed Services Tier
  • Managed Target Tier
  • Client Tier
  • Administrative Tier
  • Management Tier

Answer : Client Tier

Oracle 1Z0-516 EBS R12 General Essential Practice Exam Set 1

For a large heterogeneous environment with a large number of hosts requiring scalability and
efficiency, what is the best strategy for deployment of Oracle Enterprise Manager?


Options are :

  • Use multiple semi-autonomous agents collecting information and periodically relaying it to a central repository.
  • Use centralized alert filtering
  • Use a centralized control with persistent connections to all agents to pull data
  • Use multiple Instances of Oracle Enterprise Manager to maximize performance
  • None

Answer : Use multiple semi-autonomous agents collecting information and periodically relaying it to a central repository.

Which of the following statements are true about defense-in-depth strategy?


Options are :

  • It saves money by allowing organizations to remove costly perimeter security Infrastructure.
  • It is a strategy designed to win the battle by attrition. It consists of multiple security measures at various levels as opposed to a single barrier.
  • It includes security measures for the network, the operating system, the application, and data
  • It is a good strategy to protect an organization from insider threats
  • Due to network overhead issues, it should not be used in a distributed computing environment such as SOA or cloud computing.

Answer : It is a strategy designed to win the battle by attrition. It consists of multiple security measures at various levels as opposed to a single barrier.

How is state typically managed in the browser interface?


Options are :

  • State is not managed. All modern UIs are stateless.
  • generally through the use of cookies in the browser
  • The services tier manages state and the client tier is stateless.
  • in the caching layer

Answer : in the caching layer

Oracle 1Z0-516 EBS R12 General Essential Practice Exam Set 16

Oracle Entitlements Server (OES) provides fine grained authorization capabilities that, along with
Oracle Access Manager (OAM), comprise the XACML based Authorization Service. What factors
should be considered when choosing how to specify and deploy OES policy decision points
(PDPs)?


Options are :

  • . OES includes a security provider for Oracle WebLogic Server that will handle policy decisions locally
  • Oracle Advanced Security includes a universal stand-alone PDP that provides access for Java, NET, and SOAP clients
  • It is best to use a local PDP whenever possible to avoid network calls between the PEP and PDP. A remote PDP ran be used when a local PDP is not available for the client technology, or for other various exceptional cases.
  • If a policy enforcement point exists in the DMZ, then a remote PDP should be deployed behind the inner firewall.
  • If both OAM and OES are used, then OES should be configured to use the PDP embeddedin OAM

Answer : . OES includes a security provider for Oracle WebLogic Server that will handle policy decisions locally

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions