Ucertify offers free demo for 1Z0-574 exam. "Oracle IT Architecture Release 3 Essentials", also known as 1Z0-574 exam, is a Oracle Certification. This set of posts, Passing the Oracle 1Z0-574 exam, will help you answer those questions. The 1Z0-574 Questions & Answers covers all the knowledge points of the real exam. 100% real Oracle 1Z0-574 exams and revised by experts!
♥♥ 2017 NEW RECOMMEND ♥♥
Free VCE & PDF File for Oracle 1Z0-574 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Q91. Which of the following are examples of the management and visibility gap between the traditionally monitored IT Infrastructure resources and the Services?
A. On-going Shift to Move to an Agile Shared Service Computing Environment
B. On-going Shift to Manage IT from an End-User Experience Perspective
C. Loosening of Corporate Policies and Regulations
D. Increasing Number of Heterogeneous IT Infrastructure Components to Manage
E. Complex Distributed Environments Requiring Access to Consolidated Information
Explanation: Examples of the management and visibility gap are listed below:
* On-going Shift to Move to an Agile Shared Service Computing Environment
* On-going Shift to Manage IT from an End User Experience Perspective
* Increasing Need to Enforce Regulatory and Corporate Policies (not C)
* Increasing Number of Heterogeneous IT Infrastructure Components to Manage
* Complex Distributed Environments Require Access to Consolidated Information
Note: Many companies today are deploying enterprise technology strategies (ETS) such as Service-Oriented Architectures (SOA), Business Process Management (BPM), and Cloud Computing, which are designed to make functions, processes, information, and computing resources more available. While these ETSs offer additional benefits and sophistication, they have created a management and visibility gap between the traditionally monitored IT infrastructure resources and the services that contribute to the overall experience encountered by the end user.
Reference: Oracle Reference Architecture,Management and Monitoring, Release 3.0
Q92. Which statements best describe how architecture principles are used within the Oracle Reference Architecture (ORA)?
A. The architecture principles for Oracle products are identified whenever an Oracle product incorporated into the architecture.
B. ORA uses multiple architecturalviews where each view has its own architecture principles.
C. ORA documents describe the architectural principles upon which the architecture is based.
D. Architecture principles provide recommendations (based on industry best practices) that should be followed.
E. Architecture principles are rules that must be followedin order to comply with the documented architecture.
Explanation: The purpose of ORA is to provide a reference architecture for designing, building, and integrating solutions based on modern technology from Oracle and other vendors. The reference architecture offers architecture principles and guidance based on recommendations from Oracle product development architects and field experts. Information provided by ORA gives architects an understanding of how to design solutions for the Oracle environment and best leverage its capabilities.
Note:Oracle Reference Architecture (ORA) defines a detailed and consistent architecture for developing and integrating solutions based on Oracle technologies. The reference architecture offers architecture principles and guidance based on recommendations from technical experts across Oracle. It covers a broad spectrum of concerns pertaining to technology architecture, including middleware, database, hardware, processes, and services.
Reference: IT Strategies from Oracle, An Overview, Release 3.0
Q93. Which caching mode does every write to the cache cause a synchronous write to the back-end store?
A. Refresh-Ahead Cache
B. Write-Through Cache
C. Write-Behind Cache
D. Read-Through Cache
Explanation: In a write-through cache, every write to the cache causes a synchronous write to the backend store.
In this approach, the data is updated in the backend data store, then the primary cache, all within the scope of the transaction.
Then the backup cache is also updated to maintain consistency of data.
Reference: Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0
Q94. Which of the following token profiles is not included in the WS-Security standard as a standard type of identity token?
A. XACML token profile
B. SAML token profile
C. username token profile
D. Kerberos token profile
E. X.500 token profile
TheWS-Securityspecification allows a variety of signature formats, encryption algorithms and multiple trust domains, and is open to various security token models, such as:
* X.509 certificates (not E)
* Kerberos tickets (not D) *UserID/Password credential (not C)
* SAML Assertions (not B) *custom-defined tokens.
Note: WS-Security (Web Services Security, short WSS) is a flexible and feature-rich extension to SOAP to apply security to web services. It is a member of the WS-* family of web service specifications and was published by OASIS.
Q95. You need to redesign your application to improve performance. The potential solution requires the data to be kept in memory for faster access. The in-memory data requires full support for SQL with BI queries and there is no need to scale out further. Which Oracle product would you choose to implement your solution?
A. Oracle Coherence
B. Oracle TimesTen
C. Oracle TUXEDO
D. Oracle VM
Explanation: Oracle TimesTen In-Memory Database (TimesTen) is a full-featured, memory-optimized, relational database with persistence and recoverability. It provides applications with the instant responsiveness and very high throughput required by database-intensive applications. Deployed in the application tier, TimesTen operates on databases that fit entirely in physical memory (RAM). Applications access the TimesTen database using standard SQL interfaces. For customers with existing application data residing on the Oracle Database, TimesTen is deployed as an in-memory cache database with automatic data synchronization between TimesTen and the Oracle Database.
Q96. Oracle Entitlements Server (OES) provides fine grained authorization capabilities that, along with Oracle Access Manager (OAM), comprise the XACML based Authorization Service. What factors should be considered when choosing how to specify and deploy OES policy decision points (PDPs)?
A. If a policy enforcement point exists in the DMZ, then a remote PDP should be deployed behind the inner firewall.
B. If both OAM and OES are used, then OES should be configured to use the PDP embeddedin OAM.
C. OES includes a security provider for Oracle WebLogic Server that will handle policy decisions locally.
D. Oracle Advanced Security includes a universal stand-alone PDP that provides access for Java, NET, and SOAP clients.
E. It is best to use a local PDP whenever possible to avoid network calls between the PEP and PDP. A remote PDP ran be used when a local PDP is not available for the client technology, or for other various exceptional cases.
Explanation: A, E:Policy decision points (PDPs) for computingnodes located outside the secure environment. For example, web servers located in theDMZ might leverage a central PDP, deployed behind a firewall. Policy enforcement is still local to the web servers but decisions are made remotely.
C: OES integrates with OPSS (and other security platforms) to enable the use of local PEPs and
PDPs. OPSS is a standards-based Java framework of plug-in security services and APIs.
It provides the platform security for Oracle WebLogic Server.
Note: OES is a fine-grained authorization engine that simplifies the management of complex entitlement policies. The authorization engine includes both local and centralized PDPs. OES integrates with OPSS (and other security platforms) to enable the use of local PEPs and PDPs. Policy administration is centralized, providing a broad perspective of access privileges, yet delegated, enabling multiple stakeholders to maintain the policies that affect them.
Note 2: PDP - Policy Decision Point, where policy is evaluated and a decision is made.
PDPs may be distributed throughout the IT environment and physically co-located with PEPs to avoid network latency.
Note 3: PEP - Policy Enforcement Point, where permit/deny access decisions are enforced. This is generally included in SOA Service or application infrastructure, such as J2EE containers that manage security. It may also be represented as custom code within a SOA Service or application, providing fine grained entitlements evaluation.
Reference: Oracle Reference Architecture, Security , Release 3.1
Q97. Which of the following are capabilities required for the Integration subsystem of the Oracle Reference Architecture Management and Monitoring Framework?
A. Data Exchange
B. Extensibility Framework
C. Patch Monitoring
D. Alert and Notification Integration
Explanation: Key integration capabilities:
* Data Exchange
* Extensibility Framework
* Alert & Notification Integration
Note: While it is preferable to have a single management and monitoring solution it is unrealistic that a single management and monitoring framework can support every available infrastructure component now and in the future. Two-way integration capabilities that cater for message exchange, bulk data exchange and extending the framework are key in addressing the needs of the modern IT environment.
Q98. Select the two layers of ORA application infrastructure from the following list:
D. Computing Foundation
Explanation: The ORA Application infrastructure covers the following layers: *Platform * *Virtualization **Containers:
* Computing Foundation ** Distributed Computing:
**Grid Computing ** Caching Reference: Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0
Q99. Which of the following statements are true concerning, data formats used In Service-Oriented Integration (SOI)?
A. SOA Services used in SOI should use application-specific data formats to ensure accurate transmission of data entities from the source systems.
B. A single, canonical data model must be created to successfully build an enterprise-wide SOI.
C. Data formats should be based on logical representations of business-level entities to facilitate composite application assembly.
D. Application-specific data formats should be translated to and from normalized data formats.
E. Data formats should use third normal form because this is the most efficient format for transmitting data.
F. Binary data formats should not be used because they are costly and difficult to maintain.
G. XML data formats should not be used because they are too verbose and result in poor performance.
Explanation: C:Logical Data Representations Message and data formats should be based on logical representations of business objects rather than native application data structures.
D: Providing consumer representations and reading from and writing to multiple source systems leads to the issue of data format transformations. For a very small number of source systems, point-to-point transformations can be used by the SOA Services.
However, this approach becomes untenable as the number of source systems increases.
Thus, a better approach is to create a normalized format for the data entities and then provide transformations to and from the normalized format for each source system.
Normalized Data Formats
Data transformations are to and from normalized formats. Normalized data formats facilitate composition and reduce the number of transformations that must be created and maintained.
F: Binary data formats would be awkward.
Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0
Q100. Service composition is the creating of a new SOA Service by aggregating existing SOA Services. Which statements are correct concerning the use of service composition within the Service- Oriented Integration architecture?
A. The SOI architecture is a layered architecture; therefore service composition is not allowed.
B. Service composition is allowed, even encouraged, by the SOI architecture.
C. Service composition within the SOI architecture is allowed only when the aggregation is over SOA Services from lower layers in the architecture.
D. Service composition should be avoided because service aggregation is provided by the Mediation Layer.
E. Service composition is allowed, but is discouraged because service composition leads to complex dependencies.
Explanation: Service composition is the ability to leverage lower-level services to create a higher-level service When doing composition, the developer should respect the layering of the architecture. Thus, a Business Service could leverage existing Connectivity Services or Data Services and a Data Service could leverage existing Connectivity Services. But, a Data Service should not call a Business Service and a Connectivity Service should not call a Data Service or a Business Service
Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0