Proper study guides for Improve Oracle Oracle IT Architecture Release 3 Essentials certified begins with Oracle 1Z0-574 preparation products which designed to deliver the Highest Quality 1Z0-574 questions by making you pass the 1Z0-574 test at your first time. Try the free 1Z0-574 demo right now.

♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Oracle 1Z0-574 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 1Z0-574 Exam Dumps (PDF & VCE):
Available on:

Q31. What shortcomings of the Version Control Systems drive the need for a Metadata Repository? 

A. Version Control Systems are not easily searchable. 

B. Version Control Systems lack robust metadata that allows developers to determine relevance. 

C. Version Control Systems don't provide the level of consumer tracking and reporting necessary to support software reuse. 

D. Version Control Systems do not allow the asset versions to be rolled back to a previousstate 


Explanation: The underlying core principle of ORA Engineering is asset sharing and enterprise development through an integrated asset management approach. Most organizations use a Software Configuration Management (SCM) or Version Control System (VCS) for managing the code and configuration assets. These tools are great for managing the versioning of assets produced but they don't maintain the metadata of the assets. Without metadata assets are not organized in context and it is hard to discover them. ORA recommends an asset-centric engineering process, where an Asset Manager is used to address the challenges posed by the traditional approaches. The Asset Manager is typically an enterprise-scoped Metadata Repository working in concert with SCMs and other types of asset repositories. 

Reference: Oracle Reference Architecture,Software Engineering, Release 3.0 

Q32. Which statements are correct with regard to the layers in the Logical View of Service-Oriented Integration (SOI)? 

A. Upper layers in the architecture leverage capabilities provided by lower layers. 

B. Upper layers are allowed to access capabilities in any lower layer. 

C. Upper layers are allowed to access capabilities only in the next lower layer. 

D. Each layer encapsulates specific capabilities required by the entire architecture. 

E. Each layer encapsulates optional capabilities of the architecture; thus any layer can be omitted from the architecture. 

F. The layers are used to partition the capabilities of the architecture, but otherwise have no architectural significance. 

Answer: A,C,D 

Explanation: Each layer encapsulates specific capabilities for the overall architecture. Upper layers in the architecture leverage the capabilities provided by the lower layers. Generally, upper layers call lower layers in the architecture and the reverse (i.e. lower levels calling upper layers) is prohibited. 

Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0 

Q33. What does ORA Engineering refer to as Round-Trip Engineering? 

A. the ability to effectively perform both forward and reverse engineering to seamlessly transform assets in either direction of the life cycle 

B. the ability to derive artifacts from a previous life-cycle activity 

C. the ability to generate artifacts backwardsinthe life cycle 

D. a continuous improvement process in the SDLC that allows the assets to be produced at various stages of the life cycle with a feedback loop from operations to requirement analysis. 


Explanation: Round-trip engineering is the ability to effectively perform both forward and reverse engineering to seamlessly transform the lifecycle assets. Forward engineering is very useful the first time that code is generated from a model. It saves much of the mundane work of keying in classes, attributes, and methods. Reverse engineering is very useful both to transform code into a model when no model previously existed, as well as to resynchronize a model with the code at the end of a change. 

Note: During an iterative development cycle, once a model has been updated as part of an iteration, another round of forward engineering should allow code to be refreshed with any new classes, methods or attributes that have been added to the model. Source code generally contains much more than the model and tools must be very adept at reconstructing the source code that existed prior to the new round of forward engineering. At minimum, the modeling tool should successfully support forward engineering the first time and reverse engineering throughout the process. 

Reference: Oracle Reference Architecture,Software Engineering, Release 3.0 

Q34. Which of the following statements are true about an end-to-end security strategy? 

A. End-to-end security and point-to-point security are virtually identical strategies proposed by different security vendors. 

B. End-to-end security strives to protect data at rest, even in temporary queues. 

C. End-to-end security often involves some form of message-level protection. 

D. When end-to-end security is enabled. Point-to-point transport-level encryption should be disabledin order to avoid cryptography conflicts between layers. 

E. End to-end security is highly beneficial for distributed computing environments where many 

point-point connections and intermediaries exist, because it offers seamless data protection. 

Answer: B,C,E 

Explanation: B:End to end security is an information-centric perspective of security where information is protected throughout the entire computing environment. That is, from the points where system interactions originate, through all points of integration, processing, and persistence. 

End to end security is often associated with the secure transmission, processing, and storage of data, where at no time are data unprotected 


For a typical web-based application, end to end security generally begins at the client/browser, and ends at the application database and all external dependencies of the application. 

A common challenge in providing end to end security is finding a suitable way to secure data in all states and points along the processing path that does not interfere with any transmission, routing, processing, and storage functions that need to occur along the way. Sensitive data will usually need to be decrypted at certain points in 

order for processing or message routing to occur. 

Q35. Which of the following is NOT defined as a primary ORA computing foundation component? 

A. Distributed Computing 

B. Utility Computing 

C. Grid Computing 

D. Caching 


Explanation: Primary ORA computing foundation components: Distributed Computing On-Demand Computing Utility Computing Grid Computing Cloud Computing Elastic Computing Virtualization 

Reference: Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0 

Q36. A company is building a new customer self-service website. The company has an existing CRM application that contains customer information that needs to be integrated into the self-service website. The CRM application provides a synchronous interface to access the needed customer information. The CRM application takes 5 to 30 seconds to respond to the request for customer information. The requirements for the new customer self-service website is to respond within 3 seconds 90% of the time. What integration pattern would you suggest that the company use to integrate the CRM application into the new customer self-service website? 

A. Use the request-response message exchange pattern to access the synchronous interface provided by the CRM application. The request-response message exchange pattern matches the synchronous interface provided by the CRM application, so this is the simplest and best approach for integration. 

B. When customer information from the CRM application is needed, asynchronously fetch the information by using the store-and-forward integration pattern. This approach allows the self- service website to respond quickly to customer requests without waiting for the CRM application. The website can display the fetched customer information when it is available. 

C. Use the request optional-response message exchange pattern to access the CRM application. If the CRM application responds quickly (for example, in 5 seconds) use that response. If the CRM application does not respond quickly, then the optional response was not returned and processing continues. 

D. When customer information from the CRM application is needed, post a message to a topic queue by using the publish-and-subscribe integration pattern. This approach allows the CRMapplication or any other application subscribing to the topic queue to respond with customer information. 

E. Use the polling integration pattern to find the necessary customer information in the CRM application database. Obviously the data exists in the CRM application database. Obliviously the data exists in the CRM application database, so the slow response from the CRM application can be eliminated by polling directly from the CRM application database. 


Explanation: An asynchronous exchange patternwould be good here. Asynchronous communication can be used when the response time for the source system is too slow to support the timelines of the calling systems. Note: Store-and-forward is a special case of asynchronous communication. In the store-and-forward pattern, the request message is put onto a queue for later retrieval by the target of the request message. Similarly, the response message is put onto a response queue for later retrieval. This is a very common approach used by messaging systems (e.g. MQ Series) to integrate with legacy systems. The architecture must support this integration pattern to facilitate integration with legacy systems and existing messaging systems. 

Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0 

Q37. Which statement best describes the relationship between a Service Contract and a Usage Agreement as defined by the Oracle Reference Architecture (ORA)? 

A. There is a one-to-one relationship between a Service Contract and a Usage Agreement. For each Service Contract there is a corresponding Usage Agreement. 

B. There may be multiple Usage Agreements associated with a single Service Contract. 

C. There may be multiple Service Contracts associated with a single Usage Agreement. 

D. There is a many-to-many relationship between Service Contracts and Usage Agreements. 

E. There is no defined relationship between a Service Contract and a Usage Agreement. 


Explanation: The Service Contract defines what the SOA Service agrees to provide to the environment. 

The service consumer Usage Agreement defines what a particular service consumer is entitled to consume. 

Each service might have several consumers. 

The Service provider must ensure that the Service will satisfy the aggregate specifications of all related usage agreements. 


The usage agreement is not part of the Service; rather it defines what a particular service consumer is entitled to consume from the Service. 

Having both a usage agreement and a service contract provides a decoupling between the service provider and service consumer. This not only facilitates reuse but also provides a separation of concerns. The service contract defines the totality of what the 

Service guarantees to provide, and can be written and validated independent of any knowledge of specific service consumers. The usage agreement is service consumer specific and defines what capabilities of the Service each consumer is allowed to consume. 

Reference: Oracle Reference Architectureand Service Orientation, Release 3.0 

Q38. Which of the following best describes the role of the Managed Target Tier within the Logical view of the Management and Monitoring architecture? 

A. contains configuration details, historical metric data and alert Information, availability Information, and product and patch inventory Information 

B. provides access to management content and operations and enables end users to access the appropriate business solution 

C. provides Management Repository and Management Engine capabilities 

D. contains the named Infrastructure components that are required to be managed and monitored 


Explanation: The Managed Target Tier contains the named infrastructure components that are required to be managed and monitored. It is common to utilize a combination of agent based and gateway (a.k.a. proxy) patterns to monitor and manage hosted and non-hosted targets. 

Reference: Oracle Reference Architecture,Management and Monitoring, Release 3.0 

Q39. Architecturally speaking, why might an organization deploy a SAML-based Web SSO solution if they already have a cookie-based Web SSO in place and working? 

A. SAML generally performs better and requires less network overhead. 

B. SAML supports federation across cookie domains. 

C. SAML is required for Web Service security, which makesit a natural replacement for cookie based SSO solutions. 

D. SAML isimmune to man-in-the-middle attacks. 


Explanation: SSO solutions deployed for a localized domain often exchange state information in a browser cookie. These implementations are limited to the scope of the DNS domain as cookies are not visible across domains. SAML offers alternatives solutions that do not have this limitation. 

Reference: Oracle Reference Architecture,Security, Release 3.1 

Q40. Which one of the following security strategies protects data in motion but does not address data at rest or in memory? 

A. end to end security 

B. defense In depth 

C. per (motor security 

D. cloud security 

E. point to point security 


Explanation: A lesser alternative to end to end security is point to point security. This is used to protect messages in transit. It assumes that other means of security are used to protect messages during processing and persistence. 

Reference: Oracle Reference Architecture,Security, Release 3.1