Want to know Pass4sure 1Z0-574 Exam practice test features? Want to lear more about Oracle Oracle IT Architecture Release 3 Essentials certification experience? Study Actual Oracle 1Z0-574 answers to Up to the immediate present 1Z0-574 questions at Pass4sure. Gat a success with an absolute guarantee to pass Oracle 1Z0-574 (Oracle IT Architecture Release 3 Essentials) test on your first attempt.
♥♥ 2017 NEW RECOMMEND ♥♥
Free VCE & PDF File for Oracle 1Z0-574 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Q21. Which of the following is not an objective or function of the WS-Trust standard?
A. to enable applications to construct trusted SOAP message exchanges
B. to synchronize Identities across security domains
C. to exchange tokens in order to overcome differencesin supported technology between service consumers and service providers
D. to exchange tokensin order to mapidentities supplied by service consumers with identities supported by service providers
Explanation: Oracle STS leverages the WS-Trust standard protocol to manage token exchange between the Web Service Client (WSC) and the Web Service Provider (WSP) (not C). WS-Trust provides a standard way to send security token requests to any Security Token Service (STS) (not D). This specification can be used to manage token transformation when crossing the various security boundaries of the information system (not B).
Reference: Scalable Identity Propagation and Token Translation through Oracle Security Token
Service, Oracle White Paper
Q22. Much as in modular programming, there are two ways that federation applies to user interface design: as either consumer or producer of federated Interface elements.
Which statement is true?
A. As a consumer, the end user is responsible for incorporating existing Interface elements into the user interface.
B. As a consumer, the device is responsible for incorporating existing Interface elements into the user interface.
C. As a consumer, the developer is responsible for incorporating existing Interface elements into the user interface.
D. As a producer, the developer is responsible for building separate and independent interface elements that can be incorporated into another user interface.
E. As a producer, the developer is responsible for incorporating existing interface elements into the user interface.
Explanation: As a consumer the developer is responsible for incorporating existing interface elements into the user interface.
Reference: Oracle Reference Architecture, User Interaction, Release 3.0
Q23. A customer has two separate lines of business and each has its own unique resources that are controlled independently. The customer wants to provide a single user interface at the enterprise level that, at least from the user's perspective, unifies the separate lines of business and presents a single consistent view. What is the most suitable architectural arrangement for such a federated deployment?
A. The enterprise implements full client stack and part of the service stack while each LoB deploys the remaining part of the service tierin order to expose uniform interface elements.
B. The client tier assimilates the data from the resource stack of each line of business.
C. The enterprise implements full client and service stacks while each LoB deploys a partial service.sufficient to expose uniform interface elements.
D. The client tier assimilates the data from the service stack of each line of business.
Explanation: Each line of business has its own resources that are unique to the line of business and are controlled by that line of business. The enterprise wants to provide a single user interface that, at least from the user’s perspective, unifies the separate lines of business. In this example, the enterprise wide user interface deployment is a full featured user interaction architecture (i.e. it contains all of the capabilities defined in the Logical View). Each line of business deploys limited functionality since the only functionality required is the functionality to create interface elements exposing the resources of that line of business. The enterprise wide user interface then uses the interface elements provided by the lines of business to create a unified user experience.
The interface elements provided by the lines of business are Remote Providers to the enterprise user interface. This deployment allows the lines of business to maintain control of their respective resources since the only access to the resources is via the interface elements that they create.
Reference: Oracle Reference Architecture, User Interaction, Release 3.0
Q24. What does access to Consolidated Information in Complex Distributed Environments require?
A. siloedIT management and monitoring tools such as event managers and network managers.
B. architects and engineers to reverse engineer applications to determine dependencies across components
C. Access to information concerning dynamicinterdependences acrossinfrastructurecomments.
D. Following for diagnosing and correlating problems in complex, distributed environments.
E. a strong bottom-up approach to IT management to focus on the status of individual low-level Infrastructure components
Explanation: Infrastructure components have become more dependent on one another, with many of these interdependencies crossing corporate boundaries. Without access to information concerning these dynamic interdependencies, diagnosing and correlating problems in a complex, distributed environment is a huge challenge.
Reference: Oracle Reference Architecture,Management and Monitoring, Release 3.0
Q25. Which of the following statements are true about defense-in-depth strategy?
A. It saves money by allowing organizations to remove costly perimeter security Infrastructure.
B. It is a strategy designed to win the battle by attrition. It consists of multiple security measures at various levels as opposed to a single barrier.
C. It includes security measures for the network, the operating system, the application, and data.
D. Due to network overhead issues, it should not be used in a distributed computing environment such as SOA or cloud computing.
E. It is a good strategy to protect an organization from insider threats.
Explanation: Defense in depth is a security strategy in which multiple, independent, and mutually reinforcing security controls are leveraged to secure an IT environment.
The basic premise is that a combination of mechanisms, procedures and policies at different layers within a system are harder to bypass than a single or small number security mechanisms. An attacker may penetrate the outer layers but will be stopped before reaching the target, which is usually the data or content stored in the 'innermost' layers of the environment. Defense in depth is also adopted from military defense strategy, where the enemy is defeated by attrition as it battles its way against several layers of defense.
Defense in depth should be applied so that a combination of firewalls, intrusion detection and prevention, user management, authentication, authorization, and encryption mechanisms are employed across tiers and network zones.
The strategy also includes protection of data persisted in the form of backups and transportable/mobile devices. Defense in depth should take into account OS and VM hardening as well as configuration control as means of preventing attackers from thwarting the system by entering via the OS or by tampering with application files.
Reference: Oracle Reference Architecture,Security, Release 3.1
Q26. Which statement best describes the relationship between a SOA Service and service Infrastructure?
A. Service infrastructure is a primary part of an SOA Service.
B. Service Infrastructure exposes the Service Interface and may satisfy some capabilities of the Service Implementation.
C. Service infrastructure fulfills the Service Contract.
D. A SOA Service depends on the service infrastructure to satisfy some required capabilities.
E. A SOA Service uses the service infrastructure to generate the Service Interface.
Explanation: The Service Infrastructure side typically provides the Service enablement capabilities for the implementation. These capabilities may include, exposing the interface as a Web Service, handling SLA enforcement, security, data formatting, and others. Service infrastructure should be utilized when possible, as it reduces the burden on Service providers, from an implementation standpoint.
Reference: Oracle Reference Architecture,SOA Foundation, Release 3.1
Q27. Oracle Reference Architecture uses multiple views (as defined by standard IEEE 1471) to describe the architecture. Which statement best describes the use of views within ORA?
A. Each view within ORA focuses on a particular set of Oracle products.
B. ORA provides multiple views (for example, Conceptual, Logical, Deployment) to describe the architecture to various stakeholders.
C. Each view within ORA focuses on a particular set of industry standards.
D. ORA provides multiple views (for example, Product Mapping, Deployment) to illustrate how Oracle products must be installed and configured.
E. ORS uses views to illustrate industry standards and document architecture guidelines.
Explanation: It is important that the service-oriented reference architecture documents the architecture from multiple views. Each view might include multiple models to illustrate the concepts, capabilities, etc. important for that view. The particular choice of views depends on what material is being covered and which views best convey the information. Example views include conceptual, logical, product mapping, and deployment views.
Reference: IT Strategies from Oracle, Oracle’s approach to SOA, Oracle White Paper
Q28. The Service-Oriented Integration (SOI) architecture can be deployed in a variety of ways. One deployment option is a hierarchical deployment, where each division within the enterprise can deploy the layers of the SOI architecture by using their chosen hardware and software platforms.
A separate enterprise-wide deployment of the upper layers of the architecture is used to provide cross-divisional integration. Which statements are true for this type of hierarchical deployment of SOI?
A. Hierarchical deployment of the SOI architecture is the recommended deployment whenever an enterprise has two or more business divisions.
B. Hierarchical deployment of the SOI architecture is an anti-pattern and should be avoided du-the additional costs associated with supporting multiple hardware and software platforms.
C. Hierarchical deployment of the SOI architecture is a transitional phase moving toward a peer- peer deployment where the enterprise-wide deployment of the upper layers is eliminated.
D. Hierarchical deployment of the SOI architecture supports aquestions because each aquestions can be treated as a new division with its own chosen hardware and software platforms.
E. Because each division is allowed to select the hardware and software platform, industry standards become more important to ensure interoperability between the divisions and the enterprise-wide upper layer.
F. Because each division is allowed to select the hardware and software platform, platform vendors will have the complete for business, which will reduce the costs of hardware and software, thus reducing the cost of technical deployment versus a shared deployment.
Explanation: D: This type of deployment easily supports acquisitions since a new acquisition can be treated as simply another portfolio. E (not F): The primary disadvantage of a hierarchical deployment is the increased cost and complexity of supporting more hardware and software. Adherence to standards to support interoperability is also more important in a hierarchical deployment since the various portfolios may select different products
Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0
Q29. Which statement best describes the relationship between the Logical View and the Development view of the Service-Oriented Integration architecture?
A. The two architectural views are Independent and there is no relationship between them.
B. The Logical View defines the rationale for layers within the architecture. The Development View specifies the developer tools used for each layer.
C. The Logical View defines the layers of the architecture and the capabilities within each layer. The Development View describes how aspects of the architecture impact developers following the architecture.
D. The Logical View defines the layers of the architecture and the capabilities within each layer. The Development View specifies the developer tools that provide the capabilities for each layer.
E. The Logical View specifies the developer tools required by each layer in the architecture. The Development View describes the developer impact of the tools specified.
Explanation: * The Logical View of the architecture describes the various layers in the architecture.
Each layer encapsulates specific capabilities for the overall architecture. Upper layers in the architecture leverage the capabilities provided by the lower layers.
*The Development View of the architecture describes aspects of the architecture that are of interest to developers building assets that conform to and leverage the architecture.
In a service-oriented integration architecture the primary developer artifacts are the
SOA Services that are created to expose data and functionality contained in source systems.
Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0
Q30. Which of the following statements best describes how the deployment supports closed-loop governance?
A. The Metadata Repository is integrated with the operational systems to link operational metrics to the assets to ensure that the assets perform asintended.
B. The Metadata Repositories deployed in each environment are chained to share asset usage information.
C. A closed-loop governance framework is deployed on a clustered server to monitor the governance activities.
D. Production systems are integrated to the developer desktops to validate the requirements against the implemented code.
Explanation: SOA Software’s Policy Manager and Service Manager combine to form a comprehensive closed-loop SOA Governance solution.
Closed loop means:
* Defining and managing actionable policies in a governance solution at design-time
* Enforcing these policies via deep integration with a management solution at run-time
* Auditing that these policies are being enforced
* Using industry standards (WS-Policy, WS-MEX) where appropriate for information exchange Closed loop infrastructure enables demand and Value Management
* Collect performance, usage and exception statistics at run-time
* Track these statistics via the governance solution
* Use live, audited information to drive value-based decisions about the effectiveness of different services and organizations
* Provide developers with up to the minute information about a service in runtime to inform their decisions about which services to use
* Manage supply and demand to ensure maximum efficiency and benefit from SOA
The products share a common registry and metadata repository to ensure seamless integration and offer active governance. Closed-loop governance will:
* Ensure defined policies are enforced ** When you define a policy for a service you have to KNOW categorically that it is being enforced ** Generate audit trails for run-time and design-time policy compliance
* Measure the real-world value of SOA ** Not just theoretical value ** How many applications are using each service, and how much are they using it ** NOT how many applications have asked to use a certain capacity of each service
* Manage, monitor and control relationships between consumers and providers ** Enforced contracts ** Capacity planning Change management
The diagram below shows the relationships between SOA governance, security and management, demonstrating how SOA Policy Management forms a closed loop of policy, metrics, and audit.