Oracle 1z0-574 Exam Practice Questions (P. 2)
- Full Access (176 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
Which statement best describes the relationship between a SOA Service and service Infrastructure?
- AService infrastructure is a primary part of an SOA Service.
- BService Infrastructure exposes the Service Interface and may satisfy some capabilities of the Service Implementation.
- CService infrastructure fulfills the Service Contract.
- DA SOA Service depends on the service infrastructure to satisfy some required capabilities.
- EA SOA Service uses the service infrastructure to generate the Service Interface.
Correct Answer:
B
The Service Infrastructure side typically provides the Service enablement capabilities for the implementation. These capabilities may include, exposing the interface as a Web Service, handling SLA enforcement, security, data formatting, and others. Service infrastructure should be utilized when possible, as it reduces the burden on Service providers, from an implementation standpoint.
Reference: Oracle Reference Architecture, SOA Foundation, Release 3.1
B
The Service Infrastructure side typically provides the Service enablement capabilities for the implementation. These capabilities may include, exposing the interface as a Web Service, handling SLA enforcement, security, data formatting, and others. Service infrastructure should be utilized when possible, as it reduces the burden on Service providers, from an implementation standpoint.
Reference: Oracle Reference Architecture, SOA Foundation, Release 3.1
send
light_mode
delete
Question #7
Which WebCenter product Improves efficiency and productivity by enabling users to connect with others, regardless of their location, via web and voice conferencing, instant messaging, presence, and chat rooms?
- AOracle WebCenter Intelligent Collaboration
- BOracle WebCenter Anywhere
- COracle WebCenter Real-Time Collaboration
- DOracle WebCenter Spaces
Correct Answer:
C
Oracle WebCenter Real-Time Collaboration improves efficiency and productivity by enabling users to connect and collaborate with others via instant messaging, presence, chat rooms, and web and voice conferencing. It complements other Enterprise 2.0 services available in Oracle WebCenter by offering real-time collaboration capabilities to users who require direct interaction and immediate response.
Incorrect answers:
A: The core premise of Oracle WebCenter IC (Intelligent Collaboration) is automating business connections by enabling employees to find the right people to collaborate with at the right time in order to make the right decisions. How does WebCenter IC find the right people? Every time an employee interacts with an enterprise application including collaborative applications like Microsoft SharePoint and especially email systems WebCenter IC can learn something about what is important to that user, and where they are focusing their time and attention. This information is formed into a "composite sketch" of each person which is then made available under WebCenter ICs unique and innovative privacy model to enable employees to tap into the knowledge of others based on the employees real-time needs for information and insight within the context of a business activity.
B: Oracle WebCenter Anywhere. A set of wireless services that enable users to connect with Oracle WebCenter Suite applications from any connected device, including desktop and mobile applications
D: Oracle WebCenter Portal: Spaces is a ready-to-use application that delivers multiple sites from a single infrastructure. WebCenter Portal: Spaces lets you collaborate and share information with dynamically created user communities, pulling together the capabilities of WebCenter Portal: Framework and WebCenter
Portal: Services to:
* Empower teams to quickly and efficiently manage their information, applications, projects, and people without requiring IT assistance.
* Speed delivery of Intranet portal sites and help organizations publish their latest work easily.
* Bring together the latest technology around social computing, communications, personal productivity, and ad-hoc team interactions.
* Enable organizations to build Intranet portal sites quickly, and to populate them with information in myriad forms, all without the intervention of either IT or
Engineering.
C
Oracle WebCenter Real-Time Collaboration improves efficiency and productivity by enabling users to connect and collaborate with others via instant messaging, presence, chat rooms, and web and voice conferencing. It complements other Enterprise 2.0 services available in Oracle WebCenter by offering real-time collaboration capabilities to users who require direct interaction and immediate response.
Incorrect answers:
A: The core premise of Oracle WebCenter IC (Intelligent Collaboration) is automating business connections by enabling employees to find the right people to collaborate with at the right time in order to make the right decisions. How does WebCenter IC find the right people? Every time an employee interacts with an enterprise application including collaborative applications like Microsoft SharePoint and especially email systems WebCenter IC can learn something about what is important to that user, and where they are focusing their time and attention. This information is formed into a "composite sketch" of each person which is then made available under WebCenter ICs unique and innovative privacy model to enable employees to tap into the knowledge of others based on the employees real-time needs for information and insight within the context of a business activity.
B: Oracle WebCenter Anywhere. A set of wireless services that enable users to connect with Oracle WebCenter Suite applications from any connected device, including desktop and mobile applications
D: Oracle WebCenter Portal: Spaces is a ready-to-use application that delivers multiple sites from a single infrastructure. WebCenter Portal: Spaces lets you collaborate and share information with dynamically created user communities, pulling together the capabilities of WebCenter Portal: Framework and WebCenter
Portal: Services to:
* Empower teams to quickly and efficiently manage their information, applications, projects, and people without requiring IT assistance.
* Speed delivery of Intranet portal sites and help organizations publish their latest work easily.
* Bring together the latest technology around social computing, communications, personal productivity, and ad-hoc team interactions.
* Enable organizations to build Intranet portal sites quickly, and to populate them with information in myriad forms, all without the intervention of either IT or
Engineering.
send
light_mode
delete
Question #8
Bottom-up service Identification analyzes existing systems to Identify SOA Services. Top-down service identification analyzes business processes to identify SOA services.
Which statement best describes the relationship between top down and bottom-up service identification in Service-Oriented Integration?
Which statement best describes the relationship between top down and bottom-up service identification in Service-Oriented Integration?
- AOnly a bottom up approach should be used because the goal of SOI is to provide SOA Services exposing existing systems.
- BOnly a top-down approach should be used because the goal of SOI is composite application assembly.
- CA bottom-up approach should be used to identify which SOA Services are built; then a top-down approach should be used to determine which SOA Services are used by each composite application.
- DA top-down approach should be used to determine the needed SOA Services; then a bottom-up approach should be used to determine how existing source systems can meet the requirements top-down approach should be used by business, and a bottom-up approach should be used by IT. The overlap between
Correct Answer:
D
Note: There are three schools of thought around "how to build an Enterprise Service Oriented Architecture." They are:
* Top down - central group decides everything and the dev teams adopt them.
* Bottom up - central group provides a directory and dev teams make whatever services they want. Dev teams go to the directory to find services they can use.
* Middle out - central group provides key elements of the interface, including numbering schemes, message exchange patterns, standard communication mechanisms, and monitoring infrastructure, and encourages the dev teams to use it to build services that can be shared.
D
Note: There are three schools of thought around "how to build an Enterprise Service Oriented Architecture." They are:
* Top down - central group decides everything and the dev teams adopt them.
* Bottom up - central group provides a directory and dev teams make whatever services they want. Dev teams go to the directory to find services they can use.
* Middle out - central group provides key elements of the interface, including numbering schemes, message exchange patterns, standard communication mechanisms, and monitoring infrastructure, and encourages the dev teams to use it to build services that can be shared.
send
light_mode
delete
Question #9
Which of the following are the key drivers for Grid computing?
- AImproved server utilization - Grid computing allows companies to lower costs through the efficient use of resources.
- BBetter agility and flexibility - Businesses experience constant change and the underlying IT Infrastructure should be agile enough to support that kind of change.
- COpEx model - Enterprises require pay-as-you-go services to reduce the dependency on capital expenditure and take advantage of the benefits of operational expenditure.
- DLower Initial cost-There is a need to reduce the Initial investment at the cost of an increased operational cost.
Correct Answer:
ABD
Using a grid computing architecture, organizations can quickly and easily create a large-scale computing infrastructure from inexpensive, off-the-shelf components
(D). Other benefits of grid computing include
* Quick response to volatile business needs (B)
* Real-time responsiveness to dynamic workloads
* Predictable IT service levels
* Reduced costs as a result of improved efficiency and smarter capacity planning (A)
Note: One way to think about grid computing is as the virtualization and pooling of IT resources compute power, storage, network capacity, and so oninto a single set of shared services that can be provisioned or distributed, and then redistributed as needed.
As workloads fluctuate during the course of a month, week, or even through a single day, the grid computing infrastructure analyzes the demand for resources in real time and adjusts the supply accordingly.
Grid computing operates on three basic technology principles: Standardize hardware and software components to reduce incompatibility and simplify configuration and deployment; virtualize IT resources by pooling hardware and software into shared resources; and automate systems management, including resource provisioning and monitoring.
Grid computing operates on these technology principles:
* Standardization.
* Virtualization.
* Automation.
Reference: Oracle Grid Computing, White Paper
ABD
Using a grid computing architecture, organizations can quickly and easily create a large-scale computing infrastructure from inexpensive, off-the-shelf components
(D). Other benefits of grid computing include
* Quick response to volatile business needs (B)
* Real-time responsiveness to dynamic workloads
* Predictable IT service levels
* Reduced costs as a result of improved efficiency and smarter capacity planning (A)
Note: One way to think about grid computing is as the virtualization and pooling of IT resources compute power, storage, network capacity, and so oninto a single set of shared services that can be provisioned or distributed, and then redistributed as needed.
As workloads fluctuate during the course of a month, week, or even through a single day, the grid computing infrastructure analyzes the demand for resources in real time and adjusts the supply accordingly.
Grid computing operates on three basic technology principles: Standardize hardware and software components to reduce incompatibility and simplify configuration and deployment; virtualize IT resources by pooling hardware and software into shared resources; and automate systems management, including resource provisioning and monitoring.
Grid computing operates on these technology principles:
* Standardization.
* Virtualization.
* Automation.
Reference: Oracle Grid Computing, White Paper
send
light_mode
delete
Question #10
Which of the following statements are true about an end-to-end security strategy?
- AEnd-to-end security and point-to-point security are virtually identical strategies proposed by different security vendors.
- BEnd-to-end security strives to protect data at rest, even in temporary queues.
- CEnd-to-end security often involves some form of message-level protection.
- DWhen end-to-end security is enabled. Point-to-point transport-level encryption should be disabled in order to avoid cryptography conflicts between layers.
- EEnd to-end security is highly beneficial for distributed computing environments where many point-point connections and intermediaries exist, because it offers
Correct Answer:
BCE
B: End to end security is an information-centric perspective of security where information is protected throughout the entire computing environment. That is, from the points where system interactions originate, through all points of integration, processing, and persistence.
End to end security is often associated with the secure transmission, processing, and storage of data, where at no time are data unprotected
Note:
For a typical web-based application, end to end security generally begins at the client/browser, and ends at the application database and all external dependencies of the application.
A common challenge in providing end to end security is finding a suitable way to secure data in all states and points along the processing path that does not interfere with any transmission, routing, processing, and storage functions that need to occur along the way. Sensitive data will usually need to be decrypted at certain points in order for processing or message routing to occur.
Incorrect answers:
A: A lesser alternative to end to end security is point to point security. This is used to protect messages in transit. It assumes that other means of security are used to protect messages during processing and persistence. Point to point security is often used as a default or minimal security option in order to protect messages over insecure networks. Generally, less effort is made to protect data behind the corporate firewall.
This opens up a number of vulnerabilities and risks to an organization.
D: Cryptography conflicts is not an issue, though it would be unnecessary to encrypt the same data twice.
BCE
B: End to end security is an information-centric perspective of security where information is protected throughout the entire computing environment. That is, from the points where system interactions originate, through all points of integration, processing, and persistence.
End to end security is often associated with the secure transmission, processing, and storage of data, where at no time are data unprotected
Note:
For a typical web-based application, end to end security generally begins at the client/browser, and ends at the application database and all external dependencies of the application.
A common challenge in providing end to end security is finding a suitable way to secure data in all states and points along the processing path that does not interfere with any transmission, routing, processing, and storage functions that need to occur along the way. Sensitive data will usually need to be decrypted at certain points in order for processing or message routing to occur.
Incorrect answers:
A: A lesser alternative to end to end security is point to point security. This is used to protect messages in transit. It assumes that other means of security are used to protect messages during processing and persistence. Point to point security is often used as a default or minimal security option in order to protect messages over insecure networks. Generally, less effort is made to protect data behind the corporate firewall.
This opens up a number of vulnerabilities and risks to an organization.
D: Cryptography conflicts is not an issue, though it would be unnecessary to encrypt the same data twice.
send
light_mode
delete
All Pages