Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan Oracle Official New Released 1z0-574
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/1z0-574.html

Oracle IT Architecture Essentials

Question No: 31

Oracle Web Services Manager uses an agent-based approach to providing Web Services security. Where are these agents deployed?

  1. In any IPv4 of Later network firewall

  2. In the Oracle WebLogic Server Web Service request Interceptors

  3. In the Oracle Service Bus proxy pipeline

  4. In the Oracle Access Manager web gate

  5. In the Oracle WebLogic Server access gate

Answer: D

Explanation: You use the Web Services Manager Control Console to define Oracle Web Services Manager components such as server agents. The server agent acts as an enforcement point for security policies.

Point your browser to the Web Services Manager Control Console and log in using your single sign-on user name and password.

The Web Services Manager Control Console is accessed with a URL of the form: http://lt;hostnamegt;:port_number/ccore

Question No: 32

Your company has decided to create an Enterprise Architecture following. The Open Group Architecture Framework (TOGAF). Which option best describes how the IT Strategies from Oracle (ITSO) library of material relates to this TOGAF-based Initiative?

  1. ITSO has minimal applicability because TOGAF is a complete architecture framework.

  2. The ITSO material can be used as reference material within the TOGAF approach.

  3. The TOGAF approach will need to be modified (customized) to incorporate the ITSO material.

  4. The ITSO material will need to be adapted to the TOGAF approach.

  5. TOGAF and ITSO are mutually exclusive. One or the other must be chosen as the basis for the company#39;s Enterprise Architecture.

Answer: A

Explanation: The ITSO, and, being part of it, the Oracle Reference Architecture is not an Architecture Framework. For this, many solutions are already available, of which TOGAF andOracle#39;s Enterprise Architecture Framework (OEAF) are good examples. The ORA can be perfectly integrated in any of the currently available frameworks.

Note: The IT Strategies from Oracle give you a whole library of whitepapers, not only to develop a Reference Architecture for your own, by adapting the ORA to your needs, but it also focuses on the surrounding Enterprise Technology Strategies and Enterprise Solution Designs. In other words, ITSO covers both the horizontal technology perspectives (SOA, BPM, EDA, etc.), but also the vertical business perspectives (Utilities, Government, etc.).Now, in case you think that this is all about Oracle Technology products, you might be surprised: the whole ITSO / Oracle Reference Architecture is Vendor-Neutral. It is only scoped to Oracle#39;s product portfolio. Now, one might ask themselves: what technology product area#39;s doesn#39;t Oracle have products for, so that shouldn#39;t be too much of an issue as far as completeness is concerned.ITSO can help you organizing complex product landscapes, by means of a holistic approach to technology adoption. By covering the technology as a whole, you can reduce risk and become more in control of your IT solutions.

Question No: 33

Which of the following are strategies for alert management with Oracle Enterprise Manager?

  1. controlling the volume of alerts

  2. removing unwanted alerts

  3. centralized filtering of alerts

  4. automating fix for common alerts

Answer: B,D

Explanation: B: New in Enterprise Manager 10g Release 5 (10.2.0.5)

Alert Management Enhancements: Administrators can better manage their log-based alerts (e.g., alert log alerts) by setting duration-based notification rules that clear such alerts on a periodic basis, or by using new EMCLI verbs that support bulk clearing of such alerts.

D: New in Enterprise Manager 10g Release 5 (10.2.0.5)

Alert Management Enhancements: On-demand evaluation of alerts allow administrators to quickly verify whether the fixes implemented for alerts result in clearing of the alert.

Note: Advanced alert management

Question No: 34

Which of the following token profiles is not included in the WS-Security standard as a standard type of identity token?

  1. XACML token profile

  2. SAML token profile

  3. username token profile

  4. Kerberos token profile

  5. X.500 token profile

Answer: A Explanation:

TheWS-Securityspecification allows a variety of signature formats, encryption algorithms and multiple trust domains, and is open to various security token models, such as:

  • X.509 certificates (not E)

  • Kerberos tickets (not D)

    *UserID/Password credential (not C)

  • SAML Assertions (not B)

  • *custom-defined tokens.

    Note: WS-Security (Web Services Security, short WSS) is a flexible and feature-rich extension to SOAP to apply security to web services. It is a member of the WS-* family of web service specifications and was published by OASIS.

    Question No: 35

    Which of the following is NOT defined as a primary ORA computing foundation component?

    1. Distributed Computing

    2. Utility Computing

    3. Grid Computing

    4. Caching

    Answer: D

    Explanation: Primary ORA computing foundation components: Distributed Computing

    On-Demand Computing Utility Computing

    Grid Computing Cloud Computing Elastic Computing Virtualization

    Reference: Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0

    Question No: 36

    Which of the following capabilities are provided by containers?

    1. Transaction Support

    2. Security Support

    3. Thread Management

    4. Business Processes

    Answer: A,B,C

    Explanation: Containers provide several capabilities that include the following: Transaction Support (A)

    Security Support (B) Scalability and Performance Thread Management (C) Data and Code Integrity Centralized Configuration

    Connection and Session Management Abstraction

    Reference: Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0

    Question No: 37

    Which of the following Oracle products provides a comprehensive Integrated Development Environment (IDE)?

    1. Oracle Enterprise Pack for Eclipse

    2. Oracle JDeveloper

    3. Oracle Service Registry

    4. Enterprise Manager

    Answer: A,B

    Explanation: A: Oracle Enterprise Pack for Eclipse is a free set of certified plug-ins, enabling WebLogic developers to support Java EE and Web Service standards. Oracle Enterprise Pack for Eclipse supports development with technologies including Database, Java SE, Java EE, Web Services, XML, Spring Framework and Oracle Fusion Middleware. B: Oracle JDeveloper is a free integrated development environment that simplifies the development of Java-based SOA applications and user interfaces with support for the full development life cycle.

    Incorrect answers

    Oracle Service Registry and Enterprise Manager are not development tools.

    Question No: 38

    Which of the following statements best describes how the deployment supports closed-loop governance?

    1. The Metadata Repository is integrated with the operational systems to link operational metrics to the assets to ensure that the assets perform asintended.

    2. The Metadata Repositories deployed in each environment are chained to share asset usage information.

    3. A closed-loop governance framework is deployed on a clustered server to monitor the governance activities.

    4. Production systems are integrated to the developer desktops to validate the requirements against the implemented code.

    Answer: B,C

    Explanation: SOA Software’s Policy Manager and Service Manager combine to form a comprehensive closed-loop SOA Governance solution.

    Closed loop means:

    • Defining and managing actionable policies in a governance solution at design-time

    • Enforcing these policies via deep integration with a management solution at run-time

    • Auditing that these policies are being enforced

    • Using industry standards (WS-Policy, WS-MEX) where appropriate for information exchange

      Closed loop infrastructure enables demand and Value Management

    • Collect performance, usage and exception statistics at run-time

    • Track these statistics via the governance solution

    • Use live, audited information to drive value-based decisions about the effectiveness of different services and organizations

    • Provide developers with up to the minute information about a service in runtime to inform their decisions about which services to use

    • Manage supply and demand to ensure maximum efficiency and benefit from SOA

      The products share a common registry and metadata repository to ensure seamless integration and offer active governance. Closed-loop governance will:

    • Ensure defined policies are enforced

      ** When you define a policy for a service you have to KNOW categorically that it is being enforced

      ** Generate audit trails for run-time and design-time policy compliance

    • Measure the real-world value of SOA

    ** Not just theoretical value

    ** How many applications are using each service, and how much are they using it

    ** NOT how many applications have asked to use a certain capacity of each service

    • Manage, monitor and control relationships between consumers and providers

      ** Enforced contracts

      ** Capacity planning Change management

      The diagram below shows the relationships between SOA governance, security and management, demonstrating how SOA Policy Management forms a closed loop of policy, metrics, and audit.

      Dumps4Cert 2018 PDF and VCE

      http://www.soa.com/images/img_closed_loop.gif

      Question No: 39

      Which of the following are common uses of an Attribute Service?

      1. to maintain metadata pertaining to audit log entries and attestation reports

      2. to acquire data that are necessary to make access-control decisions

      3. to securely supply personally identifiable information to applications

      4. to determine which security policy is assigned to a Web Service

      Answer: B,C

      Explanation: The Attribute Service(AS) retrieves user information from an attribute store. The AS retrieves user information associated with a user from variety of authoritative identity stores including, but not limited to, LDAP and database stores.

      Question No: 40

      Conventional Management and Monitoring tools focus and produce metrics on which one of the following?

      1. holistically across heterogeneous systems

      2. metrics that measure individual resources

      3. metrics that focus on understanding the relationship and Interactions between component

      4. metrics that capture the combined behavior of several components interacting with the shared component

      Answer: B

      Explanation: Conventional tools tend to focus and produce metrics on individual resources which is

      inadequate for an agile shared services computing environment.

      Note:

      A metric is a unit of measurement used to report the health of the system that is captured from the monitored infrastructure components. Metrics from all monitored

      infrastructure components are stored and aggregated in the Management Repository, providing administrators with a rich source of diagnostic information and trend analysis data.

      Reference: Oracle Reference Architecture,Management and Monitoring, Release 3.0

      100% Dumps4cert Free Download!
      Download Free Demo:1z0-574 Demo PDF
      100% Dumps4cert Free Guaranteed!
      1z0-574 Dumps

      Dumps4cert ExamCollection Testking
      Lowest Price Guarantee Yes No No
      Up-to-Dated Yes No No
      Real Questions Yes No No
      Explanation Yes No No
      PDF VCE Yes No No
      Free VCE Simulator Yes No No
      Instant Download Yes No No

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    This site uses Akismet to reduce spam. Learn how your comment data is processed.