Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan Oracle Official New Released 1z0-574
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/1z0-574.html

Oracle IT Architecture Essentials

Question No: 81

Which of the following environments are typically clustered?

  1. Development Environment

  2. User Acceptance Testing (UAT) Environment

  3. Staging Environment

  4. Nonfunctional Testing Environment

Answer: B

Explanation: UAT (also known as beta testing) : Formal testing with respect to user needs, requirements, and business processes conducted to determine whether or not a system satisfies the acceptance criteria and to enable the user, customers or other authorized entity to determine whether or not to accept the system.

Incorrect answer:

The staging tier is a environment that is as identical to the production environment as possible. The purpose of the Staging environment is to simulate as much of the Production environment as possible. The Staging environment can also double as a Demonstration/Training environment.

Reference: Oracle Reference Architecture,Business Process Engineering, Release 3.0

Question No: 82

Which of the following statements are true about defense-in-depth strategy?

  1. It saves money by allowing organizations to remove costly perimeter security Infrastructure.

  2. It is a strategy designed to win the battle by attrition. It consists of multiple security measures at various levels as opposed to a single barrier.

  3. It includes security measures for the network, the operating system, the application, and data.

  4. Due to network overhead issues, it should not be used in a distributed computing environment such as SOA or cloud computing.

  5. It is a good strategy to protect an organization from insider threats.

Answer: B,C,E

Explanation: Defense in depth is a security strategy in which multiple, independent, and mutually

reinforcing security controls are leveraged to secure an IT environment.

The basic premise is that a combination of mechanisms, procedures and policies at different

layers within a system are harder to bypass than a single or small number security mechanisms. An attacker may penetrate the outer layers but will be stopped before reaching the target, which is usually the data or content stored in the #39;innermost#39; layers of the environment. Defense in depth is also adopted from military defense strategy, where the enemy is defeated by attrition as it battles its way against several layers of defense.

Defense in depth should be applied so that a combination of firewalls, intrusion detection and prevention, user management, authentication, authorization, and encryption mechanisms are employed across tiers and network zones.

The strategy also includes protection of data persisted in the form of backups and transportable/mobile devices. Defense in depth should take into account OS and VM hardening as well as configuration control as means of preventing attackers from thwarting the system by entering via the OS or by tampering with application files.

Reference: Oracle Reference Architecture,Security, Release 3.1

Question No: 83

The principle of quot;Security as a Servicequot; states that business solution; must be designed to consume common security services, where possible, as opposed to implementing custom security logic and replicating copies of security data. Which of the following statements is not an Implication of this principle?

  1. Security logic must be externalized as much as possible, i.e., developers must not hand- code security logic into business solutions.

  2. Security enforcement, decisions, and management must be performed by dedicated, shared services and Infrastructure.

  3. Wherever possible, security services must be built upon open standards.

  4. Security services must use Web Service (SOAP) interfaces and XML payloads in order to promote Interoperability.

Answer: A,B,C

Explanation: Rationale: Security services allow multiple solutions to share common security logic, features, policies, and identity information. This

provides a more secure environment by eliminating

redundancies and associated risks. It also enables more effective management of security in the IT environment.

Implications:

  • Security logic must be externalized as much as possible, i.e., developers must not hand-code security logic into business solutions.(A)

  • Security enforcement, decisions, and management must be performed by dedicated, shared services and infrastructure.(B)

  • Security services must leverage open standards for interface protocols and message formats where possible in order to promote interoperability.(C)

  • The availability and performance characteristics of security services must meet or exceed the specifications required to support the business solutions.

Reference: Oracle Reference Architecture,Security, Release 3.1

Question No: 84

Which of the following combinations represent a true multi-factor authentication

mechanism?

  1. password and PIN

  2. password and token

  3. PIN and token

  4. token and fingerprint

  5. fingerprint and retina scan

  6. password and retina scan

Answer: B,C,D,F

Explanation: Multi-factor authentication is the requirement of more than one form of proof of

identity, from more than one type (factor) of proof. The three main types of factors are:

  • Human Factors (something you are), which includes biometrics such as retina scans, fingerprints, etc.

  • Personal Factors (something you know), such as passwords, PINs, etc.

  • Technical Factors (something you have), for instance smart card, token, etc.

    A multi-factor authentication scheme must include at least one form of proof from at least two of the above factor types. For instance, it could include the use of a smart card and PIN, but not a password and PIN.

    Note: Multi-factor authentication greatly reduces the risk of establishing fraudulent identity over a scheme that uses only one factor. It takes away the ability to fraudulently authenticate by obtaining any single piece of technology or password secret.

    One way to achieve multi-factor authentication without requiring additional proofs

    from the user is to track which devices the user logs in from. The device can suffice as something the user has, for instance a laptop computer. If the user logs in from a different device, or the device is used for a different user, then additional authentication challenges may be warranted.

    Reference: Oracle Reference Architecture, Security , Release 3.1

    Question No: 85

    Which of the following is not a characteristic of Cloud computing?

    1. multi-tenancy

    2. elastic scaling

    3. pay-for-use pricing

    4. manual provisioning

    Answer: D

    Reference: Oracle Reference Architecture, Cloud Foundation Architecture, Release 3.0

    Question No: 86

    Which one of the following user classification schemes best reflects what function or function performs?

    1. role-based classification

    2. rule-based classification

    3. group-based classification

    4. attribute-based classification

    5. rank-based classification

    Answer: A

    Explanation: Given the potentially large number of users of a system, access privileges are generally

    not assigned at the user level. Instead, users are assigned to groups (mimicking the organizational structure of a company), or roles (defined based on job functions that users perform), or some combination of the two. Access privileges are then assigned to groups and/or roles. The most natural case is that they are assigned to roles, since roles align more closely with operations users naturally perform to accomplish their

    job. The industry term for this is Role-Based Access Control (RBAC). RBAC is more flexible than defining access rights based on usernames or static groups and enables an organization to be more versatile when allocating resources.

    With RBAC the system must determine if the subject (user or client) is associated with a role that has been granted access to a resource. This process of user to role ascertainment is called role mapping.

    Incorrect answers

    B: Rule-based access control is very similar to fine-grained access control, where access is controlled by rules defined in policies. The twist is that rules might refer to each other.

    For instance, access may be granted to resource/function A as long as it is not also

    granted to resource/function B. This form of control can be used to ensure that a group or individual is not given privileges that create a conflict of interest or inappropriate level of authority. For instance, the approver of expenses or purchases cannot be the same as the requestor.

    C: Role is better here.

    D: There are times when access should be based on characteristics the user has rather than the organization or roles to which the user belongs. For instance, a customer with premium status might be granted access to exclusive offers, and a sales representative that has achieved his target sales revenue might have access to certain perks. Such levels of status vary over time, making it difficult to manage access based on relatively static group or role assignments. Attribute-based access control offers a more dynamic method of evaluation. Decisions are based on attributes assigned to users, which are free to change as business events unfold. Access policies define the attributes and values a user must have, and access decisions are evaluated against the current values assigned to the user. Attributes can be used to support both course-grained and

    fine-grained authorization.

    E: No such thing as rank-based classification

    Reference: Oracle Reference Architecture,Security, Release 3.1

    Question No: 87

    Which of the following are architecture principles that pertain to the management and monitoring framework?

    1. focus on individual resources

    2. service aware

    3. standards-based integration

    4. manual governance processes

    5. discoverable

    Answer: B,C,E

    Explanation: The following list is a sample architecture principles that pertain to the management and monitoring framework.

  • Service Aware (B)

Treat a Service as a super infrastructure component.

As more and more enterprises utilize Services as a means to

build and compose business solutions it has become critical that IT operations have a comprehensive approach to managing and monitoring these Services.

* Standards-based Integration (C)

Standards based approach to integration to interact with internal and external IT operational systems.

Standards-based integration improves the ability to interoperate with existing but also future and unknown IT operational systems. This facilitates the ability to manage and monitor the IT environment holistically as well as minimizing the cost of maintaining the integrations.

*Discoverable (E)

Discovery of deployed services and infrastructure components. Services and infrastructure components have become more dependent on one another, with many of these interdependencies crossing corporate boundaries. Without access to information concerning these dynamic interdependencies diagnosing problems and correlating problems in a complex, distributed environment is a huge challenge. Identifying and understanding dependencies manually is cost prohibitive, and breaks down with rising complexity and a rapid rate of change.

Note:

Other architecture principles that apply here as well:

*Compliant

  • Proactive

  • Externalize Management

  • Manage and Monitor as One

  • Extensible

Reference: Oracle Reference Architecture,Management and Monitoring, Release 3.0

Question No: 88

Which of the following statements describes the relationship between Cloud computing and

Grid computing?

  1. Grid computing is the same as Cloud computing

  2. Grid architectures are likely to be used in building Clouds

  3. Grid computing is an evolution of the Cloud computing architecture

  4. Grid computing and Cloud computing are totally unrelated concepts

Answer: B

Explanation: The term utility computing is often used to describe the metered (or pay-per- use) IT services enabled by grid computing. Cloudcomputing (where dynamically scalable and often virtualized resources are provided as a service over the internet) is another term that describes how enterprises are using computing resources-on both private and public networks-over the internet.

Because grid computing provides superior flexibility, it is the natural architectural foundation for both utility and cloud computing.

Reference: Oracle White Paper, Oracle Grid Computing

Question No: 89

Which statement best describes synchronous versus asynchronous communications in a Service Oriented Integration (SOI) architecture?

  1. Both synchronous and asynchronous communication should be supported by SOI. Synchronous communication provides an easier programming paradigm. Asynchronous communication provides greater decoupling between the requester and the responder.

  2. The SOI architecture should use only synchronous communication because SOA Services are inherently synchronous. If a back end system supports only asynchronous communications, the quot;bridging synchronous and asynchronous communicationsquot; integration pattern can be used to convert from asynchronous communication to synchronous communication.

  3. The SOI architecture should use only asynchronous communication because asynchronous communication provides greater decoupling in the architecture. If a back-end system supports only synchronous communications, the quot;bridging synchronous and asynchronous communicationsquot; integration pattern can be used to convert from synchronous communication to asynchronous communication.

  4. The SOA Services in the SOI architecture should use only synchronous communication because SOA Services are inherently synchronous. All communication with back-end system should be asynchronous to decouple the SOA Services from the back-end systems.

  5. The communication within the SOI architecture should be asynchronous and should follow the publish-and-subscribe integration pattern. The publish-and-subscribe pattern is the most flexible and provides the greatest decoupling and message throughput.

Answer: A

Explanation: When using synchronous communication the service consumer blocks until the service

provider responds. This is usually the easiest type of communication to program in the consumer application. Thus, synchronous communication must be supported by the architecture.

Many applications included in integration scenarios do not provide a synchronous interface. Asynchronous communication is also used when the response time for the source system is too slow to support the timelines of the calling systems. Thus the architecture must support asynchronous communications.

Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0

Question No: 90

IT Strategies from Oracle (ITSO) includes many Enterprise Solution Designs (ESD). Which statement best describes what an ESD provides to ITSO?

  1. An ESD describes the business processes and data entities that are incorporated into a specific Oracle application.

  2. An ESD detailsindustry-specific business processes that span two or more Oracle applications.

  3. An ESD describes the current state and desired future-state architecture of a typical enterprise in a vertical industry.

  4. An ESD identifies the Oracle applications that are focused on a particular vertical industry.

Answer: B

Explanation: ITSO is made up of three primary elementsOracle Reference Architecture (ORA), Enterrprise Technology Strategies (ETS) and Enterprise Solution Designs (ESD).

Enterprise Solution Designs (ESD) are industry specific solution perspectives based on ORA. They define the high level business processes and functions, and

the software capabilities in an underlying technology infrastructure that are required to build enterprise-wide industry solutions. ESDs also map the relevant application and technology products against solutions to illustrate how capabilities in Oracle’s complete integrated stack can best meet the business, technical and quality of service requirements within a particular industry.

Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0

100% Dumps4cert Free Download!
Download Free Demo:1z0-574 Demo PDF
100% Dumps4cert Free Guaranteed!
1z0-574 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.