You are developing an Integration component that uses customer data. The source system defines customer data in a different format than expected. Which of the following options best describes how you would develop the component?
A. Create an object representation of customer data and use itin the component.
B. Externalize the data transformation by mapping the source data format to a canonical data format.
C. The data formats are different, so it is not possible to develop the component.
D. Write data from the source system into a database and read it back in the expected format.
Correct Answer: A
Explanation:
Note: It is quite common to encounter use cases that require transformation of information from one format to another, especially in the area of enterprise integration. Source systems and target systems may use very different representations of data and in some cases, a canonical data model might be used as a common intermediate format. In some cases, the transformation is a simple field-to-field mapping whereas in other cases it is a complex manipulation and conversion of data. It should be possible to visually map the source and target representations with the ability to enrich the elements to support both simple and complex data transformations.
Question 132:
Which of the following are true statements about the benefits of standardizing on a common security framework?
A. Security requirements no longer need to be specified for eachindividual application; the framework will automatically determine what security needs to be applied.
B. A common set of security services and information can be used across the organization, promoting Infrastructure reuseand minimizing inconsistencies.
C. Secure application integrationis made easier via standardization on a preferred subset of technologies and options.
D. Administration and auditing are improved due to rationalization and standardization of identities, attributes, roles, policies, and so on.
E. Interoperability amid federation are easier to achieve via the adoption of common security and technology standards.
Correct Answer: ABE
Explanation:
In order to provide security in a consistent manner, a common set of infrastructure, e.g. a security
framework, must be used. The purpose of this framework is to rationalize security across the enterprise by:
*
Establishing a master set of security data that reflect the policies, IT resources, participants and their attributes across the entire domain of security
*
Mapping organizational structures, computing resources, and users to roles in a way that clearly depicts access privileges for the organization
*
Maintaining fine-grained access rules based on roles that have been established for the organization
*
Propagating the master security data to individual applications and systems that enforce security (A)
*
Detecting changes to security data residing on systems that have not been propagated from the master source of record, and sending alerts regarding these inconsistencies
*
Providing common security services, such as authentication, authorization, credential mapping, auditing, etc. that solutions can leverage going forward in place of custom-developed and proprietary functions (B)
*
Facilitating interoperability between systems and trust between security domains by acting as a trusted authority and brokering credentials as needed(E)
*
Centrally managing security policies for SOA Service interactions
The security framework should provide these types of capabilities as a value-add to the existing infrastructure. The intent is not to discard the capabilities built into current applications, but rather to provide a common foundation that enhances security across the enterprise. Security enforcement can still be performed locally, but security data should be modeled and managed holistically.
Incorrect:
C: Not a main goal.
D: Ease of administration and auditing is not a main goal here.
References:
Question 133:
What shortcomings of the Version Control Systems drive the need for a Metadata Repository?
A. Version Control Systems are not easily searchable.
B. Version Control Systems lack robust metadata that allows developers to determine relevance.
C. Version Control Systems don't provide the level of consumer tracking and reporting necessary to support software reuse.
D. Version Control Systems do not allow the asset versions to be rolled back to a previousstate
Correct Answer: B
Explanation: The underlying core principle of ORA Engineering is asset sharing and enterprise development through an integrated asset management approach. Most organizations use a Software Configuration Management (SCM) or Version Control System (VCS) for managing the code and configuration assets. These tools are great for managing the versioning of assets produced but they don't maintain the metadata of the assets. Without metadata assets are not organized in context and it is hard to discover them. ORA recommends an asset-centric engineering process, where an Asset Manager is used to address the challenges posed by the traditional approaches. The Asset Manager is typically an enterprise-scoped Metadata Repository working in concert with SCMs and other types of asset repositories.
References:
Question 134:
Which of the following are the implications of the architecture principle, "Asset-centric approach must be applied to engineering processes"?
A. The development Infrastructure must support asset-centric engineering.
B. Assets must be associated with meaningful metadata that can be used to discover and interpret the assets.
C. Solutions developed must beintegrated and tested early and often.
D. Existing assets must be reused to fulfill whole or part functionality when available.
Correct Answer: B
Explanation: The underlying core principle of ORA Engineering is asset sharing and enterprise development through an integrated asset management approach. Most organizations use a Software Configuration Management (SCM) or Version Control System (VCS) for managing the code and configuration assets. These tools are great for managing the versioning of assets produced but they don't maintain the metadata of the assets. Without metadata assets are not organized in context and it is hard to discover them. ORA recommends an asset-centric engineering process, where an Asset Manager is used to address the challenges posed by the traditional approaches. The Asset Manager is typically an enterprise-scoped Metadata Repository working in concert with SCMs and other types of asset repositories.
References:
Question 135:
Which three primary components form IT Strategies from Oracle (ITSO)?
A. Enterprise Technology Strategies
B. Maximum Availability Architecture
C. Enterprise Solution Designs
D. Oracle Reference Architecture
E. Oracle Enterprise Architecture Framework
F. Oracle Unified Method
Correct Answer: ACD
Explanation:
ITSO is made up of three primary elements.
Enterprise Technology Strategies (ETS)
Enterprise Solution Designs (ESD)
Oracle Reference Architecture (ORA)
References:
Question 136:
Which of the following statements are true about perimeter security?
A. Though it is often associated with network security, it also applies to physical security measures as fences and locked doors.
B. It is most effective when there is only one perimeter. For example, when inner perimetersare established, they reduce the effectiveness of outer perimeters.
C. The Demilitarized Zone (DMZ) is the most protected zone of the network, which should be reserved for only the most sensitive data.
D. Connections should not be permitted to span more than one perimeter or firewall.
E. Perimeter security can be a component of a defense-in-depth strategy.
F. Perimeter security is most effective for protection against insider threats.
Correct Answer: ADE
Explanation:
A: Your inner perimeter consists of the doors, windows and walls of your building(s). Protecting your inner perimeter is usually accomplished with locks, keys and alarm systems.
D:
E: Defense in depth is a security strategy in which multiple, independent, and mutually reinforcing security controls are leveraged to secure an IT environment. Defense in depth should be applied so that a combination of firewalls, intrusion detection and prevention, user management, authentication, authorization, and encryption mechanisms are employed across tiers and network zones. Defense in depth is compatible with perimeter security in that network perimeters (or more generically, protection zones) can make up part of the defense in depth strategy.
References:
Question 137:
Conventional Management and Monitoring tools focus and produce metrics on which one of the following?
A. holistically across heterogeneous systems
B. metrics that measure individual resources
C. metrics that focus on understanding the relationship and Interactions between component
D. metrics that capture the combined behavior of several components interacting with the shared component
Correct Answer: B
Explanation:
Conventional tools tend to focus and produce metrics on individual resources which is inadequate for an
agile shared services computing environment.
Note:
A metric is a unit of measurement used to report the health of the system that is captured from the
monitored infrastructure components. Metrics from all monitored infrastructure components are stored and
aggregated in the Management Repository, providing administrators with a rich source of diagnostic
information and trend analysis data.
References:
Question 138:
Which of the following are common uses of an Attribute Service?
A. to maintain metadata pertaining to audit log entries and attestation reports
B. to acquire data that are necessary to make access-control decisions
C. to securely supply personally identifiable information to applications
D. to determine which security policy is assigned to a Web Service
Correct Answer: BC
Explanation:
The Attribute Service(AS) retrieves user information from an attribute store. The AS retrieves user
information associated with a user from variety of authoritative identity stores including, but not limited to,
LDAP and database stores.
Question 139:
Which of the following statements best describes how the deployment supports closed-loop governance?
A. The Metadata Repository is integrated with the operational systems to link operational metrics to the assets to ensure that the assets perform asintended.
B. The Metadata Repositories deployed in each environment are chained to share asset usage information.
C. A closed-loop governance framework is deployed on a clustered server to monitor the governance activities.
D. Production systems are integrated to the developer desktops to validate the requirements against the implemented code.
Correct Answer: BC
Explanation:
SOA Software's Policy Manager and Service Manager combine to form a comprehensive closed-loop SOA
Governance solution.
Closed loop means:
*
Defining and managing actionable policies in a governance solution at design-time
*
Enforcing these policies via deep integration with a management solution at run-time
*
Auditing that these policies are being enforced
*
Using industry standards (WS-Policy, WS-MEX) where appropriate for information exchange Closed loop infrastructure enables demand and Value Management
*
Collect performance, usage and exception statistics at run-time
*
Track these statistics via the governance solution
*
Use live, audited information to drive value-based decisions about the effectiveness of different services and organizations
*
Provide developers with up to the minute information about a service in runtime to inform their decisions about which services to use
*
Manage supply and demand to ensure maximum efficiency and benefit from SOA
The products share a common registry and metadata repository to ensure seamless integration and offer active governance. Closed-loop governance will:
*
Ensure defined policies are enforced ** When you define a policy for a service you have to KNOW categorically that it is being enforced ** Generate audit trails for run-time and design-time policy compliance
*
Measure the real-world value of SOA ** Not just theoretical value ** How many applications are using each service, and how much are they using it ** NOT how many applications have asked to use a certain capacity of each service
*
Manage, monitor and control relationships between consumers and providers ** Enforced contracts ** Capacity planning Change management
The diagram below shows the relationships between SOA governance, security and management, demonstrating how SOA Policy Management forms a closed loop of policy, metrics, and audit.
http://www.soa.com/images/img_closed_loop.gif
Question 140:
Which of the following Oracle products provides a comprehensive Integrated Development Environment (IDE)?
A. Oracle Enterprise Pack for Eclipse
B. Oracle JDeveloper
C. Oracle Service Registry
D. Enterprise Manager
Correct Answer: AB
Explanation:
A: Oracle Enterprise Pack for Eclipse is a free set of certified plug-ins, enabling WebLogic developers to support Java EE and Web Service standards. Oracle Enterprise Pack for Eclipse supports development with technologies including Database, Java SE, Java EE, Web Services, XML, Spring Framework and Oracle Fusion Middleware.
B: Oracle JDeveloper is a free integrated development environment that simplifies the development of Java-based SOA applications and user interfaces with support for the full development life cycle.
Incorrect answers
Oracle Service Registry and Enterprise Manager are not development tools.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Oracle exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Z0-574 exam preparations and Oracle certification application, do not hesitate to visit our Vcedump.com to find your solutions here.