Which of the following interactions does not occur as part of a web-based single sign-on scenario?
A. A gateway, deployed In the Web Server, intercepts requests destined for protected resource
B. The user is prompted for login credentials when a protected resource is accessed and the user has not (recently) logged In.
C. Credentials are passed to the application for validation.
D. Authorization checks are optionally performed before the user is permitted access to the application.
E. A cookie is returned, which is used to permit access to other protected resources in that domain
Correct Answer: C
Explanation:
The application does not handle the validation.
Question 152:
BPM and SOA are frequently combined to provide greater business value than either technology provides independently. Which statements are true with regard to combining the BPM Technology Perspective and SOA Technology Perspective?
A. A Business Process may invoke a SOA Services to perform specific tasks within the process flow.
B. A Business Process may be exposed as a SOA Service.
C. When combining SOA and BPM, all the tasks within a Business Process are accomplished via Services.
D. A Business Process may invoke an SOA Service, but an SOA Service cannot invoke a Business Process.
E. Every business Process is exposed as a SOA Service.
Correct Answer: ABD
Explanation:
Note E: BPM processes and sub-processes can (but are not required) themselves be exposed as SOA Services. This enables processes to be composed of SOA Services that are implemented as processes. It can be beneficial in two ways. First, it improves reuse of lower level system-centric processes (i.e. service orchestrations), and second, it offers a standard interface mechanism with which to invoke all types of business processes.
Note: BPM and SOA are often used together, as they both support a closer alignment between business and IT, and they both promote agility. BPM targets alignment and agility at the process level, while SOA applies more at the activity level. Hence, business processes and SOA Services can represent business constructs, providing a mapping between the things business does and the way IT helps get it done. The convergence of BPM and SOA generally happens via process decomposition. That is when business processes are modeled as, (i.e. decomposed into), activities. All automated activities must be backed by some form of executable code or function call. These functions, if they are deemed worthy, can be engineered as SOA Services following service-oriented design principles. Agility at the process level is attained by changing the process model. Agility at the service level is achieved by deploying services that are loosely coupled and independently managed.
Question 153:
Which one of the following types of access control should be used when access to a resource is dependent upon specific qualities of the user, for example, membership status, frequency of purchases, or level of certification?
A. role-based access control
B. rule-based access control
C. discretionary access control
D. content-dependent access control
E. attribute-based access control
Correct Answer: C
Explanation:
Content dependent access control involves restricting access to content, such as documents and emails,
based on embedded keywords or certain assigned metadata. It works by inspecting the content and
applying rules to determine if access is permitted. This approach is taken by many Data Loss Prevention
solutions. It is possible to combine content dependent access control with role-based access control in
order to restrict access to content by established roles.
References:
Question 154:
The Mediation Layer in the Logical View of the Service-Oriented Integration architecture provides several capabilities. Which of the following are capabilities provided by the Mediation Layer?
A. enrichment - adding data elements to a data entity to give the entity increased Information
B. routing - sending the client request to the appropriate provider (s) based on some criteria
C. message transformation - converting the request message format to a different message form, appropriate for the provider
D. choreography - defining the messages that flow back and forth between systems that are participating in a business process
E. protocol mediation - converting a client request from one protocol to a different protocol used by provider
Correct Answer: BCE
Explanation:
The Mediation Layer provides loose coupling for the entire architecture. It decouples the layers of the
architecture as well as decoupling external users of the layers from the specific layers in the architecture.
The key capabilities in this layer include:
*
Routing - Routing provides the ability to send the client request to the appropriate provider based on
some criteria. The routing may even include sending the client request to multiple providers. This capability
SecurityPolicy) across all messages flowing through the mediation layer. Since the mediation layer is an
intermediary for message traffic, it provides a centralized policy enforcement capability.
References:
Question 155:
IT Strategies from Oracle (ITSO) Includes multiple Enterprise Technology Strategies. Why are there multiple Enterprise Technology Strategies within ITSO?
A. Each enterprise Technology Strategy documents the architecture for a particular Oracle product.
B. Each Enterprise Technology Strategy provides Oracle product details that are important to the technology strategy.
C. An Enterprise Technology Strategy provides detailed guidance on deploying the oracle products that are important to the technology strategy.
D. Each Enterprise technology Strategy provides a reference architecture and practical guidance to achieve success with specific new technology.
E. Each Enterprise Technology Strategy provides industry-vertical reference architecture and practical guidance.
Correct Answer: D
Explanation: IT Strategies from Oracle (ITSO) is a series of documentation and supporting material designed to enable organizations to develop an architecture-centric approach to enterprise-class IT initiatives. ITSO presents successful technology strategies and solution designs by defining universally adopted architecture concepts, principles, guidelines, standards, and patterns.
ITSO is made up of three primary elements Oracle Reference Architecture (ORA), Enterprise Technology Strategies (ETS) and Enterprise Solution Designs (ESD).
Enterprise Technology Strategies (ETS) offer valuable guidance on the adoption of horizontal technologies for the enterprise. They explain how to successfully execute on a strategy by addressing concerns pertaining to architecture, technology, engineering, strategy, and governance. An organization can use this material to measure their maturity, develop their strategy, and achieve greater levels of adoption and success. In addition, each ETS extends the Oracle Reference Architecture by adding the unique capabilities and components provided by that particular technology. It offers a horizontal technology-based perspective of ORA.
References:
Question 156:
Service Oriented Integration (SOI) exposes capabilities from existing source systems. Which statement best describes the Impact SOI has on existing source systems?
A. Because SOI exposes only existing capabilities, any new required functionality will be implemented by modifying the existing source systems.
B. No modifications to existing source systems are allowed because SOA Services expose all the necessary capabilities from the source systems.
C. Modifications to existing source systems should be avoided, but may be necessary to support SOA Service creation.
D. To support SOA Service connectivity, modifications will be required for the existing source systems incorporated into the SOI architecture.
Correct Answer: C
Explanation:
Some minor modifications may be required to support connectivity, but requiring extensive modifications
defeats a major reason for integration.
It must be noted that creating a SOA Service from existing assets generally requires a good deal more
than just adding a standards-based interface, i.e. simply service enabling existing assets is insufficient.
The SOA Service needs to expose process, functionality, and data that is usable in a broader context than
the source of the capability was designed to meet. Therefore, creating a SOA Service usually entails some
amount of aggregation, transformation, or expansion of existing capabilities provided by the source
systems. This requires a SOA Services layer between the existing assets and the consumers as illustrated
in the figure.
Note: The primary goal of service-oriented integration is to better leverage existing systems within the IT environment by applying service-oriented principles. Ultimately, the goal is to enable the assembly of composite applications, with little or no custom coding, that include capabilities sourced from existing systems. Composite applications are applications that pull together data, functionality, and process from multiple existing sources to solve a business problem or create new business value. Service-oriented integration is the mechanism to expose existing sources of data, functionality, and process so that those sources can be readily consumed by a composite application. Service construction includes creating entirely new SOA Services and also exposing existing assets as SOA Services. References:
Question 157:
Where are the components of the client tier of the ORA UI logical architecture hosted?
A. on the transcoding engine
B. on the web server
C. on the display device
D. some components on the web server and some on the display device
Correct Answer: C
Explanation: The Client Tier is hosted on the display device, this may be a browser or an thick client specific to the display device References:
Question 158:
Identify the true statements in the following list.
A. The core components of the ORA UI Logical view are grouped into the client tier and the server tier.
B. The components of the ORA UI Logical view are model, view, and controller.
C. The core components of the ORA UI Logical view are grouped into thedisplaytier and theresourcestier.
D. In addition to the core components, the Logical view also includes security, communication protocols, and development tools.
Correct Answer: AD
Explanation:
The Logical View of the architecture describes the various layers in the architecture. Each layer
encapsulates specific capabilities for the overall architecture. Upper layers in the architecture leverage the
capabilities provided by the lower layers.
The Client Tier is hosted on the display device.
The Service Tier hosts the capabilities that satisfy the requirements of the end user.
Question 159:
Interface elements are an important part of modular programming for UI. Which of the following statements is true with regard to Interface elements?
A. Interface elements are always provided as proprietary packages of widgets from device vendors and third parties.
B. There is a wide variety of interface elements that can be developed once and used repeatedly in various user-interface designs.
C. Interface elements are highly standardized and, once developed for one device, they are sufficiently portable to be reused on other devices without modification.
D. Interface elements implement application-specific functionality and are therefore rarely reusable across multiple applications.
Correct Answer: BC
Explanation:
Interface element that a computer user interacts with, and is also known as a control or Widget. Examples:
Windows, Pointer, Text Box, Button, Hyperlink, Drop-down list, List box, Combo box, Check Box, Radio
button, Cycle button, Datagrid
Question 160:
Which statement best describes the relationship between Oracle Reference Architecture (ORA) and the Oracle products?
A. ORA describes the architecture built in to the Oracle products.
B. ORA describes the architecture underlying the Oracle Fusion Applications.
C. ORA describes a product-agnostic architecture and then maps the Oracle products onto the architecture.
D. ORA describes an architecture thatis exclusively based on Oracle products.
Correct Answer: C
Explanation:
The Oracle Reference Architecture is Applicable to heterogeneous environments. It is independent of
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Oracle exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Z0-574 exam preparations and Oracle certification application, do not hesitate to visit our Vcedump.com to find your solutions here.