How is Oracle Database Firewall (ODF) used to protect applications from attacks such as SQL- Injection?
A. ODF is an option for the Oracle Database. A DBA configures this option to inspect database commands and compare them with a set of known attacks. An ODF agent periodically downloads the latest signatures in order to keep up with the latest known types of attacks.
B. ODF is a feature of Oracle Advanced Security. A database security administrator configures each database realm with a set of acceptable ports and protocols from which database clients can connect. Valid connections are continuously monitored for suspicious activity.
C. ODF is an agent based secure connection component that is installed on the database and on the clients. It creates a VPN-like connection between the two that greatly reduces the likelihood of man-inthe-middle and SQL-injection attacks. An administrator installs ODF and configures it for a specific environment.
D. ODF is a stand-alone product that is installed in between the client and database. It monitors and/or blocks SQL statements, comparing them against a set of known good or known bad statements.
Assets may be packaged into deployable units by using a variety of strategies. Which of the following is not a valid asset packaging scenario?
A. bundled as a single archive file
B. unbundled with artifactsinthe original location
C. unbundled with artifacts moved to a new location
D. bundles as a single executable binary file thatis run stand-alone
In order to support rapid development, which one of the following principles must be applied?
A. The architecture must provide a Rapid Application Development framework for user interface development.
B. The architecture must provide guided development of the user interface without needlessly exposing the developer to implementation details.
C. The architecture must provide access to the full implementation details of the interface in order permit maximum flexibility in the development process.
D. Usability best practices are incorporated into proven user-interface techniques.
Which of the following statements are true concerning, data formats used In Service-Oriented Integration (SOI)?
A. SOA Services used in SOI should use application-specific data formats to ensure accurate transmission of data entities from the source systems.
B. A single, canonical data model must be created to successfully build an enterprise-wide SOI.
C. Data formats should be based on logical representations of business-level entities to facilitate composite application assembly.
D. Application-specific data formats should be translated to and from normalized data formats.
E. Data formats should use third normal form because this is the most efficient format for transmitting data.
F. Binary data formats should not be used because they are costly and difficult to maintain.
G. XML data formats should not be used because they are too verbose and result in poor performance.
What capabilities are provided by Oracle Enterprise Repository (OER)?
A. Dependency Analysis
B. Asset Prescription
C. Asset Versioning
D. O-R Mapping
The Oracle Reference Architecture (ORA) includes the central layers as well as Technology Perspectives and Industry perspectives. Which statements best describe how these are related within ORA?
A. The Technology Perspectives are reference architectures incorporating specific technologies, products, and standards.
B. The Technology Perspectives provide a view of ORA focused on specific technologies, product and standards.
C. The Industry Perspectives are reference architectures for specificindustries, for example, Telco, Pharma.
D. The Industry Perspectives extend the central layers of ORA toincludeindustry-specific capabilities, components, and so on.
E. ORA is a collection of reference architectures, some based on technology (Technology Perspectives), and some based on industry verticals (Industry Perspectives).
Choose the three statements from the following list that accurately reflect architectural principles of Oracle Reference Architecture User Interaction.
A. The architecture must support separating configuration and other types of metadata from the source code.
B. The architecture must support orchestration of business application functions.
C. The architecture must support end-user access to a wide variety of server-side functionality.
D. The architecture must not attempt to replicate the capabilities of traditional client-server GUIs.
E. The architecture must provide secure interaction between the end user and the server-side resources.
F. The architecture must provide the end user with the capability to switch quickly between applications.
Service composition is the creating of a new SOA Service by aggregating existing SOA Services. Which statements are correct concerning the use of service composition within the Service-Oriented Integration architecture?
A. The SOI architecture is a layered architecture; therefore service composition is not allowed.
B. Service composition is allowed, even encouraged, by the SOI architecture.
C. Service composition within the SOI architecture is allowed only when the aggregation is over SOA Services from lower layers in the architecture.
D. Service composition should be avoided because service aggregation is provided by the Mediation Layer.
E. Service composition is allowed, but is discouraged because service composition leads to complex dependencies.
Which statement best describes the relationship between the Logical View and the Development view of the Service-Oriented Integration architecture?
A. The two architectural views are Independent and there is no relationship between them.
B. The Logical View defines the rationale for layers within the architecture. The Development View specifies the developer tools used for each layer.
C. The Logical View defines the layers of the architecture and the capabilities within each layer. The Development View describes how aspects of the architecture impact developers following the architecture.
D. The Logical View defines the layers of the architecture and the capabilities within each layer. The Development View specifies the developer tools that provide the capabilities for each layer.
E. The Logical View specifies the developer tools required by each layer in the architecture. The Development View describes the developer impact of the tools specified.
Which of the following statements are true about applying security to SOA Services?
A. SOA Services must base access control decisions on roles, attributes, rules, and so on, that are universal to all consumers.
B. SOA Services are difficult to secure due to a lack of security standards for Web Services.
C. SOA Services are a type of monolithic application with self-contained identity and role management.
D. Data returned by a SOA Service may need to be redacted according to data classification schemes, depending on the privileges of users.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Oracle exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Z0-574 exam preparations and Oracle certification application, do not hesitate to visit our Vcedump.com to find your solutions here.