1Z0-574 | how many questions of 1Z0-574 vce?


Q41. What capabilities are provided by Oracle Enterprise Repository (OER)? 

A. Dependency Analysis 

B. Asset Prescription 

C. Asset Versioning 

D. O-R Mapping Answer: A,C 

Explanation: The primary focus of the Metadata Repository (aka Enterprise Metadata Repository or Enterprise Repository) is design-time, and it usually has no role in the runtime environment of most SOA deployments. The metadata repository is primarily a human interface for asset capture and presentment. It has integration with the service registry to promote the service interfaces and with the security framework for repository security like authentication and access control. 

Core capabilities of the metadata repository include: 

* Asset Management 

* Asset Lifecycle Management 

* Usage Tracking 

* Service Discovery 

* Version Management (C) 

* Service Taxonomy 

* Dependency Analysis (A) 

* Portfolio Management 

Reference: Oracle Reference Architecture, SOA Infrastructure, Release 3.0 

Q42. Where are the components of the client tier of the ORA UI logical architecture hosted? 

A. on the transcoding engine 

B. on the web server 

C. on the display device 

D. some components on the web server and some on the display device 

Answer:

Explanation: The Client Tier is hosted on the display device, this may be a browser or an thick client specific to the display device Reference: Oracle Reference Architecture, User Interaction, Release 3.0 

Q43. The Conceptual, Logical, and Product Mapping architecture views are core to the documents within the Oracle Reference Architecture (ORA) library- Which statement best describes the relationship between these three architectural views? 

A. The Conceptual view lists the concepts behind the architecture, the Logical view describes the rationale for the architecture, and the Product Mapping view Identifies the Oracle products required. 

B. The Conceptual view defines the architecture in less technical terms, the Logical view provides Increasing detail by using more technical terms, and the Product Mapping view maps Oracle products onto the Logical view. 

C. The Conceptual view is a high-level description of the architecture, the Logical view is a detailed description of the architecture, and the Product Mapping view illustrates the deployment of Oracle products. 

D. Each architecture view is designed to communicate to a specific stakeholder and there is no defined relationship between the views. 

E. Each architecture view is a description of the components within the architecture, the logical view describes the runtime interactions between the components, and the product mapping view illustrates the deployment of Oracle products. 

Answer:

Explanation: 

Q44. Why is it necessary to have Integration of Metadata Repository to the Source Code Management (SCM) server? 

A. The SCM needs to access the asset metadata for reporting purposes. 

B. The Metadata Repository links the asset metadata to the asset payload, which may be archived in the SCM. 

C. The Metadata Repository promotes the assets to the SCM. 

D. The Metadata Repository stores the asset metadata in the SCM. 

Answer:

Explanation: SCM server manages the code base and configuration. It uses file store or database for maintaining the asset payload and to manage the versioning of the assets. 

Note: The metadata repository is primarily a human interface for asset capture and presentment. It has integration with the service registry to promote the service interfaces and with the security framework for repository security like authentication and access control. It also has integration with other enterprise asset sources like Source Code Management (SCM) tools and file servers. Source Code Management (SCM) is the management of changes to documents, programs, and other information artifacts. 

Reference: Oracle Reference Architecture, Software Engineering, Release 3.0, 

Q45. Which of the following are examples of the management and visibility gap between the traditionally monitored IT Infrastructure resources and the Services? 

A. On-going Shift to Move to an Agile Shared Service Computing Environment 

B. On-going Shift to Manage IT from an End-User Experience Perspective 

C. Loosening of Corporate Policies and Regulations 

D. Increasing Number of Heterogeneous IT Infrastructure Components to Manage 

E. Complex Distributed Environments Requiring Access to Consolidated Information 

Answer: A,B,D,E 

Explanation: Examples of the management and visibility gap are listed below: 

* On-going Shift to Move to an Agile Shared Service Computing Environment 

* On-going Shift to Manage IT from an End User Experience Perspective 

* Increasing Need to Enforce Regulatory and Corporate Policies (not C) 

* Increasing Number of Heterogeneous IT Infrastructure Components to Manage 

* Complex Distributed Environments Require Access to Consolidated Information 

Note: Many companies today are deploying enterprise technology strategies (ETS) such as Service-Oriented Architectures (SOA), Business Process Management (BPM), and Cloud Computing, which are designed to make functions, processes, information, and computing resources more available. While these ETSs offer additional benefits and sophistication, they have created a management and visibility gap between the traditionally monitored IT infrastructure resources and the services that contribute to the overall experience encountered by the end user. 

Reference: Oracle Reference Architecture,Management and Monitoring, Release 3.0 

Q46. Which of the following is NOT defined as a primary ORA computing foundation component? 

A. Distributed Computing 

B. Utility Computing 

C. Grid Computing 

D. Caching 

Answer:

Explanation: Primary ORA computing foundation components: Distributed Computing On-Demand Computing Utility Computing Grid Computing Cloud Computing Elastic Computing Virtualization 

Reference: Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0 

Q47. Which of the following are examples of dynamic modeling? 

A. Behavior Modeling 

B. Interaction Modeling 

C. Static Modeling 

D. Data Modeling 

Answer: A,B 

Explanation: Static modeling focuses on capturing the instance attributes and snapshots of nodes and objects. Dynamic modeling generally refers to one or both of the following 

* Behavior modeling that focuses on the internal state changes 

* Interaction modeling that focuses on external collaborations. 

Note: Modeling is a prime and foremost activity of the engineering process. Modeling bridges the gap between business and technology worlds through the language common to both sides. 

Reference: Oracle Reference Architecture,Software Engineering, Release 3.0 

Q48. Credential mapping is done in order to create the proper credential for a user in order to issue a request to another system. In a scenario where one Oracle WebLogic Server makes a Web Service request to another Oracle WebLogic Server, where might credential mapping be performed? 

A. In the WLS platform (OPSS / OWSM agent) making the Web Service request 

B. In the service bus, if one is being used 

C. In the WLS platform (OPSS / OWSM agent) responding to the request 

D. In a Security Token Service, if WS-Trust is being used 

E. In the credential store 

F. In the identity management server 

Answer: A,C 

Explanation: OPSSworks in conjunction with OWSM and the WebLogic container. It provides the plug-in security framework.OPSS enables OWSM to perform credential mapping and identity assertion, which is necessary in order to propagate and assert identity from client to service. It also handles authentication and authorization of service requests as needed. 

A credential mapping service intercepts the outbound service request, maps the current user identity to the target credentials, and embeds the credentials within the outbound request. The receiver then extracts the credentials and authenticates the user. Mapping may be performed by an intermediary in order to avoid embedding such security concerns within the requestor or target resource. 

Note: OWSMis a run-time framework for security policy creation, management, and governance. Policies are created, attached to services, and enforced at various points in the messaging life cycle. OWSM includes a policy manager and Web Service security agents. Both the policy manager and agents run on Oracle WebLogic Server (OWLS). Agents can be on the service requester side (client) and/or the service provider side(A and C). Agents are installed in the OWLS Web Service interceptors. A request made to a Web Service is intercepted by an OWSM agent that enforces security policies defined in the OWSM policy manager. Since OWSM and Oracle Service Bus (OSB) both run on Oracle WebLogic Server, OWSM agents can be used to secure OSB proxy and business services. This provides a common, universal policy and enforcement model for WSS. OWSM is also integrated with Oracle JDeveloper to provide declarative policy attachment at development time. 

Reference: Oracle Reference Architecture,Security, Release 3.1 

Q49. Which statement best describes the role of the Data Normalization Layer within the Logical view of the Service-Oriented Integration (SOI) architecture? 

A. The Data Normalization Layer converts all data formats to third normal form to facilitate database access. 

B. The Data Normalization Layer converts all data formats to XML to facilitate platform independent. 

C. The Data Normalization Layer hides the complexity of the multiple data formats used by back end systems by converting data to standardized formats. 

D. The Data Normalization Layer stores persistent data in a normalized format. 

E. The Data Normalization Layer provides normalized access to all databasesiIncluded as back- end systems in the architecture. 

Answer:

Explanation: The Data Normalization Layer provides a standardized format for data entities. Each EIS stores data in its own (usually proprietary) format. This layer transforms the data to a form that is readily consumable by the upper layers in the architecture. 

The primary purpose of this layer in the architecture is to encapsulate and hide the complexity of the data models and formats used by the back-end systems. This allows the upper layers in the architecture to operate on data entities that match the needs of the business rather than operating on data that match the storage approach of the back-end systems. 

Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0 

Q50. What are the three key technical concepts related to Grid computing? 

A. Web Services 

B. Server Virtualization 

C. Clustering 

D. Dynamic Provisioning 

Answer: B,C,D 

Explanation: Grid computing is a technology architecture that virtualizes and pools IT resources, such as compute power, storage, and network capacity into a set of shared services that can be distributed and re-distributed as needed. Grid computing involves server virtualization, clustering, and dynamic provisioning. 

Reference: Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0