[Free] 2018(Jan) Dumps4cert Testinsides Oracle 1z0-574 Dumps with VCE and PDF Download 101-110

Dumps4cert.com : Latest Dumps with PDF and VCE Files 2018 Jan Oracle Official New Released 1z0-574
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/1z0-574.html

Oracle IT Architecture Essentials

Question No: 101

The Oracle Reference Architecture (ORA) includes the central layers as well as Technology Perspectives and Industry perspectives. Which statements best describe how these are related within ORA?

  1. The Technology Perspectives are reference architectures incorporating specific technologies, products, and standards.

  2. The Technology Perspectives provide a view of ORA focused on specific technologies, product and standards.

  3. The Industry Perspectives are reference architectures for specificindustries, for example, Telco, Pharma.

  4. The Industry Perspectives extend the central layers of ORA toincludeindustry-specific capabilities, components, and so on.

  5. ORA is a collection of reference architectures, some based on technology (Technology Perspectives), and some based on industry verticals (Industry Perspectives).

Answer: B,D

Explanation: The core ORA material is extended via architecture perspectives. There are two types

of perspectives: Technology and Industry(not E).

B:Technology perspectives extend the core material by adding the unique capabilities,

components, standards, and approaches that a specific technology strategy offers. SOA, BPM, EPM/BI, and EDA are examples of perspectives for ORA.

Each technology strategy presents unique requirements to architecture that includes specific capabilities, principles, components, technologies, standards, etc. Rather than create another reference architecture for each strategy, ORA was designed to be extensible to incorporate new computing strategies as they emerge in the industry

In order to present the reference architecture in the most effective manner, each new technology strategy adds a perspective to ORA. This enables the reference architecture to evolve holistically. New computing strategies extend the core material, providing further insight and detail as needed.

A perspective extends the ORA core collateral by providing views, principles, patterns, and guidelines that are significant to that technology domain yet cohesive with the overall ORA.

Industry perspectives extend the core material by adding the business functions, business processes, data entities, software capabilities and components that an industry vertical requires. Retail, Financial, Telco, and Pharma are examples of industry perspectives for ORA.

Reference: IT Strategies from Oracle, An Overview, Release 3.0

Question No: 102

What capabilities are provided by Oracle Enterprise Repository (OER)?

  1. Dependency Analysis

  2. Asset Prescription

  3. Asset Versioning

  4. O-R Mapping

Answer: A,C

Explanation: The primary focus of the Metadata Repository (aka Enterprise Metadata Repository or

Enterprise Repository) is design-time, and it usually has no role in the runtime environment of most SOA deployments.

The metadata repository is primarily a human interface for asset

capture and presentment. It has integration with the service registry to promote the service interfaces and with the security framework for repository security like

authentication and access control.

Core capabilities of the metadata repository include:

  • Asset Management

  • Asset Lifecycle Management

  • Usage Tracking

  • Service Discovery

  • Version Management (C)

  • Service Taxonomy

  • Dependency Analysis (A)

  • Portfolio Management

Reference: Oracle Reference Architecture, SOA Infrastructure, Release 3.0

Question No: 103

Which of the following statements are true concerning, data formats used In Service- Oriented Integration (SOI)?

  1. SOA Services used in SOI should use application-specific data formats to ensure accurate transmission of data entities from the source systems.

  2. A single, canonical data model must be created to successfully build an enterprise-wide SOI.

  3. Data formats should be based on logical representations of business-level entities to facilitate composite application assembly.

  4. Application-specific data formats should be translated to and from normalized data formats.

  5. Data formats should use third normal form because this is the most efficient format for transmitting data.

  6. Binary data formats should not be used because they are costly and difficult to maintain.

  7. XML data formats should not be used because they are too verbose and result in poor performance.

Answer: C,D,F

Explanation: C:Logical Data Representations

Message and data formats should be based on logical representations of business objects rather than native application data structures.

D: Providing consumer representations and reading from and writing to multiple source systems leads to the issue of data format transformations. For a very small number of source systems, point-to-point transformations can be used by the SOA Services.

However, this approach becomes untenable as the number of source systems increases. Thus, a better approach is to create a normalized format for the data entities and then provide transformations to and from the normalized format for each source system.

Normalized Data Formats

Data transformations are to and from normalized formats. Normalized data formats facilitate composition and reduce the number of transformations that must be created and maintained.

F: Binary data formats would be awkward.

Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0

Question No: 104

In order to support rapid development, which one of the following principles must be applied?

  1. The architecture must provide a Rapid Application Development framework for user interface development.

  2. The architecture must provide guided development of the user interface without needlessly exposing the developer to implementation details.

  3. The architecture must provide access to the full implementation details of the interface in order permit maximum flexibility in the development process.

  4. Usability best practices are incorporated into proven user-interface techniques.

Answer: B

Explanation: The architecture must provide rapid, guided development of the user interface without needlessly exposing the developer to

implementation details.

Reducing the time and resources required to deliver business solutions is required for IT to better support and align with business needs. Low level development is both time consuming and error prone.

Reference: Oracle Reference Architecture, User Interaction, Release 3.0

Question No: 105

Assets may be packaged into deployable units by using a variety of strategies. Which of the following is not a valid asset packaging scenario?

  1. bundled as a single archive file

  2. unbundled with artifactsinthe original location

  3. unbundled with artifacts moved to a new location

  4. bundles as a single executable binary file thatis run stand-alone

Answer: D

Explanation: The Reusable Asset Specification (RAS) provides the following guidelines with respect

to asset packaging.

  • Every reusable asset must contain at a minimum one manifest file and at least one artifact, to be considered a valid reusable asset.

  • An asset package is the collection of artifact files plus a manifest. There are several asset packaging scenarios including:

  • Bundled As Single Archive File (not A)

  • Unbundled with artifacts in original location (not B)

  • Unbundled with artifacts moved to new location (not C)

Reference: Oracle Reference Architecture, Software Engineering, Release 3.0,

Question No: 106

How is Oracle Database Firewall (ODF) used to protect applications from attacks such as SQL-Injection?

  1. ODF is an option for the Oracle Database. A DBA configures this option to inspect database commands and compare them with a set of known attacks. An ODF agent

    periodically downloads the latest signatures in order to keep up with the latest known types of attacks.

  2. ODF is a feature of Oracle Advanced Security. A database security administrator configures each database realm with a set of acceptable ports and protocols from which database clients can connect. Valid connections are continuously monitored for suspicious activity.

  3. ODF is an agent based secure connection component that is installed on the database and on the clients. It creates a VPN-like connection between the two that greatly reduces the likelihood of man-in-the-middle and SQL-injection attacks. An administrator installs ODF and configures it for a specific environment.

  4. ODF is a stand-alone product that is installed in between the client and database. It monitors and/or blocks SQL statements, comparing them against a set of known good or known bad statements.

Answer: D

Explanation: Oracle Database Firewall (ODF) – ODF is the first line of defense for both Oracle

and non-Oracle databases. It monitors database activity on the network to help prevent unauthorized access, SQL injections, and other forms of attack. ODF uses positive (white list) and negative (black list) security models to validate SQL commands before they can reach the database.

The ODF instances act as a firewall for incoming SQL

traffic. Each instance can handle multiple downstream databases, and the instances are configured for high availability. SQL traffic must pass through the firewall boxes in

order to reach the databases.

ODF protects Oracle, MySQL, Microsoft SQL Server, IBM DB2 for Linux, Unix, and Windows, and Sybase databases

Reference: Oracle Reference Architecture,Security, Release 3.1

Question No: 107

Which statement best describe the benefits of asset dependency tracking?

  1. Tracking the asset dependencies allows you to performiImpact analysis when changes need to occur.

  2. It is a governance mechanism to control and streamline changes to the assets.

  3. Dependency tracking improves the quality of code by ensuring 100% code coverage.

  4. Dependency tracking improves the performance by collocating related assets.

Answer: A

Explanation: As the number of assets grow rapidly, the interdependencies become hard to track if

not managed properly. Dependency tracking is beneficial as the number of assets increases, the relationships become more complex, and the need to revise or retire assets arises. Tracking the dependencies allows us to perform impact analysis when changes need to occur. This goes both ways – one may need to understand the dependencies an asset has, if the asset needs to be changed, moved, or virtualized; or one may need to understand what assets depend on a particular resource, if that resource needs to be modified, retired, or moved.

Reference: Oracle Reference Architecture,Software Engineering, Release 3.0

Question No: 108

Which of the following are benefits of three-tier distributed computing?

  1. It allows separation and independent scaling of the data tier and middle/business tier

  2. Management of security, transaction, and connection are handled in the middle tier.

  3. It allows the client to query the database directly.

  4. It improves the performance of the application tenfold.

Answer: A,B

Explanation: Three-tier architecture allows the data tier and middle tier to scale independently (A). It

also allows multiple clients to share the business logic running in the middle tier. This makes distribution of the application a lot easier. Since security, transactions management, and connection management are handled in the middle tier, it gives

better control of the resources (B). Three-tier architecture is more scalable than the simple client-server model and requires less powerful client side machines. Due to these characteristics this architecture is suitable for small to medium enterprise

deployments.

Note: Distributed programming typically falls into one of several basic architectures or categories such as Client-server, three-tier architecture, and N-tier architecture.

In the three tier architecture, business logic is handled in the middle tier, presentation rendering is handled on the client and data management is handled in the backend.

This architecture allows multiple clients to access centrally

deployed business logic components. This allows centralized distribution and management of resources.

Reference: Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0

Question No: 109

Which of the following are capabilities provided by the Monitoring Engine within the Logical view of the Management and Monitoring architecture?

  1. Resource Monitor

  2. System Monitor

  3. Collection Monitor

  4. Service Monitor

Answer: A,B,D

Explanation: Logocal View, Monitoring Engine:

Dumps4Cert 2018 PDF and VCE

Note:

The Monitoring Engine contains a number of monitoring sub-systems which respond to scheduled events, and specific user actions within the management console in making various requests for data to be collected from various managed targets. In

addition, these monitoring sub-systems integrate with each other to offer the administrator full discovery and drill down capabilities.

Reference: Oracle Reference Architecture,Management and Monitoring, Release 3.0

Question No: 110

Select the most appropriate reason why three-tier architecture is a better architectural choice than simple client-server architecture for complex enterprise applications.

  1. Three-tier architecture uses three threads to run the applications, so performance is better.

  2. Three-tier architecture combines presentation, business logic, and data processing of business logic, data, and presentation. This allows the tiers to be independently scaled to maximize the investment.

  3. Three-tier architecture combines presentation, business logic, and data processing into a single layer to eliminate network latencies.

  4. Three-tier architecture moves all processing to the client, thereby reducing the load on the server.

Answer: B

Explanation: Three-tier architecture allows the data tier and middle tier to scale independently. It

also allows multiple clients to share the business logic running in the middle tier. This makes distribution of the application a lot easier. Since security, transactions management, and connection management are handled in the middle tier, it gives better control of the resources. Three-tier architecture is more scalable than the simple client-server model and requires less powerful client side machines. Due to these characteristics this architecture is suitable for small to medium enterprise deployments.

Note: Distributed programming typically falls into one of several basic architectures or categories such as Client-server, three-tier architecture, and N-tier architecture.

In the three tier architecture, business logic is handled in the middle tier, presentation rendering is handled on the client and data management is handled in the backend.

This architecture allows multiple clients to access centrally

deployed business logic components. This allows centralized distribution and management of resources.

Reference: Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0

100% Dumps4cert Free Download!
Download Free Demo:1z0-574 Demo PDF
100% Dumps4cert Free Guaranteed!
1z0-574 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Add a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.