[Free] 2018(Jan) EnsurePass Testking Oracle 1z0-574 Dumps with VCE and PDF 41-50

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-574
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/1z0-574.html

Oracle IT Architecture Essentials

Question No: 41

Which of the following statements are true about perimeter security?

  1. Though it is often associated with network security, it also applies to physical security measures as fences and locked doors.

  2. It is most effective when there is only one perimeter. For example, when inner perimetersare established, they reduce the effectiveness of outer perimeters.

  3. The Demilitarized Zone (DMZ) is the most protected zone of the network, which should be reserved for only the most sensitive data.

  4. Connections should not be permitted to span more than one perimeter or firewall.

  5. Perimeter security can be a component of a defense-in-depth strategy.

  6. Perimeter security is most effective for protection against insider threats.

Answer: A,D,E

Explanation: A: Your inner perimeter consists of the doors, windows and walls of your building(s). Protecting your inner perimeter is usually accomplished with locks, keys and alarm systems.

D:

E: Defense in depth is a security strategy in which multiple, independent, and mutually reinforcing security controls are leveraged to secure an IT environment. Defense in depth should be applied so that a combination of firewalls, intrusion

detection and prevention, user management, authentication, authorization, and encryption mechanisms are employed across tiers and network zones.

Defense in depth is compatible with perimeter security

in that network perimeters (or more generically, protection zones) can make up part of the defense in depth strategy.

Reference: Oracle Reference Architecture,Security, Release 3.1

Question No: 42

Which three primary components form IT Strategies from Oracle (ITSO)?

  1. Enterprise Technology Strategies

  2. Maximum Availability Architecture

  3. Enterprise Solution Designs

  4. Oracle Reference Architecture

  5. Oracle Enterprise Architecture Framework

  6. Oracle Unified Method

Answer: A,C,D

Explanation: ITSO is made up of three primary elements. Enterprise Technology Strategies (ETS)

Enterprise Solution Designs (ESD) Oracle Reference Architecture (ORA)

Reference: IT Strategies from Oracle, An Overview, Release 3.0

Question No: 43

Which of the following are the implications of the architecture principle, quot;Asset-centric approach must be applied to engineering processesquot;?

  1. The development Infrastructure must support asset-centric engineering.

  2. Assets must be associated with meaningful metadata that can be used to discover and interpret the assets.

  3. Solutions developed must beintegrated and tested early and often.

  4. Existing assets must be reused to fulfill whole or part functionality when available.

Answer: B

Explanation: The underlying core principle of ORA Engineering is asset sharing and enterprise

development through an integrated asset management approach. Most organizations use a Software Configuration Management (SCM) or Version Control System (VCS)

for managing the code and configuration assets. These tools are great for managing the versioning of assets produced but they don#39;t maintain the metadata of the assets.

Without metadata assets are not organized in context and it is hard to discover them.

ORA recommends an asset-centric engineering process, where

an Asset Manager is used to address the challenges posed by the traditional approaches. The Asset Manager is typically an enterprise-scoped Metadata Repository working in concert with SCMs and other types of asset repositories.

Reference: Oracle Reference Architecture,Software Engineering, Release 3.0

Question No: 44

What shortcomings of the Version Control Systems drive the need for a Metadata Repository?

  1. Version Control Systems are not easily searchable.

  2. Version Control Systems lack robust metadata that allows developers to determine relevance.

  3. Version Control Systems don#39;t provide the level of consumer tracking and reporting necessary to support software reuse.

  4. Version Control Systems do not allow the asset versions to be rolled back to a previousstate

Answer: B

Explanation: The underlying core principle of ORA Engineering is asset sharing and enterprise

development through an integrated asset management approach. Most organizations use a Software Configuration Management (SCM) or Version Control System (VCS)

for managing the code and configuration assets. These tools are great for managing the versioning of assets produced but they don#39;t maintain the metadata of the assets.

Without metadata assets are not organized in context and it is hard to discover them.

ORA recommends an asset-centric engineering process, where

an Asset Manager is used to address the challenges posed by the traditional approaches. The Asset Manager is typically an enterprise-scoped Metadata Repository working in concert with SCMs and other types of asset repositories.

Reference: Oracle Reference Architecture,Software Engineering, Release 3.0

Question No: 45

Which of the following are true statements about the benefits of standardizing on a common security framework?

  1. Security requirements no longer need to be specified for eachindividual application; the framework will automatically determine what security needs to be applied.

  2. A common set of security services and information can be used across the organization, promoting Infrastructure reuseand minimizing inconsistencies.

  3. Secure application integrationis made easier via standardization on a preferred subset of technologies and options.

  4. Administration and auditing are improved due to rationalization and standardization of identities, attributes, roles, policies, and so on.

  5. Interoperability amid federation are easier to achieve via the adoption of common security and technology standards.

Answer: A,B,E

Explanation: In order to provide security in a consistent manner, a common set of infrastructure,

e.g. a security framework, must be used. The purpose of this framework is to rationalize security across the enterprise by:

  • Establishing a master set of security data that reflect the policies, IT resources, participants and their attributes across the entire domain of security

  • Mapping organizational structures, computing resources, and users to roles in a way that clearly depicts access privileges for the organization

  • Maintaining fine-grained access rules based on roles that have been established for the organization

  • Propagating the master security data to individual applications and systems that enforce security (A)

  • Detecting changes to security data residing on systems that have not been propagated from the master source of record, and sending alerts regarding these inconsistencies

  • Providing common security services, such as authentication, authorization, credential mapping, auditing, etc. that solutions can leverage going forward in place of custom-developed and proprietary functions (B)

  • Facilitating interoperability between systems and trust between security domains by acting as a trusted authority and brokering credentials as needed(E)

  • Centrally managing security policies for SOA Service interactions

    The security framework should provide these types of capabilities as a value-add to

    the existing infrastructure. The intent is not to discard the capabilities built into current applications, but rather to provide a common foundation that enhances

    security across the enterprise. Security enforcement can still be performed locally, but security data should be modeled and managed holistically.

    Incorrect:

    C: Not a main goal.

    D: Ease of administration and auditing is not a main goal here.

    Reference: Oracle Reference Architecture,Security, Release 3.1, 4.1.1 Purpose of a Security Framework

    Question No: 46

    You are developing an Integration component that uses customer data. The source system defines customer data in a different format than expected. Which of the following options best describes how you would develop the component?

    1. Create an object representation of customer data and use itin the component.

    2. Externalize the data transformation by mapping the source data format to a canonical data format.

    3. The data formats are different, so it is not possible to develop the component.

    4. Write data from the source system into a database and read it back in the expected format.

    Answer: A Explanation: Note:

    It is quite common to encounter use cases that require transformation of information from one format to another, especially in the area of enterprise integration. Source systems and target systems may use very different representations of data and in some cases, a canonical data model might be used as a common intermediate format. In some cases, the transformation is a simple field-to-field mapping whereas in other cases it is a complex manipulation and conversion of data. It should be possible to visually map the source and target representations with the ability to enrich the elements to support both simple and complex data transformations.

    Question No: 47

    The Service-Oriented Integration (SOI) architecture includes an event-handling capability as illustrated and described in the Process View. Which statement best describes the rationale for including event handling in the SOI architecture?

    1. Event-Driven Architecture (EDA) is a subset of SOI, so including event handling provides the EDA part of SOI.

    2. The event-handling capability allows arbitrarily complex events to be handled by the architecture; i.e. Complex Event Handling (CEP) is part of the SOI architecture.

    3. AH other interactions within the architecture are upper layers calling lower layers. The event-handling capability allows a Connectivity Service to call a Business Service, thus providing the ability to lower layers to call upper layers in the architecture.

    4. The event-handling capability allows a back-end system that is included in the SOI to initiate action because something important has occurred within the back-end system.

    5. By employing a publish-and-subscriber message approach, the event-handling capacity allows the SOI architecture to handle high-volume message traffic because publish-and- subscribe handles higher message volumes than request-response.

    Answer: D Explanation: Note:

    Events allow one system (event emitter) to notify other systems (event sink) that something of interest has changed. There are two broad categories of event types:

  • Business Event – A business event is an event that is of business relevance and would be readily understood by a business person.

  • Technical Event – A technical event is an event that is relevant to IT but not directly relevant to the business.

  • As illustrated by the figure below, in this architecture all events are routed to the Business Process Layer and the appropriate business processes are executed for that event.

    Essentially this is a mechanism for a lower level in the architecture stack, the Connectivity Layer, to initiate actions that might include interactions with all other levels in the architecture. This is essential since the generated event will likely be backend system specific; therefore it is likely that the data must be normalized and some amount of custom logic may be required to convert the event into an event that is backend system agnostic.

    Ensurepass 2018 PDF and VCE

    Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0

    Question No: 48

    Service-Oriented Integration is based on creating a catalogue of SOA Services that expose existing capabilities from back-end systems. Which statement best describes how an SOA Service relates to the existing back-end systems?

    1. Each SOA Service exposes the functionality from only a single back-end system to ensure the decoupling of SOA Services.

    2. An SOA Service should expose the low-level interface of the back-end system to ensure that all back-end system capabilities are fully exposed.

    3. An SOA Service should expose higher-level business capabilities by encapsulating the lower level Interfaces of the back-end systems.

    4. Each SOA Service should expose only one isolated capability of the back-end systems to ensure isolation between SOA Service calls in composite applications.

    5. All access to a back end system should be through a single SOA Service to ensure the back-end system will net become overloaded by service requests.

    6. An SOA Service should connect to at least two back-end systems; otherwise the SOA Service is just duplicating the existing interface to the back-end system.

    Answer: C

    Explanation: The primary purpose of the Business layer in the architecture is to define and automate the

    business processes external to, and independent of, the specific backend systems used in the organization. This isolates the business process from backend system changes, and conversely, isolates the backend systems from business process changes.

    De-coupling the business processes from the backend systems simplifies changes and maintenance for business processes and backend systems.

    The Business layer generally provides the greatest and most measurable business value. Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0

    Question No: 49

    You need to redesign your application to improve performance. The potential solution requires the data to be kept in memory for faster access. The in-memory data requires full support for SQL with BI queries and there is no need to scale out further. Which Oracle product would you choose to implement your solution?

    1. Oracle Coherence

    2. Oracle TimesTen

    3. Oracle TUXEDO

    4. Oracle VM

    Answer: B

    Explanation: Oracle TimesTen In-Memory Database (TimesTen) is a full-featured, memory-optimized, relational database with persistence and recoverability. It provides applications with the instant responsiveness and very high throughput required by database-intensive applications. Deployed in the application tier, TimesTen operates on databases that fit entirely in physical memory (RAM). Applications access the TimesTen database using standard SQL interfaces. For customers with existing application data residing on the Oracle Database, TimesTen is deployed as an in-memory cache database with automatic data synchronization between TimesTen and the Oracle Database.

    Question No: 50

    Which of the following statements about asset-centric engineering is true?

    1. Project assets are maintained at each individual project level in an asset-centric engineering.

    2. Asset-centric engineering promotes an integrated asset management approach in which assets are shared across the enterprise.

    3. Asset-centric engineering uses multiple enterprise repositories to store and maintain the assets.

    4. Asset-centric engineering requires that everything related to the assets,including metadata and payload, should be stored in the same repository.

    Answer: D

    Explanation: The underlying core principle of ORA Engineering is asset sharing and enterprise

    development through an integrated asset management approach. Most organizations use a Software Configuration Management (SCM) or Version Control System (VCS)

    for managing the code and configuration assets. These tools are great for managing the versioning of assets produced but they don#39;t maintain the metadata of the assets.

    Without metadata assets are not organized in context and it is hard to discover them.

    ORA recommends an asset-centric engineering process, where

    an Asset Manager is used to address the challenges posed by the traditional approaches. The Asset Manager is typically an enterprise-scoped Metadata Repository working in concert with SCMs and other types of asset repositories.

    Reference: Oracle Reference Architecture,Software Engineering, Release 3.0

    100% Ensurepass Free Download!
    Download Free Demo:1z0-574 Demo PDF
    100% Ensurepass Free Guaranteed!
    1z0-574 Dumps

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    Leave a Reply

    Your email address will not be published. Required fields are marked *