1Z0-574 - Oracle IT Architecture Release 3 Essentials Exam
Go back to Oracle
How many questions are there on the 1Z0-574 exam?
There are 102 questions on the 1Z0-574 exam to be completed in 150 minutes.
How long is the 1Z0-574 exam?
The 1Z0-574 exam is 150 minutes to complete 102 questions.
How much does the 1Z0-574 exam cost?
The 1Z0-574 exam is $245. The exam provider is Pearson Vue and you can register for the exam on their website.
What is the best way to study for the 1Z0-574 exam?
The best way to study for the 1Z0-574 exam is to practice at Exam.com.
Which statement best describes how the Oracle Reference Architecture (ORA) combines different Technology Perspectives?
The composition of different Technology Perspectives is accomplished via SOA Services. The SOA conceptual model is used to illustrate and describe how each Technology Perspective consumes and provides SOA Services.
What is the main benefit of Utility Computing?
What are the two primary approaches of visualization?
Server Consolidation - abstracting the complexities of the underlying pool of servers by creating aggregated logical machines
Server Management - managing the servers by using a single-point management interface
Which of the following statements describes the relationship between Cloud computing and Grid computing?
Grid architectures are likely to be used in building Clouds
Architecturally speaking, why might an organization deploy a SAML-based Web SSO solution if they already have a cookie-based Web SSO in place and working?
SAML supports federation across cookie domains.
For a large heterogeneous environment with a large number of hosts requiring scalability and efficiency, what is the best strategy for deployment of Oracle Enterprise Manager?
Use multiple semi-autonomous agents collecting information and periodically relaying it to a central repository.
Which of the following is not a part of the Oracle Reference Architecture Monitoring and Management framework?
Which of the following are examples of the management and visibility gap between the traditionally monitored IT Infrastructure resources and the Services?
On-going Shift to Move to an Agile Shared Service Computing Environment
On-going Shift to Manage IT from an End-User Experience Perspective
Increasing Number of Heterogeneous IT Infrastructure Components to Manage
Complex Distributed Environments Requiring Access to Consolidated Information
Which statements are correct for service contracts?
Each SOA Serviceincludes a service contract.
A service contract defines the functional and non-functional capabilities provided by an SOA Service.
Which of the following environments are typically clustered?
User Acceptance Testing (UAT) Environment
Which of the following are capabilities required for the Integration subsystem of the Oracle Reference Architecture Management and Monitoring Framework?
Alert and Notification Integration
Which statement best describes the relationship between the Oracle Reference Architecture (ORA) and Service-Oriented Architecture (SOA)?
ORA embraces service orientation as a core tenet to consistently and uniformly deal with the complexity of a heterogeneous computing environment common to enterprise IT.
What does the Java EE Management Specification (JSR 77) provide?
a standard model for managing a J2EE Platform; it describes a standard data model for monitoring and managing the runtime state of any Java EE Web application server and Its resources
Because each back-end system is running in a separate process, any integration architecture is required to cross multiple process boundaries. A Service-Oriented Integration (SOI) architecture also introduces SOA Services that run in their own process, thus adding more process boundaries to be crossed. What approaches can be employed to reduce the performance impact of crossing multiple process boundaries?
The SOA Services should expose larger-granularity operations to reduce the number of s-calls, which reduces the number of times process boundaries are crossed.
The SOA Services can encapsulate multiple layers of theSOI architecture to reducenumber of service calls, which reduces the number of process boundaries being crossed.
The Service-Oriented Integration architecture makes a distinction between technical orchestrations and business processes. Which statement best describes these two concepts?
A business processes is likely to change when the business changes, whereas a technical orchestration is likely to change when back-end systems change.
Which of the following are the implications of the architecture principle, "Asset-centric approach must be applied to engineering processes"?
Assets must be associated with meaningful metadata that can be used to discover and interpret the assets.
When two or more technology perspectives are combined, which statement best describes how the Oracle Reference Architecture (ORA) applies to the combination?
One of the layersin ORAis the Business Services layer that contains the SOA Services. It is these SOA Services that provide the connection between different technology perspectives; therefore the Business Services layer is the interlock between two or more technology perspectives.
A modular approach has been taken to document the Oracle Reference Architecture (ORA). Select the statements that are true for this modular approach?
The ORA library has a document dedicated to each Oracle product suite.
ORA is a single-reference architecture but is documented via different views of the architects-some focused on specific technologies (Technology Perspectives), and some on industry verticals (Industry Perspectives).
The number of Technology Perspectives and Industry Perspectives will increase over time.
Which of the following does Policy Management Compliance refer to?
the demonstration and enforcement of regulatory standards,industry standards, internal best practices
Which caching mode does every write to the cache cause a synchronous write to the back-end store?
Which of the following are the key drivers for Grid computing?
Improved server utilization - Grid computing allows companies to lower costs through the efficient use of resources.
Better agility and flexibility - Businesses experience constant change and the underlying IT Infrastructure should be agile enough to support that kind of change.
Lower Initial cost-There is a need to reduce the Initial investment at the cost of an increased operational cost.
Service-Oriented Integration creates a catalog of SOA Services that expose capabilities from existing back-end systems. What are the three types of capabilities that the SOA Services expose?
existing business processes
existing business functionality
existing data entities
Which of the following are benefits of three-tier distributed computing?
It allows separation and independent scaling of the data tier and middle/business tier
Management of security, transaction, and connection are handled in the middle tier.
You are designing a mission-critical application that requires high performance. Your analysis concludes that Oracle Exadata would enable you to meet the performance goals. What characteristics of Oracle Exadata make it possible to provide such superior performance?
Oracle Exadata uses massively parallel architecture to speed up Oracle data warehouses by offloading data-intensive query processing from the databases.
What is meant by cache hit rate or ratio?
the percentage of times the cache was hit successfully over the total number of tries
The Product Mapping view of the Service-Oriented Integration architecture shows some of the Oracle products mapped onto two or more layers in the architecture. For example, Oracle WebLogic Suite (OWLS) is mapped to the Business Service Layer, the Data Normalization Layer, and the Connectivity Layer. Which statement best describes why OWLS is mapped to these three layers in the OSI architecture?
The other Oracle product mapped to the three layers all have OWLS embedded in the product. Thus, OWLS is required for the products mapped into three layers.
Which statements are true with regard to authorization checks being done in the Mediation Layer?
Performing authorization checksin the Mediation Layer provides a centralized approach to securing SOA Services.
Performing authorization checks in the Mediation Layer eliminates the need for role-based authentication.
Which statement best describes the use of point-to-point integrations within a Service-Oriented Integration (SOI) architecture?
Point-to-point integrations should be avoided but are allowed as exceptions when requirements can be met only by point-to-point integration.
Which statement best describes the mapping of User Interaction logical architecture layers to deployment tiers?
The Logical view and Deployment view of the User Interaction architecture do not map effectively from one to the other because other intermediate views are needed.
Which principle should be applied when considering display devices?
The architecture must provide for the development of user Interfaces for a variety of display devices.
Conceptually, management and monitoring capabilities consist of which of the following?
consolidating administration tasks for a variety of infrastructure components
allowing enterprises to define, model, capture, and consolidate monitoringinformation into a single framework
Which of the following statements best describes the ideal role of an application owner with respect to defining application security?
The application owner should recommend adherence to common established practices for assessments, classifications, architecture, and policies that have been defined, and are actively maintained, by security experts across the organization. Deviations may be necessary, butapplication owners should strive to be consistent with best practices that have been adopted by the organization.
Which of the following statements are true about applying security to SOA Services?
SOA Services must base access control decisions on roles, attributes, rules, and so on, that are universal to all consumers.
Data returned by a SOA Service may need to be redacted according to data classification schemes, depending on the privileges of users.
Which of the following is not an objective or function of the WS-Trust standard?
to enable applications to construct trusted SOAP message exchanges
What shortcomings of the Version Control Systems drive the need for a Metadata Repository?
Version Control Systems lack robust metadata that allows developers to determine relevance.
What does ORA Engineering refer to as Round-Trip Engineering?
the ability to effectively perform both forward and reverse engineering to seamlessly transform assets in either direction of the life cycle
Which of the following interactions does not occur as part of a web-based single sign-on scenario?
Credentials are passed to the application for validation.
Which statement best describe the benefits of asset dependency tracking?
Tracking the asset dependencies allows you to performiImpact analysis when changes need to occur.
Which one of the following types of access control should be used when access to a resource is dependent upon specific qualities of the user, for example, membership status, frequency of purchases, or level of certification?
discretionary access control
A customer has two separate lines of business and each has its own unique resources that are controlled independently. The customer wants to provide a single user interface at the enterprise level that, at least from the user's perspective, unifies the separate lines of business and presents a single consistent view. What is the most suitable architectural arrangement for such a federated deployment?
The enterprise implements full client stack and part of the service stack while each LoB deploys the remaining part of the service tierin order to expose uniform interface elements.
Which of the following statements are true about point to point security?
It is often implemented using transport security protocols such as SSL/TLS.
It is designed to transport sensitive data over unprotected networks.
After data reaches an endpoint, it offers no further protection.
SSL/TLS is used sparingly because it is difficult to set up.
Which of the following are true statements about the benefits of standardizing on a common security framework?
Security requirements no longer need to be specified for eachindividual application; the framework will automatically determine what security needs to be applied.
A common set of security services and information can be used across the organization, promoting Infrastructure reuseand minimizing inconsistencies.
Interoperability amid federation are easier to achieve via the adoption of common security and technology standards.
Which of the following standards states that every reusable asset must contain a minimum of one manifest file and at least one artifact to be considered a valid reusable asset?
OMG Reusable Asset Specification (RAS)
A company is building a new customer self-service website. The company has an existing CRM application that contains customer information that needs to be integrated into the self-service website. The CRM application provides a synchronous interface to access the needed customer information. The CRM application takes 5 to 30 seconds to respond to the request for customer information. The requirements for the new customer self-service website is to respond within 3 seconds 90% of the time. What integration pattern would you suggest that the company use to integrate the CRM application into the new customer self-service website?
When customer information from the CRM application is needed, asynchronously fetch the information by using the store-and-forward integration pattern. This approach allows the self-service website to respond quickly to customer requests without waiting for the CRM application. The website can display the fetched customer information when it is available.
Which of the following Oracle products provides a comprehensive Integrated Development Environment (IDE)?
Oracle Enterprise Pack for Eclipse
Bottom-up service Identification analyzes existing systems to Identify SOA Services. Top-down service identification analyzes business processes to identify SOA services. Which statement best describes the relationship between top down and bottom-up service identification in Service-Oriented Integration?
A top-down approach should be used to determine the needed SOA Services; then a bottom-up approach should be used to determine how existing source systems can meet the requirements top- down approach should be used by business, and a bottom-up approach should be used by IT.Theoverlap between the SOA Services Identified by the two methods are the ones that should
There are various network topologies that can be used when deploying the Service-Oriented Integration architecture. One deployment option includes three networks: production network, services network and maintenance network. Which statement best describes the uses of these three networks?
The production network provides connectivity to applications and client access to the Mediation Layer. The services network provides connectivity between the Mediation Layer and the SOA Services. The maintenance network is used by the operations team to manage the infrastructure.
Which of the following statements are true with regard to the Service Contract as defined by the Oracle Reference Architecture (ORA)?
A Service Contract defines the functional and nonfunctional capabilities of the SOA ServiceiIn human-readable terms.
Which of the following are examples of dynamic modeling?
Which statement best describes the relationship between the Logical View and the Development view of the Service-Oriented Integration architecture?
The Logical View defines the layers of the architecture and the capabilities within each layer. The Development View describes how aspects of the architecture impact developers following the architecture.