Act now and download your Oracle 1Z0-574 test today! Do not waste time for the worthless Oracle 1Z0-574 tutorials. Download Abreast of the times Oracle Oracle IT Architecture Release 3 Essentials exam with real questions and answers and begin to learn Oracle 1Z0-574 with a classic professional.
2016 Aug 1Z0-574 exam fees
Q31. Which of the following is not a characteristic of Cloud computing?
B. elastic scaling
C. pay-for-use pricing
D. manual provisioning
Reference: Oracle Reference Architecture, Cloud Foundation Architecture, Release 3.0
Q32. Which statement best describes the relationship between a Service Contract and a Usage Agreement as defined by the Oracle Reference Architecture (ORA)?
A. There is a one-to-one relationship between a Service Contract and a Usage Agreement. For each Service Contract there is a corresponding Usage Agreement.
B. There may be multiple Usage Agreements associated with a single Service Contract.
C. There may be multiple Service Contracts associated with a single Usage Agreement.
D. There is a many-to-many relationship between Service Contracts and Usage Agreements.
E. There is no defined relationship between a Service Contract and a Usage Agreement.
Explanation: The Service Contract defines what the SOA Service agrees to provide to the environment.
The service consumer Usage Agreement defines what a particular service consumer is entitled to consume.
Each service might have several consumers.
The Service provider must ensure that the Service will satisfy the aggregate specifications of all related usage agreements.
The usage agreement is not part of the Service; rather it defines what a particular service consumer is entitled to consume from the Service.
Having both a usage agreement and a service contract provides a decoupling between the service provider and service consumer. This not only facilitates reuse but also provides a separation of concerns. The service contract defines the totality of what the
Service guarantees to provide, and can be written and validated independent of any knowledge of specific service consumers. The usage agreement is service consumer specific and defines what capabilities of the Service each consumer is allowed to consume.
Reference: Oracle Reference Architectureand Service Orientation, Release 3.0
Q33. Oracle Web Services Manager uses an agent-based approach to providing Web Services security. Where are these agents deployed?
A. In any IPv4 of Later network firewall
B. In the Oracle WebLogic Server Web Service request Interceptors
C. In the Oracle Service Bus proxy pipeline
D. In the Oracle Access Manager web gate
E. In the Oracle WebLogic Server access gate
Explanation: You use the Web Services Manager Control Console to define Oracle Web Services Manager components such as server agents. The server agent acts as an enforcement point for security policies.
Point your browser to the Web Services Manager Control Console and log in using your single sign-on user name and password.
The Web Services Manager Control Console is accessed with a URL of the form:
Q34. Which of the following statements are true with regard to the Service Contract as defined by the Oracle Reference Architecture (ORA)?
A. A Service Contract defines the contract between a service consumer and a service provider.
B. A Service Contract defines the functional and nonfunctional capabilities of the SOA ServiceiIn human-readable terms.
C. The Web Services Description Language (WSDL) defines the Service Contract for a Web Service.
D. A Service Contract defines the totality of what the SOA Service provides, independent of individual service consumers.
E. A Service Contract Is an optional part of an SOA Service, providing human-readable documentation of the SOA Service.
Explanation: SOA Services include a contract that specifies the functional and non-functional capabilities provided.
In order to support business-level composition, the SOA Service must have a contract that is understandable to a business person.
Reference: Oracle Reference Architectureand Service Orientation, Release 3.0
Q35. Which of the following token profiles is not included in the WS-Security standard as a standard type of identity token?
A. XACML token profile
B. SAML token profile
C. username token profile
D. Kerberos token profile
E. X.500 token profile
TheWS-Securityspecification allows a variety of signature formats, encryption algorithms and multiple trust domains, and is open to various security token models, such as:
* X.509 certificates (not E)
* Kerberos tickets (not D) *UserID/Password credential (not C)
* SAML Assertions (not B) *custom-defined tokens.
Note: WS-Security (Web Services Security, short WSS) is a flexible and feature-rich extension to SOAP to apply security to web services. It is a member of the WS-* family of web service specifications and was published by OASIS.
Improve 1Z0-574 exam cost:
Q36. Which of the following are benefits of three-tier distributed computing?
A. It allows separation and independent scaling of the data tier and middle/business tier
B. Management of security, transaction, and connection are handled in the middle tier.
C. It allows the client to query the database directly.
D. It improves the performance of the application tenfold.
Explanation: Three-tier architecture allows the data tier and middle tier to scale independently (A). It also allows multiple clients to share the business logic running in the middle tier. This makes distribution of the application a lot easier. Since security, transactions management, and connection management are handled in the middle tier, it gives better control of the resources (B). Three-tier architecture is more scalable than the simple client-server model and requires less powerful client side machines. Due to these characteristics this architecture is suitable for small to medium enterprise deployments.
Note: Distributed programming typically falls into one of several basic architectures or categories such as Client-server, three-tier architecture, and N-tier architecture. In the three tier architecture, business logic is handled in the middle tier, presentation rendering is handled on the client and data management is handled in the backend. This architecture allows multiple clients to access centrally deployed business logic components. This allows centralized distribution and management of resources.
Reference: Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0
Q37. Which of the following statements are true about applying security to SOA Services?
A. SOA Services must base access control decisions on roles, attributes, rules, and so on, that are universal to all consumers.
B. SOA Services are difficult to secure due to a lack of security standards for Web Services.
C. SOA Services are a type of monolithic application with self-contained identity and role management.
D. Data returned by a SOA Service may need to be redacted according to data classification schemes, depending on the privileges of users.
Explanation: A: In terms of access control, SOA Services must base access control decisions on roles, attributes, rules, etc. that are universal to all consumers.
D: data provided by a SOA Service must adhere to data classification restrictions that might differ between consumers. For instance, the same query service may need to redact various rows or columns of data based on restrictions assigned to classes of consumers.
Reference: Oracle Reference Architecture,Security, Release 3.1
Q38. What does the Java EE Management Specification (JSR 77) provide?
A. a general mechanism for monitoring and managing Java resources
B. an internet-standard protocol for managing devices on IP networks
C. a standard model for managing a J2EE Platform; it describes a standard data model for monitoring and managing the runtime state of any Java EE Web application server and Its resources
D. a structured approach to monitor diverse and heterogeneous shared systems
Explanation: The Java EE Management specification (JSR 77) provides a standard model for managing a J2EE Platform and describes a standard data model for monitoring and managing the runtime state of any Java EE Web application server and its resources.
Note: The J2EE Management specification includes standard mappings of the model to the Common Information Model (CIM), to an SNMP Management Information Base (MIB), and to the Java object model through a server-resident Enterprise JavaBeans (EJB) component, known as the J2EE Management EJB Component (MEJB). The MEJB provides interoperable remote access to the model from any standard J2EE application.
Reference: Oracle Reference Architecture,Management and Monitoring, Release 3.0
Q39. Enterprise Architecture consists of Business Architecture, Application Architecture, Information, Architecture and Technical Architecture (BAIT). Which statement best describes Oracle Reference Architecture (ORA) in the context of BAIT?
A. ORA addresses all four (Business, Application, Information, and Technical) equally.
B. ORA is primarily focused on the Technical Architecture, with some content on the other three aspects- of BAIT.
C. ORA has content applicable to the Technical Architecture only.
D. ORA is primarily focused on the Business Architecture, with some content on the other three aspects of BAIT
E. ORA is primarily focused on the information Architecture, with some limited content on the other three aspects of BAIT.
F. ORA has content applicable to Information Architecture only.
Explanation: Oracle Reference Architecture(ORA) defines a detailed and consistent reference architecture for developing and integrating solutions based on current technologies from Oracle and other vendors. The reference architecture offers architecture views, principles, and guidance based on recommendations from technical experts across Oracle. It covers a broad spectrum of concerns pertaining to technology architecture, including middleware, database, hardware, processes, and services.
Q40. Assets may be packaged into deployable units by using a variety of strategies. Which of the following is not a valid asset packaging scenario?
A. bundled as a single archive file
B. unbundled with artifactsinthe original location
C. unbundled with artifacts moved to a new location
D. bundles as a single executable binary file thatis run stand-alone
Explanation: The Reusable Asset Specification (RAS) provides the following guidelines with respect to asset packaging.
* Every reusable asset must contain at a minimum one manifest file and at least one artifact, to be considered a valid reusable asset.
* An asset package is the collection of artifact files plus a manifest. There are several asset packaging scenarios including:
* Bundled As Single Archive File (not A)
* Unbundled with artifacts in original location (not B)
* Unbundled with artifacts moved to new location (not C)
Reference: Oracle Reference Architecture, Software Engineering, Release 3.0,