By creating the utmost of our Oracle 1Z0-574 items which contain 1Z0-574 exam question and also answers, you are bond to acquire through the Oracle actual test. We guarantee your success together with the help of Oracle 1Z0-574 professionally written practice questions and also answers at Pass4sure. Our own Oracle practice materials will offer you comprehensive training for the 1Z0-574 exam syllabus. Cracking your Oracle Oracle exam is no issue with each of our precise, accurate and also logical dumps. The feedback and also high passing ratio can prove each of our promise. We offer anyone the money-back policy just in case you fail in the initial attempt after employing Oracle 1Z0-574 products.

2016 Aug 1Z0-574 answers

Q71. Which statements are correct with regard to the layers in the Logical View of Service-Oriented Integration (SOI)? 

A. Upper layers in the architecture leverage capabilities provided by lower layers. 

B. Upper layers are allowed to access capabilities in any lower layer. 

C. Upper layers are allowed to access capabilities only in the next lower layer. 

D. Each layer encapsulates specific capabilities required by the entire architecture. 

E. Each layer encapsulates optional capabilities of the architecture; thus any layer can be omitted from the architecture. 

F. The layers are used to partition the capabilities of the architecture, but otherwise have no architectural significance. 

Answer: A,C,D 

Explanation: Each layer encapsulates specific capabilities for the overall architecture. Upper layers in the architecture leverage the capabilities provided by the lower layers. Generally, upper layers call lower layers in the architecture and the reverse (i.e. lower levels calling upper layers) is prohibited. 

Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0 


Q72. Which of the following statements are true? 

A. (OWCS) provides components for reverse proxy, personalization, customization, social computing, and analytics. 

B. Oracle WebCenter (OWC) provides the Resource Tier of the Oracle Reference Architecture User Interaction. 

C. Oracle HTTP Server (OHS) provides the standard communication protocols (for example, HTTP) between the Client Tier and the Service Tier as well as the Message Security between the Client Tier and Service Tier. 

D. Oracle Meta Data Services (OMDS) stores customization, personalization, and other metadata in a repository 

E. Oracle WebLogic Suite (OWLS) is used in Oracle Reference Architecture User Interaction to enable Ontology languages for the Semantic Web 

Answer: B,D 

Explanation: B: Oracle WebCenter (OWC) - provides the foundation for delivering a modern user 

experience for Oracle Fusion Middleware as well as Oracle Fusion Applications. 

OWC is composed of four main components as illustrated in the figure: 

D: Oracle Meta Data Services (OMDS) - stores customization, personalization, and other metadata in a repository. The repository can either be stored in a database or in file-based storage. 


Q73. Select the two layers of ORA application infrastructure from the following list: 

A. Application 

B. Platform 

C. Abstraction 

D. Computing Foundation 

Answer: A,B 

Explanation: The ORA Application infrastructure covers the following layers: *Platform * *Virtualization **Containers: 

* Computing Foundation ** Distributed Computing: 

**Grid Computing ** Caching Reference: Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0 


Q74. Which four components of the following list should be found in the client tier of the Logical view of the Oracle Reference Architecture User Interaction? 

A. Personalization 

B. Communication services 

C. State management 

D. Customization 

E. Collaboration 

F. Syndication 

G. Controller 

H. Rendering 

Answer: B,C,G,H 

Explanation: The Client Tier is hosted on the display device. As mentioned above, this may be a browser or an thick client specific to the display device. 

Regardless of the choice for the Client Tier, there are standard capabilities provided by 

this tier in the architecture: 

Controller: The Controller accepts input from the user and performs actions based on that input. 

State Management: The State Management component is responsible for maintaining the current 

state of the user interface. 

Rendering: The Rendering component is responsible for delivering a view of the interface suitable 

for the end user. 

Communication Services: The Communication Services provide the means to access Service Tier 

capabilities. 

Note: Security Container, Data Management and Composition can also be included here. 

Reference: Oracle Reference Architecture, User Interaction, Release 3.0 


Q75. Which product provides the standard communication protocols (for example, HTTPS) between the Client Tier and the Service Tier as well as Message Security? 

A. Oracle platform Security Services 

B. Oracle WebCenter 

C. Application Development Framework 

D. Oracle HI IP Server 

Answer: A 

Explanation: Oracle Platform Security Services comprises Oracle WebLogic Server's internal security framework and Oracle's security framework (referred to as Oracle Platform Security). 

OPSS delivers security as a service within a comprehensive, standards-based security framework. 

The Security Services includes SSL:Hypertext Transfer Protocol Secure (HTTPS) is a combination of Hypertext Transfer Protocol (HTTP) with SSL/TLS protocol. 

Note:Oracle Platform Security Services (OPSS) provides enterprise product development teams, systems integrators (SIs), and independent software vendors (ISVs) with a standards-based, portable, integrated, enterprise-grade security framework for Java Standard Edition (Java SE) and 

Java Enterprise Edition (Java EE) applications. 

OPSS provides an abstraction layer in the form of standards-based application programming interfaces (APIs) that insulate developers from security and identity management implementation details. With OPSS, developers don’t need to know the details of cryptographic key management or interfaces with user repositories and other identity management infrastructures. Thanks to 

OPSS, in-house developed applications, third-party applications, and integrated applications benefit from the same, uniform security, identity management, and audit services across the enterprise. 

OPSS is the underlying security platform that provides security to Oracle Fusion Middleware including products like WebLogic Server, SOA, WebCenter, ADF, OES to name a few. OPSS is designed from the ground up to be portable to third-party application servers. As a result, developers can use OPSS as the single security framework for both Oracle and third-party environments, thus decreasing application development, administration, and maintenance costs. 

Reference: Oracle. Fusion Middleware Security Overview, 11g Release 1, About Oracle Platform 

Security Services 


certifyforall.com

Renewal 1Z0-574 free exam questions:

Q76. The Mediation Layer in the Logical View of the Service-Oriented Integration architecture provides several capabilities. Which of the following are capabilities provided by the Mediation Layer? 

A. enrichment - adding data elements to a data entity to give the entity increased Information 

B. routing - sending the client request to the appropriate provider (s) based on some criteria 

C. message transformation - converting the request message format to a different message form, appropriate for the provider 

D. choreography - defining the messages that flow back and forth between systems that are participating in a business process 

E. protocol mediation - converting a client request from one protocol to a different protocol used by provider 

Answer: B,C,E 

Explanation: The Mediation Layer provides loose coupling for the entire architecture. It decouples the layers of the architecture as well as decoupling external users of the layers from the specific layers in the architecture. The key capabilities in this layer include: 

* Routing - Routing provides the ability to send the client request to the appropriate provider based on some criteria. The routing may even include sending the client request to multiple providers. This capability facilitates location transparency, versioning, scalability, partitioning, request pipelining, SLA management, etc. 

* Protocol Mediation - Protocol mediation is the ability to handle a client request using one protocol (e.g. WS*, JMS, REST) with a provider using a different protocol. This provides protocol decoupling between the provider and the consumer. Message Transformation - Message transformation allows a client request using one message format to be handled by a provider that expects a different message format. This provides message format decoupling between the provider and the consumer. 

* Discovery - Discovery is the mechanism by which a client finds a provider of a particular SOA Service. Discovery can occur at design time or runtime. 

* Monitoring - Monitoring captures runtime information about the messages flowing through the mediation layer. Since the mediation layer is an intermediary for message traffic, it provides a centralized monitoring capability. 

* Policy Enforcement - Policy enforcement provides consistent application of policies (e.g. WS-SecurityPolicy) across all messages flowing through the mediation layer. Since the mediation layer is an intermediary for message traffic, it provides a centralized policy enforcement capability. 

Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0 


Q77. Which of the following statements pertaining to role-based and group-based user classifications are true? 

A. A role is a subset of a group where all users share a commonidentity. 

B. Users can belong to one and only one role. 

C. A role can have any number of users. 

D. A group is a collection of users that perform the same function. A role is a collection of groups. 

E. Access privileges can be assigned to roles or groups. 

Answer: C,E 

Explanation: A group is a set of users, classified by common trait. 

A role is an abstract name for the permission to access a particular set of resources in an application. 

Multiple users can be mapped to a role. 

Users can be mapped to multiple roles. 

Incorrect answers 

A, B: Just wrong. 

D: A group is a collection of users, but a role does not need to be a collection of groups. 

Note: Given the potentially large number of users of a system, access privileges are generally not assigned at the user level. Instead, users are assigned to groups (mimicking the organizational structure of a company), or roles (defined based on job functions that users perform), or some combination of the two. Access privileges are then assigned to groups and/or roles. The most natural case is that they are assigned to roles, since roles align more closely with operations users naturally perform to accomplish their job. The industry term for this is Role-Based Access Control (RBAC). RBAC is more flexible than defining access rights based on usernames or static groups and enables an organization to be more versatile when allocating resources. With RBAC the system must determine if the subject (user or client) is associated with a role that has been granted access to a resource. This process of user to role ascertainment is called role mapping. 


Q78. Which of the following is the most correct definition of Grid computing? 

A. Grid computing refers to the ability to run computers off a power grid. 

B. Grid computing refers to the aggregation of multiple, distributed computing resources, making them function as a single computing resource with respect to a particular computational task. 

C. Grid computing refers to the vertical scaling of resources to add more capacity to the Infrastructure. 

D. Grid computing allows computing resources to be operated and managed independently, creating a distributed architecture. 

Answer: D 

Explanation: Grid computing is a technology architecture that virtualizes and pools IT resources, such as compute power, storage, and network capacity into a set of shared services that can be distributed and re-distributed as needed. Grid computing involves server virtualization, clustering, and dynamic provisioning. 

Note: With Grid computing, groups of independent, modular hardware and software components can be pooled and provisioned on demand to meet the changing needs of businesses. Grid computing is really a form of distributed computing and it aims to deliver flexible and dynamic infrastructures using tiered optimization. It uses virtualization at various levels of the middleware and database layer to achieve it. 

Reference: Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0 


Q79. Which one of the following security strategies protects data in motion but does not address data at rest or in memory? 

A. end to end security 

B. defense In depth 

C. per (motor security 

D. cloud security 

E. point to point security 

Answer: E 

Explanation: A lesser alternative to end to end security is point to point security. This is used to protect messages in transit. It assumes that other means of security are used to protect messages during processing and persistence. 

Reference: Oracle Reference Architecture,Security, Release 3.1 


Q80. The principle of "Security as a Service" states that business solution; must be designed to consume common security services, where possible, as opposed to implementing custom security logic and replicating copies of security data. Which of the following statements is not an Implication of this principle? 

A. Security logic must be externalized as much as possible, i.e., developers must not hand-code security logic into business solutions. 

B. Security enforcement, decisions, and management must be performed by dedicated, shared services and Infrastructure. 

C. Wherever possible, security services must be built upon open standards. 

D. Security services must use Web Service (SOAP) interfaces and XML payloads in order to promote Interoperability. 

Answer: A,B,C 

Explanation: Rationale: Security services allow multiple solutions to share common security logic, features, policies, and identity information. This provides a more secure environment by eliminating redundancies and associated risks. It also enables more effective management of security in the IT environment. Implications: 

* Security logic must be externalized as much as possible, i.e., developers must not hand-code security logic into business solutions.(A) 

* Security enforcement, decisions, and management must be performed by dedicated, shared services and infrastructure.(B) 

* Security services must leverage open standards for interface protocols and message formats where possible in order to promote interoperability.(C) 

* The availability and performance characteristics of security services must meet or exceed the specifications required to support the business solutions. 

Reference: Oracle Reference Architecture,Security, Release 3.1