|Exam Name||:||Oracle IT Architecture Essentials (Beta(R) )|
|Questions and Answers||:||176 Q & A|
|Updated On||:||October 20, 2017|
|PDF Download Mirror||:||1Z1-574 Dump|
|Get Full Version||:||Pass4sure 1Z1-574 Full Version|
Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0
What are the key differentiating characteristics of Oracle Reference Architecture User Interaction?
ORA UI is application-focused, enabling effective Integration of content and application functionality
ORA UI is user centric, providing a feature-rich, intuitive human Interface.
ORA UI provides a single unified interface regardless of the complexity of underlying applications.
ORA UI standardizes on a single technology, simplifying development.
ORA UI replaces portal platforms for collaboration.
The primary goal of user interaction is to provide a user-centric, feature-rich, intuitive interface to end users tailored to the specific needs of each end user; thereby bringing maximum productivity to the work environment. Realizing this goal requires a flexible,
extensible architecture since different types of end users will have very different needs.
Oracle Reference Architecture, User Interaction, Release 3.0
What does the Identity Asserter do in a J2EE framework?
It informs the container of the client identity of an inbound request.
It Inserts identity into Web Service credentials used for outbound service requests.
It determines a user's identity based on a given set of security roles and asserts it to the container.
It resolves Identity conflicts when multiple LDAPs are used.
Like the Authenticator, theIdentity Assertersecurity provider uses Oracle Access Manager authentication services to validate already-authenticated Oracle Access Manager users using the ObSSOCookie and to create a WebLogic-authenticated session.
Note: If authentication is successful, the identity asserter creates a Subject, which is used to identify the user. Actions performed by the user will be associated with the Subject so that the caller's identity will be known. If outbound requests are made by the business logic, identity can be included by the container based on the Subject.
The Service-Oriented Integration (SOI) architecture can be deployed in a variety of ways. One deployment option is a hierarchical deployment, where each division within the enterprise can deploy the layers of the SOI architecture by using their chosen hardware and software platforms. A separate enterprise-wide deployment of the upper layers of the architecture is used to provide cross-divisional integration. Which statements are true for this type of hierarchical deployment of SOI?
Hierarchical deployment of the SOI architecture is the recommended deployment whenever an enterprise has two or more business divisions.
Hierarchical deployment of the SOI architecture is an anti-pattern and should be avoided du-the additional costs associated with supporting multiple hardware and software platforms.
Hierarchical deployment of the SOI architecture is a transitional phase moving toward a peer- peer deployment where the enterprise-wide deployment of the upper layers is eliminated.
Hierarchical deployment of the SOI architecture supports aquestions because each aquestions can be treated as a new division with its own chosen hardware and software platforms.
Because each division is allowed to select the hardware and software platform, industry standards become more important to ensure interoperability between the divisions and the enterprise-wide upper layer.
Because each division is allowed to select the hardware and software platform, platform vendors will have the complete for business, which will reduce the costs of hardware and software, thus reducing the cost of technical deployment versus a shared deployment.
D: This type of deployment easily supports acquisitions since a new acquisition can be treated as simply another portfolio. E (not F): The primary disadvantage of a hierarchical deployment is the increased cost and complexity of supporting more hardware and software. Adherence to standards to support interoperability is also more important in a hierarchical deployment since the various portfolios may select different products
Oracle Reference Architecture, Service-Oriented Integration, Release 3.0
Which statements arc true about Rich Internet Applications (RIAs)?
A Rich Internet Application (RIA) is a web application that provides the type of sophisticated user Interface that has traditionally requiredadedicated desktop client.
There are a variety of technologies being applied to create RIAs, but all provide a sophisticated user interface delivered through a browser.
Rich Internet Applications provide only limited functionality and the traditional fat client is still needed in cases such as those requiring animation.
Rich Internet Applications transfer all the business application processing to the client, thereby reducing the cost of the server infrastructure.
Not D: Rich internet applications (RIA) move some (but usually not all) of the view and controller functionality to the Client Tier.
Note: Web 2.0 introduces even more client-side code to enrich the user experience (i.e. Rich Internet Applications). This can be done in a standardized way, such as the Ajax framework. New message-injection attacks are possible in areas such as cross-site scripting and cross-site-forgery due to poor protocol implementations and poor message parsing. An example exploit is the SAMY worm created on MySpace.
Oracle Reference Architecture uses multiple views (as defined by standard IEEE 1471) to describe the architecture. Which statement best describes the use of views within ORA?
Each view within ORA focuses on a particular set of Oracle products.
ORA provides multiple views (for example, Conceptual, Logical, Deployment) to describe the architecture to various stakeholders.
Each view within ORA focuses on a particular set of industry standards.
ORA provides multiple views (for example, Product Mapping, Deployment) to illustrate how Oracle products must be installed and configured.
ORS uses views to illustrate industry standards and document architecture guidelines.
It is important that the service-oriented reference architecture documents the architecture from multiple views. Each view might include multiple models to illustrate the concepts, capabilities, etc. important for that view. The particular choice of views depends on what material is being covered and which views best convey the information. Example views include conceptual, logical, product mapping, and deployment views.
IT Strategies from Oracle, Oracle’s approach to SOA, Oracle White Paper
Which statement best describes the relationship between a Service Contract and a Usage Agreement as defined by the Oracle Reference Architecture (ORA)?
There is a one-to-one relationship between a Service Contract and a Usage Agreement. For each Service Contract there is a corresponding Usage Agreement.
There may be multiple Usage Agreements associated with a single Service Contract.
There may be multiple Service Contracts associated with a single Usage Agreement.
There is a many-to-many relationship between Service Contracts and Usage Agreements.
There is no defined relationship between a Service Contract and a Usage Agreement.
The Service Contract defines what the SOA Service agrees to provide to the environment. The service consumer Usage Agreement defines what a particular service consumer is entitled to consume.Each service might have several consumers. The Service provider must ensure that the Service will satisfy the aggregate specifications of all related usage agreements.
The usage agreement is not part of the Service; rather it defines what a particular service consumer is entitled to consume from the Service. Having both a usage agreement and a service contract provides a decoupling between the service provider and service consumer. This not only facilitates reuse but also provides a separation of concerns. The service contract defines the totality of what the Service guarantees to provide, and can be written and validated independent of any knowledge of specific service consumers. The usage agreement is service consumer specific and defines what capabilities of the Service each consumer is allowed to consume.
Oracle Reference Architectureand Service Orientation, Release 3.0
The Conceptual, Logical, and Product Mapping architecture views are core to the documents within the Oracle Reference Architecture (ORA) library- Which statement best describes the relationship between these three architectural views?
The Conceptual view lists the concepts behind the architecture, the Logical view describes the rationale for the architecture, and the Product Mapping view Identifies the Oracle products required.
The Conceptual view defines the architecture in less technical terms, the Logical view provides Increasing detail by using more technical terms, and the Product Mapping view maps Oracle products onto the Logical view.
The Conceptual view is a high-level description of the architecture, the Logical view is a detailed description of the architecture, and the Product Mapping view illustrates the deployment of Oracle products.
Each architecture view is designed to communicate to a specific stakeholder and there is no defined relationship between the views.
Each architecture view is a description of the components within the architecture, the logical view describes the runtime interactions between the components, and the product mapping view illustrates the deployment of Oracle products.
AAPML and CARML are part of what standards effort?
Web Services Interoperability
JCA and JAAS
Identity Governance Framework
Identity Governance Framework (IGF) consists of:
An identity attribute service that supports access to many different sources of PII and enforces administrative policy.
Client Attribute Requirements Markup Language (CARML): declarative syntax used by clients to specify their requirements for PII.
Attribute Authority Policy Markup Language (AAPML): declarative syntax which enables providers of identity-related data to express policy on the usage of information.
A multi-language API (Java, .NET, Perl) for reading and writing identity-related attributes.
Oracle Reference Architecture,Security, Release 3.1
A company is building a new customer self-service website. The company has an existing CRM application that contains customer information that needs to be integrated into the self-service website. The CRM application provides a synchronous interface to access the needed customer information. The CRM application takes 5 to 30 seconds to respond to the request for customer information. The requirements for the new customer self-service website is to respond within 3 seconds 90% of the time. What integration pattern would you suggest that the company use to integrate the CRM application into the new customer self-service website?
Use the request-response message exchange pattern to access the synchronous interface provided by the CRM application. The request-response message exchange pattern matches the synchronous interface provided by the CRM application, so this is the simplest and best approach for integration.
When customer information from the CRM application is needed, asynchronously fetch the information by using the store-and-forward integration pattern. This approach allows the self- service website to respond quickly to customer requests without waiting for the CRM application. The website can display the fetched customer information when it is available.
Use the request optional-response message exchange pattern to access the CRM application. If the CRM application responds quickly (for example, in 5 seconds) use that response. If the CRM application does not respond quickly, then the optional response was not returned and processing continues.
When customer information from the CRM application is needed, post a message to a topic queue by using the publish-and-subscribe integration pattern. This approach allows the CRMapplication or any other application subscribing to the topic queue to respond with customer information.
Use the polling integration pattern to find the necessary customer information in the CRM application database. Obviously the data exists in the CRM application database. Obliviously the data exists in the CRM application database, so the slow response from the CRM application can be eliminated by polling directly from the CRM application database.
An asynchronous exchange patternwould be good here. Asynchronous communication can be used when the response time for the source system is too slow to support the timelines
of the calling systems. Note: Store-and-forward is a special case of asynchronous communication. In the store-and-forward pattern, the request message is put onto a queue for later retrieval by the target of the request message. Similarly, the response message is put onto a response queue for later retrieval. This is a very common approach used by messaging systems (e.g. MQ Series) to integrate with legacy systems. The architecture must support this integration pattern to facilitate integration with legacy systems and existing messaging systems.
Oracle Reference Architecture, Service-Oriented Integration, Release 3.0
What are the three key technical concepts related to Grid computing?
Grid computing is a technology architecture that virtualizes and pools IT resources, such as compute power, storage, and network capacity into a set of shared services that can be
distributed and re-distributed as needed. Grid computing involves server virtualization, clustering, and dynamic provisioning.
Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0
Enablement 2.0 Get Specialized!
Oracle PartnerNetwork Specialized program is releasing new certifications on our latest products, and partners are invited to be the first candidates. A Certification exam goes through a rigorous review process called a beta period. Here are a few advantages of taking a Beta Exam:
Take the exam(s) now at a near Pearson VUE testing center!
Please direct any inquiries you may have to Oracle Partner Enablement team atopn-edu_wworaclem
For More Information
EXCLUSIVE: Shepherd Neame is to bring its staging date forward by three months and amend its trust-based defined contribution (DC) pension scheme to comply with its auto-enrolment duties.
The brewer, which is working with BBS Consultants and Actuaries, elected to bring its staging date forward to 1 July from 1 September 2013, to align this with other key dates in its financial year.
It has a diverse workforce of highly transient workers, with around 1,200 employees in the UK, around 75% of who are not members of a workplace pension scheme.
The brewer currently operates three defined contribution (DC) pension schemes for staff. The schemes, which include a trust-based scheme, a group personal pension (GPP) plan and a stakeholder scheme, are for different segments of its workforce.
Its trust-based pension, which will have different sections for different segments of the workforce, will include a bespoke default fund, as well as other new investment options to ensure an appropriate range is available to members.
Jonathan Neame, chief executive of the brewer, said: “Prior to starting our preparations for auto-enrolment with BBS, we had three pension schemes in place.
“We are now in the process of moving all members into one scheme, with different sections, which will be our sole workplace pension arrangement going forward.”
In May, Shepherd Neame started communicating with employees through presentations. Leading up to 1 July, it will send out personalised letters to all staff, frequently-asked questions (FAQs) on auto-enrolment and investment, as well as bespoke forms for employees to select their investment options.
Neame added: “BBS will be handling all auto-enrolment administration on our behalf, so all we need to do is tell it about new joiners and leavers, and send it our pay data after each payroll.”
Paul McArdle, auto-enrolment manager at BBS Consultants and Actuaries, added: “It was imperative that the introduction of auto-enrolment at Shepherd Neame did not have any negative impact on its existing HR and payroll processes.
“We worked closely with the brewer to undertake a number of carefully considered exercises to ensure both the organisation and its workforce are fully prepared.”