Latest Update Free Version of Oracle 1Z0-574 Exam Study Guides in CertBus
No doubt that Java and Middleware 1Z0-574 exam is a tough task to accomplish. But you should not feel hesitant against the confronting difficulties. CertBus provides the latest version of 1Z0-574 Oracle IT Architecture Release 3 Essentials VCE dumps. Get a complete hold on Java and Middleware 1Z0-574 exam syllabus through CertBus and boost up your skills. Besides, the Oracle dumps are the latest. It would be great helpful to your Java and Middleware 1Z0-574 Oracle IT Architecture Release 3 Essentials exam.
We CertBus has our own expert team. They selected and published the latest 1Z0-574 preparation materials from Oracle Official Exam-Center: http://www.certgod.com/1Z0-574.html
QUESTION NO:67
Which of the following statements pertaining to role-based and group-based user classifications are true?
A. A role is a subset of a group where all users share a commonidentity.
B. Users can belong to one and only one role.
C. A role can have any number of users.
D. A group is a collection of users that perform the same function. A role is a collection of groups.
E. Access privileges can be assigned to roles or groups.
Correct Answer: CE
Explanation
Explanation/Reference:
Explanation:
A group is a set of users, classified by common trait. A role is an abstract name for the permission to
access a particular set of resources in an application.
Multiple users can be mapped to a role.
Users can be mapped to multiple roles.
Incorrect answers
A, B: Just wrong.
D: A group is a collection of users, but a role does not need to be a collection of groups.
Note: Given the potentially large number of users of a system, access privileges are generally not assigned
at the user level. Instead, users are assigned to groups (mimicking the organizational structure of a
company), or roles (defined based on job functions that users perform), or some combination of the two.
Access privileges are then assigned to groups and/or roles. The most natural case is that they are
assigned to roles, since roles align more closely with operations users naturally perform to accomplish
their job. The industry term for this is Role-Based Access Control (RBAC). RBAC is more flexible than
defining access rights based on usernames or static groups and enables an organization to be more
versatile when allocating resources. With RBAC the system must determine if the subject (user or client) is
associated with a role that has been granted access to a resource. This process of user to role
ascertainment is called role mapping.
QUESTION NO:16
Which four components of the following list should be found in the client tier of the Logical view of the
Oracle Reference Architecture User Interaction?
A. Personalization
B. Communication services
C. State management
D. Customization
E. Collaboration
F. Syndication
G. Controller
H. Rendering
Correct Answer: BCGH
Explanation
Explanation/Reference:
Explanation:
The Client Tier is hosted on the display device. As mentioned above, this may be a browser or an thick
client specific to the display device.
Regardless of the choice for the Client Tier, there are standard capabilities provided by this tier in the
architecture:
Controller: The Controller accepts input from the user and performs actions based on that input. State
Management: The State Management component is responsible for maintaining the current state of the
user interface.
Rendering: The Rendering component is responsible for delivering a view of the interface suitable for the
end user.
Communication Services: The Communication Services provide the means to access Service Tier
capabilities.
Note: Security Container, Data Management and Composition can also be included here.
References:
QUESTION NO:36
Which of the following capabilities are provided by containers?
A. Transaction Support
B. Security Support
C. Thread Management
D. Business Processes
Correct Answer: ABC
Explanation
Explanation/Reference:
Explanation:
Containers provide several capabilities that include the following:
Transaction Support (A)
Security Support (B)
Scalability and Performance
Thread Management (C)
Data and Code Integrity
Centralized Configuration
Connection and Session Management
Abstraction
References:
QUESTION NO:28
Enterprise Architecture consists of Business Architecture, Application Architecture, Information,
Architecture and Technical Architecture (BAIT). Which statement best describes Oracle Reference
Architecture (ORA) in the context of BAIT?
A. ORA addresses all four (Business, Application, Information, and Technical) equally.
B. ORA is primarily focused on the Technical Architecture, with some content on the other three aspects-
of BAIT.
C. ORA has content applicable to the Technical Architecture only.
D. ORA is primarily focused on the Business Architecture, with some content on the other three aspects of
BAIT
E. ORA is primarily focused on the information Architecture, with some limited content on the other three
aspects of BAIT.
F. ORA has content applicable to Information Architecture only.
Correct Answer: A
Explanation
Explanation/Reference:
Explanation:
Oracle Reference Architecture(ORA) defines a detailed and consistent reference architecture for
developing and integrating solutions based on current technologies from Oracle and other vendors. The
reference architecture offers architecture views, principles, and guidance based on recommendations from
technical experts across Oracle. It covers a broad spectrum of concerns pertaining to technology
architecture, including middleware, database, hardware, processes, and services.
QUESTION NO:49
You need to redesign your application to improve performance. The potential solution requires the data to
be kept in memory for faster access. The in-memory data requires full support for SQL with BI queries and
there is no need to scale out further. Which Oracle product would you choose to implement your solution?
A. Oracle Coherence
B. Oracle TimesTen
C. Oracle TUXEDO
D. Oracle VM
Correct Answer: B
Explanation
Explanation/Reference:
Explanation:
Oracle TimesTen In-Memory Database (TimesTen) is a full-featured, memory-optimized, relational
database with persistence and recoverability. It provides applications with the instant responsiveness and
very high throughput required by database-intensive applications. Deployed in the application tier,
TimesTen operates on databases that fit entirely in physical memory (RAM). Applications access the
TimesTen database using standard SQL interfaces. For customers with existing application data residing
on the Oracle Database, TimesTen is deployed as an in-memory cache database with automatic data
synchronization between TimesTen and the Oracle Database.
QUESTION NO:52
Which of the following are types of policy considerations designed to affect the way privileges are assigned
to users?
A. Principle of Alternating Privilege
B. Separation of Duties
C. DefenseinDepth
D. Vacation, Job Rotation, and Transfer
E. Principle of Least Privilege
Correct Answer: BDE
Explanation
Explanation/Reference:
Explanation:
B: Separation of duties is a classic security principle that restricts the amount of power held by any one
individual in order to prevent conflict of interest, the appearance of conflict of interest, fraud, and errors.
Separation of duties is one of the fundamental principles of many regulatory mandates such as Sarbanes-
Oxley (SOX) and the Gramm-Leach-Bliley Act (GLBA), and as a result IT organizations are placing greater
emphasis on separation of duties across all IT functions, especially database administration.
D: Vacation, Job Rotation, and Transfer are policy considerations.. Once way to detect and deter misuse of
systems is to have a new person perform the duties of an existing worker. The new person might notice
irregularities or questionable circumstances and be able to report it. The new worker might be there
temporarily, i.e. filling in for someone on vacation, or might be a replacement as a result of periodic job
rotations and transfers. In addition, workers that expect periodic rotations are less likely to misuse systems
as they know others following behind them will eventually discover it and report them.
E:Each user should have only those privileges appropriate to the tasks she needs to do, an idea termed
the principle of least privilege. Least privilege mitigates risk by limiting privileges, so that it remains easy to
do what is needed while concurrently reducing the ability to do inappropriate things, either inadvertently or
maliciously.
Note: The principle of least privilege. Users are given the least amount of privileges necessary in order to
carry out their job functions. This applies to interactions between systems as well as user interactions. This
reduces the opportunity for unauthorized access to sensitive information.
References:
QUESTION NO:44
What shortcomings of the Version Control Systems drive the need for a Metadata Repository?
A. Version Control Systems are not easily searchable.
B. Version Control Systems lack robust metadata that allows developers to determine relevance.
C. Version Control Systems don\’t provide the level of consumer tracking and reporting necessary to
support software reuse.
D. Version Control Systems do not allow the asset versions to be rolled back to a previousstate
Correct Answer: B
Explanation
Explanation/Reference:
Explanation:
The underlying core principle of ORA Engineering is asset sharing and enterprise development through an
integrated asset management approach. Most organizations use a Software Configuration Management
(SCM) or Version Control System (VCS) for managing the code and configuration assets. These tools are
great for managing the versioning of assets produced but they don\’t maintain the metadata of the assets.
Without metadata assets are not organized in context and it is hard to discover them. ORA recommends
an asset-centric engineering process, where an Asset Manager is used to address the challenges posed
by the traditional approaches. The Asset Manager is typically an enterprise-scoped Metadata Repository
working in concert with SCMs and other types of asset repositories.
References:
QUESTION NO:62
When mapping Oracle Products onto the Logical view, what is the best approach?
A. Utilize management packs, connectors, and plug-ins to create a customized product mapping for the
Logical view.
B. Use Oracle Enterprise Manager to provide core capabilities required by the three layers for Oracle
stack, and use management packs, connectors, and plug ins for non-Oracle stack.
C. Use an Oracle Enterprise Manager product to provide all the capabilities required by the three layers in
the Management and Monitoring architecture.
D. Use a third-party to provide all capabilities required by the three layersin the Management and
Monitoring architecture.
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
Oracle offers a comprehensive SOA solution through a suite of SOA products. Oracle Fusion Middleware
products cover the needs of the SOA infrastructure end-to-end. The figure below shows the mapping of
Oracle products to the SOA logical components.
Management of services is extremely important in SOA environments, where services are integrated,
reused, and constantly changed. Oracle Enterprise Manager (OEM) simplifies monitoring and managing
SOA environments. It addresses each of the challenges by helping model, monitor, and manage the SOA
environment.
The products referred in the figure are:
* OSB – Oracle Service Bus
* OSR – Oracle Service Registry
* OER – Oracle Enterprise Repository
* OWSM – Oracle Web Service Management
* OEM – Oracle Enterprise Manager (with SOA management pack)
* IdM – Identity and Access Management
There isn\’t necessarily a one to one mapping between logical architecture components and products.
While some products target a specific logical need, most provide additional features, such as monitoring,
management, and security.
Note:
The SOA infrastructure capabilities can be grouped into the following logical components as shown in
Figure below.
* Service Bus
* SOA Security Framework
* Service Registry
* Metadata Repository
* Monitoring Framework3-2 ORA SOA Infrastructure
* Management Framework
References:
QUESTION NO:39
Which of the following are common uses of an Attribute Service?
A. to maintain metadata pertaining to audit log entries and attestation reports
B. to acquire data that are necessary to make access-control decisions
C. to securely supply personally identifiable information to applications
D. to determine which security policy is assigned to a Web Service
Correct Answer: BC
Explanation
Explanation/Reference:
Explanation:
The Attribute Service(AS) retrieves user information from an attribute store. The AS retrieves user
information associated with a user from variety of authoritative identity stores including, but not limited to,
LDAP and database stores.
QUESTION NO:48
Service-Oriented Integration is based on creating a catalogue of SOA Services that expose existing
capabilities from back-end systems. Which statement best describes how an SOA Service relates to the
existing back-end systems?
A. Each SOA Service exposes the functionality from only a single back-end system to ensure the
decoupling of SOA Services.
B. An SOA Service should expose the low-level interface of the back-end system to ensure that all back-
end system capabilities are fully exposed.
C. An SOA Service should expose higher-level business capabilities by encapsulating the lower level
Interfaces of the back-end systems.
D. Each SOA Service should expose only one isolated capability of the back-end systems to ensure
isolation between SOA Service calls in composite applications.
E. All access to a back end system should be through a single SOA Service to ensure the back-end
system will net become overloaded by service requests.
F.
An SOA Service should connect to at least two back-end systems; otherwise the SOA Service is just
duplicating the existing interface to the back-end system.
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
The primary purpose of the Business layer in the architecture is to define and automate the business
processes external to, and independent of, the specific backend systems used in the organization. This
isolates the business process from backend system changes, and conversely, isolates the backend
systems from business process changes. De-coupling the business processes from the backend systems
simplifies changes and maintenance for business processes and backend systems. The Business layer
generally provides the greatest and most measurable business value.
References:
CertBus exam braindumps are pass guaranteed. We guarantee your pass for the 1Z0-574 exam successfully with our Oracle materials. CertBus Oracle IT Architecture Release 3 Essentials exam PDF and VCE are the latest and most accurate. We have the best Oracle in our team to make sure CertBus Oracle IT Architecture Release 3 Essentials exam questions and answers are the most valid. CertBus exam Oracle IT Architecture Release 3 Essentials exam dumps will help you to be the Oracle specialist, clear your 1Z0-574 exam and get the final success.
1Z0-574 Latest questions and answers on Google Drive(100% Free Download): https://drive.google.com/file/d/0B_3QX8HGRR1mUk1vV3dPMUtsZFE/view?usp=sharing
1Z0-574 Oracle exam dumps (100% Pass Guaranteed) from CertBus: http://www.certgod.com/1Z0-574.html [100% Exam Pass Guaranteed]
Why select/choose CertBus?
Millions of interested professionals can touch the destination of success in exams by certgod.com. products which would be available, affordable, updated and of really best quality to overcome the difficulties of any course outlines. Questions and Answers material is updated in highly outclass manner on regular basis and material is released periodically and is available in testing centers with whom we are maintaining our relationship to get latest material.