Sep 2016 updated: Pass4sure Oracle 1Z0-574 free practice questions 51-60

Cause all that matters here is passing the Oracle 1Z0-574 exam. Cause all that you need is a high score of 1Z0-574 Oracle IT Architecture Release 3 Essentials exam. The only one thing you need to do is downloading {brand} 1Z0-574 exam study guides now. We will not let you down with our money-back guarantee.

2016 Sep 1Z0-574 Study Guide Questions:

Q51. Which three primary types of materials form an Enterprise Technology Strategy? 

A. ORA Technology Perspective 

B. ORA Industry Perspective 

C. Practitioner Guides 

D. Maturity Model 

E. Business Processes 

F. Data Entities 

Answer: A,C,D 

Explanation: There are three primary types of collateral provided for each ETS: 

* ORA Technology Perspective 

* Practitioner Guides 

* Maturity Model 

Reference: IT Strategies from Oracle, An Overview, Release 3.0 

Q52. There are a number of ways to classify applications in order to assess business risks and assign appropriate security policies. Which of the following is not described as a primary means to classify an application? 

A. by the user community it serves, such as HR, finance, all employees, general public, and so on 

B. by the information it handles, such as classified information, personal information, publicly availableinformation, and so on 

C. by business criticality, such as revenue-generating applications versus informational applications 

D. by technology and/or vendor, such as .NET versus Java, and so on 

E. by the applicability of existing laws and regulations pertaining to privacy, auditing, and access control 

Answer: D 

Explanation: Applications can be classified in a number of ways, such as: 

* By the user community it serves, such as HR, Finance, company executives, all employees, all persons working on behalf of the company (includes contractors and temporary workers), general public, etc. (not A) 

* Based on information confidentiality. Some applications process personal information while others do not. Likewise, in military terms, an application might be targeted towards individuals with a specific level of clearance. (not B) 

* Based on business criticality. Some applications may have a direct and severe contribution or impact to revenue. Examples include order processing, credit card processing, call processing, securities trading, and travel reservations. Others may have little or no impact. (not C) 

* Based on the applicability of existing laws and regulations. For example, HIPPA puts more security emphasis on patient records than would otherwise exist. (not E) 

* Based on network exposure. Levels might include: locked down (no network access), secure production environment access, general organization-wide intranet access, partner access, Internet access limited to a specific user community, and Internet access open to the public. 

Reference: Oracle Reference Architecture,Security, Release 3.1 

Q53. Which statement best describes the relationship between the Service-Oriented Integration (SOI) architecture and the Application Integration Architecture (AIA) product from Oracle? 

A. AIA is a product specific Implementation of the SOI architecture. 

B. AIA is a traditional Enterprise Application Integration (EAI) architecture; therefore AIA does not follow the SOI architecture. 

C. AIA is an Oracle product that maps to some of the layers and capabilities defined by the SOI architecture. 

D. AIAis an Oracle product and the SOI architecture is a product-agnostic architecture; therefore there is no relationship between the two. 

E. AIA is one of many Oracle products that maps onto SOI architecture. 

Answer: E 

Explanation: There are two categories of Oracle products that map into the service-oriented integration architecture, Fusion Middleware products and the Application Integration Architecture (AIA) products. 

Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0 

1Z0-574  torrent

Abreast of the times 1Z0-574 simulations:

Q54. Which of the following statements are true about the XACML standard and architecture? 

A. The Policy Enforcement Point (PEP) is where permit / deny access decisions are made. 

B. The Policy Information Point (PIP) provides information such as user attributes or environmental data that may be used to make access control decisions. 

C. XACML defines an XML schema used to represent rules for access control. 

D. XACML defines a TCP protocol used to communicate messages between Policy Enforcement Points. 

E. SAML assertions can be used to carry XACML authorization decisions. 

Answer: A,B,C,E 

Explanation: A: PEP – Policy Enforcement Point, where permit/deny access decisions are enforced. 

B: PIP – Policy Information Point, where information can be retrieved to evaluate policy conditions. For example, a user's role or time of day may be needed by the PDP to make a policy decision. 

C: eXtensible Access Control Markup Language (XACML) provides a standard way to represent access control policy information using XML. XAMCL defines access control policies in terms of rules, which in turn are defined to include a target, an effect, and a set of conditions. XACML defines an XML schema used to represent rule 

E: The SAML 2.0 profile of XACML 2.0 defines SAML assertions used to carry policies, policy queries and responses, authorization decisions, authorization query decisions and responses, and attribute assertions. In this way SAML authentication, attribute, and authorization assertions are incorporated into the security framework to complement XACML. 

Reference: Oracle Reference Architecture,Security, Release 3.1 

Q55. Which of the following token profiles is not included in the WS-Security standard as a standard type of identity token? 

A. XACML token profile 

B. SAML token profile 

C. username token profile 

D. Kerberos token profile 

E. X.500 token profile 

Answer: A 

Explanation: 

TheWS-Securityspecification allows a variety of signature formats, encryption algorithms and multiple trust domains, and is open to various security token models, such as: 

* X.509 certificates (not E) 

* Kerberos tickets (not D) *UserID/Password credential (not C) 

* SAML Assertions (not B) *custom-defined tokens. 

Note: WS-Security (Web Services Security, short WSS) is a flexible and feature-rich extension to SOAP to apply security to web services. It is a member of the WS-* family of web service specifications and was published by OASIS. 

Q56. Web Services are a natural fit for building distributed computing platforms. Which of the following qualities of Web Services make them suitable for distributed computing? 

A. WSDL,SOAPand XML promote language and platform Independence and interoperability 

B. WSDL can be used to define components that can be distributed in multiple servers. 

C. UDDI allows services deployed in a distributed infrastructure to be discovered and consumed. 

D. Web Services are deployed to the web tier of the distributed architecture. 

Answer: A,C 

Explanation: Web Services are a natural fit for building distributed computing platforms. 

* WSDL, SOAP, and XML promote language and platform independence and interoperability. 

* UDDI allows services deployed in a distributed infrastructure to be discovered and consumed. 

* Simple Object Access Protocol (SOAP) enables service binding and invocation using standards based protocols such as HTTP and JMS. 

* The platform for SOA should support the WS-* standards 

Note: Openness is the property of distributed systems such that each subsystem is continually open to interaction with other systems. Web services protocols are standards which enable distributed systems to be extended and scaled. In general, an open system that scales has an advantage over a perfectly closed and self-contained system. 

Reference: Oracle Reference Architecture, Application Infrastructure Foundation, Release 3.0 

certleader.com

Certified 1Z0-574 Q&A:

Q57. Which of the following are examples of dynamic modeling? 

A. Behavior Modeling 

B. Interaction Modeling 

C. Static Modeling 

D. Data Modeling 

Answer: A,B 

Explanation: Static modeling focuses on capturing the instance attributes and snapshots of nodes and objects. Dynamic modeling generally refers to one or both of the following 

* Behavior modeling that focuses on the internal state changes 

* Interaction modeling that focuses on external collaborations. 

Note: Modeling is a prime and foremost activity of the engineering process. Modeling bridges the gap between business and technology worlds through the language common to both sides. 

Reference: Oracle Reference Architecture,Software Engineering, Release 3.0 

Q58. The principle of "Security as a Service" states that business solution; must be designed to consume common security services, where possible, as opposed to implementing custom security logic and replicating copies of security data. Which of the following statements is not an Implication of this principle? 

A. Security logic must be externalized as much as possible, i.e., developers must not hand-code security logic into business solutions. 

B. Security enforcement, decisions, and management must be performed by dedicated, shared services and Infrastructure. 

C. Wherever possible, security services must be built upon open standards. 

D. Security services must use Web Service (SOAP) interfaces and XML payloads in order to promote Interoperability. 

Answer: A,B,C 

Explanation: Rationale: Security services allow multiple solutions to share common security logic, features, policies, and identity information. This provides a more secure environment by eliminating redundancies and associated risks. It also enables more effective management of security in the IT environment. Implications: 

* Security logic must be externalized as much as possible, i.e., developers must not hand-code security logic into business solutions.(A) 

* Security enforcement, decisions, and management must be performed by dedicated, shared services and infrastructure.(B) 

* Security services must leverage open standards for interface protocols and message formats where possible in order to promote interoperability.(C) 

* The availability and performance characteristics of security services must meet or exceed the specifications required to support the business solutions. 

Reference: Oracle Reference Architecture,Security, Release 3.1 

Q59. Which of the following are ORA Engineering logical categories? 

A. Integrated Development Environment 

B. Quality Manager 

C. Asset Manager 

D. Monitoring and Management 

Answer: A,B 

Explanation: The Engineering logical view shows the logical components of the Engineering environment and show how they are connected to each other. T The primary logical categories as shown are: *Modeler *Integrated Development Environment (IDE) *Quality Manager *Deployment Manager *Metadata Repository *Asset Repository 

Reference: Oracle Reference Architecture, Software Engineering, Release 3.0, Engineering Logical View 

Q60. Which statements are correct with regard to the layers in the Logical View of Service-Oriented Integration (SOI)? 

A. Upper layers in the architecture leverage capabilities provided by lower layers. 

B. Upper layers are allowed to access capabilities in any lower layer. 

C. Upper layers are allowed to access capabilities only in the next lower layer. 

D. Each layer encapsulates specific capabilities required by the entire architecture. 

E. Each layer encapsulates optional capabilities of the architecture; thus any layer can be omitted from the architecture. 

F. The layers are used to partition the capabilities of the architecture, but otherwise have no architectural significance. 

Answer: A,C,D 

Explanation: Each layer encapsulates specific capabilities for the overall architecture. Upper layers in the architecture leverage the capabilities provided by the lower layers. Generally, upper layers call lower layers in the architecture and the reverse (i.e. lower levels calling upper layers) is prohibited. 

Reference: Oracle Reference Architecture, Service-Oriented Integration, Release 3.0 

About 1Z0-574 Information: 1Z0-574 Dumps

Certleader Dumps
Certleader is a company specialized on providing high quality IT exam materials and fully committed to assist our respected clients crack any IT certification tests on their 1st efforts.