Which WebCenter product Improves efficiency and productivity by enabling users to connect with others, regardless of their location, via web and voice conferencing, instant messaging, presence, and chat rooms?
A. Oracle WebCenter Intelligent Collaboration
B. Oracle WebCenter Anywhere
C. Oracle WebCenter Real-Time Collaboration
D. Oracle WebCenter Spaces
Which of the following are common uses of an Attribute Service?
A. to maintain metadata pertaining to audit log entries and attestation reports
B. to acquire data that are necessary to make access-control decisions
C. to securely supply personally identifiable information to applications
D. to determine which security policy is assigned to a Web Service
Which of the following statements about asset-centric engineering is true?
A. Project assets are maintained at each individual project level in an asset-centric engineering.
B. Asset-centric engineering promotes an integrated asset management approach in which assets are shared across the enterprise.
C. Asset-centric engineering uses multiple enterprise repositories to store and maintain the assets.
D. Asset-centric engineering requires that everything related to the assets,including metadata and payload, should be stored in the same repository.
There are a number of ways to classify applications in order to assess business risks and assign appropriate security policies. Which of the following is not described as a primary means to classify an application?
A. by the user community it serves, such as HR, finance, all employees, general public, and so on
B. by the information it handles, such as classified information, personal information, publicly availableinformation, and so on
C. by business criticality, such as revenue-generating applications versus informational applications
D. by technology and/or vendor, such as .NET versus Java, and so on
E. by the applicability of existing laws and regulations pertaining to privacy, auditing, and access control
Which of the following statements describes the relationship between Cloud computing and Grid computing?
A. Grid computing is the same as Cloud computing
B. Grid architectures are likely to be used in building Clouds
C. Grid computing is an evolution of the Cloud computing architecture
D. Grid computing and Cloud computing are totally unrelated concepts
Which statement best describes the relationship between the Logical View and the Development view of the Service-Oriented Integration architecture?
A. The two architectural views are Independent and there is no relationship between them.
B. The Logical View defines the rationale for layers within the architecture. The Development View specifies the developer tools used for each layer.
C. The Logical View defines the layers of the architecture and the capabilities within each layer. The Development View describes how aspects of the architecture impact developers following the architecture.
D. The Logical View defines the layers of the architecture and the capabilities within each layer. The Development View specifies the developer tools that provide the capabilities for each layer.
E. The Logical View specifies the developer tools required by each layer in the architecture. The Development View describes the developer impact of the tools specified.
Which of the following statements best describes the ideal role of an application owner with respect to defining application security?
A. The application owner must become knowledgeable about security risks, threats, classifications, and policies in order to define security requirements for his or her applications. The more on owner learns about security, the more secure his or her applications will become.
B. The application owner should hire a security expert to define security requirements for his or herapplications, based on current Industry best practices. Actively implementing the latest trends will best ensure a secure application environment.
C. The application owner should recommend adherence to common established practices for assessments, classifications, architecture, and policies that have been defined, and are actively maintained, by security experts across the organization. Deviations may be necessary, butapplication owners should strive to be consistent with best practices that have been adopted by the organization.
D. The application owner, whenever possible, should elect to deploy applications into a public cloud computing environment. Doing so effectivelydelegatesresponsibility and accountability of concerns to another company. The owner doesn't need to be concerned with security as long as the cloud provider has been certified.
A customer has two separate lines of business and each has its own unique resources that are controlled independently. The customer wants to provide a single user interface at the enterprise level that, at least from the user's perspective, unifies the separate lines of business and presents a single consistent view. What is the most suitable architectural arrangement for such a federated deployment?
A. The enterprise implements full client stack and part of the service stack while each LoB deploys the remaining part of the service tierin order to expose uniform interface elements.
B. The client tier assimilates the data from the resource stack of each line of business.
C. The enterprise implements full client and service stacks while each LoB deploys a partial service. sufficient to expose uniform interface elements.
D. The client tier assimilates the data from the service stack of each line of business.
Which statement is true with respect to Metadata Repository and Asset Repository?
A. Metadata Repository manages the data about the assets, and Asset Repository stores the payload of the assets.
B. Asset Repository manages the data about the assets, and Metadata Repository stores the payload of the assets.
C. Metadata Repository stores everything related to the assets. Including metadata and payload.
D. Asset Repository stores everything related to the assets, including metadata and payload.
A company is building a new customer self-service website. The company has an existing CRM application that contains customer information that needs to be integrated into the self-service website. The CRM application provides a synchronous interface to access the needed customer information. The CRM application takes 5 to 30 seconds to respond to the request for customer information. The requirements for the new customer self-service website is to respond within 3 seconds 90% of the time. What integration pattern would you suggest that the company use to integrate the CRM application into the new customer self-service website?
A. Use the request-response message exchange pattern to access the synchronous interface provided by the CRM application. The request-response message exchange pattern matches the synchronous interface provided by the CRM application, so this is the simplest and best approach for integration.
B. When customer information from the CRM application is needed, asynchronously fetch the information by using the store-and-forward integration pattern. This approach allows the self-service website to respond quickly to customer requests without waiting for the CRM application. The website can display the fetched customer information when it is available.
C. Use the request optional-response message exchange pattern to access the CRM application. If the CRM application responds quickly (for example, in 5 seconds) use that response. If the CRM application does not respond quickly, then the optional response was not returned and processing continues.
D. When customer information from the CRM application is needed, post a message to a topic queue by using the publish-and-subscribe integration pattern. This approach allows the CRMapplication or any other application subscribing to the topic queue to respond with customer information.
E. Use the polling integration pattern to find the necessary customer information in the CRM application database. Obviously the data exists in the CRM application database. Obliviously the data exists in the CRM application database, so the slow response from the CRM application can be eliminated by polling directly from the CRM application database.