Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Oracle 1z0-434 - Oracle SOA Suite 12c Essentials

Page: 2 / 3
Total 84 questions

Which two statements accurately describe policy attachment in Oracle Web Services Manager (OWSM)?

A.

The order in which policies are attached to a subject determines the order in which the policies are executed.

B.

JDeveloper groups the policies that can be attached into five categoriesof interceptors.

C.

Multiple WS-Addressing policies can be attached to a policy subject.

D.

In Enterprise Manager Fusion Middleware Control, a security policy can be attached to a web service and it can be either enabled or disabled.

Which two statements are true about the role of a Continuous Query Language (CQL) processor in a Oracle Event Processing application?

A.

It primarily executes SQL statements against the database.

B.

It can be used to filter, aggregate, and correlate events in memory and can integrate with Coherence, NoSQL, and HDFS.

C.

It invokes human workflows to deal with exception handing.

D.

It can perform spatial queries as well as complex

For each three items can you create tests by using the Service Component Architecture (SCA) test framework?

A.

Reference binding components

B.

Service components such as a Mediator

C.

Wires

D.

Invoke activities in a BPEL process

E.

Composite sensors

Which two are correct statements about the Oracle Cloud Adapter for Salesforce.com?

A.

It uses either HTTP basic authentication or username token authentication to perform secure interaction with Salesforce.com.

B.

It can make both synchronous and asynchronous calls through the Salesforce.comSOAP API.

C.

Behind the scenes, it uses the SOAP API provided by Salesforce.com.

D.

The design-time tooling generates a WSDL that is different from the enterprise WSDL available from Salesforce.com.

Which three design considerations apply to an if-then rule?

A.

A rule function can be called.

B.

Aggregations such as count, max, and average can be used.

C.

A while loop can be employed.

D.

Fact object structures can be changed.

E.

A BPEL scope variable can be defined.

When more than one policy is attached to a policy subject, the combination of policies needs to be valid.

Which statement is true about the valid combination of policies for a policy subject?

A.

Only one MTOM policy can be attached to a policy subject.

B.

More than one Reliable Messaging policy can be attached to a policy subject.

C.

You cannot have both a Reliable Messaging policy and a WS-Addressing policy attached to the same policy subject

D.

Only one security policy can be attached to a policy subject

You pass some data from a process variable as a parameter into a human task. At a later time, the variable is then updated in a parallel stream of execution in the BPEL process while the human task is still executing before it is actioned by the assignee.

What does the assignee see after opening the task in the workspace and looking at the parameter?

A.

The parameter contains the values of the process variable as it was when the task was created.

B.

The parameter contains the values of the process variable as it is at the current time (that is, when the user opened the human task in the workspace).

C.

The parameter is empty and the task must be restarted to pick up the new values of the process variable.

D.

It is not possible to determine what the assignee sees from the information provided.

The identity context is opaque to your web service client and web service and you don’t need to perform any additional coding or processing in your client or service to support it after you enable identity context propagation.

Which Oracle SOA Suite component directly enables this behavior?

A.

Oracle Web Service Manager Policy Manager

B.

Oracle BPEL Process Manager

C.

Oracle Enterprise Manager

D.

Oracle User Messaging Service

Your company wants to extend a number of in-house applications with the third-party service functionality.

Identify two ways in which this can be accomplished using Oracle SOA Suite.

A.

by developing BPEL processes that orchestrate a number of third-party service calls to complete a new business activity.

B.

by developing ADF screen flows that percent unified viewsof the third-party service functionality to in-house portal users

C.

by developing RESTful web services that provide logic to enrich third-party service responses

D.

by developing mediators that handle last-mile transformation and routing of messages to and from third-party services

Identify two statements that correctly describe OWSM policy attachments in Oracle SOA Suite

A.

Although you can attach as well as detach security policies in JDeveloper, you can only detach them in Enterprise Manager.

B.

An applicationdeveloper typically uses JDeveloper to create new security policies rather than select them froma prebuilt list.

C.

When you use JDeveloper to associate a security policy with a web service, the policy is not really attached until application deployment.

D.

OWSM policies can be attached and detached with WLST.