Which of the following statements are true about an end-to-end security strategy?
A. End-to-end security and point-to-point security are virtually identical strategies proposed by different security vendors.
B. End-to-end security strives to protect data at rest, even in temporary queues.
C. End-to-end security often involves some form of message-level protection.
D. When end-to-end security is enabled. Point-to-point transport-level encryption should be disabledin order to avoid cryptography conflicts between layers.
E. End to-end security is highly beneficial for distributed computing environments where many point- point connections and intermediaries exist, because it offers seamless data protection.
Which three primary components form IT Strategies from Oracle (ITSO)?
A. Enterprise Technology Strategies
B. Maximum Availability Architecture
C. Enterprise Solution Designs
D. Oracle Reference Architecture
E. Oracle Enterprise Architecture Framework
F. Oracle Unified Method
For a large heterogeneous environment with a large number of hosts requiring scalability and efficiency, what is the best strategy for deployment of Oracle Enterprise Manager?
A. Use a centralized control with persistent connections to all agents to pull data.
B. Use multiple semi-autonomous agents collecting information and periodically relaying it to a central repository.
C. Use multiple Instances of Oracle Enterprise Manager to maximize performance.
D. Use centralized alert filtering.
Data is often said to exist in one of three states:
1.
In motion being transmitted over a network or connection
2.
At rest persisted in a queue, disk, file, and so on
3.
In memory loaded into computer memory
The third state, in memory, is seldom mentioned in security standards, texts and requirements. Why?
A. Computer memory has built-in parity checking which protects against malicious alteration
B. No one has direct access to a computer's memory, therefore it is the safest place to be.
C. All modern computers (developed since the mid-90s) automatically store data in memory in encrypted from to help ensure confidentiality and integrity, because of this, more emphasis has been placed on raising the level of protection in the other two states.
D. This state is often overlooked. Data in memory can easily be viewed by anyone with system administrator.
You are designing a mission-critical application that requires high performance. Your analysis concludes that Oracle Exadata would enable you to meet the performance goals. What characteristics of Oracle Exadata make it possible to provide such superior performance?
A. Oracle Exadata uses massively parallel architecture to speed up Oracle data warehouses by offloading data-intensive query processing from the databases.
B. By pushing SQL processing to the Oracle Exadata Storage Server, all the disks can operate in parallel, reducing database server CPU consumption while consuming much less bandwidth to move data between storage and database servers.
C. The Oracle Exadata Storage Server returns a query result set rather than entire tables, eliminates network bottlenecks, and frees up database server resources.
D. Oracle Exadata uses direct data placement to ensure very low CPU overhead by directly moving data from the wire to database buffers with no extra data copies being made.
Which of the following environments are typically clustered?
A. Development Environment
B. User Acceptance Testing (UAT) Environment
C. Staging Environment
D. Nonfunctional Testing Environment
Choose the three statements from the following list that accurately reflect architectural principles of Oracle Reference Architecture User Interaction.
A. The architecture must support separating configuration and other types of metadata from the source code.
B. The architecture must support orchestration of business application functions.
C. The architecture must support end-user access to a wide variety of server-side functionality.
D. The architecture must not attempt to replicate the capabilities of traditional client-server GUIs.
E. The architecture must provide secure interaction between the end user and the server-side resources.
F. The architecture must provide the end user with the capability to switch quickly between applications.
Which of the following is not a key function of an identity management system?
A. user provisioning
B. password maintenance and self-service
C. approval workflow
D. LDAP integration
E. authentication
Which statement best describes the role of the Data Movement Layer within the logical view of the Service-Oriented Integration (SOI) architecture?
A. The Data Movement Layer provides access to persistent data storage for the architecture.
B. All write operations on persistent data are performed via the Data Movement Layer.
C. All read operations on persistent data are performed via the Data Movement Layer.
D. All create, read, update, and delete operations on persistent data are performed via the Data Movement Layer.
E. The Data Movement Layer provides batch and bulk data operations for the architecture.
Why is it necessary to have Integration of Metadata Repository to the Source Code Management (SCM) server?
A. The SCM needs to access the asset metadata for reporting purposes.
B. The Metadata Repository links the asset metadata to the asset payload, which may be archived in the SCM.
C. The Metadata Repository promotes the assets to the SCM.
D. The Metadata Repository stores the asset metadata in the SCM.