[Free] 2018(Mar) Dumps4cert Examcollection Oracle 1z0-478 Dumps with VCE and PDF 1-10

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Mar Oracle Official New Released 1z0-478
100% Free Download! 100% Pass Guaranteed!

Oracle SOA Suite 11g Certified Implementation Specialist

Question No: 1

View the Exhibit.

Dumps4Cert 2018 PDF and VCE

For the XML shown, which XPath expression returns exactly one node?

  1. /purchaseOrder/orderDate

  2. /purchaseOrder/items/item[0]/quantity

  3. /purchaseOrder//item

  4. /purchaseOrder//comment[not(following: : description) ]

Answer: B

Question No: 2

Why would you use the Mediator component in a Service Component Architecture (SCA) application Instead of using Oracle Service Bus?

  1. Oracle Service Bus runs out side of a SCA application. Therefore, the Mediator is the only choice for translation and transformation tasks in an SCA application.

  2. The Mediator is much faster than Oracle Service Bus.

  3. The Mediator supports transactions, but Oracle Service Bus does not.

  4. It is always better to use Oracle service Bus Instead of the Mediator.

Answer: A

Explanation: Whereas Oracle Service Bus provides service virtualization and protocol transformations for an Oracle SOA Suite application containing multiple composites, Oracle Mediator is an intra-composite mediation component that is deployed within an application.


  • Analogous to a load balancer routing HTTP traffic, the Oracle Mediator routes data from service providers to external partners. In addition, it can subscribe to and publish business events.

    Using Oracle Mediator, you create routing services and rules for them. A routing service is the key component for moving a message across the enterprise service bus – from its entry point to its exit point. The rules determine how a message instance processed by the routing service gets to its next destination. Using the rules, Oracle Mediator can perform the following actions:

    Route: Determines the service component (BPEL process, business rule, human task, and mediator) to which to send the messages.

    Validate: Provides support for validating the incoming message payload by using a schematron or an XSD file.

    Filter: If specified in the rules, applies a filter expression that specifies the contents (payload) of a message be analyzed before any service is invoked.

    Transformation: If specified in the rules, transforms document data from one XML schema to another, thus enabling data interchange among applications using different schemas.

    Question No: 3

    A customer demands access to your Service Composite Architecture (SCA) application. However keeping with the customer#39;s company standards, the interface must be EJB 3.0.

    Which solution meets the needs of the customer while requiring the least amount of time, effort, and architectural change for you?

    1. Create a small EJB 3.0 application that interfaces directly with your SCA application. This approach hides the web service interface from your customer while adding the smallest amount of overhead in the process

    2. Create an EJB 3.0 interface using Oracle Service Bus, which, in turn, invokes the SCA application through its native web service interface. This approach hides the web service Interface from your customer while adding the smallest amount of overhead in the process.

    3. Use the Mediator component to provide an EJB 3.0 interface in addition to the existing web service interface. This approach adds the least amount of overhead to each call.

    4. Explain to the customer the importance and flexibility of modem web services, and encourage the customer to learn some new skills.

    Answer: B

    Question No: 4

    Which two options are allowed in a decision table?

    1. An action modifying an output fact

    2. Asserting an output fact in a decision rule action

    3. Calling a rules function in an assertion

    4. Having rules specifying different actions

    Answer: A,D Explanation: Note:

  • After you create a Decision Table there are operations that you may want to perform on the Decision Table, including the following:

    Compact or split cells in a Decision Table

    Merge a condition or split a condition in a Decision Table

    Finding and resolving conflicts between rules in a Decision Table Find and fix gaps in a Decision Table

    Question No: 5

    Identify two correct descriptions of Oracle Web Services Manager (OWSM).

    1. It enables you to externalize web services security from the applications you build.

    2. It manages policies in a distributed policy manager that serves as a single policy enforcement point.

    3. Use security and management events, captured by OWSM agents, are displayed using Oracle BAM.

    4. It supplies predefined security policies that enable declarative security and management definition.

    5. It uses Oracle Event Processing (OEP) to determine when security violations have occurred.

    Answer: B,C Explanation: Note:

  • Oracle WSM allows companies to (1) centrally define and store declarative policies applied to the multiple web services making up a SOA infrastructure, (2) locally enforce security and management policies through configurable agents, and (3) monitor runtime security events such as failed authentication or authorization.

  • Oracle Web Services Manager offers a comprehensive and easy-to-use solution for policy management and security of service infrastructure. It provides visibility and control of the policies through a centralized administration interface offered by Oracle Enterprise Manager.

    Question No: 6

    Which three statements are true about enabling streaming support in adapters?

    1. Enabling streaming allows larger payloads to be read by the adapters.

    2. Enabling streaming improves message throughput and latency.

    3. Enabling streaming leverages features of the scalable DOM in Oracle XML Developer Kit (XDK).

    4. The benefits of enabling streaming are better when payloads are of relatively large.

    Answer: A,C,D

    Explanation: Streaming Large Payload

    To enable support to stream payload, you must select the Enable Streaming check box while specifying polling options. When you enable this feature, the payload is streamed to a database instead of getting manipulated in SOA run time as in a memory DOM. You use this feature while handling large payloads. When you select the Enable Streaming check box, a corresponding Boolean property StreamPayload is appended to the ActivationSpec properties defined in the respective .jca file.

    Question No: 7

    Which statement is correct about a JCA common client interface?

    1. The JCA binding component uses the JCA common client Interface APIs to communicate with the resource adapter.

    2. The resource adapter uses the common client interface APIs to communicate with the EIS.

    3. The resource adapter implements the standard MessageListener interface to poll for events from the EIS.

    4. The application server uses the common client interface APIs to commune with the EIS.

    Answer: A Explanation: Note:

  • The Common Client Interface (CCI) is the JCA-recommended client API for all resource adapters.

  • A resource adapter is a system-level software driver that enables J2EE components to communicate with a back-end enterprise information system (EIS) through a JCA- compliant application server when a resource adapter for the specific EIS is deployed to the server.

Question No: 8

Identify two correct descriptions of Oracle Event Processing (OEP).

  1. It is technology used to develop near-real-time, event driven systems

  2. It uses standard SQL to run some of the same queries that are executed in transactional systems.

  3. It is a time driven and request-focused form of traditional business intelligence (BI)

  4. It distills information value from many simpler events into a few more useful summary level events.

Answer: A,B

Explanation: A: Oracle Event Processing is a complete solution for building applications to filter, correlate and process events in real-time.

B: Built on industry-standards including ANSI SQL, Java, Spring DM and OSGI, Oracle Event Processing provides an open architecture for sourcing, processing, and publishing complex events throughout the enterprise.

Question No: 9

How is a SAML token used by OWSM for identity propagation?

  1. As each web service in a chain is invoked, OWSM generates a SAML token and inserts it in the WS-Security header of the request message.

  2. A SAML token is generated on invocation of the first web service in a chain and is stored in the Java Authentication and Authorization (JAAS) Subject so it can be used throughout the transaction by subsequent web services.

  3. A SAML token is used to determine the destination address of the next web service in the chain.

  4. The SAML token, embedded in the X.509 certificate or Kerberos ticket, is extracted by OWSM and delivered to the next web service in the chain.

Answer: A

Explanation: Propagating Identities through a Chain of Web Services

A web service may invoke another web service which in turn may invoke yet another web service

to complete a single transaction (this pattern is known as “chained web services”). Each of the

services in the chain may be protected. Instead of checking which service is calling which other

service, Oracle WSM allows you to check who the original user invoking the chain of web services is. Oracle WSM policies can be used to propagate the original user’s identity across the

chained web services. Following successful authentication to the first web service in the chain,

Oracle WSM sets the user as a Java Subject used throughout the transaction. When invoking

another service, the Oracle WSM client policy picks up the user identity from the Java Subject,

generates a SAML token based on the Subject’s information, and inserts the SAML token in the

WS-Security header of the request message to be sent to the service provider. This allows all the

web services in a chain to track the identity of the actual user calling a web service endpoint

instead of having the identity of the prior service in the chain calling the first web service to get

that information.


* Security Assertion Markup Language 2.0 (SAML 2.0) is a version of the SAML standard for exchanging authentication and authorization data between security domains. SAML 2.0 is an XML-based protocol that uses security tokens containing assertions to pass information about a principal (usually an end user) between a SAML authority, that is an identity provider, and a SAML consumer, that is a service provider. SAML 2.0 enables web- based authentication and authorization scenarios including cross-domain single sign-on (SSO).

Question No: 10

Which JDeveloper SOA project artifacts have references to the JNDI name of a resource adapter connection factory that is used in the project?

  1. .jca file

  2. .wsdl file

  3. .componentType file

  4. adf-config.xml file

Answer: D Explanation: Example:

If the MDS database has a JNDI name, then use the following entries in adf-config.xml:



lt;property name=quot;jndi-datasourcequot; value=quot;${db.jndi.name}quot;/gt;

lt;property name=quot;partition-namequot; value=quot;soa-infraquot;/gt;


100% Dumps4cert Free Download!
Download Free Demo:1z0-478 Demo PDF
100% Dumps4cert Free Guaranteed!
1z0-478 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.