2018 Jan Oracle Official New Released 1z0-478
100% Free Download! 100% Pass Guaranteed!

Oracle SOA Suite 11g Certified Implementation Specialist

Question No: 21

In your solution, a web service client needs to invoke a series of three web services in support of a single transaction. The third web service needs the identity of the original web service client.

Which statement describes how the identity is made available by Oracle Web Services Manager (OWSM)?

  1. The transaction manager accesses an internal table that maintains credentials used to invoke each individual web service in the chain.

  2. Each web service in the chain does its own authentication so the third web service handles its own identity checking.

  3. OWSM sets the user in the Java Authentication and Authorization (JAAS) Subject when the first web service successfully authenticates, and the Java Subject is used by subsequent web services to access the identity.

  4. OWSM stores a SAML token from the first web service invocation in a database table, and that table is accessed by subsequent web services in the chain to retrieve identity.

Answer: C

Explanation: Propagating Identities through a Chain of Web Services

A web service may invoke another web service which in turn may invoke yet another web service to complete a single transaction (this pattern is known as “chained web services”). Each of the services in the chain may be protected. Instead of checking which service is calling which other service, Oracle WSM allows you to check who the original user invoking the chain of

Web services is. Oracle WSM policies can be used to propagate the original user’s identity across the chained web services. Following successful authentication to the first web service in the chain, Oracle WSM sets the user as a Java Subject used throughout the transaction. When invoking another service, the Oracle WSM client policy picks up the user

identity from the Java

Subject, generates a SAML token based on the Subject ‘s information, and inserts the SAML token in the WS-Security header of the request message to be sent to the service provider. This allows all the web services in a chain to track the identity of the actual user calling a web service endpoint instead of having the identity of the prior service in the chain calling the first web service

to get that information.

Reference: Securing Web Services and Service-Oriented Architectures with Oracle Web Services Manager 11g, Oracle White Paper

Question No: 22

Your solution needs to validate, transform, and route data. You want to deploy the capability as a Service Component Architecture (SCA) composite application. You would most likely use a to provide the functionality.

  1. Proxy service

  2. Business service

  3. BPEL service

  4. Spring component

  5. Mediator

Answer: E

Explanation: The primary building block of a mediation flow is called a mediation task. Mediation tasks are primitives that implement ESB functions such as logging, data transformation, routing, and so on.

Question No: 23

Composite X invokes an outbound DB adapter to write data to a database table. You have configured JCA at the binding component as follows:

lt;property name = “jca.retry.count” type = “xs:int” many = “false” override = “may” gt;


lt;property name = “jca.retry.interval” type = “xs:int” many = “false” override = “may” gt; 2lt;/propertygt;

You have also modeled a modeled a fault policy to retry the invocation three times in case of remoteFault as follows:



Which result describes what happens when the database that is being accessed by the above binding component goes down?

  1. The invocation is retrieved for a total of two times every two seconds. Fault policy retries are ignored.

  2. The invocation is retried for a total of six times every three seconds.

  3. The invocation is retried for a total of six times every two seconds.

  4. The fault policy retries occur within the JCA retries. So two JCA retries are executed two seconds apart. Within each JCA retry, three fault policy retries are executed three seconds apart.

  5. The JCA retries occur within the fault policy retries. So three fault policy retries are executed three seconds apart. Within each fault policy retry, two JCA retries are executed two seconds apart.

Answer: E Explanation: Note:

  • Global retries for any error handling are returned to the BPEL Receive activity instance, for example, or, more generally, to the point at which the transaction started. Such a retry could occur if there was an error such as a temporary database fault. The default retry count is by default indefinite, or specified in the jca.retry.count property.

  • Properties you can specify in the composite.xml file include:

  • /jca.retry.count

    Specifies the maximum number of retries before rejection. Again, specifying this value is a pre-requisite to specifying the other property values.


    Specifies the time interval between retries (measured in seconds.)

    • A remoteFault is also thrown inside an activity. It is thrown because the invocation fails. For example, a SOAP fault is returned by the remote service.

      Question No: 24

      Which activity is used to invoke a human task from a BPEL process?

      1. Invoke

      2. Human task

      3. Task

      4. Invoke human task

      5. Start human task

      Answer: A Explanation:


    • Activities are the building blocks of a BPEL process service component. Oracle BPEL Designer includes a set of activities that you drag into a BPEL process service component. You then double-click an activity to define its attributes (property values). Activities enable you to perform specific tasks within a BPEL process service component. For example, here are several key activities:

    / An assign activity enables you to manipulate data, such as copying the contents of one variable to another.

    / An invoke activity enables you to invoke a service (identified by its partner link) and specify an operation for this service to perform.

    / A receive activity waits for an asynchronous callback response message from a service.

    * Invoking a human task from a BPEL process is a two-step process:

    ->Creating a human task.

    ->Wiring and invoking the human task from BPEL.

    Question No: 25

    An Oracle Web Services Manager (OWSM) agent .

    1. Can apply categories of policies in any specified order

    2. Generates a request to an LDAP directory to look up policy definitions

    3. Always fails if the Policy Manager becomes unavailable

    4. Intercepts requests to and responses from a client or service

    Answer: D

    Explanation: The OWSM Agent protects access to a web service at the web service provider (server-side Agent)

    • Step1: The client posts a request to a web service

    • Step2: The Agent intercepts the request, applies security policies (e.g., decryption, signature verification, authentication, authorization), and passes the request to the web service

    • Step3: The web service returns a response

    • Step4: The Agent intercepts the response, applies security policies (e.g., encryption), and passes the response to the client

    Ensurepass 2018 PDF and VCE

    Question No: 26

    What does SOA governance complement and influence?

    1. Data center capacity planning

    2. Decisions to use SOAP-based vs. REST-based web services approaches.

    3. Data models that define a shared view of corporate data resources.

    4. IT governance processes and structures

    Answer: D

    Explanation: Service-oriented architecture (SOA) has moved beyond hype to widespread acceptance as an IT strategy for delivering business

    results. Effective SOA governance is essential to achieving measurable, sustainable business value, lowering costs, improving efficiency and increasing visibility. In fact, without it, many SOA initiatives fail. Oracle provides a comprehensive SOA governance solution that unites people, process, and technology to help organizations achieve their SOA objectives – at every level of SOA maturity. While early SOA projects may need automation to manage artifacts in the lifecycle, more advanced organizations measure SOA success by how it transforms the business. Governance support is essential to making progress on both technical and business dimensions of SOA.

    Question No: 27

    Which two activities are typically performed during the service implementation and configuration phase of the SOA lifecycle?

    1. Capabilities are evaluated and prioritized based on business models and ROI.

    2. Oracle Enterprise Repository promotes services and harvested endpoints to the service registry.

    3. Developers find and reuse services to help them complete development.

    4. Developers use harvesting tools to submit their completed implementations to Oracle Enterprise Repository.

    Answer: C,D

    Explanation: Implementation and Configuration

    As capabilities are funded, projects are established to implement the capability. SOA Suite developers working in JDeveloper can see and reuse services from the enterprise repository to complete their projects. Service Bus developers working in Eclipse can see and reuse services from the enterprise repository to complete their projects (C).

    Developers can also harvest their completed implementations directly to the Enterprise Repository (D). The Enterprise repository also supports VS .Net development.

    Question No: 28

    In oracle Service Bus, loose coupling between service provider and service consumer is provided by the .

    1. database tables stored in MDS

    2. a proxy service and a business service

    3. a JMS-based queuing service

    4. a Mediator component

    Answer: B

    Question No: 29

    How are task outcomes processed in a BPEL process?

    1. Each path out of the human task activity has a condition in which you specify the outcome that causes that path to be followed.

    2. With onMessage or pick activities that receive the outcome from the human workflow engine.

    3. With a switch containing a case for each outcome of interest plus an optional otherwise case after the human task activity.

    4. With a switch containing one case for each possible outcome after the human task.

    Answer: C

    Explanation: The Switch activity reflects the possible outcomes, or cases, specified previously, Approve and Reject. It also has an Otherwise case to represent other outcomes, such as errored, stale, or expired. Inside each of the cases, you can add activities to complete modeling of the business process.


    • Human Task editor-A tool that enables you to specify task settings such as task outcome, payload structure, task participants, assignment and routing policy, expiration and escalation policy, notification settings, and so on.

    • Task outcomes capture the possible outcomes of a task. The Oracle BPEL Worklist

      Application displays the outcomes you specify here as the possible actions to perform during run time. You can specify the following types of task outcomes:

      Select a seeded outcome Enter a custom outcome

    • The Outcomes window displays the possible outcomes for tasks. APPROVE and REJECT are selected by default.

      Ensurepass 2018 PDF and VCE

      Question No: 30

      Which two statements describe the security policy attachment features of Oracle SOA Suite 11g?

      1. The order in which policies are attached to a subject determines the order in which the policies are executed.

      2. JDeveloper groups the policy that can be attached into the five categories of interceptors.

      3. Only one security polity can be attached to a web service at a time.

      4. In JDeveloper, a security policy can be attached to a web service, but it can be marked as either enabled or disabled.

      Answer: A,D Explanation:


    • If necessary, add additional policies.

      You can temporarily disable a policy by deselecting the checkbox to the left of the name of the attached policy. This action does not detach the policy.

    • You can attach or detach policies to and from service binding components, service components, and reference binding components in a SOA composite application. Use Oracle JDeveloper to attach policies for testing security in a design-time environment. When your application is ready for deployment to a production environment, you can attach or detach runtime policies in Oracle Enterprise Manager Fusion Middleware Control Console.

      100% Free Download!
      Download Free Demo:1z0-478 Demo PDF
      100% Pass Guaranteed!
      Download 2018 EnsurePass 1z0-478 Full Exam PDF and VCE

      EnsurePass ExamCollection Testking
      Lowest Price Guarantee Yes No No
      Up-to-Dated Yes No No
      Real Questions Yes No No
      Explanation Yes No No
      PDF VCE Yes No No
      Free VCE Simulator Yes No No
      Instant Download Yes No No

      2018 EnsurePass IT Certification PDF and VCE