Download Oracle Application Integration Architecture 11g Essentials.1z0-543.PracticeTest.2017-01-11.43q.vcex

Vendor: Oracle
Exam Code: 1z0-543
Exam Name: Oracle Application Integration Architecture 11g Essentials
Date: Jan 11, 2017
File Size: 58 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
How do you jump start standards-compliant service deployment?
  1. By using AIA code generator tool to create a skeleton of ABCS
  2. By creating ABCS manually and by executing PIP Auditor to check compliance
  3. By enforcing sticker qa checks
  4. By manual code walkthrough
Correct answer: A
Explanation:
AIA Service Constructor is an application that helps jump-start ABCS development by pregenerating AIA artifacts complying with architectural recommendations. It generates artifacts according to the AIA architecture naming recommendations and relieves developers of performing repeatable mundane tasks, making them focus more on value-added business scenario-specific tasks. Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Constructing an ABCS Using Service Constructor
AIA Service Constructor is an application that helps jump-start ABCS development by pregenerating AIA artifacts complying with architectural recommendations. It generates artifacts according to the AIA architecture naming recommendations and relieves developers of performing repeatable mundane tasks, making them focus more on value-added business scenario-specific tasks. 
Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Constructing an ABCS Using Service Constructor
Question 2
For upgrades, knowing what custom mappings have been done can be very useful for customers to identify whether the upgrade will cause any functional issues. How will you identify the functional issues?
  1. XMAN (mapping compliance reports) reports in the CSV can be analyzed to find duplicate EBM mappings that also contain extended records.
  2. XMAN (mapping compliance reports) CSV reports can be analyzed to find the ABCS name that has changed.
  3. PIP Auditor reports can be analyzed to figure out the compliance of upgraded PIP.
  4. EOL2CSV reports can be analyzed to find the correct ABCS for specific business flow.
Correct answer: B
Explanation:
The reuse of artifacts and effective information sharing are key principles of SOA governance. The XSL Mapping Analyzer (XMAN) analyzes mapping information that exists in cryptic Application Business Connector Service (ABCS) XSLT files and provides it in a more readable format so that existing connector mappings can be easily considered for reuse.  Being able to comprehend the mappings between an Application Business Message (ABM) and an Enterprise Business Message (EBM) becomes imperative when developing a connector based on existing connectors.  When preparing for an upgrade, use XMAN to compare customized mappings to Oracle-supplied mappings. Evaluate the results of these comparisons and make any necessary changes before performing the upgrade. Incorrect answers:C: PIP Auditor - Used to check if given BPEL and ESB projects follow the AIA methodology for  coding conventions.Reference: Oracle Application Integration Architecture, Infrastructure Components and Utilities Guide
The reuse of artifacts and effective information sharing are key principles of SOA governance. The XSL Mapping Analyzer (XMAN) analyzes mapping information that exists in cryptic Application Business Connector Service (ABCS) XSLT files and provides it in a more readable format so that existing connector mappings can be easily considered for reuse.  
Being able to comprehend the mappings between an Application Business Message (ABM) and an Enterprise Business Message (EBM) becomes imperative when developing a connector based on existing connectors.  
When preparing for an upgrade, use XMAN to compare customized mappings to Oracle-supplied mappings. Evaluate the results of these comparisons and make any necessary changes before performing the upgrade. 
Incorrect answers:
C: PIP Auditor - Used to check if given BPEL and ESB projects follow the AIA methodology for  coding conventions.Reference: Oracle Application Integration Architecture, Infrastructure Components and Utilities Guide
Question 3
Which two statements are true for a requester ABCS?
  1. It receives the ABM as pay load and optionally returns the ABM as the response.
  2. It cannot have additional interactions with the requester application to enrich the ABM.
  3. It is supplied by the provider application to interface with an EBS.
  4. It enables the participating application to invoke an EBS either to access data or to perform transactional task.
Correct answer: AD
Explanation:
An ABCS (Application Business Connector Services) can be requester-specific or provider-specific. A requester ABCS accepts the request from the client application through a client-specific Application Business Message (ABM) and returns the response to the client application through a client-specific ABM. The role of the requester ABCS is to act as a vehicle to enable the participating application to invoke the EBS either to access data or to perform a transactional task. (D) The client side ABM is the payload that is passed by the requester application to the requester ABCS. The requester application that wants to leverage an action must define the requester-specific ABCS. The requester application that wants to implement this ABCS could be Siebel CRM, PeopleSoft Enterprise CRM, or Oracle eBusiness Suite CRM. The requester application-specific ABCS must take the requester application-specific ABM as input and provide the requester application-specific ABM as output. Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Introduction to ABCS
An ABCS (Application Business Connector Services) can be requester-specific or provider-specific. A requester ABCS accepts the request from the client application through a client-specific Application Business Message (ABM) and returns the response to the client application through a client-specific ABM. The role of the requester ABCS is to act as a vehicle to enable the participating application to invoke the EBS either to access data or to perform a transactional task. (D) The client side ABM is the payload that is passed by the requester application to the requester ABCS. 
The requester application that wants to leverage an action must define the requester-specific ABCS. The requester application that wants to implement this ABCS could be Siebel CRM, PeopleSoft Enterprise CRM, or Oracle eBusiness Suite CRM. The requester application-specific ABCS must take the requester application-specific ABM as input and provide the requester application-specific ABM as output. 
Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Introduction to ABCS
Question 4
Which two statements are true about Enterprise Business Flow (EBF) in context of Oracle AIA?
  1. The EBF will have no activity that needs human-to-human interaction.
  2. The EBF will involve only human-to-human or service-to-service Interaction.
  3. The EBF will involve only system-to-system or service-to-service Interaction.
  4. The EBF will involve only system-to-system or human-to-human interaction.
Correct answer: AC
Explanation:
The EBF involves only system-to-system or service-to-service interaction. The EBF has no activity that needs human intervention. Note: The EBF is used for implementing a business activity or a task that involves leveraging capabilities available in multiple applications. The EBF is about stringing together a set of capabilities available in applications to implement a coarse-grained business activity or task and composing a new service leveraging existing capabilities. Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Introduction to Enterprise Business Flows
The EBF involves only system-to-system or service-to-service interaction. The EBF has no activity that needs human intervention. 
Note: The EBF is used for implementing a business activity or a task that involves leveraging capabilities available in multiple applications. The EBF is about stringing together a set of capabilities available in applications to implement a coarse-grained business activity or task and composing a new service leveraging existing capabilities. 
Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Introduction to Enterprise Business Flows
Question 5
Which one best defines where an EBO is defined?
  1. WSDL document
  2. XSD document
  3. Java source file
  4. .cfg configuration file
Correct answer: B
Explanation:
EBOs (Enterprise Business Objects)  have the following characteristics:* They contain components that satisfy the requirements of business objects from the source and target application data models. * EBOs differ from other data models in that they are not data repositories. Instead, they provide the structure for exchanging data. XML provides the vocabulary for expressing business data. The XML schema is an XSD file that contains the application-independent data structure to describe the common object. * Each EBO is represented in an XML schema (XSD) file format. Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Introduction to EBOs
EBOs (Enterprise Business Objects)  have the following characteristics:
* They contain components that satisfy the requirements of business objects from the source and target application data models. 
* EBOs differ from other data models in that they are not data repositories. 
Instead, they provide the structure for exchanging data. XML provides the vocabulary for expressing business data. The XML schema is an XSD file that contains the application-independent data structure to describe the common object. 
* Each EBO is represented in an XML schema (XSD) file format. 
Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Introduction to EBOs
Question 6
On your project, you are ready to generate a Deployment Plan. What three parameter values will you need to be ready for?
  1. BOM file location as output file
  2. BOM file location as input file
  3. Deployment Plan file location as Input file
  4. Deployment Plan file location as output file
  5. Harvester Settings file location as output file
Correct answer: BDE
Explanation:
B: ODI BOM is a hand-coded xml file with the list of artifacts to be imported to ODI along with the list of tokens to be replaced and encrypted. This ODI BOM is provided as input to the Deployment Plan Generator to generate the ODI deployment plan.D: The command to generate a deployment plan for ODI is similar to the command to generate a deployment plan for the Project Lifecycle Workbench BOM.E: -DHarvesterSettings=<output path for the runtime Harvester setting file along with file name>Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Generating a Deployment Plan for ODI
B: ODI BOM is a hand-coded xml file with the list of artifacts to be imported to ODI along with the list of tokens to be replaced and encrypted. This ODI BOM is provided as input to the Deployment Plan Generator to generate the ODI deployment plan.
D: The command to generate a deployment plan for ODI is similar to the command to generate a deployment plan for the Project Lifecycle Workbench BOM.
E: -DHarvesterSettings=<output path for the runtime Harvester setting file along with file name>
Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Generating a Deployment Plan for ODI
Question 7
What should you define for an EBS before you begin implementing its operations?
  1. contract
  2. .cfg file
  3. XSD
  4. cross-reference
Correct answer: A
Explanation:
The methodology for designing and implementing an EBS is a contract-first methodology, that is, the contract is defined and created before the EBS is implemented. The contract for an EBS is defined as a WSDL document. Note: EBS (Enterprise Business Services) are the foundation blocks in the Oracle Application Integration Architecture (AIA). EBS represent the application or implementation-independent web service definition for performing a business task. The architecture facilitates distributed processing using EBS.An EBS is a service interface definition, currently manifested as an abstract Web Service Definition Language (WSDL) document, which defines the operations, message exchange pattern, and payload that are applicable for each operation of a service. Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Designing the EBS
The methodology for designing and implementing an EBS is a contract-first methodology, that is, the contract is defined and created before the EBS is implemented. The contract for an EBS is defined as a WSDL document. 
Note: EBS (Enterprise Business Services) are the foundation blocks in the Oracle Application Integration Architecture (AIA). EBS represent the application or implementation-independent web service definition for performing a business task. The architecture facilitates distributed processing using EBS.
An EBS is a service interface definition, currently manifested as an abstract Web Service Definition Language (WSDL) document, which defines the operations, message exchange pattern, and payload that are applicable for each operation of a service. 
Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Designing the EBS
Question 8
In which two ways is an EBF similar to an EBS?
  1. They operate only on EBMs.
  2. They are external application-independent.
  3. They are developed at the same time in the life cycle.
  4. Both are modeled to implement only a single operation.
Correct answer: BC
Explanation:
Note on EBF (Enterprise Business Flow): The EBF is used for implementing a business activity or a task that involves leveraging capabilities available in multiple applications. The EBF is about stringing together a set of capabilities available in applications to implement a coarse-grained business activity or task and composing a new service leveraging existing capabilities. The EBF involves only system-to-system or service-to-service interaction. The EBF has no activity that needs human intervention. In a canonical integration, the EBF is an implementation of an Enterprise Business Service (EBS) operation and calls other EBSs. It never calls an Application Business Connector Service (ABCS) or the applications directly. In other integration styles, the caller invoking the EBF can be either an application or any other service.Note on EBS: EBSs are the foundation blocks in Oracle Application Integration Architecture (AIA). An EBS represents the application or implementation-independent Web service definition for performing a business task, and the architecture facilitates distributed processing using EBS. Since an EBS is self-contained, it can be used independently of any other services. In addition, it can be used within another EBS.You must construct an EBS when the business process integration is between multiple source applications and target applications using the canonical model. The purpose of the EBS is to:* Provide the mediation between the requesting services and providing services. * Provide different operations invoked from a requester Application Business Connector Service (ABCS), an EBS, or an Enterprise Business Flow (EBF). * Route an operation to a suitable EBS, EBF, or provider ABCS based on the evaluation of the various routing rules for an operation. Incorrect answers:A: EBFs are more restricted.Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Introduction to Enterprise Business Flows
Note on EBF (Enterprise Business Flow): The EBF is used for implementing a business activity or a task that involves leveraging capabilities available in multiple applications. The EBF is about stringing together a set of capabilities available in applications to implement a coarse-grained business activity or task and composing a new service leveraging existing capabilities. The EBF involves only system-to-system or service-to-service interaction. The EBF has no activity that needs human intervention. In a canonical integration, the EBF is an implementation of an Enterprise Business Service (EBS) operation and calls other EBSs. It never calls an Application Business Connector Service (ABCS) or the applications directly. In other integration styles, the caller invoking the EBF can be either an application or any other service.
Note on EBS: EBSs are the foundation blocks in Oracle Application Integration Architecture (AIA). An EBS represents the application or implementation-independent Web service definition for performing a business task, and the architecture facilitates distributed processing using EBS. Since an EBS is self-contained, it can be used independently of any other services. In addition, it can be used within another EBS.
You must construct an EBS when the business process integration is between multiple source applications and target applications using the canonical model. 
The purpose of the EBS is to:
* Provide the mediation between the requesting services and providing services. 
* Provide different operations invoked from a requester Application Business Connector Service (ABCS), an EBS, or an Enterprise Business Flow (EBF). 
* Route an operation to a suitable EBS, EBF, or provider ABCS based on the evaluation of the various routing rules for an operation. 
Incorrect answers:
A: EBFs are more restricted.
Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack, Introduction to Enterprise Business Flows
Question 9
Which tool is used to update existing CBP Implementation?
  1. Because it is implemented at a service, the AIA Service Constructor will be used.
  2. Because it is implemented as a Mediator component, the Oracle SOA Suite will be used.
  3. The Oracle BPEL Designer will be used.
  4. The Deployment Plan Generator will be used.
Correct answer: C
Explanation:
Composite Business Processes (CBPs) are the implementation of process services. Process services orchestrate a series of human and automated steps, including enterprise-wide policies captured in business rules. These services run the implementations of the business processes in the Oracle Application Integration Architecture (AIA) Reference Process Models. AIA recommends using BPEL for implementing CBPs. CBPs are long-running processes that may run from few seconds to days. A CBP has an interface and message structure that is detailed enough to capture all of the information about the source of the triggering event. In most cases, the event is triggered by customer-facing applications. Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack:Designing and Constructing Composite Business Processes
Composite Business Processes (CBPs) are the implementation of process services. Process services orchestrate a series of human and automated steps, including enterprise-wide policies captured in business rules. These services run the implementations of the business processes in the Oracle Application Integration Architecture (AIA) Reference Process Models. 
AIA recommends using BPEL for implementing CBPs. CBPs are long-running processes that may run from few seconds to days. A CBP has an interface and message structure that is detailed enough to capture all of the information about the source of the triggering event. In most cases, the event is triggered by customer-facing applications. 
Reference: Oracle Fusion Middleware Concepts and Technologies Guide for Oracle Application Integration Architecture Foundation Pack:
Designing and Constructing Composite Business Processes
Question 10
Which statement represents the correct sequence of user actions for custom-built services, after the Bill-of-Materials is generated?
  1. Create the Deployment Plan using the Deployment Plan Generator, set up appropriate value in AIAInstallProporties.xml, encrypt the passwords in the Deployment Plan using CreateStore utility, and execute the Deployment Plan using AIA Install Driver
  2. Create the Deployment Plan using the Deployment Plan Generator, set up appropriate values in AIAInstallProperties.xml, execute the Deployment Plan using AIA Install Driver, and encrypt the passwords in AIAinstallProperties.xml using CreateStore utility.
  3. Create the Deployment Plan using the Deployment Plan Generator, set up appropriate value-AIAinstallProperties.xml, execute the Deployment Plan using AIA install Driver, and encrypt the passwords in AIAInstallProperties.xml using UpdateStore utility.
  4. Create the Deployment Plan using the Deployment Plan Generator, set up appropriate values AIAinstallProperties.xml, encrypt the passwords in AIAInstallProperties.xml using the UpdateStore utility, and execute the Deployment Plan using AIA Install Driver.
Correct answer: B
Explanation:
Incorrect answers:A: Encrypt the password after deployment.C, D: You need to use CreateStore, not UpdateStore which only can change the password.The passwords specified at the time of AIA installation can be changed post-installation. To help you change passwords, AIA provides a utility called UpdateStore. AIA stores its passwords in Keystore. This utility can modify the existing passwords in the Keystore. In order to run this utility, the AIAIntallProperties.xml properties file should exist in the corresponding AIAHOME/AIA_INSTANCE/<Instance name>/config folder. Also the password being modified must exist in the file Note #2: Making Migrated Services Deployable Step 1: Annotating CompositesStep 2: Harvesting AIA ContentStep 3: Generate Bill of MaterialStep 4: Deploy Composites1. Deploying custom built services is a two step process:Generate the deployment plans and deploy using the AID (Application Integration Architecture Installation Driver). 2. Deploy custom-built services using the AID.
Incorrect answers:
A: Encrypt the password after deployment.
C, D: You need to use CreateStore, not UpdateStore which only can change the password.
The passwords specified at the time of AIA installation can be changed post-installation. To help you change passwords, AIA provides a utility called UpdateStore. AIA stores its passwords in Keystore. This utility can modify the existing passwords in the Keystore. 
In order to run this utility, the AIAIntallProperties.xml properties file should exist in the corresponding AIAHOME/AIA_INSTANCE/<Instance name>/config folder. Also the password being modified must exist in the file 
Note #2: 
Making Migrated Services Deployable 
Step 1: Annotating Composites
Step 2: Harvesting AIA Content
Step 3: Generate Bill of Material
Step 4: Deploy Composites
1. Deploying custom built services is a two step process:
Generate the deployment plans and deploy using the AID (Application Integration Architecture Installation Driver). 
2. Deploy custom-built services using the AID.
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!