Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

You can group one or more Oracle Integration Cloud (OIC) integrations into a single structure called a package.

Which statement is NOT true about OIC packages?

A.

You can import packages directly from the Oracle Marketplace.

B.

All packages must include at least one integration.

C.

Packages enable you to easily import and export a group of integrations to and from OIC.

D.

Integrations do not need to be part of a package.

E.

Packages cannot be locked to deny other users access to your integrations.

F.

New packages can be created by clicking the Create button on the Packages page in the OIC console.

Full Access
Question # 5

You are assigned to review the specifications of the SOA composite applications that have been deployed to your SOA Cloud Service instance. Part of this analysis requires you to catalog the Service Component Architecture (SCA) components that are implemented within each composite application.

Which is a valid SCA component in an Oracle SOA composite application?

A.

BAM Adapter

B.

B2B Agreement

C.

MFT Adapter

D.

Mediator

Full Access
Question # 6

When defining the frequency for scheduled orchestration style integration runs, you can choose either Basic or the Advanced option.

Which expression format is used for defining advanced scheduled runs?

A.

Groovy

B.

YAML

C.

cron

D.

iCal

Full Access
Question # 7

When a connection is in edit mode and the browser crashes, the connection becomes locked, which then prevents it from being edited.

Which two users can unlock the connection?

A.

A user with the Designer Role

B.

The same user who has edited the connection

C.

Any user

D.

A user with the Administrator Role

Full Access
Question # 8

Which two statements are true about the Internet of Things (IoT)?

A.

Different IoT approaches need to integrate technologies like mobile, cloud, big data, and analytics, connecting everyday objects to each other and the Internet.

B.

Cloud technology is well-suited to enable IoT, offering agility, low costs, and excellent resourceutilization.

C.

Using IoT, hospitality-based businesses can track customer behavior to deliver rewards and tailored services.

D.

IoT is not useful in asset tracking scenarios due to the unavailability of low-cost connected devices and sensors.

Full Access
Question # 9

OIC is available in two editions - Standard and Enterprise. Which OIC Enterprise Edition capabilities are ALSO available in the OIC Standard edition? (Select two)

A.

Process Applications

B.

B2B Trading Partner Agreements

C.

Enterprise application Adapters (such as EBS, JDE, SAP, and Siebel)

D.

Integration Insight

E.

File Server

F.

Visual Builder

Full Access
Question # 10

You are tasked with creating a new integration in OIC that will be exposed to clients as a SOAP web service. In addition, this integration will be invoking an external SOAP web service as part of the orchestration flow logic.

In your creation of these SOAP adapter connection components, which is a valid consideration?

A.

You must explicitly specify the target server TLS version for the external web service outbound Invoke connection configuration.

B.

The WSDL URL property value can be defined by uploading a file for either the inbound Trigger connection or the outbound Invoke connection configurations.

C.

The SAML and OAuth security policies are available options for creating either the inbound Trigger connection or the outbound Invoke connection configurations.

D.

Suppress insertion of timestamp into the request and Ignore timestamp in the response message are optional fields only for the outbound Invoke connection configuration.

Full Access
Question # 11

Which three statements are true about SOAP and the advantages it provides?

A.

As compared to RPC (Remote Procedure Calls), which are sometimes blocked by firewalls and proxy servers, SOAP over HTTP can overcome that limitation.

B.

It provides flexibility for message format, allowing for loose coupling between client and server.

C.

It commonly serves as a cleaning agent to remove excess data from the transmission protocol.

D.

It leverages XML-based payloads to communicate between two client machines across any modern network.

E.

It is platform and programming language independent.

F.

SOAP clients can easily hold stateful references to remote server-side SOAP objects.

Full Access
Question # 12

Which APIs does Oracle Internet of Things (IoT) Cloud Service use to perform an analysis?

A.

Native Spark Java APIs

B.

SQL Queries

C.

JavaScript APIs

D.

Big Data APIs

Full Access
Question # 13

You are tasked with monitoring the SOA composite application and the underlying environment within a SOA Cloud Service instance.

Which tool should you use?

A.

Manage File Transfer Console

B.

WebLogic Server Console

C.

Fusion Middleware Control

D.

Oracle Service Bus Console

E.

B2B Console

F.

Load Balancer Console

Full Access
Question # 14

You receive a status code: 502 Proxy Error.

Which is a possible event cause for this error?

A.

When the proxy setup is incorrect.

B.

While registering a large number of devices using the Batch Registration feature under the Devices menu.

C.

While adding proxy for an enterprise application device.

D.

While the proxy server is not responding to the request.

Full Access
Question # 15

Your organization maintains two SOA cloud service instances used separately for testing and production. What is the best practice for defining the property values and endpoint addresses unique to each environment when deploying the same SOA composite application archive to both instances?

A.

Create two separate configuration plans that contain the environment-specific values and then associate the appropriate plan with the SOA archive deployment.

B.

Manually update any required values for unique properties or endpoint addresses in Fusion Middleware Control following deployment.

C.

Edit each application's deployment descriptor to dynamically retrieve values for properties and endpoint addresses from the environment upon deployment.

D.

You cannot deploy the same archive to two different environments. Define the specific properties and endpoint addresses statically within two separate SOA archives.

Full Access