The identity context is opaque to your web service client and web service and you don't need to perform any additional coding or processing in your client or service to support it after you enable identity context propagation.
Which Oracle SOA Suite component directly enables this behavior?
A. Oracle Web Service Manager Policy Manager
B. Oracle BPEL Process Manager
C. Oracle Enterprise Manager
D. Oracle User Messaging Service
You have modeled a composite with an inbound adapter service wired to a BPEL process component.
Which method do you use to model a rejection handler for the inbound adapter service?
A. Define the rejection-handler logic in rejection-handlers.xmlin the $MW_HOME/soa/connectorsdirectory.
B. Define the rejection-handler logic inline as a child element of the
C. Define the rejection-handler logic in a top-level catch block in the BPEL process where the QName of the fault should be bpws:rejectedMessages.
D. Define the rejection-handler logic in fault-policies.xmlfor the composite, and then associate the fault-policies.xmlwith the composite.
Oracle Adapters are deployed to the Oracle SOA Suite server. Which three SOA Suite components can use Oracle Adapters?
A. BPEL Process
B. Mediator
C. Proxy Service
D. Human Workflow
E. Business Rule
Which statement is false about debugging SOA composites?
A. You can run the debugger in Oracle Enterprise Manager Fusion Middleware Control.
B. You can debug on local as well as on remote servers.
C. Breakpoints are the intentional pausing locations in a SOA composite application that you set for debugging purposes.
D. If the composite is not already deployed in the current JDeveloper session, then JDeveloper will redeploy it.
Which statement is correct about how if-then rules are processed during an inferencing session?
A. Rules are evaluated in the order in which they were added to the ruleset.
B. A particular rule can be fired only once in an inferencing session.
C. The effective date set for a rule can take it out of consideration for evaluation.
D. A priority setting of 1 will cause the rule to fire during each inferencing session.
E. Rules with multiple IF conditions receive higher priority during evaluation.
Which three are proper applications of Oracle Service Bus?
A. An existing Java web service is made available to clients running transports and protocols not originally
planned by the original developers. No modifications to the web service implementation are required.
B. A request is transformed and routed to an appropriate service endpoint based on the content of the request message. All complexity of the supporting runtime protocol selection is hidden
C. A request for a large graphics job is split into smaller pieces that are processed in parallel by an existing rendering service. After all of the pieces have been processed, the results are joined to create a single response.
D. A request containing a complex family tree is validated before being routed to an existing genealogy service. Recursive logic is implemented to validate that all relationships in the tree are consistent.
E. A request for a background check is conditionally routed between multiple third-party validation services with different service-level agreements. Remediation must be handled if any one of the validation service calls fails.
You are about to upgrade an environment from SOA Suite 11g to SOA Suite 12cand you want to make sure that you meet the prerequisites for the upgrade process.
Which two options are prerequisites?
A. The operating system and the JVM must be 64-bit.
B. SOA Suite must be at the 11.1.1.5, 11.1.1.6 or 11.1.1.7 patchset levels.
C. Oracle Platform Security Services (OPSS) must have been migrated to use the DB or the LDAP-based policy store.
D. The SOA server must be a single-node server so that it is not part of a SOA cluster.
Identify two reasons why Oracle Cloud Adapters make it easier to integrate a SOA Suite application with a cloud-based application.
A. They shield the developer from needing in-depth expertise on the functionality of the cloud- based application.
B. They help the developer master the intricacies of the cloud application's data model and mechanisms for security and session management.
C. They come with a configuration wizard that is accessible from Enterprise Manager.
D. They free the developer up to focus on building the business logic for related business processes.
To avoid the purchase of new server capacity, a company must limit the volume of messages routed to a computationally expensive RESTful service operation.
Which Oracle SOA Suite component can help the company meet this requirement?
A. BPEL process
B. Mediator
C. Proxy Service
D. Business Service
You have a situation where a collection of rules might provide a flexible way of externalizing logic in an application.
Which two are accurate considerations to assess when you decide to use a decision table or if- then rules?
A. The decision table's spreadsheet metaphor is compact and familiar to end users.
B. Decision tables can use globals whereas if-then rules cannot.
C. The logic will likely require more rules if expressed as a decision table.
D. Unlike with a decision table, an Expression Builder is provided for if-then rules to help you craft condition expressions.
E. Built-in error prevention features for decision tables can help you build more complete and accurate rules.
For each three items can you create tests by using the Service Component Architecture (SCA) test framework?
A. Reference binding components
B. Service components such as a Mediator
C. Wires
D. Invoke activities in a BPEL process
E. Composite sensors
Which two statements accurately describe how Oracle Web Services Manager works?
A. On the client side, the agent coordinates a pipeline of policy interceptors that apply policy assertions to a request in a standardized, predetermined order.
B. On the service side, policy assertions are processed in reverse order of the client side before a request is delivered to the service.
C. On the client side, the policy manager coordinates a pipeline of agents that apply policy assertions to the request in the order specified by the developer.
D. On the service side, policy assertions are processed in the same order as on the client side before a request is delivered to the service.
Given the following XML document, which two XPath expressions return the same result?
A. bookstore/book/author
B. bookstore/book/author/text ()
C. bookstore/book/author/*
D. bookstore//author/text ()
E. //author/@text
F. //author/*text
After a successful web application login, an Oracle Access Manager (OAM) token is made available to Oracle WebLogic Server (WLS) where the token is asserted for authentication purposes. The resulting Java Authentication and Authorization Service (JAAS) subject is then made available to the Oracle Web Service Manager (OWSM) agent where it is used to create a Security Assertion Markup Language (SAML).
Which security feature does this scenario illustrate?
A. identity propagation
B. single sign-on
C. user authorization
D. non-repudiation
Which three security schemes are supported by Oracle Service Bus (OSB)?
A. partial encryption of a request as defined by a custom WS-Securitypolicy
B. partial encryption of a request as defined by an OWSM policy
C. authentication of a request as defined by an OWSM policy
D. propagation of a Security Assertion Markup Language (SAML) token from aWebCenter portal to an OSB proxy service
E. propagation of a SAML token from a WebCenter portal to the OSBconsole