Which of the following are ORA Engineering logical categories?
Correct Answer:
AB
🗳️
The Engineering logical view shows the logical components of the Engineering environment and show how they are connected to each other. T
The primary logical categories as shown are:
* Modeler
* Integrated Development Environment (IDE)
* Quality Manager
* Deployment Manager
* Metadata Repository
* Asset Repository
Reference: Oracle Reference Architecture, Software Engineering, Release 3.0, Engineering Logical View
Which of the following options best describes the concept of data-driven testing?
Correct Answer:
B
🗳️
One of the best ways to perform functional testing is through data-driven testing, in which a databank is created to cover the various functional use cases and is used to drive the testing. This requires the ability to iterate through a list of data sets in the databank, substitute them for the input values, and run the tests.
Reference: Oracle Reference Architecture, Software Engineering, Release 3.0, Data driven testing
As part of a company-wide IT Initiative to simplify and rationalize the technology and products used you have been tasked with defining an Enterprise Architecture.
The Enterprise Architecture will be used to communicate the desired future state where redundant, deprecated, and undesired technology and products have been eliminated. Oracle products will be included. In the Enterprise Architecture, it will be products from other vendors, including products that directly compete with Oracle products.
Which option best describes how IT Strategies from Oracle (ITSO) material can be used while creating the Enterprise Architecture?
Correct Answer:
C
🗳️
IT Strategies from Oracle (ITSO) is a series of documentation and supporting collateral designed to enable organizations to develop an architecture-centric approach to enterprise-class IT initiatives. ITSO presents successful technology strategies and solution designs by defining universally adopted architecture concepts, principles, guidelines, standards, and patterns.
ITSO is made up of three primary elements:
* Oracle Reference Architecture (ORA) defines a detailed and consistent architecture for developing and integrating solutions based on Oracle technologies. The reference architecture offers architecture principles and guidance based on recommendations from technical experts across Oracle. It covers a broad spectrum of concerns pertaining to technology architecture, including middleware, database, hardware, processes, and services.
* Enterprise Technology Strategies (ETS) offer valuable guidance on the adoption of horizontal technologies for the enterprise. They explain how to successfully execute on a strategy by addressing concerns pertaining to architecture, technology, engineering, strategy, and governance. An organization can use this material to measure their maturity, develop their strategy, and achieve greater levels of success and adoption. In addition, each ETS extends the Oracle Reference
Architecture by adding the unique capabilities and components provided by that particular technology. It offers a horizontal technology-based perspective of ORA.
* Enterprise Solution Designs (ESD) are industry specific solution perspectives based on ORA. They define the high level business processes and functions, and the software capabilities in an underlying technology infrastructure that are required to build enterprise-wide industry solutions. ESDs also map the relevant application and technology products against solutions to illustrate how capabilities in Oracles complete integrated stack can best meet the business, technical and quality of service requirements within a particular industry.
Reference: IT Strategies from Oracle, An Overview, Release 3.0
The three common goals of Information security are known as the CIA triad. CIA stands for:
Correct Answer:
B
🗳️
For over twenty years, information security has held confidentiality, integrity and availability (known as the CIA triad) to be the core principles of information security.
There is continuous debate about extending this classic trio.
Note:
Confidentiality -
is the term used to prevent the disclosure of information to unauthorized individuals or systems.
In information security, integrity means that data cannot be modified undetectably.
For any information system to serve its purpose, the information must be available when it is needed.