A customer demands access to your Service Composite Architecture (SCA) application.
However keeping with the customer's company standards, the interface must be EJB 3.0.
Which solution meets the needs of the customer while requiring the least amount of time, effort, and
architectural change for you? A. Create a small EJB 3.0 application that interfaces directly with your SCA application. This approach
hides the web service interface from your customer while adding the smallest amount of overhead in the
process B. Create an EJB 3.0 interface using Oracle Service Bus, which, in turn, invokes the SCA application
through its native web service interface. This approach hides the web service Interface from your
customer while adding the smallest amount of overhead in the process. C. Use the Mediator component to provide an EJB 3.0 interface in addition to the existing web service
interface. This approach adds the least amount of overhead to each call. D. Explain to the customer the importance and flexibility of modem web services, and encourage the
customer to learn some new skills.
For the XML shown, which XPath expression returns exactly one node? A. /purchaseOrder/orderDate B. /purchaseOrder/items/item/quantity C. /purchaseOrder//item D. /purchaseOrder//comment[not(following: : description) ].
Identify two features of Oracle BAM. A. Enterprise Manager's monitoring capabilities are central to Oracle BAM's ability to monitor performance
indicators. B. You can analyze and present Information from activities spanning multiple systems and applications. C. Rich browser-based dashboards provide visibility into current values of key performance indicators
(KPIs). D. There is a built-in trouble ticket system to track assignment and completion of corrective actions.
Each JCA adapter has a single deployment listed in the WLS Console. Identify two accurate descriptions
about managing multiple instances of each adapter in the runtime. A. Instance configuration in the SOA Suite deployment plan B. JCA files for each adapter instance C. Adapter connection factories specified in the WLS Console D. One entry per adapter instance in the adapters_config.xml file.
Identify four steps that are involved in defining a human task. A. Setting the task owner B. Specifying outcomes C. Specifying parameters D. Adding the human task to a BPEL process E. Specifying the assignment and routing policy F. Defining the task in the Workspace web application.
Which two statements are true about messages that are marked "Exhausted" on the Recovery tab of the
BPEL service engine in Enterprise Manager Fusion Middleware Control? A. They are messages that have exceeded the maximum number of auto recovery attempt. B. They can be marked again For auto recovery by using the "Reset" feature in the recovery console. C. Rejected messages are directly marked as "Exhausted." D. The "Refresh Alarm table" option can be used to resubmit Exhausted messages. E. Exhausted messages for Mediator components can be manually recovered from the same location in
Fusion Middleware Control.
Identify two correct descriptions of Oracle Web Services Manager (OWSM). A. It enables you to externalize web services security from the applications you build. B. It manages policies in a distributed policy manager that serves as a single policy enforcement point. C. Use security and management events, captured by OWSM agents, are displayed using Oracle BAM. D. It supplies predefined security policies that enable declarative security and management definition. E. It uses Oracle Event Processing (OEP) to determine when security violations have occurred.
When more than one policy is attached to a policy subject, the combination of policies needs to be valid.
Which statement is true about the valid combination of policies for a policy subject? A. Only one MTOM policy can be attached to a policy subject. B. More than one Reliable Messaging policy can be attached to a policy subject. C. Both a Reliable Messaging policy and a WS-Addressing policy cannot be attached to the same policy
subject. D. Only one security policy can be attached to a policy subject.
Which two features are provided by decision tables? A. Sets of input data can be bucketed and reviewed for gaps. B. Data sets can be reviewed for conflicts. C. Data can be used for only one rule evaluation. D. A rule evaluation can be used only to enter new output data.
You expand a business rule component that a colleague added to the BPEL process. You see an Assign
element named Facts_To_Rule_Service.
Which statement is true bout this Assign element? A. It was added automatically based on entries that your colleague made in the dialog box that approved
when the business rule component was added to the BPEL model. B. Your colleague manually added this Assign element after adding the business rule component to the
BPEL Model. C. This Assign element was automatically added when your colleague manually added the corresponding
Rule_Service_To_Facts assign to the BPEL model. D. You can delete this Assign because it was created for documentation purposes only.
Which statement is true about how the BPEL Process Manager works? A. If the transaction property for a synchronous BPEL process is set to requiresNew transaction, a new
transaction is created for the execution and the existing transaction (if there is one) is suspended. B. If the transaction property for an asynchronous BPEL process is set to required, the BPEL process joins
a caller's transaction (if there is no one) or creates a new transaction (if there is no transaction) C. If the delivery policy for a synchronous BPEL process is set to sync, the instance-initiating message is
not temporarily saved in the delivery layer. D. If the delivery policy for a synchronous BPEL process is set to async.persist, messages to the system
are saved in the delivery store before being picked up by the service engine.
Which two tasks cannot be done in the Worklist application? A. Update the data in a task parameter. B. Register a different user interface for a given type of task. C. Set up task routing rules for a vacation period. D. Create a new human task. E. Escalate a task to your manager.
You have modeled a composite that has two BPEL processes: X and Y. The WSDL for Y defines a single
portType with a one-way operation. The WSDL for X defines a single portType with a request-response
operation. The component property bpel.config.trancation is set to requiresNew for Process X, and the
component property bpel.config.oneWayDeliveryPolicy is set to async.persist for process Y. You have wired
these components so that Y invokes X.
What is the result when X throws a remoteFault at runtime, assuming that X has no catch blocks defined
within it? A. The transaction of X is rolled back, and process Y gets a remoteFault that can be caught and handled. B. A Fault policy defined for X for handling the remoteFault is triggered and handles the fault. C. The transaction of X is committed, and process gets a Fault back that can be caught and handled. D. The transactions of X and Y are both rolled back even If you have fault handlers configured for handling
the remote fault in Y.
By using the System Component Architecture (SCA) test framework, you can create tests for which three
items? A. Reference binding components B. Service components like a Mediator C. Wires D. Invoke activities in a BPL process E. Composite sensors.
Which adapter is configured using Application Explorer? A. Oracle Adapter for VSAM B. Oracle Applications Adapter C. Oracle Adapter for Tuxedo D. Oracle Adapter for SAP.
Which activity is used to invoke a human task from a BPEL process? A. Invoke B. Human task C. Task D. Invoke human task E. Start human task.
You are creating a web service interface to a legacy system that can handle only five concurrent calls.
What feature of Oracle Service Bus enables you to define this restriction? A. Endpoint management B. Throttling C. Caching D. Choking.
You want to define a now event to be managed by the Event Delivery Network (EDN). The XSD is in place
that defines the element that is to be the basis of the new event.
Which step do you perform next? A. Create a new event definition in the SOA Composite Editor. B. Use an editor to create the event using Event Definition Language (EDL) syntax. C. Create the now event definition as you configure the invoke activity that publishes the event in your
BPEL process. D. Use Enterprise Manager to register the new event to EDN.
A partner needs to access services that are defined in one of your Service Composite Architecture (SCA)
applications via a web service interface. Which approach (and accompanying reasoning) describes a
loosely coupled and robust solution? A. Use Oracle Service Bus to provide an Interface layer over your SCA application. This enables you to
hide the locations of your SCA application, perform load-balancing across those endpoints, and provide
the ability to define service level agreements to help ensure that you are meeting your contractual
obligations to the partner. B. Use the Mediator component to provide a web service interface to your SCA application. This arrives
you the flexibility of using the industry standard XSLT technology to perform translation and
transformations. C. Use Oracle Service Bus to provide an interface layer over your SCA application. This enables you to
"skin" your SCA application with a web service interface and still provide a robust experience to the
partner. D. Allow the partner simply to connect directly to the SCA application. This provides the best performance
and helps keep the partner happy.
Your solution needs to validate, transform, and route data. You want to deploy the capability as a Service
Component Architecture (SCA) composite application. You would most likely use a ________ to provide the
functionality. A. Proxy service B. Business service C. BPEL service D. Spring component E. Mediator.
Suppose that you pass some data from a process variable as a parameter into a human task. The variable
is then updated at a later time in a parallel stream of execution in the BPEL process while the human task
still executing (that is, before is auctioned by the assignee)
What does the assignee see after opening the task in the workspace and looking at the parameter? A. The parameter contains the values of the process variable as it was when the task was created. B. The parameter contains the values of the process variable as it is at the current time (that is, when the
user opened the human task in the workspace). C. The parameter is empty, and the task must be restarted to pick up the new values of the processes
variable. D. It is not possible to determine from the information.
Identify two correct statements about Oracle service Registry. A. It stores references to XML based assets and web services. B. It provides reporting on portfolio management metrics such as reuse and compliance. C. It allows automated notification for lifecycle events to alert asset subscribers. D. It provides a lookup service for design time discovery and for runtime dynamic service location.
Which SOA Suite capability enforces WS-* standards for authentication and authorization? A. BPEL Process Manager B. Enterprise Manager C. B2B D. Web Services Manager.
Which two options are allowed in a decision table? A. An action modifying an output fact B. Asserting an output fact in a decision rule action C. Calling a rules function in an assertion D. Having rules specifying different actions.
Composite A has two versions deployed lo the SOA runtime. Version 2.0 is the default revision, and Version
1.0 is an earlier (but active) revision. Version 2.0 has 100 instances in the Running state also hits 50
instances that are waiting for a callback on a mid-process < receiver> within a BPEL component in the
composite. You undeploy Version 2.0. Which statement describes what happens after undeployment
completes? A. All running Instances and the callbacks are allowed to complete on Version 1.0, but all new requests are
served by Version 1.0. B. All running Instances are allowed to complete, the callbacks fail after undeployment and all new
requests ate served by Version 1.0. C. All running instances immediately go stale, including the instances that are awaiting callbacks on the
mid process <receive>. D. All running instances immediately go stale, but the callbacks are processed by Version 1.0.
Which two approaches are valid when using dynamic partner links in a BPEL process? A. A WSDL file, which contains multiple services that use the same portType, is available at design time,
but the decision to determine which service is used can only be made at runtime. B. When the BPEL process is designed, the endpoint URL of the WSDL file is known but the services and
port types are not known. C. When the BPEL process is designed, the services and port types of the WSDL file are known but the
endpoint URI is not known. D. A WSDL file, which contains multiple services that use different portTypes, is available at design time,
but the decision to determine which server us used can only be made at runtime.
Which two configurations provide a certified deployment of multiple SOA domains? A. Point all domains to a single SOA Suite schema. B. Have separate databases hosting a single SOA Suite schema. C. Have a single SOA Suite schema installed on Oracle RAC. D. Use Repository Creation Utility (RCU) to create SOA Suite schemas in a single database within unique
How is a SAML token used by OWSM for identity propagation? A. As each web service in a chain is invoked, OWSM generates a SAML token and inserts it in the WSSecurity
header of the request message. B. A SAML token is generated on invocation of the first web service in a chain and is stored in the Java
Authentication and Authorization (JAAS) Subject so it can be used throughout the transaction by
subsequent web services. C. A SAML token is used to determine the destination address of the next web service in the chain. D. The SAML token, embedded in the X.509 certificate or Kerberos ticket, is extracted by OWSM and
delivered to the next web service in the chain.
Which statement is true about editing adapter InteractionSpec endpoint properties with Enterprise manager
Fusion Middleware Control? A. InteractionSpec properties can be added or removed, but they take effect only after the composite is
retired and activated. B. Adapter endpoint property values can be changed, but they take effect only after the composite is
retired and activated. C. Adapter endpoints property values can be changed, and they take effect without retiring and activating
the composite. D. InteractionSpec property values cannot be changed.
Consider a scenario where Oracle B2B receives messages from different trading partners that need to be
placed in separate folders after processing. For example, messages received from trading partner
Marketing need to be processed and placed in a file folder called "Marketing" after processing. Messages
received from trading partner GlobalChips need to be processed and placed in a file Folder named
"GlobalChips" after processing.
Which approach enables this to work? A. There should be two different trading partner agreements, with each agreement using a different host
channel depending on which folder the processed file needs to be placed in. B. There should be two different trading partner agreements, with each agreement using a different partner
channel depending on which folder the processed file needs to be placed in. C. There should be one trading partner agreement, but there should be two different listening channels
depending on which folder the file needs to be placed in. D. This functionality cannot be achieved In Oracle B2B natively and needs to be implemented using a Java
Identify two service components that can be added to the components section of the SOA Composite
Editor. A. Database adapter B. BPEL process C. File adapter D. Business rule E. ADF-BC service.
You have modeled a SOA composite with a single BPEL process component. Both of the invoke activities
in the BPEL process use the same XA connection factory: eis/DB/SOADemo. The InsertData partnerlink
inserts a new record in the DEPT table in the database. The storeproc_validate partner link calls a stored
procedure that validates this newly inserted record.
Which statement is true about the composite? A. Invoke1 is capable of detecting omitted XML elements in the input payload and throwing a bindingFault
to the caller B. If invoke1 encounters a primary key constraint violation on insert, the invocation retires a total of 4 times
with a starting interval of 1 and a back-off factor of 2. C. Invoke1 and invoke2 use the same underlying JDBC connection to the database. D. If invoke2 interaction fils, the insert from Invoke1 is also rolled back.
Which expiration and escalation setting can be used to route a task a specified number of levels up a
management chain if the assignee does not respond in a given time period? A. Never expire B. Expire after C. Route to manager D. Renew after E. Escalate after F. Management chain.
View the Exhibit.
A user has configured Mediator M1 to receive and route product Information from System X into its internal
applications in chronological order. For each product1 M1 receives one create number of "update" events
from an AQ Queue via a JMS adapter. M1 can receive updates to the product at any time of day.
The user claims that incoming messages for each product are received and processed in the correct
chronological order 95% of the time. However, the messages are being processed out of order 5% of the
time. This results in critical errors in the target systems. The user expects all messages pertaining to a
product to be unconditionally processed In the order of arrival at M1.
What causes this discrepancy? A. The user is running on a four node SOA cluster and has not configured the inbound JMS adapter to be
a singleton. B. The user is running a single-node SOA environment but has configured the number of inbound adapter
threads to be a value greater than 1. C. The given Mediator configuration does not address this sequencing requirement. D. The user has configured resequencer worker threads to a value greater than 1 for the Mediator service
You just added a business rule component to the components section of the SOA Composite Editor
canvas. You open your business process for editing and notice that there is no partner link to the decision
service for the new rule component.
What do you do next to make the link appear? A. Add an invoke activity to the BPEL model to call the decision service. B. Edit the business rule component and specify the If/then rules or the decision table. C. Add a business rule component to the BPEL model. D. Add a partner link to the BPEL model.
Which two statements describe the security policy attachment features of Oracle SOA Suite 11g? A. The order in which policies are attached to a subject determines the order in which the policies are
executed. B. JDeveloper groups the policy that can be attached into the five categories of interceptors. C. Only one security polity can be attached to a web service at a time. D. In JDeveloper, a security policy can be attached to a web service, but it can be marked as either
enabled or disabled.
Identify three valid BPEL thread pools. A. Engine B. Callback C. Invoke D. System E. Service.
You want to monitor a specific BPEL process variable in your process. You have all the capability Oracle
SOA Suite at your disposal.
Which approach do you take if you want the variable data written to a JMS queue to be processed by
another application? A. Identify the variable as a key performance Indicator (KPI) and track it in BAM. B. Use a composite sensor on the appropriate service or reference binding. C. Use a BPEL Process Manager sensor to collect the value and context. D. Use Oracle Event Processing (OEP) to monitor the activities being executed in the BPI l process.
Which JDeveloper SOA project artifacts have references to the JNDI name of a resource adapter
connection factory that is used in the project? A. .jca file B. .wsdl file C. .componentType file D. adf-config.xml file.
You have defined an event. You now want to trigger that event from an existing Mediator component.
How do you link the event to the Mediator so that the Mediator can raise the event to the Event Delivery
Network (EDN)? A. Use the SOA Composite Editor to specify the event as a property on the incoming wire into the Mediator
component. B. Use a text editor to modify the .edl file that defines the event so that the Mediator is identified as a
publisher. C. Use the SOA Composite Editor to add a raise action to the Mediator's .mplan specification file. D. Use Enterprise Manager to associate the Mediator with the appropriate event.
You want to leverage the Event Delivery Network (EDN) in your composite application for publishing and
Which two components do you use? A. Business rule B. Mediator C. BAM adapter D. Spring component E. BPEL process.
Why would you use the Mediator component in a Service Component Architecture (SCA) application
Instead of using Oracle Service Bus? A. Oracle Service Bus runs out side of a SCA application. Therefore, the Mediator is the only choice for
translation and transformation tasks in an SCA application. B. The Mediator is much faster than Oracle Service Bus. C. The Mediator supports transactions, but Oracle Service Bus does not. D. It is always better to use Oracle service Bus Instead of the Mediator.
In oracle Service Bus, loose coupling between service provider and service consumer is provided by the
__________. A. database tables stored in MDS B. a proxy service and a business service C. a JMS-based queuing service D. a Mediator component.
What does service abstraction do? A. It hides the implementation details of a service. Including the location of the service, the interface, and
the idempotence of the operations. B. It creates services quickly and easily for a variety of back-end technologies. C. It translates and transforms messages. D. It mediates security models.
Identify the correct description of a business service. A. It is a service that is closely aligned with the goals of the business. B. It is metadata about an external service interface that enables Oracle Service Bus to integrate with the
external service. C. It is programmable entity that enables Oracle Service Bus to connect to a Wide variety of interfaces. D. It is a complicated object that often takes days or weeks to implement, but it is highly scalable and
reliable after it is complete.
Over a period of time, you have deployed three versions (1.0, 1.1, and 1.2) of a SOA application X to a
three-node SOA cluster. All versions of X subscribes to a business event named createCustomer and
instantiate a new BPEL process Y on receiving the event.
At runtime, how many SOA composite instances are generated when createCustomer business event is
fired? A. 1 B. 3 C. 9 D. 0.
View the Exhibit.
There are two groups acting on a task. The group on the left approves line items in the order.
The group on the right approves the order header. If any actor rejects the order the task completes without
routing to any additional actors that have not yet acted on the task.
Identify the two options that should be selected in the human task definition to achieve this behavior. A. Complete parent tasks of early completing subtasks. B. Each parallel participant has a local copy of the payload. C. Complete task when a participant chooses the reject option. D. Enable early completion in parallel subtasks.
What does SOA governance complement and influence? A. Data center capacity planning B. Decisions to use SOAP-based vs. REST-based web services approaches. C. Data models that define a shared view of corporate data resources. D. IT governance processes and structures.
You are implementing SOA asset lifecycle management in your organization. In the service definition
phase, architects and business analysts identify requirements.
What should you do with the requirements so they can be tracked through the lifecycle? A. Document them in BPEL models. B. Add them to the Enterprise Repository. C. Add them to the Service Registry. D. Use harvesting tools to produce web service implementations. E. Produce value chain and strategy map documentation.
View the Exhibit.
The Exhibit shows a display from Enterprise manager Fusion Middleware Control where you can monitor
and manage BPEL service engine properties. Where are all changes to this configuration stored? A. bpel_config.xml in MDS B. soa-infra-config.xml in $MW_HOME/soa/config on each physical host in cluster C. soa-infra-config.xml in the soa-infra-wls.ear file D. a temporary directory on each physical host in the cluster.
Which statement is true about an if-then rule evaluation? A. It can be evaluated more than once. B. It is evaluated once and only once. C. It must evaluate only native variable types. D. It cannot change the assessment for another if-then rule.
In a design session, a colleague makes the following comments about cluster support for Oracle SOA Suite
11g application. Which two statements are correct? A. A cluster appears to clients as multiple WebLogic Server instances B. The server instances in a cluster must all run on the same machine. C. You can scale a cluster by adding machines to the cluster to host additional server instances. D. Server instances in a cluster can run different versions of WebLogic Server. E. You can create it cluster by using WLST, the WebLogic Server Administration Console or Enterprise Manager Fusion Middleware Control. F. For management purposes, you can split a cluster across multiple domains.
What is default transactional behavior for a synchronous request/reply and a one-way synchronous BPEL
process? A. Required B. RequireNew C. Mandatory D. NotSupported E. Supports.
An invoke activity in a BPEL process is dehydrated _____. (select two) A. immediately after execution if idempotent is set to True B. before execution if idempotent is set to True C. immediately after execution if idempotent is set to False D. before execution if idempotent is set to False.
Which two are beneficial results of a successful SOA governance initiative? A. Maintains a direct connection between business objectives and the production and consumption of
services B. Provides technical standards for the creation of web services. C. Prevents the proliferation of services of questionable utility, reliability and business value D. Develops strategy maps and value-chain analyses that help define business requirements.
You have modeled a composite with a one-way Mediator component that is exposed via an inbound file
adapter service. How do you configure the inbound file adapter to read local files in ascending order of their
lastModifiedTime? A. By setting the SingleThreadModel activationsSpec property to true and configuring the ListSorter
activationSpec property to
oracle.tip.adapter.file.inbound.listing.TimestampSorterAscending. B. By not making any configuration changes because, by default, the adapter reads input files in ascending
order of their lastModifiedTime. C. By setting the ThreadCount activationSpec property to 0 and configuring the List Sorter activationSpec
property to oracle.tip.adapter.file.inbound.listing.TimestampSorterDescending. D. By setting the ThreadCount activatioSpec property to 1 and configuring the ListSorter activationSpec
property to oracle.tip.adapter.file.inbound.liting.TimestampSorterAscending.
Which two activities are typically performed during the service implementation and configuration phase of
the SOA lifecycle? A. Capabilities are evaluated and prioritized based on business models and ROI. B. Oracle Enterprise Repository promotes services and harvested endpoints to the service registry. C. Developers find and reuse services to help them complete development. D. Developers use harvesting tools to submit their completed implementations to Oracle Enterprise
In your solution, a web service client needs to invoke a series of three web services in support of a single
transaction. The third web service needs the identity of the original web service client.
Which statement describes how the identity is made available by Oracle Web Services Manager (OWSM)? A. The transaction manager accesses an internal table that maintains credentials used to invoke each
individual web service in the chain. B. Each web service in the chain does its own authentication so the third web service handles its own
identity checking. C. OWSM sets the user in the Java Authentication and Authorization (JAAS) Subject when the first web
service successfully authenticates, and the Java Subject is used by subsequent web services to access
the identity. D. OWSM stores a SAML token from the first web service invocation in a database table, and that table is
accessed by subsequent web services in the chain to retrieve identity.
Identify the best description of the recommended use of shared storage in a high-availability (HA)
implementation of Oracle SOA Suite? A. To allow access to a common installation home for all domain cluster members B. To allow access to a shared JTA log C. Shared storage is not recommended for Oracle SOA Suite. D. To allow access to the default user store on the file system for all domain cluster members.
Composite X invokes an outbound DB adapter to write data to a database table. You have configured JCA
at the binding component as follows:
<property name = "jca.retry.count" type = "xs:int" many = "false" override = "may" > 2</property>
<property name = "jca.retry.interval" type = "xs:int" many = "false" override = "may" > 2</property>
You have also modeled a modeled a fault policy to retry the invocation three times in case of remoteFault
Which result describes what happens when the database that is being accessed by the above binding
component goes down? A. The invocation is retrieved for a total of two times every two seconds. Fault policy retries are ignored. B. The invocation is retried for a total of six times every three seconds. C. The invocation is retried for a total of six times every two seconds. D. The fault policy retries occur within the JCA retries. So two JCA retries are executed two seconds apart.
Within each JCA retry, three fault policy retries are executed three seconds apart. E. The JCA retries occur within the fault policy retries. So three fault policy retries are executed three
seconds apart. Within each fault policy retry, two JCA retries are executed two seconds apart.
Which statement best describes deploying your SOA application to a cluster? A. Manually deploy the application to each managed server in the cluster. B. After deployment, restart each managed server in the cluster before the application is available for
service. C. Use WebLogit Server Administration Console for deployment because you cannot deploy to a cluster
from JDeveloper. D. Treat your cluster as a single deployment target and let the administration server automatically deploy
the application to all managed servers in the cluster.
Identify two fundamental terms in Service Component Architecture (SCA) that are represented visually in
the SOA Composite Editor. A. Application B. Entry point C. Component D. Wire E. External call.
An Oracle Web Services Manager (OWSM) agent __________. A. Can apply categories of policies in any specified order B. Generates a request to an LDAP directory to look up policy definitions C. Always fails if the Policy Manager becomes unavailable D. Intercepts requests to and responses from a client or service.
You are modeling a conditional branch using a Switch element. You choose not to include an Otherwise
branch. What is the result? A. A business fault is generated if one of the case branches cannot execute. B. A design time error is indicated by JDeveloper. C. You need to include fault handler to account for the fact that none of the case branches can execute. D. If none of the case branches can execute, control passes to (the next element in the BPEL model.
Which capability or benefit is not applicable to Oracle Service Bus? A. Service mediation B. Service abstraction C. Translation and transformation D. Service creation E. Stateful processing.
Which three statements are true about enabling streaming support in adapters? A. Enabling streaming allows larger payloads to be read by the adapters. B. Enabling streaming improves message throughput and latency. C. Enabling streaming leverages features of the scalable DOM in Oracle XML Developer Kit (XDK). D. The benefits of enabling streaming are better when payloads are of relatively large.
In a BPEL model, what is quickest way to implement a capability to skip rule execution if particular condition
holds? A. Model a switch activity to conditionally execute the business rule component. B. Use a skip condition on the business rule component. C. Include an XPath expression in an annotation on the business rule component. D. Use a correlation set on the business rule component.
How are task outcomes processed in a BPEL process? A. Each path out of the human task activity has a condition in which you specify the outcome that causes
that path to be followed. B. With onMessage or pick activities that receive the outcome from the human workflow engine. C. With a switch containing a case for each outcome of interest plus an optional otherwise case after the
human task activity. D. With a switch containing one case for each possible outcome after the human task.
Identify two correct descriptions of Oracle Event Processing (OEP). A. It is technology used to develop near-real-time, event driven systems B. It uses standard SQL to run some of the same queries that are executed in transactional systems. C. It is a time driven and request-focused form of traditional business intelligence (BI) D. It distills information value from many simpler events into a few more useful summary level events.
Which option is not able to invoke a human task? A. A BPEL process in the same composite as the human task B. A BPEL process in a different composite where the human task is defined C. A Mediator in the same composite as the human task D. A web service client outside of the composite where the human task is defined E. Another human task in the same composite as the first human task.
You want to include documentation in the BPEL source code for a business rule component that you are
adding to your BPEL model. How would you enter this documentation? A. As the value for a BPEL global variable B. As a comment attribute on the surrounding scope element C. As an annotation on the business rule component D. As user documentation on the business rule component.
To add an xsi:type attribute to a target element, what needs to be mapped to the target element? A. A rename element on the canvas B. A recast element on the canvas C. An expression on the canvas D. A literal element on the canvas.
Which statement is correct about a JCA common client interface? A. The JCA binding component uses the JCA common client Interface APIs to communicate with the
resource adapter. B. The resource adapter uses the common client interface APIs to communicate with the EIS. C. The resource adapter implements the standard MessageListener interface to poll for events from the
EIS. D. The application server uses the common client interface APIs to commune with the EIS.
What element first executes the iterative activity and then checks the validity of the condition? A. Switch B. While C. Repeat Until D. For Each.
Identify the statement that describes an ESB. A. An ESB provides a mediation layer between services and consumers. B. An ESB facilitates a point-to-point approach to application integration. C. An ESB is an execution engine providing Java EE capabilities. D. An ESB makes service provider addresses visible to service consumers.