You are assigned to review the specifications of the SOA composite applications that have been deployed to your SOA Cloud Service instance. Part of this analysis requires you to catalog the Service Component Architecture (SCA) components that are implemented within each composite application.
Which is a valid SCA component in an Oracle SOA composite application?
A. BAM Adapter
B. B2B Agreement
C. MFT Adapter
D. Mediator
E. Split-Join
You are designing an OIC integration that will be processing files in a shared file system located within your on-premises data center. You have decided to leverage various Stage File action operationswithin the integration flow in conjunction with an on-premises OIC connectivity agent.
When using the Configure Stage File Action Wizard, which is a valid consideration regarding file operation capabilities?
A. The Write File operation is not available foron-premises file systems.
B. The List Files operation is still available for files uploaded through the connectivity agent.
C. With regard to both the Read Entire File and Read File in Segments operations, files uploaded through the connectivity agent canonly be read with a file reference.
D. Files uploaded through the connectivity agent cannot be unzipped with the Unzip File operation using the file reference.
Which expression can you use to schedule integration runs?
A. a XPATH
B. an iCal
C. a JavaScript
D. a XSLT
Which adapter is NOT provided in the oracle cloud adapter pack bundled with the Oracle SOA Cloud service?
A. successFactors Adapter
B. Oracle ERP Cloud Adapter
C. Salesforce Adapter
D. OracleE-Business Suite Adapter
Oracle SOA Cloud Service (SOA CS) includes a number of built-in adapters to include all of the technology adapters delivered with SOA Suite.
When using one of these technology adapters in a composite application deployed in SOA CS, which two are valid approaches for facilitating connectivity to on-premises applications and systems?
A. WLST script
B. VPN service
C. PL/SQL procedure
D. SSH tunnel
E. SOA on-premises connectivity agent
Which two statements are true about implementing an API-First strategy?
A. The API isto be developed first before any UI or new business logic are created.
B. It generally is assumed that SOAP/WSDL are the key specifications for defining the API.
C. The code to execute business logic needs to exist and be exposed as an API first before youbuild a strategy around it.
D. You define the API definition/contract first before any work on its implementation or any applications that use it, allowing to work in parallel.
You are tasked with creating a new integration in OIC that will be exposed to clients as a SOAP web service. In addition, this integration will be invoking an external SOAP web service as part of the orchestration flow logic.
In your creation of these SOAP adapter connection components, which is a valid consideration?
A. You must explicitly specify the target server TLS version for the external web service outbound Invoke connection configuration.
B. The WSDL URL property value can be defined by uploading a file for either the inbound Trigger connection or the outbound Invoke connection configurations.
C. The SAML and OAuth security policies are available options for creating either the inbound Trigger connection or the outbound Invoke connection configurations.
D. Suppress insertion of timestamp into the request and Ignore timestamp in the response message are optional fields only for the outbound Invoke connection configuration.
Which three are characteristics of Device Virtualization?
A. Oracle Internet of Things (IoT) Cloud Service does not support Device Virtualization.
B. You can monitor each device endpoint's health, performance, and location via the client software library API or with REST callsmade to those devices.
C. You can collect data from your devices using APIs delivered with Oracle Internet of Things (IoT) Cloud Service Client Software Libraries or Oracle IoT Cloud Service Gateway.
D. The APIs provided enable you to send telemetry messages and device data from your devices to Oracle Internet of Things (IoT) Cloud Service, control your devices, and deploy applications to your gateway devices.
E. Devices used are not real. They are virtual devices and linked with Oracle Internet of Things (IoT) CS.
When a connection is in edit mode and the browser crashes, the connection becomes locked, whichthen prevents it from being edited. Which two users can unlock the connection?
A. a user with the Designer Role
B. the same user who has edited the connection
C. any user
D. a user with the Administrator Role
You receive a status code: 502 Proxy Error. Which is a possible event cause for this error?
A. when the proxy setup is incorrect
B. while registering a large number of devices using the Batch Registration feature under the Devices menu
C. while adding proxy for an enterprise application device
D. while the proxy server is not responding to the request