Which three are types of certificates that can be imported from Settings?
B. Key Validation Policy C. Redaction Policy D. Groovy Script Policy Explanation: The Groovy Script Policy allows you to manipulate the request context. This policy provides the flexibility to customize and modify the behavior of requests and responses by writing custom Groovy scripts, making it suitable for manipulating the request context as needed. Reference: https://docs.oracle.com/cd/E83857_01/paas/api -platform -cloud/apfad/using -oracle -api-platform - cloud - service.pdf Which two statements are true regarding mapper activity?
available for mapping in the mapper because query parameters are considered optional. Explanation:
D. Task start and end event E. None start and end event Explanation:
important part of a hybrid on-premises/Cloud architecture. C. BPEL is inherently better than BPMN in managing orchestrations that involve people, because BPEL can also interact with systems. D. An ESB is used primarily for stateless messages and service mediation. The ESB construct is being replaced by API's and API Gateways in modern Cloud architectures. E. BPEL and ESB are both good technologies for doing heavy transformations of data before sending the data to a back -end system or database. Explanation: D. An ESB is used primarily for stateless messages and service mediation. The ESB construct is being replaced by APIs and API Gateways in modern Cloud architectures. This statement is correct because ESBs traditionally handle stateless message routing and service mediation. In modern cloud architectures, APIs and API gateways offer more lightweight, flexible, and scalable solutions for similar use cases. E. BPEL and ESB are both good technologies for doing heavy transformations of data before sending the data to a back -end system or database. This statement is correct as both BPEL and ESB are capable of performing complex data transformations. BPEL, with its process orchestration capabilities, and ESB, with its mediation and transformation functionalities, are suitable for handling data processing tasks before interaction with back -end systems. Which two types of authentication mechanisms are available for Service Account configurations in API Platform Cloud Service?
➢ TOTAL QUESTIONS:179 You are assigned to review the specifications of the SOA composite applications that have been deployed to your SOA Cloud Service instance. Part of this analysis requires you to catalog the Service Component Architecture (SCA) components that are implemented within each composite application. Which is a valid SCA component in an Oracle SOA composite application?