Showing posts with label Oracle. Show all posts
Showing posts with label Oracle. Show all posts

June 08, 2022

Top 20 AWS Data Exchange Interview Questions and Answers

 

 

        Finding, subscribing to, and using third-party data in the cloud is simple using AWS Data Exchange. Reuters, which curates data from over 2.2 million unique news stories per year in multiple languages; Change Healthcare, which processes and anonymizes more than 14 billion healthcare transactions and $1 trillion in claims annually; Dun & Bradstreet, which maintains a database of more than 330 million global business records; and Foursquare, which derives location data from 220 million unique consumers.


AWS(Amazon Web Services) Interview Questions and Answers


Ques. 1): AWS Data Exchange is accessible in which AWS Regions?

Answer:

AWS Data Exchange features a single global product catalogue that suppliers may access from any AWS Region that is supported. Regardless of the Region you're in, you'll see the same catalogue. The product's resources (data sets, revisions, and assets) are regional resources that you may manage programmatically or via the AWS Data Exchange UI in certain AWS Regions.  


AWS Cloud Interview Questions and Answers 


Ques. 2): What rules do I have to follow as an AWS Data Exchange for APIs provider?

Answer:

Providers of API-enabled goods must reply to subscriber support requests within one business day, according to the AWS Data Exchange User Guide, in addition to obeying the Terms and Conditions for AWS Marketplace Sellers and the AWS Customer Agreement. If you don't follow the rules, your product may be withdrawn from AWS Data Exchange.


AWS AppSync Interview Questions and Answers


Ques. 3): What are the most common AWS Data Exchange users?

Answer:

AWS Data Exchange allows AWS customers to securely exchange and access data from other parties on AWS. Nearly every sector, including data analysts, product managers, portfolio managers, data scientists, quants, clinical trial technicians, and developers, would like more data to drive analytics, train machine learning (ML) models, and make data-driven choices. However, there is no single location where numerous providers' data can be found, and there is no uniformity in how providers send data, leaving them to cope with a variety of supplied physical media, FTP credentials, and custom API queries. Many businesses, on the other hand, would want to make their data available for research or commercial reasons, but building and maintaining data delivery, entitlement, and payment infrastructure is too difficult and expensive, further reducing the availability of important data.


AWS Cloud9 Interview Questions and Answers 


Ques. 4): How will AWS manage sales and use tax collection and remittances in the United States?

Answer:

You can allow the collection and payment of US sales and use tax when listing your data sets. You may also set up your tax nexus to account for locations where you have a physical presence and have AWS collect the relevant taxes for you. It's a good idea to go over the AWS Marketplace Terms and Conditions for US Tax Collection Support.  


Amazon Athena Interview Questions and Answers 


Ques. 5): What is AWS Data Exchange for APIs and how does it work?

Answer:

Customers may utilise AWS Data Exchange for APIs to identify, subscribe to, and use third-party API products from AWS Data Exchange providers. Customers may use AWS Data Exchange for APIs to perform API calls using AWS-native authentication and governance, standardised API documentation, and supported AWS SDKs. Data providers may now access millions of AWS customers that consume API-based data and manage subscriber identification, entitlement, and invoicing more effectively by adding their APIs to the AWS Data Exchange catalogue.


AWS RedShift Interview Questions and Answers


Ques. 6): What if I need to delete information from AWS Data Exchange?

Answer:

A product's pricing or Data Subscription Agreement (DSA) can be changed or removed at any time, but existing subscriptions will continue until their next renewal. If a data source publishes data that is incorrectly released, you can create a support case to have the data removed.


AWS Cloud Practitioner Essentials Questions and Answers 


Ques. 7): Is it possible for data providers to amend the conditions of the service to which I have subscribed? What impact would this have on my membership and renewal?

Answer:

Yes. Data providers can change the conditions of the offer at any moment, but existing subscriptions will not be affected. AWS Data Exchange will automatically renew subscriptions set to auto-renew at the latest terms given by the provider on or by the renewal date, which may differ from the original subscription terms.


AWS EC2 Interview Questions and Answers 


Ques. 8): Is there a limit to the type of data that may be made public on AWS Data Exchange?

Answer:

Yes. Certain types of data are restricted by publishing rules for selling items on AWS Data Exchange and Terms & Conditions for AWS Marketplace Providers. Except for information that is already legally available to the public, such as newspaper articles, open court records, public company filings, or public online profiles, data products listed on AWS Data Exchange may not include information that can be used to identify any person unless a provider is enrolled in the Extended Provider Program.


AWS Lambda Interview Questions and Answers


Ques. 9): On AWS Data Exchange, what kind of data can I subscribe to?

Answer:

AWS Data Exchange now has over 3,000 data products from a variety of industries, including financial services (for example, top US businesses by revenue), healthcare and life sciences (for example, population health management), geospatial (for example, satellite imagery), weather (for example, historical and future temperature trajectories), and mapping (for example, street level imagery and foot traffic patterns). Go to the AWS Data Exchange catalogue for a comprehensive list of data suppliers. Customers can register requests for additional data sources not presently accessible on AWS Data Exchange here.


AWS Cloud Security Interview Questions and Answers


Ques. 10): Who owns the data I'm sharing using AWS Data Exchange as a provider?

Answer:

As an AWS Data Exchange data provider, you maintain control of the data you provide. Each data provider must confirm that they have the legal authority to disseminate the data they publish under the AWS Marketplace Providers Terms and Conditions. Before receiving access to data sets contained in a product, subscribers must legally agree to the Data Subscription Agreement given by the data provider, which stays available for both data providers and subscribers. Where there is evidence of misuse, AWS Data Exchange may advise remedial action in accordance with the AWS acceptable use policy, but it is the data provider's obligation to enforce and administer the conditions of use.


AWS Simple Storage Service (S3) Interview Questions and Answers


Ques. 11): When using AWS Data Exchange solutions, how can I stay compliant with applicable data privacy laws?

Answer:

AWS, the data supplier, and the user all share responsibility for security and compliance. The Terms and Conditions for AWS Marketplace Providers, which every data supplier must agree to before listing any data products, provide detailed constraints surrounding qualifying data sets and other associated legal compliance issues. If AWS discovers that these rules have been violated in any manner, the material will be removed from AWS Data Exchange, and the data provider may be removed from the service.


AWS Fargate Interview Questions and Answers


Ques. 12): Is it necessary for me to package my files in a certain format?

Answer:

You may package files in any file type using AWS Data Exchange, but you should think about what would make it easiest for subscribers to understand the data. Subscribers will be able to conduct queries using Amazon Athena in a cost-effective manner utilising parquet prepared data, for example. Subscribers will need to understand how to interpret binary or other proprietary file formats, which AWS advises addressing in each product description.


AWS SageMaker Interview Questions and Answers


Ques. 13): What is the procedure for making an API call?

Answer:

First, make sure you've subscribed to a product that includes an API data collection. Then go to the asset detail page for the product to see API schemas and code snippets to assist you arrange your API call. You may also use the AWS SDK to have your API calls automatically signed with your AWS credentials.  


AWS DynamoDB Interview Questions and Answers 


Ques. 14): In AWS Data Exchange, how is data organised?

Answer:

AWS Data Exchange organises data into three categories: data sets, modifications, and assets. A data set is a collection of data that is meant to be used together (for example, end of data pricing for equities trading in the US). Revisions to data sets are published when needed by data suppliers to make new assets available. Changes or new data (for example, today's end-of-day pricing), corrections to earlier revisions, or whole new snapshots can all be represented via revisions. Any file that may be saved in Amazon Simple Storage Service (S3) is considered an asset.  


AWS Cloudwatch interview Questions and Answers


Ques. 15): What are the requirements for becoming an AWS Data Exchange data provider?

Answer:

To join AWS Data Exchange, data suppliers must agree to the AWS Marketplace Providers Terms and Conditions ("AWS Marketplace Terms & Conditions"). Data suppliers must utilise a legal corporation based in the United States or a European Union member state, present proper banking and taxation identity, and be approved by the AWS Data Exchange business operations team. Before being granted authorization to advertise data items in the catalogue, each data supplier will be subjected to a thorough evaluation by the AWS Data Exchange team.


AWS Elastic Block Store (EBS) Interview Questions and Answers


Ques. 16): What is the Data Subscription Agreement (DSA) and how can I specify it?

Answer:

AWS Data Exchange offers a Data Subscription Agreement (DSA) form that may be customised to include input from different AWS customers and data sources. You can use this DSA template, copy and alter it with their own terms and conditions, or upload their own DSA to express specific terms. Without any additional alterations, AWS Data Exchange will associate the DSA given for the product.


AWS Amplify Interview Questions and Answers 


Ques. 17): How can I report abusive content or request that information from a product suspected of being abused be removed?

Answer:

You can fill out and submit the form on Report Amazon AWS Abuse if you feel that a data product or AWS Data Exchange resources are being exploited for abusive or unlawful reasons. If AWS discovers that our conditions have been violated in any manner, the subscriber's access to the data product may be revoked, and the data source or subscriber may be barred from using AWS Data Exchange in the future.


AWS Secrets Manager Interview Questions and Answers


Ques. 18): How can I publish and make data sets available to my subscribers after I've created them?

Answer:

As part of a product, data sets are made available to subscribers. A product is a set of one or more data sets, as well as information that makes the product discoverable in the AWS Data Exchange catalogue, price, and a Data Subscription Agreement that includes terms for your customers.


AWS Django Interview Questions and Answers


Ques. 19): Are there any limitations to the usage of AWS Data Exchange and any data collected through AWS Data Exchange?

Answer:

Yes, AWS expressly forbids using AWS Data Exchange for any unlawful or fraudulent purposes. Data may not be utilised in any way that violates an individual's rights or discriminates illegally against others based on race, ethnicity, sexual orientation, gender identity, or other similar groupings. Subscribers may not construct, derive, or infer any information pertaining to a person's identity from material acquired through AWS Data Exchange that has been anonymized or aggregated (so that it is no longer connected with an identifiable individual) by the data provider (for example, attempting to triangulate with other data sources).


AWS Cloud Support Engineer Interview Question and Answers


Ques. 20): What is the procedure for refunds?

Answer:

Data suppliers are required by AWS Data Exchange to indicate their refund policy, which can be seen on the subscription information page. You must contact the supplier directly for any refund claims. AWS will process and provide the approved refund if a provider authorizes the request.


AWS Solution Architect Interview Questions and Answers


More AWS interview Questions and Answers:


AWS Glue Interview Questions and Answers


AWS Cloud Interview Questions and Answers


AWS VPC Interview Questions and Answers


AWS DevOps Cloud Interview Questions and Answers


AWS Aurora Interview Questions and Answers


AWS Database Interview Questions and Answers


AWS ActiveMQ Interview Questions and Answers


AWS CloudFormation Interview Questions and Answers


AWS GuardDuty Questions and Answers


AWS Control Tower Interview Questions and Answers


AWS Lake Formation Interview Questions and Answers


AWS Data Pipeline Interview Questions and Answers


Amazon CloudSearch Interview Questions and Answers 


AWS Transit Gateway Interview Questions and Answers


Amazon Detective Interview Questions and Answers



May 08, 2022

Top 20 Oracle 10g Interview Questions and Answers

 

             The Oracle Database 10g Standard Edition is designed for medium-sized businesses. Oracle's Real Application Cluster features are included to protect against hardware failures. It's simple to set up and configure, and it includes its own clustering software, storage management, and other self-managing features. Oracle Database 10g Standard Edition maintains all of your data and lets all of your business applications to benefit from Oracle Database's renowned performance, security, and reliability. It also has full upward compatibility with Oracle Database 10g Enterprise Edition, ensuring that your investment is protected as your needs change.


Oracle Fusion Applications interview Questions and Answers


Ques. 1): What are the components of an Oracle database's logical database structure?

Answer:

The following are the components of Oracle's logical database structure:

Tablespaces: Tablespaces are the logical storage units that make up a database. This tablespace is a collection of logical structures that are linked together. To be more specific, tablespace groupings are linked to logical structures.

Database Schema Objects: A schema is a set of database objects that belong to a single user. Tables, indexes, views, stored procedures, and other objects are among the objects. The user is the account in Oracle, and the schema is the object. It is also possible to have a schema without specifying a user in database platforms.


Oracle Accounts Payables Interview Questions and Answers


Ques. 2): What is the connection between the database, tablespace, and data file?

Answer:

An Oracle database has one or more tablespaces, which are logical storage units. Each tablespace in an Oracle database is made up of one or more datafiles. The complete data of databases is stored in these tablespaces. When we talk about datafiles, we're talking about the physical structure that tells the operating system which Oracle software is running.


Oracle ADF Interview Questions and Answers


Ques. 3): What is the difference between DB file sequential read and DB File Scattered Read ?

Answer:

DB File Scattered Read is related to index read, whereas DB File Sequential Read is related to whole table scan. DB File sequential read reads blocks into contiguous memory, whereas DB File dispersed read reads multiple blocks into buffer cache.


Oracle Access Manager Interview Questions and Answers


Ques. 4): Which variables should be addressed when establishing a table index? How do I choose a column for indexing?

Answer:

The size of the database and the amount of data determine how an index is created. If the table is vast and only a few data points are required for selection or reporting, an index must be created. Cardinality and frequent usage in the where condition of a select query are two primary reasons for selecting columns for indexing. Because configuring main key or unique key immediately creates unique index, the business rule also forces the creation of indexes like primary keys.

It is important to note that creation of so many indexes would affect the performance of DML on table because in single transaction should need to perform on various index segments and table simultaneously.


Oracle Fusion HCM Interview Questions and Answers


Ques. 5): What does Oracle's ANALYZE command do?

Answer:

This command "Analyze" is used to conduct different operations on an index, table, or cluster. The following is a list of Oracle commands that use the ANALYZE command:

The Analyze command is used to find migrated and chained table or cluster rows.

It is used to verify an object's structure.

This assists in gathering statistics about the object that the user is using, which are subsequently put in the data dictionary.

It also aids in the deletion of statistics from the data dictionary that are used by an object.


Oracle SCM Interview Questions and Answers


Ques. 6): What is the DUAL table's data type?

Answer:

The Dual table is a single-column table in the Oracle database. Dummy is a single Varchar2(1) column in this table with the value 'X'.


Oracle Financials Interview questions and Answers


Ques. 7): Is it possible to create an index online?

Answer:

YES. Indexes can be created and rebuilt online. This allows you to change basic tables while also building or rebuilding indexes on those tables. DML actions are permitted while the index is being built, but DDL operations are not permitted.

When constructing or rebuilding an index online, parallel execution is not supported.

CREATE INDEX emp_name ON emp (mgr, emp1, emp2, emp3) ONLINE;


Oracle Cloud Interview Questions and Answers


Ques. 8): When the R/3 system is active, why is a small dump written during an offline backup?

Answer:

BRBACKUP terminates the database during an offline backup, however the present R/3 system is unaware of this. As a result, the first work process that loses its database connection creates a small dump. Until the database is available again, all work processes move into reconnect mode. As a result, because the database cannot be accessed, one (or more) brief dumps are usually produced during an offline backup.


Oracle PL/SQL Interview Questions and Answers


Ques. 9): How can you track a user's password change in Oracle?

Answer:

Oracle only keeps track of the password's expiration date based on when it was last modified. You may discover when a password was last changed by listing the view DBA USERS.EXPIRY DATE and subtracting PASSWORD LIFE TIME. The PTIME column in the USER$ database (on which the DBA USERS view is based) can also be used to check the last password change time. However, if PASSWORD REUSE TIME and/or PASSWORD REUSE MAX are configured in a profile given to a user account, you can look up the password change date in the dictionary table USER HISTORY$.

SELECT user$.NAME, user$.PASSWORD, user$.ptime, user_history$.password_date

FROM SYS.user_history$, SYS.user$

WHERE user_history$.user# = user$.user#;


Oracle SQL Interview Questions and Answers


Ques. 10): What is Secure External password Store (SEPS) ?

Answer:

You can store password credentials for connecting to databases using SEPS by utilising a client-side Oracle wallet, which also stores signing credentials. This capability has been available since Oracle 10g. Thus, embedded username and passwords were no longer required in application code, scheduled jobs, or scripts. This decreases risk because passwords are no longer accessible, and password management policies can be implemented more quickly without having to alter application code whenever the login and password change.


Oracle RDMS Interview Questions and Answers


Ques. 11): Why do we require the CASCADE option when using the DROP USER command to drop a user, and why do "DROP USER" instructions fail when we don't use it?

Answer:

If a user has an object, you will not be able to delete that user without using the CASCADE option. The DROP USER command with the CASCADE option deletes the user and all associated items. Because this is a DDL command, rollback is not possible after it has been executed.


BI Publisher Interview Questions and Answers


Ques. 12): What is the difference between Redo, Undo, and Rollback?

Answer:

When it comes to Redo, Rollback, and Undo, I always get a little confused. They all sound pretty much the same, or at least very similar.

Every Oracle database has a collection of redo log files (two or more). The redo log keeps track of all data changes, including both uncommitted and committed ones. Oracle saves archive redo logs in addition to online redo logs. In recovery scenarios, all redo logs are used. Rollback: More specifically, section rollback. The data in rollback segments is saved as it was before any modifications were made. The redo log, on the other hand, is a record of the inserts, updates, and deletions.

Undo: Rollback segments. They both are really one in the same. Undo data is stored in the undo tablespace. Undo is helpful in building a read consistent view of data.

 

Ques. 13): Do you have more than three Linux instances running? How do you figure out which shared memory and semaphores belong to which instance?

Answer:

Oracle provides an undocumented utility called Oradebug. The oradebug help command displays a list of oracle commands.

SQL>oradebug setmypid

SQL>oradebug ipc

SQL>oradebug tracfile_name

 

Ques. 14): Why aren't all Oracle faults recorded in the Alert Log?

Answer:

In the Alert Log, Oracle only logs critical problems. The majority of Oracle error codes are not recorded (unfortunately this may also include error codes that are genuinely critical). As a result, it's common to discover faults in the Oracle application that aren't visible in the Alert Log.

 

Ques. 15): There is no room available to add datafiles to enhance temp tablespace because it is completely full. What can you do to free up TEMP tablespace in that case?

Answer:

Closing some of the database's idle sessions will help you free up some TEMP space. You can also make use of:

Alter Tablespace PCTINCREASE 1' ;

'Alter Tablespace PCTINCREASE 0;

 

Ques. 16): What is the difference between row chaning and row migration?

Answer:

Row Migration:  When an update to a row causes it to no longer fit on the block, it migrates (with all of the other data that exists there currently). A migration means that the entire row will be moved, with only the «forwarding address» remaining. As a result, the original block only has the new block's rowid and the entire row is transferred.

Row Chaining: A single database block cannot hold more than one row. For example, if your database uses a 4KB blocksize and you need to insert an 8KB row, Oracle will use three blocks and save the information in pieces. Row chaining can occur under the following circumstances: Tables with a rowsize greater than the blocksize. Chained rows are common in tables containing LONG and LONG RAW columns. Oracle breaks broad tables split into sections, therefore tables with more than 255 columns will have chained rows. Rather of having a forwarding address on one block and data on another, we now have data on two or more blocks.

 

Ques. 17): How can I erase a data file that I accidentally created?

Answer:

In most circumstances, you can use RESIZE or RENAME to fix a data file that was generated with the improper size or in the wrong location. You have the following alternatives if you want to drop the data file again:

A produced data file can only be erased during a tablespace reorganization up to and including Oracle 9i. There are no other viable alternatives.

As of Oracle 10g, an empty data file can also be dropped with the following command:

ALTER TABLESPACE DROP DATAFILE ' ';

If there are still extents in the data file, this command fails with ORA-03262. In this case, the affected segments must first be relocated so that the extents are released.

 

Ques. 18): What is the ideal file size for data files?

Answer:

It is impossible to provide a straightforward solution to this topic. In most cases, the size of the data files has no bearing on database activity. However, keep the following considerations in mind:

Make sure the Oracle parameter DB FILES is set high enough. Otherwise, once this limit is reached, new data files cannot be produced.

The fewer the datafiles, the faster they can be restored individually during a backup.

BEGIN BACKUP processes in online backups are likely to take longer the smaller the data files are, and hence the more data files there are.

Data files that are too large aggravate performance problems that are caused by inode locking, since parallel processes may become serialized on the data file inode.

On occasion, size restrictions may prevent the system from using data files that exceed a certain size (often 2GB).

 

Ques. 19): Why does the order of the online redo logs occasionally change?

Answer:

This redo log becomes the next redo log if the next online redo log is still archived and another redo log is available for overwriting. The order of the online redo logs is now altered. Because the alternative would be an archiver stuck, at least briefly, this behaviour is preferable.

Only if many archive processes run in parallel and do not run again when the redo logs are archived may this situation arise. To avoid this issue, see if the archiver's performance (I/O tuning) can be improved. You must also avoid getting an archiver stuck due to a fully operational archive file system.

This problem cannot occur if the number of archiver processes is limited to one by LOG_ARCHIVE_MAX_PROCESSES

 

 

Ques. 20): On my system, why do Oracle processes run as the sid>adm user?

Answer:

By default, the UNIX PS command displays the true user, not the actual user. As a result, having adm as the displayed user for Oracle processes is not a problem. The only thing that matters is that the Oracle executable has the appropriate permissions.  

 

 

November 28, 2021

Top 20 Oracle Access Manager Interview Questions and Answers

  

                  Oracle Access Manager (Access Manager) is the key capability for Web Single Sign-on (SSO), authentication, authorization, centralized policy administration and agent management, real-time session management, and auditing in the new Oracle Access Management platform. Access Manager is a 100% Java solution that is incredibly scalable, allowing it to manage Internet-scale installations. It also works with heterogeneous environments that already exist, with agents certified for hundreds of web and application servers. Access Manager increases security, improves user experience and productivity, and improves compliance while lowering total cost of ownership by providing broad capabilities, scalability, and high availability.


Oracle Fusion Applications interview Questions and Answers


Ques: 1). What are the different security modes available in Oracle Access Manager?

Answer: 

Open: Allows communication without encryption. There is no authentication or encryption between the AccessGate and the Access Server in Open mode. The AccessGate does not need the Access Server to provide proof of identification, and the Access Server accepts connections from all AccessGates. Similarly, Identity Server does not require WebPass to provide confirmation of identity.

Simple: Oracle encryption is supported. TLS v1 is used to secure communications between Web clients in Simple mode (WebPass and Identity Server, Policy Manager and WebPass, and Access Server and WebGate). Oracle Access Manager components only use X.509 digital certificates in both Simple and Cert modes. The standard cert-decode plug-in decodes the certificate and delivers certificate information to the standard credential mapping authentication plug-in in Cert Authentication between WebGates and the Access Server. Oracle Access Manager saves the associated private key for each public key in the aaa key.pem file for the Access Server (or ois key.pem for the Identity Server).

Cert: A third-party certificate is required. If you have an internal Certificate Authority (CA) for processing server certificates, use Cert (SSL) mode. Communication between WebGate and Access Server, as well as between Identity Server and WebPass, is encrypted in Cert mode utilising Transport Layer Security (RFC 2246). (TLS v1).


BlockChain Interview Question and Answers


Ques: 2). What Is Oracle Access Manager's Architecture?

Answer: 

Identity Server, WebPass, Policy Manager, Access Server, and a WebGate are the primary components of the Oracle Access Manager architecture. Identity Server is a stand-alone C++ server that connects to LDAP directly.

It also receives requests from Webpass and responds to them. WebPass is a web server plugin that allows information to be passed between the identity server and the web server. It sends Identity XML SOAP requests to Identity Server and redirects HTTP requests from the browser to Access Server.

A web server plugin called Policy Manager (PMP or PAP) interfaces directly with user, configuration, and policy repositories. Access Server, commonly known as PDP, is a stand-alone C++ server. It receives requests from WebGates/AccessGates and responds to them.

It also uses LDAP for communication. It responds to queries from the Access Server SDK. WebGate (PEP) is a web server plugin that communicates with the access server. It passes user authentication data to access server for processing.


Oracle Accounts Payables Interview Questions and Answers


Ques: 3). In Oracle Access Manager, what is the Iwa mechanism?

Answer: 

The OAM offers a feature that allows Microsoft Internet Explorer users to authenticate to their Web packages using their computing device credentials on a regular basis. Windows Native Authentication is the term for this. The user logs in to the computer, and the Windows Domain Administrator authentication mechanism is used to complete the local authentication.

The user launches an Internet Explorer (IE) browser and asks a Web assist from the Access System.

The browser notifies the IIS Web server about the neighbourhood authentication and sends a token.

The token is used by the IIS Web server to authenticate the user and to set the REMOTE USER HTTP header variable, which indicates the customer name provided by the customer and authenticated by the server.

The WebGate creates an ObSSOCookie and sends it lower back to the browser.

The Access System authorization and different techniques proceed as usual.

The maximum session timeout length configured for the WebGate is applicable to the generated ObSSOCookie.


Oracle ADF Interview Questions and Answers           


Ques: 4). What Is An Access Server Sdk?

Answer :

The Access Manager Software Developer's Kit (SDK) allows you to extend the Access System's access management features. You can use this SDK to construct a customised AccessGate. The Access Manager SDK provides an environment in which you can establish an AccessGate by creating a dynamic link library or a shared object. You'll also need configureAccessGate.exe to make sure your client is working properly.


Oracle Fusion HCM Interview Questions and Answers


Ques: 5).  What Is Policy Manager Api?

Answer :

The Policy Manager API provides an interface that allows custom applications to establish and edit Access System policy domains and their contents using the Access Server's authentication, authorization, and auditing capabilities.


Oracle SCM Interview Questions and Answers


Ques: 6). Name some new features of OAM11gR2?

Answer: 

Dynamic Authentication -- Dynamic authentication is the ability to define what authentication scheme should be presented to a user base on some condition.

Persistent Login (Remember Me) -- Persistent Login is the ability to let users login without credentials after the first-time login.

Policy Evaluation Ordering -- The out-of-the -box algorithm is based on the "best match" algorithm for evaluating policies.

Delegated Administration -- The ability to select users who can administer their own application domains.

Unified Administration Console -- The console screen has a new look; a new single 'Launch Pad' screen with services that are enabled based on user roles.

Session Management -- Ability to set idle session timeout's at the application domain level


Oracle Financials Interview questions and Answers


Ques: 7). What is IIS?

Answer: 

Internet Information Services (IIS, formerly Internet Information Server) is a Microsoft extensible web server designed for use with the Windows NT family of operating systems. [2] HTTP, HTTPS, FTP, FTPS, SMTP, and NNTP are all supported by IIS. Since Windows NT 4.0, it has been a fundamental element of the Windows NT family, albeit it may be missing from other editions (e.g. Windows XP Home edition). When Windows is installed, IIS is not enabled by default. The IIS Manager can be accessed through the Control Panel's Microsoft Management Console or Administrative Tools.


Oracle Cloud Interview Questions and Answers


Ques: 8). What is the meaning of an Oracle Access Manager Basic License?

Answer: 

The Oracle Access Manager (OAM) Basic licence was intended to support Oracle AS Single Sign-On (OSSO) customers who purchased the Oracle iAS Suite or other Oracle E-Business Suite products. Customers who have valid Oracle Single Sign-On (OSSO) licences can swap them for an equivalent number of Access Manager licences under the OAM Basic licence, with some restrictions. Access Manager must employ Oracle infrastructure components due to the constraints; this was also a requirement for OSSO. The LDAP directory, for example, must be Oracle Internet Directory or Oracle Virtual Directory, and only Oracle application resources can be protected. Customers who want to remove the restrictions must acquire the complete Access Manager licence.


Oracle PL/SQL Interview Questions and Answers


Ques: 9). What is Oracle Webgate, and how does it work?

Answer: 

Oracle WebGate is a Web server plug-in that comes with Oracle Access Manager out of the box. Users' HTTP requests for Web resources are intercepted by the WebGate and forwarded to the Access Server for authentication and permission.


Oracle SQL Interview Questions and Answers


Ques: 10). 11g Access Manager Oracle HTTP Server 11g and IBM HTTP Server 7.0 support WebGates, but I prefer Apache Web Servers. If I want to use Access Manager 11g, what should I do?

Answer: 

Oracle Access Manager 10g WebGates can communicate with Access Manager 11g servers. Oracle Access Manager 10g WebGates have a wide range of web server certifications, including Apache, Domino, Microsoft IIS, and many others. With thousands of applications, I have a massive Oracle Access Manager 10gR3 implementation. Do I have to transfer them all at once to the new 11gR2 platform? No. Both Oracle Access Manager 10gR3 and Oracle Access Manager 11gR2 servers can be live in production at the same time, protecting distinct sets of applications, thanks to server side coexistence in Access Manager 11gR2. End users will continue having a seamless single sign-on experience as they navigate between applications protected by the two servers. This capability can be leveraged by customers with large deployments to perform the server migration in a phased manner over a period of time without impacting end users.


Oracle RDMS Interview Questions and Answers


Ques: 11). With thousands of applications, I have a massive Sun Access Manager 7.1 or Sun Access Manager 7.1 deployment. Is it necessary to migrate all of them to the new Access Manager 11gR2 platform at the same time?

Answer: 

No. Both the OpenSSO 8.0 (or Sun Access Manager 7.1) and Access Manager 11gR2 servers can be live in production at the same time safeguarding distinct sets of apps with Access Manager 11gR2. End users will continue to have a seamless single sign-on experience as they move between the two servers' protected apps. Customers with big deployments can utilise this capability to migrate servers in stages over time without affecting end users.


BI Publisher Interview Questions and Answers

 

Ques: 12).What Is An Identity Xml?

Answer: 

IdentityXML provides a programmatic interface for performing the actions that a user can perform while using a browser to access a COREid application. A software can, for example, submit an IdentityXML request to find members of a group defined in the Group Manager software or to add a person to the User Manager. Simple moves and multi-step procedures can be applied to trade person, institution, and company object profiles using IdentityXML. After you've finished constructing the IdentityXML request, you'll need to put up a SOAP wrapper to send the IdentityXML request to WebPass over HTTP. XML over SOAP is used by the IdentityXML API. Using an HTTP request, we send IdentityXML parameters to the COREid Server. A SOAP envelope is included in this HTTP request. When WebPass receives an HTTP request, the SOAP envelope identifies it as an IdentityXML request rather than a standard browser request. The request is passed to the COREid Server, which executes the request and returns a response. You could also use WSDL to put together the SOAP request. This appears to be the SOAP content material: SOAP envelope (with oblix namespace described), SOAP body (with authentication information), genuine request (with software name and params). Userservcenter, groupservcenter, or objservcenter are examples of application names (for companies).


Oracle 10g Interview Questions and Answers

 

Ques: 13). What are Header Variables and How Do I Use Them?

Answer: 

The Header Variable contains Oracle Access Manager allows administrators to build a web of trust in which a user's credentials are confirmed once and then delivered to each application that the user uses. The programme does not need to re-authenticate the user with its own mechanism when using these credentials. Users who have been authenticated by Oracle Access Manager are able to access applications without having to re-authenticate. A user's credentials can be sent in one of two ways:

• Using Cookies: A specific value is set on the browser's cookie that the application must extract to identify a user.

• Using Header Variables: An HTTP header set on the request by the agent and visible to the application. Authorization Policy Response in the Administration Console Header response values are inserted into a request by an OAM Agent, and can only be applied on Web servers that are protected by an agent registered with OAM 11g If the policy includes a redirect URL that is hosted by a Web server not protected by OAM, header responses are not applied.

 

Ques: 14). Explain the Oam-oaam Integration Architecture and Integration.

Answer: 

Using all of these products together will provide you complete control over the authentication process and comprehensive pre-/post-authentication testing capabilities against Adaptive Risk Manager models.

Two Oracle Access Manager AccessGates are used in the OAAM's ASA-OAM integration: one for fronting the Web server (a traditional WebGate) to Adaptive Strong Authenticator and one for the embedded AccessGate. The access server SDK must be installed and configured before the AccessGate device can be used. The ASDK location will be updated in the ASA bharosa papers. An application that will use the ASA authentication mechanism and will be tested for the ASA login touchdown page.

 

Ques: 15). What Happens When A User Submits A Request That Is Protected By An Access Gate (No Longer Webgate)?

Answer: 

The following is an example of the flow:

The consumer sends a resource request to the application or servlet that has the access gate code.

The access gate code creates an ObResourceRequest shape and calls the Access server to determine whether or not the resource is protected.

The server responds to the request for entry. If the aid isn't secured, gaining access to the gate allows anyone to gain access to the resource. Otherwise, Access Gate creates an ObAuthenticationScheme shape to inquire about the credentials the user wishes to send to Access Server. The request for entry to the server is granted. To get the credentials, the programme employs a form or one of several additional methods. The AccessGate creates the ObUserSession structure, which provides the Acc Server with user information. If credentials are verified valid, get admission to gate creates a session token for the person after which sends an authorization request to the get admission to server. Access server validates if the user is authz to get right of entry to that useful resource. Access gate permits user to get entry to the asked resource.

 

Ques: 16). What exactly is SSO?

Answer: 

SSO (single sign-on) is a session/user authentication method that allows a user to access different apps with just one username and password. The procedure authenticates the user for all of the programmes to which they have been granted access and removes the need for further questions when they switch applications during a session.

Overview:

  • Provides users with unified sign-on and authentication across all their enterprise resources, including
  • desktops, client-server, custom, and host-based mainframe applications
  • Provides a centralized framework for security and compliance enforcement
  • Eliminates the need for multiple usernames and passwords
  • Helps enforce strong password and authentication policies.
  • Uses any LDAP directory, Active Directory, or any SQL database server as its user profile and credential repository

Benefits

  • Reduces deployment risk and operational costs.
  • Allows enterprises to provide fast, secure access to applications for employees and partners.
  • Eliminates the overhead and limitations of traditional desktop client deployments.
  • Seamlessly integrates with Oracle Identity Management for common security policy enforcement and compliance reporting across applications

  

Ques: 17). What is Reverse Proxy?

Answer: 

A reverse proxy gives you architectural flexibility by allowing you to expose the same application on both the intranet and the extranet without having to make any changes to the existing application. By sending all requests through the proxy, you may safeguard all Web content from a single logical component.

This is true even for platforms that Oracle Access Manager does not support. All content on these servers can be safeguarded if you have multiple types of Web servers, such as iPlanet, Apache, and others, running on different platforms, such as MacOS, Solaris x86, mainframe, and so on. A reverse proxy can be used as a workaround for unsupported Web servers, removing the requirement to develop custom AccessGates for unsupported Web servers or systems that do not support AccessGates. This creates a single management point. You can manage the security of all of the Web servers through the reverse proxy without establishing a footprint on the other Web servers.

 

Ques: 18). What is Identity Store and how does it work? Describe the many types of identity stores.

Answer: 

The term "identity store" refers to a database that contains business users and groups. Weblogic includes an inbuilt LDAP that is used as the identity store by default by fusion middleware components. External LDAP servers, such as OID, AD, and others, can be configured to serve as identity stores.

System Store - Represents the identity store which will have groups or users that will act as “Administrators” to OAM that is only members of this identity store group/user can perform admin functions via oam console.

Default Store - This will be the identity store that will be used at time of patching for migration purpose or by Oracle security token service.

 

Ques: 19). In OAM, what are Authorization Policies?

Answer: 

The process of assessing whether a user has the permission to access a requested resource is known as authorization. Administrators can establish the circumstances under which a subject or identity has access to a resource by creating one or more authorization policies. A user may seek to view data or run a policy-protected application programme. The requested resource must be part of an application domain and be covered by a specified permission policy within that domain.

 

Ques: 20). In comparison to the ECC, what are the benefits of the DCC?

Answer: 

From a security and flexibility standpoint, the DCC has several advantages. The DCC can be placed anywhere in the DMZ because it is totally detached from the Access Manager server. It also adds security by terminating all unauthenticated end user login requests at the DCC in the DMZ, isolating the server from unauthenticated network traffic.