exam questions

Exam 1z0-574 All Questions

View all questions & answers for the 1z0-574 exam

Exam 1z0-574 topic 1 question 128 discussion

Actual exam question from Oracle's 1z0-574
Question #: 128
Topic #: 1
[All 1z0-574 Questions]

Which of the following statements are true?

  • A. When a DMZ is used, all components of the architecture are deployed into the demilitarized zone.
  • B. Secure Internet protocols, such as HTTPS, enable the deployment of the full UI stack without the use of a firewall.
  • C. Traditional "fat client" applications may be deployed across the Internet along with browsers and mobile devices.
  • D. The ORA UI architecture may be deployed in a cloud environment by using virtual servers.
Show Suggested Answer Hide Answer
Suggested Answer: BD 🗳️
Incorrect answers:
A: Many companies that have gone through the evolution of computer networking have a perimeter security strategy. In its simplest form, it consists of two zones - the unprotected zone, outside the perimeter, and the protected zone, within the perimeter Usually the perimeter or barrier itself is expanded into a third zone, named the demilitarized zone (DMZ). The DMZ offers some protection to public-facing systems, and further protection to production systems behind the perimeter firewalls.

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Currently there are no comments in this discussion, be the first to comment!
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...