(Choose two.)

You are analyzing the different methods available to manage the life cycle of the OWSM policies in your SOA/
BPM environment. Identify two statements that correctly describe OWSM policy attachments. (Choose two.)

You are analyzing the different methods available to manage the life cycle of the OWSM policies in your SOA/
BPM environment. Identify two statements that correctly describe OWSM policy attachments. (Choose two.)

A.
Although you can boss attach and detach security policies in JDeveloper, you can detach them only in
Enterprise Manager.

B.
An application developer typically uses JDeveloper to create new security policies rather than select them
from a prebuilt list.

C.
When you use JDeveloper to associate a security policy with a web service, the policy is not really attached
until application development.

D.
OWSM policies can be attached and detached with WLST.



Leave a Reply 0

Your email address will not be published. Required fields are marked *