1
Which statement about the OCI Block Volume Cross Region Replication is NOT correct?
2
Which two of the following statements about volume groups are correct?
Choose one or more answers
3
You would like to make a point-in-time disk-to-disk deep copy of an existing block volume without needing to go through the backup and restore process. What would you create?
4
You would like to make a point-in-time snapshot of the data on a block volume and later restore it as a new volume in a different availability domain within the same region. What would you create?
5
Which statement about Oracle Cloud Infrastructure (OCI) File Storage service is correct?
6
Which component uniquely identifies the file system within the mount target, letting you associate many file systems to a single mount target?
7
Which component represents paths within a client instance to a locally accessible directory to which the remote file system is mounted?
8
Which of the following statements about the OCI File System Mount Target is NOT true?
9
When a clone is created, the metadata is copied from the source file system to the clone. What do we call that process?
10
Which statement about the OCI File System Export is correct?
11
Which of the following statements about File System Snapshots is NOT correct?
12
Which statement about File System Replication is NOT correct?
13
Which package needs to be installed on an instance to enable in-transit encryption with OCI's File Storage service?
14
You create a file system and then add a 1 gb. You then take a snapshot of the file system. What would be the total meteredBytes shown by the Fie Storage service after the hourly update cycle is complete?
15
You want to restrict users from creating public buckets in Object Storage and if some user tries to create they should receive an error message. What would you use to configure this?
16
Which three are a customer's responsibilities in the shared responsibilities model for security?
Choose one or more answers
17
You would like to examine your resources for security weakness related to configuration and upon detection suggest, assist, or take corrective actions. Which Oracle Cloud Infrastructure (OCI) security service should you use?
18
Which statement about Security Zones in Oracle Cloud Infrastructure is true?
19
Wich option accurately describes the primary purpuse of the Cloud Event rule in the Responder recipe of Oracle Cloud Guard?
20
What is the purpose of the Vulnerability Scanning service in Oracle Cloud Infrastructure?
21
Which of the following can you do using Oracle Cloud Infrastructure Certificates service?
22
Which OCI Security service protects web applications and APIs from common web exploits that can affect availability or security?
23
Which type of rule do you need to configure in OCI WAF to protect your web applications from various types of threats like SQL injection, cross-site scripting, and HTML injection?
24
Which of the following statements best explains why a dynamic group is needed for Certificate Authority creation in OCI Certificates service?
25
Which statement about key rotation in OCI Vault is true?
26
Which of the following encryption algorithms are supported by the OCI Vault service?
27
What is the purpose of Oracle Cloud Infrastructure OCI Vault-Key Management?
28
As a security analyst for a financial company, you are tasked with ensuring the confidentiality and integrity of sensitive data. You need to decide which encryption method to use for protecting the company's data. Which two of the following statements about asymmetric and symmetric key encryption are true?
Choose one or more answers
29
5. As an administrator for a database system in OCI, you need to create credentials for a new user. How can you store these credentials securely to prevent unauthorized access?
Which is the best option?
30
Which three are mandatory components for defining a metric query?
Choose one or more answers
31
What is the maximum duration of Alarm history stored for the Monitoring service?
32
You are tasked to review and run routine checks for Alarms configured in the Oracle Cloud Infrastructure environment. To choose notification methods, which configuration should be updated?
33
Which component controls the length of each time window in a metric query?
34
You want to filter aggregated data by a specific resource ID. What is used in Basic and Advanced Modes to achieve this?
35
Which two are log categories of Object Storage Service Logs?
Choose one or more answers
36
Which three types of logs are used by the Logging service?
Choose one or more answers
37
Which statement best describes the purpose of a log group in the OCI Logging service?
38
In OCI logging service, an Agent Configuration is created to enable Custom log ingestion from Compute instances. As part of the Agent Configurations, which of the following is selected to choose Instances to ingest logs from the Compartment?
39
You have a requirement to collect custom logs from an on-premises external application and archive low-prority log data into Object Storage buckets. Which two of the followinf options are involved in achieving this?
Choose one or more answers
40
You have a high-demand web application running on OCI. Your tenancy administrator has set up a schedule-based autoscaling policy on instance pool with initial size of 10 instances for the application.
Policy 1:
Target pool size: 20 instances
Execution time: 8:30 a.m. on every Monday through Friday, in every month, in every year.
Cron expression: 0 30 8? *MON-FRI*
Which statement accurately explains the goal of this policy?
41
Which is NOT a valid Oracle Cloud Infrastructure Virtual Cloud Network (VCN) approach?
42
You are designing a lab exercise with an application that includes a large number of graphics with large file sizes. The application becomes unresponsive if the graphics are embedded in the application.
You have uploaded the graphics to OCI Object Storage bucket and added the URL paths for the individual objects in the application. You need to ensure these graphics are accessible without requiring any authentication for an extended period of time.
How can you achieve these requirements?
43
Which is NOT a feature of Logging service in OCI?
44
Which Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM) policy is invalid?
45
Which Statement regarding Oracle Vulnerability Scanning Service is NOT true? This Service can identify:
|