Icon New game New game
Get Academic Plan
Get Academic Plan
Get Academic Plan

0C1 3

Quiz

ESTUDIO

Download the paper version to play

1 times made

Created by

United States

Top 10 results

There are still no results for this game. Be the first to stay in the ranking! to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

0C1 3Online version

ESTUDIO

by 4L3 M4NZ
1

Which statement about the OCI Block Volume Cross Region Replication is NOT correct?

2

Which two of the following statements about volume groups are correct?

Choose one or more answers

3

You would like to make a point-in-time disk-to-disk deep copy of an existing block volume without needing to go through the backup and restore process. What would you create?

4

You would like to make a point-in-time snapshot of the data on a block volume and later restore it as a new volume in a different availability domain within the same region. What would you create?

5

Which statement about Oracle Cloud Infrastructure (OCI) File Storage service is correct?

6

Which component uniquely identifies the file system within the mount target, letting you associate many file systems to a single mount target?

7

Which component represents paths within a client instance to a locally accessible directory to which the remote file system is mounted?

8

Which of the following statements about the OCI File System Mount Target is NOT true?

9

When a clone is created, the metadata is copied from the source file system to the clone. What do we call that process?

10

Which statement about the OCI File System Export is correct?

11

Which of the following statements about File System Snapshots is NOT correct?

12

Which statement about File System Replication is NOT correct?

13

Which package needs to be installed on an instance to enable in-transit encryption with OCI's File Storage service?

14

You create a file system and then add a 1 gb. You then take a snapshot of the file system. What would be the total meteredBytes shown by the Fie Storage service after the hourly update cycle is complete?

15

You want to restrict users from creating public buckets in Object Storage and if some user tries to create they should receive an error message. What would you use to configure this?

16

Which three are a customer's responsibilities in the shared responsibilities model for security?

Choose one or more answers

17

You would like to examine your resources for security weakness related to configuration and upon detection suggest, assist, or take corrective actions. Which Oracle Cloud Infrastructure (OCI) security service should you use?

18

Which statement about Security Zones in Oracle Cloud Infrastructure is true?

19

Wich option accurately describes the primary purpuse of the Cloud Event rule in the Responder recipe of Oracle Cloud Guard?

20

What is the purpose of the Vulnerability Scanning service in Oracle Cloud Infrastructure?

21

Which of the following can you do using Oracle Cloud Infrastructure Certificates service?

22

Which OCI Security service protects web applications and APIs from common web exploits that can affect availability or security?

23

Which type of rule do you need to configure in OCI WAF to protect your web applications from various types of threats like SQL injection, cross-site scripting, and HTML injection?

24

Which of the following statements best explains why a dynamic group is needed for Certificate Authority creation in OCI Certificates service?

25

Which statement about key rotation in OCI Vault is true?

26

Which of the following encryption algorithms are supported by the OCI Vault service?

27

What is the purpose of Oracle Cloud Infrastructure OCI Vault-Key Management?

28

As a security analyst for a financial company, you are tasked with ensuring the confidentiality and integrity of sensitive data. You need to decide which encryption method to use for protecting the company's data. Which two of the following statements about asymmetric and symmetric key encryption are true?

Choose one or more answers

29

5. As an administrator for a database system in OCI, you need to create credentials for a new user. How can you store these credentials securely to prevent unauthorized access? Which is the best option?

30

Which three are mandatory components for defining a metric query?

Choose one or more answers

31

What is the maximum duration of Alarm history stored for the Monitoring service?

32

You are tasked to review and run routine checks for Alarms configured in the Oracle Cloud Infrastructure environment. To choose notification methods, which configuration should be updated?

33

Which component controls the length of each time window in a metric query?

34

You want to filter aggregated data by a specific resource ID. What is used in Basic and Advanced Modes to achieve this?

35

Which two are log categories of Object Storage Service Logs?

Choose one or more answers

36

Which three types of logs are used by the Logging service?

Choose one or more answers

37

Which statement best describes the purpose of a log group in the OCI Logging service?

38

In OCI logging service, an Agent Configuration is created to enable Custom log ingestion from Compute instances. As part of the Agent Configurations, which of the following is selected to choose Instances to ingest logs from the Compartment?

39

You have a requirement to collect custom logs from an on-premises external application and archive low-prority log data into Object Storage buckets. Which two of the followinf options are involved in achieving this?

Choose one or more answers

40

You have a high-demand web application running on OCI. Your tenancy administrator has set up a schedule-based autoscaling policy on instance pool with initial size of 10 instances for the application. Policy 1: Target pool size: 20 instances Execution time: 8:30 a.m. on every Monday through Friday, in every month, in every year. Cron expression: 0 30 8? *MON-FRI* Which statement accurately explains the goal of this policy?

41

Which is NOT a valid Oracle Cloud Infrastructure Virtual Cloud Network (VCN) approach?

42

You are designing a lab exercise with an application that includes a large number of graphics with large file sizes. The application becomes unresponsive if the graphics are embedded in the application. You have uploaded the graphics to OCI Object Storage bucket and added the URL paths for the individual objects in the application. You need to ensure these graphics are accessible without requiring any authentication for an extended period of time. How can you achieve these requirements?

43

Which is NOT a feature of Logging service in OCI?

44

Which Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM) policy is invalid?

45

Which Statement regarding Oracle Vulnerability Scanning Service is NOT true? This Service can identify:

46

HOLA

47

HOLA

48

HOLA

49

HOLA

educaplay suscripción