New Activity
Play Quiz
1. 
You are backing up your on-premises data to the Oracle Cloud Infrastructure (OCI) Object Storage Service. Your requirements are: 1. Backups need to be retained for at least full 31 days. 2. Data should be accessible immediately if and when needed after the backup. Which OCI Object Storage tier is suitable for storing the backup to minimize cost?
A.
Infrequent Access tier
B.
Archive tier
C.
Standard tier
D.
Auto-Tiering tier
2. 
You have a block volume created in the US West (Phoenix) region. You enabled Cross Region Replication for the volume and selected US West (San Jose) as the destination region. Now, you would like to create a new volume from the volume replica in the US West (San Jose) region. What should you do?
A.
Activate the replica
B.
Trigger the replica
C.
No action required. By default, the replica is available as a block volume
D.
Initiate the replica
3. 
Oracle Cloud Agent is a lightweight process that manages plugins running on compute instances. Which is NOT a valid Oracle Cloud Agent plugin name?
A.
Live Migration Agent
B.
OS Management Service Agent
C.
Compute Instance Run Command
D.
Bastion
4. 
Which statement is TRUE about patching an Oracle Cloud Infrastructure (OCI) DB System?
A.
There is no automation with patching. You need to check for patches and manually schedule when to apply the patches.
B.
Once you pre-check the patches for your database, you can decide to apply the patches immediately or schedule a time to apply the patches.
C.
Once you pre-check the patches for your database, the system automatically applies the patches.
D.
Patching is automatically pre-checked and applied to the database
5. 
Which statement accurately describes the key features and benefits of OCI Confidential Computing?
A.
It encrypts and isolates in-use data and the applications processing that data, thereby preventing unauthorized access or modification.
B.
It optimizes network performance and reduces latency through advanced routing algorithms and caching mechanisms.
C.
It enables users to securely store and retrieve data by using distributed file systems, ensuring high availability and fault tolerance.
D.
It provides automatic scalability and load balancing capabilities, which allow seamless integration with other cloud providers.
6. 
You are a system administrator of your company and you are managing a complex environment consisting of compute instances running Oracle Linux on Oracle Cloud Infrastructure (OCI). It's your task to apply all the latest kernel security updates to all instances. Which OCI service will allow you to complete this task?
A.
OCI Streaming service
B.
OS Management service
C.
OCI Registry
D.
OCI Security Zones to achieve automatic security updates
E.
OCI Cloud Guard to monitor and install the security updates
7. 
What should be created before provisioning an Oracle Cloud Infrastructure (OCI) DB System?
A.
Bucket in Object Storage
B.
Virtual Cloud Network
C.
Compute Instance
D.
Compartment
8. 
You want to create a policy to allow the NetworkAdmins group to manage Virtual Cloud Network (VCN) in compartment C. You want to attach this policy to the tenancy. The compartment hierarchy is shown below. Which policy statement can be used to accomplish this task?
A.
Allow group NetworkAdmins to manage virtual-network-family in compartment B:C
B.
Allow group NetworkAdmins to manage virtual-network-family in compartment C
C.
Allow group NetworkAdmins to manage virtual-network-family in tenancy
D.
Allow group NetworkAdmins to manage virtual-network-family in compartment A:B:C
9. 
Which TWO statements are NOT correct regarding the Oracle Cloud Infrastructure (OCI) burstable instances? If the instance's average CPU utilization over the past 24 hours is below the baseline, the system allows it to burst above the baseline.
A.
Baseline utilization is a fraction of each CPU core, either 25% or 75%
B.
Burstable instances cost less than regular instances with the same total OCPU count.
C.
Burstable instances are designed for scenarios where an instance is not typically idle and has high CPU utilization.
D.
Burstable instances are charged according to the baseline OCPU
10. 
You need to set up instance principals so that an application running on an instance can call Oracle Cloud Infrastructure (OCI) public services, without the need to configure user credentials. A developer in your team has already configured the application built using an OCI SDK to authenticate using the instance principals provider. Which is NOTa necessary step to complete this set up?
A.
Create a dynamic group with matching rules to specify which instances can make API calls against services.
B.
Generate Auth Tokens to enable instances in the dynamic group to authenticate with APIs.
C.
Create a policy granting permissions to the dynamic group to access services in your compartment or tenancy.
D.
Deploy the application and the SDK to all the instances that belong to the dynamic group
11. 
Which of the following statements is true about cloning a volume in the Oracle Cloud Infrastructure (OCI) Block Volume service?
A.
You need to detach a volume before cloning it
B.
Creating a clone takes longer than creating a backup of a volume
C.
You can clone a volume to another region
D.
You can change the block volume size when cloning a volume
12. 
As your company's cloud architect, you have been invited by the CEO to join his staff meeting. They want your input on interconnecting Oracle Cloud Infrastructure (OCI) to another cloud provider in London, with some specific requirements: Which other cloud provider should you recommend to interconnect with OCI and meet the above requirements?
A.
IBM Cloud
B.
Google Cloud
C.
OCI
D.
Microsoft Azure
13. 
You are using the Oracle Cloud Infrastructure (OCI) Vault service to create and manage Secrets. For your database password, you have created a secret and rotated the secret one time. The secret versions are as follows: Version Number | Status ---------------------------- 2(latest) |current 1 |Previous You later realize that you have made a mistake in updating the secret content for version 2 and want to rollback to version 1. What should you do to rollback to version 1?
A.
Deprecate version 2(latest). Create new Secret version 3. Create soft link from version 3 to version 1.
B.
a new secret version 3 and set to Pending. Copy the content of version 1 into version 3.
C.
rsion 2(latest) menu, select "Rollback" and select version 1 when given the option.
D.
From the version 1 menu on the OCI console, select "Promote to Current".
14. 
Which of the following statements is true about the Oracle Cloud Infrastructure (OCI) Object Storage server-side encryption?
A.
Encryption of data encryption keys with a master encryption key is optional
B.
Each object in a bucket is always encrypted with the same data encryption key.
C.
Encryption is enabled by default and cannot be turned off.
D.
Customer-provided encryption keys are always stored in the OCI Vault service.
15. 
Which is NOT a valid action within the Oracle Cloud Infrastructure (OCI) Block Volume service?
A.
Expanding an existing volume in place with offline resizing.
B.
Restoring from a volume backup to a larger volume.
C.
Attaching a block volume to an instance in a different availability domain.
D.
Cloning an existing volume to a new, larger volume
16. 
In which two ways can Oracle Security Zones assist with the cloud security shared responsibility model?
A.
Encrypt storage resources with a customer-managed key
B.
Allow access to an unsecured compartment, which is moved from a standard compartment.
C.
Deny public access to Oracle Cloud Infrastructure resources, such as databases and object storage buckets.
D.
Add or move a standard compartment to a highly secured security zone compartment.
17. 
Your IT team has asked you to provision an Autonomous Database in Oracle Cloud Infrastructure (OCI), but they want it to operate similar to what you have currently on-premises. What are the TWO prerequisites for successfully deploying an Autonomous Dedicated Database in OCI?
A.
Autonomous Container Database
B.
Object Storage
C.
Exadata Infrastructure
D.
Identity and Access Management (IAM) Policies
18. 
When defining a query for metric data in Monitoring, which field provides the time window for aggregating metric data points plotted on the metric chart?
A.
Dimension
B.
Namespace
C.
Statistic
D.
Interval
19. 
You just got a last minute request to create a set of instances in Oracle Cloud Infrastructure (OCI). The configuration and installed software are identical for every instance, and you already have a running instance in your OCI tenancy. Which image option allows you to achieve this task with the least amount of effort?
A.
Bring your own image and use it as a template for the new instances.
B.
Select an image from the OCI Marketplace.
C.
Use Oracle-provided images and customize the installation using a third-party tool.
D.
Create a custom image and use it as a template for the new instances.
20. 
Which TWO statements are TRUE about Private IP addresses in Oracle Cloud Infrastructure (OCI)?
A.
Each VNIC can only have one private IP address
B.
By default, the primary VNIC of an instance in a subnet has one primary private IP address.
C.
By default, the primary VNIC of an instance in a subnet has one primary private IP address and one secondary private IP address.
D.
A private IP can have an optional public IP assigned to it if it resides in a public subnet.
21. 
Which tool provides a diagram of the implemented topology of all Virtual Cloud Networks (VCNs) in a selected region and tenancy?
A.
Network Watcher
B.
Traffic Analytics
C.
VCN Flow Logs
D.
Network Visualizer
22. 
You created a virtual cloud network (VCN) with three private subnets. Two of the subnets contain application servers and the third subnet contains a DB System. The application requires a shared file system, therefore you have provisioned one using the file storage service (FSS). However when they test it, they are unable to access FSS. How would you allow access to FSS?
A.
Create an NES export option that allows READ_ONLY access where the source is the CIDR range of the DB System subnet.
B.
Create an instance principal for the DB System. Write an Identity and Access Management (IAM) policy that allows the instance principal read-only access to the file storage service.
C.
Modify the security list associated with the subnet where the mount target resides. Change the ingress rules corresponding to the DB System subnet to be stateless.
D.
Modify the security list associated with the subnet where the mount target resides. Change the ingress rules corresponding to the DB System subnet to be stateful.
23. 
You are responsible for creating and maintaining an enterprise application that consists of multiple storage volumes across multiple compute instances in Oracle Cloud Infrastructure (OCI). The storage volumes include boot volumes and block volumes for your data storage. You need to create a backup for the boot volumes that will be done daily and a backup for the block volumes that will be done every six hours. How can you meet this requirement?
A.
Create clones of all boot volumes and block volumes one at a time.
B.
Group the boot volumes into a volume group and create a custom backup policy. Group the block volumes and create a custom backup policy.
C.
Create on-demand full backups of block volumes, and create custom images from the boot volumes. Use a function to run at a specific time to start the backup process.
D.
Group multiple storage volumes in a volume group and create volume group backups.
24. 
Which database option in Oracle Cloud Infrastructure (OCI) provides Oracle Active Data Guard?
A.
Enterprise Edition
B.
Enterprise Edition High Performance
C.
Enterprise Edition Extreme Performance
D.
Standard Edition
25. 
Which is NOT a valid option for an Oracle Cloud Infrastructure (OCI) compute shape?
A.
Bare Metal
B.
Dedicated Virtual Machine Host
C.
Virtual Machine
D.
Exadata Virtual Machine
26. 
Which TWO statements are TRUE about Public IP addresses in Oracle Cloud Infrastructure (OCI)?
A.
Public IP addresses can be ephemeral or reserved.
B.
You must use OCI provided public IP addresses. You cannot bring your own IP addresses to OCI.
C.
By default, an instance in a public subnet has one primary public IP address.
D.
You can assign a given instance multiple public IPs across one or more VNICs.
27. 
You are responsible for deploying an application on Oracle Cloud Infrastructure (OCI). The application is memory intensive and performs poorly if enough memory is not available. You have created an instance pool of Linux compute instances in OCT to host the application and defined Autoscaling Configuration for the instance pool. What should you do to ensure that the instance pool autoscales to prevent poor application performance?
A.
Install OCI SDK on all compute instances and create a script that triggers the autoscaling event if there is high memory usage.
B.
Configure the autoscaling policy to monitor memory usage and scale up the number of instances when it meets the threshold.
C.
Install the monitoring agent on all compute instances, which triggers the autoscaling group.
D.
Configure the autoscaling policy to monitor CPU usage and scale up the number of instances when it meets the threshold.
28. 
Which TWO predefined service names can you use when connecting to an Oracle Cloud Infrastructure (OCI) Autonomous Data Warehouse?
A.
High for the highest level of resources to process each SQL statement.
B.
TP for a connection service when you do not want to run with parallelism
C.
TPUrgent for a connection service when you do want to run with parallelism.
D.
Medium for a lower level of resources to process each SQL statement.
29. 
Your customer would run month-end jobs on their on-premises databases that would take around 14 hours to complete and sometimes even fail due to overloaded database systems. After a detailed evaluation, they migrated their database to Oracle Autonomous Data Warehouse. They realized they could also move their analytics platform to Oracle Analytics Cloud and have their best of breed technology platforms meet their critical business requirements. How can your customer implement this requirement?
A.
Use consumer group high for data analytics and consumer group low for month-end jobs.
B.
Use consumer group high for month-end jobs and consumer group medium for data analytics.
C.
Use consumer group medium for month-end jobs and consumer group low for data analytics.
D.
Use consumer group high for both month-end jobs and data analyties.
30. 
Your cloud developer is using the Oracle Cloud Infrastructure (OCI) Vault service to encrypt plaintext. She runs the following command using the OCI Command Line Interface (CLI) and encounters a service error. oci kms crypto encrypt --key-id ocid1.key.oc1.iad.bbptfrrSaaeuk.abuwcljt32arg6e6xlswgluvc521nrtk62jq7jenfejfxlhb46nkav3zhsta --plaintext foobar --endpoint https://bbptfrrSaacuk-management.kms.us-ashburn-1.oraclecloud.com What could be the most likely reason for this error?
A.
The developer forgot to specify the region.
B.
The developer should pass the key version OCID instead of the key OCID.
C.
The developer has the wrong endpoint.
D.
The plaintext needs to be in the JSON form.
31. 
Which is NOT a valid statement regarding the Oracle Cloud Infrastructure (OCI) Audit service?
A.
Retention period for Audit logs is 365 days and it cannot be changed
B.
Changes within the objects stored in an Object Storage bucket are collected as Audit logs
C.
Audit service can record REST API calls executed by a custom client.
D.
Audit logs are displayed for Compartments.
32. 
You want to distribute DNS traffic to different endpoints based on the location of the end user. Which Traffic Management Steering Policy would you use?
A.
IP Prefix
B.
Load Balancer
C.
Geolocation
D.
Failover
33. 
You have objects stored in an OCI Object Storage bucket that you want to share with a partner company. You decide to use pre-authenticated requests to grant access to the objects. Which statement is true about pre-authenticated requests?
A.
You cannot edit a pre-authenticated request.
B.
e-authenticated request does not revoke user access to the associated bucket or object.
C.
You need to provide your OCI credentials to the partner company.
D.
Pre-authenticated requests can be used to delete buckets or objects.
34. 
Your DevOps team needs to interconnect the on-premises network to the Oracle Cloud Infrastructure (OCI) resources, such as a managed database that resides in a private subnet. They indicate that they have a low budget and their bandwidth requirements are minimal, so you decide that a site-to-site VPN is the best option. They provide you with their router public IP address. You need to create an object in OCI that represents this router. Which object would you create?
A.
Internet Gateway
B.
Dynamic Routing Gateway (DRG)
C.
Customer Premises Equipment (CPE)
D.
Virtual Network Interface Card (vNIC)
E.
IPSec Tunnel
35. 
You have multiple applications running on a compute instance that generate a large amount of log files. You are required to retain these log files retained for a total of 60 days; at least 15 days on the boot volume, and an additional 45 days in any location. Which is the most cost-effective way to meet the 15-day boot volume retention requirement and the 60-day total retention requirement?
A.
Terminate the instance while preserving the boot volume. Create a new instance from the boot volume and select a DenselO shape to take advantage of the local NVMe storage.
B.
Create an Object Storage bucket and use a script that runs daily to move log files older than 15 days from the boot volume to the bucket. Create a lifecycle rule for the bucket to delete any logs over 60 days old.
C.
Do not delete any logs but resize the boot volume of the instance every time additional space is needed.
D.
Attach a block volume and use a script that moves log files older than 15 days to the new volume and deletes them completely after 60 days.
36. 
A few Object Storage buckets in your Oracle Cloud Infrastructure (OCI) tenancy should remain public, and yet you do not want the Cloud Guard service to detect these as problems. In which TWO ways would you address this requirement?
A.
Fix the base line by configuring Conditional Groups for the detector.
B.
Resolve or remediate those problems and you should not see Cloud Guard triggering on these resources ever again.
C.
Cloud Guard will keep detecting it because a public bucket is a security risk.
D.
Dismiss the problems associated with those resources.
37. 
A financial firm is designing an application architecture for its online trading platform that should have high availability and fault tolerance. Their solutions architects configured the application to use an OCI Object Storage bucket located in the US West (us-phoenix-1) region to store large amounts of financial data. What should the architect do to avoid any costly service disruptions and ensure data durability?
A.
Create a replication policy to send data to a different bucket in another OCI region.
B.
Copy the Object Storage bucket to a block volume.
C.
Create a lifecycle policy to regularly send data from the Standard to Archive storage.
D.
Create a new Object Storage bucket in another region and configure lifecycle policy to move data every 5 days.
38. 
The volume of transactions of your rental business is increasing. You anticipate a rise in workload during the upcoming holiday sales event. You want to ensure that the business isnt impacted during the event due to an overloaded database system. Based on your database administrator's suggestion, you intend to scale up your VirtualMachine DB System during the event period to address the resource demand. Which of the following TWOstatements are true about scaling the Virtual Machine DB System?
A.
You can only scale up a database system, but cannot scale it down.
B.
You can scale up storage in a Virtual Machine DB System without any downtime.
C.
You can only scale up OCPUs, but not storage.
D.
You can perform scaling operations only after the database system is down.
E.
You can change the shape of a Virtual Machine DB System to change the number of OCPU cores.
39. 
You are part of an organization with thousands of users accessing Oracle Cloud Infrastructure (OCI). An unknown user action was executed resulting in configuration errors. You are tasked to quickly identify the details of all users who were active in the last six hours along with any REST API calls that were executed. Which OCI service would you use?
A.
Notifications
B.
Service Connectors
C.
Notifications
D.
Logging
E.
Audit
40. 
You have three compartments: ProjectA, ProjectB, and ProjectC. For each compartment, there is an admin group set up: A-Admins, B-Admins, and C-Admins. Each admin group has full access over their respective compartments as shown in the graphic below. Your organization has set up a tag namespace, EmployeeGroup.Role and all your admin groups are tagged with a value of 'Admin'. Which policy would you write to accomplish this task?
A.
Allow all-group to manage all-resources in compartment Test where request.principal.group.tag.EmployeeGroup.Role='Admin'
B.
Allow dynamic-group to manage all-resources in compartment Test where request.principal.group.tag.EmployeeGroup.Role='Admin'
C.
Allow group any-group to manage all-resources in compartment Test where request.principal.group.tag.EmployeeGroup.Role='Admin'
D.
Allow any-user to manage all-resources in compartment Test where request.principal.group.tag.EmployeeGroup.Role='Admin'
41. 
Which statement is NOT true about the Oracle Cloud Infrastructure (OCI) Object Storage service?
A.
Object Versioning is enabled at the namespace level.
B.
Object Storage resources can be shared across tenancies.
C.
Object lifecycle rules can be used to either archive or delete objects.
D.
Immutable option for data stored in Object Storage can be set via retention rules.
42. 
You want a full-featured Identity-as-a-Service (IDaaS) solution that helps you manage workforce authentication and access to all of your Oracle and non-Oracle applications, whether they are SaaS apps, on-premises enterprise apps, or apps that are hosted in the cloud. Which IAM Identity Domain type should you create?
A.
Free
B.
Oracle Apps Premium
C.
Premium
D.
External User
43. 
Which are the TWO tools you would use for Logical migration?
A.
Data Pump
B.
RMAN
C.
GoldenGate
D.
Data Guard
44. 
A recently hired network administrator has been given the task of removing SSH permissions from all compute instances in the company's tenancy. She finds all Virtual Cloud Networks (VCNs) in the tenancy using Tenancy Explorer. She removes port 22 from the Security Lists in all VCNs. After she completes the task, the very first compute instance that she tests SSH against, allows her to still SSH into it. Why is that?
A.
The VNIC of that compute instance is attached to a Network Security Group (NSG) that has a stateful ingress rule for all protocols on source CIDR 0.0.0.0/0.
B.
The VCN where that compute instance resides still has a route rule that allows port 22.
C.
The VCN where that compute instance resides still has an Internet Gateway.
D.
The VNIC of that compute instance is attached to a Cluster Network that has a stateful ingress rule for all protocols on source CIDR 0.0.0.0/0.
45. 
You have an instance running in Oracle Cloud Infrastructure (OCI) that cannot be live-migrated during an infrastructure maintenance event. OCI schedules a maintenance due date within 14 to 16 days and sends you a notification. What would happen if you choose not to proactively reboot the instance before the scheduled maintenance due date?
A.
The instance will get terminated.
B.
The instance is either reboot-migrated or rebuilt in place for you.
C.
You will receive another notification to reboot within the next 14 days.
D.
ou will receive another notification to reboot within the next 7 days.