We use cookies to personalize your experience. If you continue browsing you will be accepting its use. More information.
option

T2

INFO STADISTICS RECORDS
TAKE THE TEST
Title of test:
T2

Description:
Second Test

Author:
Second Test
(Other tests from this author)

Creation Date:
24/01/2020

Category:
Others
Share the Test:
Facebook
Twitter
Whatsapp
TAKE THE TEST
Last comments
No comments about this test.
Content:
You are asked to deploy a new application that has been designed to scale horizontally. The business stakeholders have asked that the application be deployed In us-phoenlx-1. Normal usage requires 2 OCPUs. You expect to have few spikes during the week, that will require up to 4 OCPUs, and a major usage uptick at the end of each month that will require 8 OCPUs. What is the most cost-effective approach to implement a highly available and scalable solution? A. Create an instance pool with a VM.Standard2.2 shape instance configuration. Setup the autoscaling configuration to use 2 availability domains and have a minimum of 2 instances, to handle the weekly spikes, and a maximum of 4 Instances. B. Create an instance with 1 OCPU shape. Use a CLI script to clone It when more resources are needed. C. Create an instance pool with a VM.Standard2.1 shape instance configuration. Setup the autoscaling configuration to use 2 availability domains and have a minimum of 2 instances and a maximum of 8 instances. D. Create an instance with 1 OCPU shape. Use the Resize Instance action to scale up to a larger shape when more resources are needed.
As the operations administrator for your company's Oracle Cloud Infrastructure (OCI), you have been entrusted the task of ensuring that data being accessed by the application is encrypted. Your application portfolio Includes both Virtual Machine (VM) and Bare Metal (BM) database systems. Which method should you use to achieve encryption of data in-transit? A. Configure backup encryption for RMAN backup sets before transferring data B. Native Oracle Net Services encryption and integrity capabilities C. Key Store/Wallet service for on the fly encryption of data in transit D. Data is encrypted at rest using TDE and no additional encryption is needed.
You have deployed a three-tier web application inside an Oracle Cloud Infrastructure (OCI) VCN with a CIDR block of 10.0.0.0/28. You Initially deploy three web servers (VM.Standard2.2), two application servers (VM.Standard2.4), and two servers (VM.Standard2.8) running Oracle database. The web, application and database servers are deployed across two availability domains in the usashburn-1 region. You also deployed a Public Load Balancer In front of the two web servers. The web traffic gradually Increases In the first few days following the deployment, so you attempt to double the number of instances in each tier of the application to handle the new load. Unfortunately, some of these new Instances fail to launch. Your tenancy comes with the following set of predefined services limits for the availability domain and compartment where the application is deployed. What is a possible reason for this deployment to fail? A. You do not have enough private IP addresses left to launch all of the new compute instances. B. You do not have sufficient public IP addresses required by the web, application and database servers. C. You do not have sufficient quotas for number of VM.Standard2.2, VM.Standard2.4 and VM.Standard2.8 shapes in the Production compartment in the us-ashburn-1 region. D. You do not have sufficient quotas for number of VM.Standard2.2, VM.Standard2.4 and VM.Standard2.8 shapes in each availability domain in the us-ashburn-1 region.
A subscriber of on Oracle Cloud Infrastructure (OCI) Notifications service topic complained about not receiving messages from the service. Which of the following options can help you debug this issue? A. If OCI Notifications service does not receive an acknowledgement from a subscription endpoint, the service tries to redeliver messages for up to two hours. Configure an alarm on the Number of Notification Failed metric through the OCI Monitoring service to help debug the issue. B. If OCI Notifications service does not receive an acknowledgement from a subscription endpoint, the service drops the message. Confirm that the subscriber is always online to receive messages to help debug the issue. C. If OCI Notifications service does not receive an acknowledgement from a subscription endpoint, the service tries to redeliver messages for up to one day. Make sure that the subscriber is online at least once a day to help debug the Issue. D. If OCI Notifications service does not receive an acknowledgement from a subscription endpoint, check the Number of Notification Failed metric through the OCI Monitoring service for failed messages. Copy these messages to an OCI Object Storage bucket. Make sure the subscriber has the required credentials to access this bucket to help debug the Issue.
The boot volume on your Oracle Linux instance has run out of space. Your application has crashed due to a lack of swap space, forcing you to Increase the size of the boot volume. Which step should NOT be Included In the process used to solve the Issue? A. Resize the boot volume by specifying a larger value than the boot volume's current size. B. Create a RAID0 configuration to extend the boot volume file system onto another block volume. C. Attach the resized boot volume to a second instance as a data volume; Extend the partition and grow the file system on the resized boot volume. D. Reattach the boot volume and restart the instance. E. Stop the instance and detach the boot volume.
Several development teams in your company have each been provided with a budget and a dedicated compartment to be used for testing purpose u are asked to help them to control the costs and avoid any overspending. What should you do? A. Configure a Quota for each compartment to prevent provisioning of any bare metal instances. B. Contact Oracle support and ask them to associate the monthly budget with the Service Limits In every region for which your tenancy is subscribed. The tenancy administrator will receive an alert email from Oracle when the limit Is reached. C. Associate a Budget Tag to each resource with monthly budget amount and use that Information to prepare a weekly report to send to each team. D. Associate a Budget Tag to each compartment with the monthly budget amount and set an alert rule to notify the developers' teams when they reached a specific percentage of the budget.
You are using the Oracle Cloud Infrastructure Command Line Interface to launch a Linux virtual machine. You enter the following command (with correct values for all parameters): The command fails. Which is NOT a valid parameter in this command? A. --image-id <image_id> B. --subnet-id <subnet_id> C. --shape "<shape_name>" D. -c <compartment_id> E. -t <tenancy_id>.
You have set an alarm to be generated when the CPU usage of a specified instance is greater than 10%. In the alarm behavior view below you not that the critical condition happened around 23:30. You were expecting a notification after 1 minute, however, the alarm firing state did not begin until 23:23. What should you change to fix It? A. Change the alarm's trigger delay minutes value to 1. B. Change the notification topic that you previously associated with the alarm. C. Change the alarm's metric interval to 1. D. Change the alarm condition to be greater than 3%.
You are system administrator at a retail company. You Just received a ticket stating that the account team is unable to access an internal application. The application is running behind an Oracle Cloud Infrastructure (OCI) Public Load Balancer and is using a compute instance pool with autoscaling enabled. You noticed some deleted items In the Audit Log while troubleshooting. Which resource deletion could have caused this Issue? A. The Route Table rules associated with the subnet within the Virtual Cloud Network (VCN) B. An Object Storage bucket containing transaction log backups C. NAT Gateway and the Route Table associated with the Virtual Cloud Network (VCN) D. Internet Gateway and the Route Table associated with the Virtual Cloud Network (VCN).
You are a Cloud Operations administrator who has recently joined a new department. You have created 10 Terraform stacks using Oracle Cloud Infrastructure (OCI) resource manager. Each stack creates a different set of resources In OCI for your development team. What determines the cost of these Terraform stacks? A. The cost for each stack will be higher for pay as you go (PAYG) than for monthly flex billing. B. The length of time It takes to build each resource using these Terraform stacks. C. Resource manager stacks are free but you are charged for the resources they create. D. The number of lines of text in your Terraform configuration files.
To take advantage of cloud agility and burst computing capability, ABC Automobiles have extended their data center to a Virtual Cloud Network (VCN). In Oracle Cloud Infrastructure's (OCI) us-phoenlx-1 region. They have several members in their Cloud Operations (CloudOps) team that need I access the OCI management console. The security administrator does not want to create new IAM users and credentials that would then need to be distributed to each CloudOps member. Which option will help solution architect meet the needs for CloudOps? A. Use Web Identity Federation to retrieve an AuthToken to enable CloudOps members to sign in to the OCI Console. B. Use on-premises SAML2.0 compliant identity provider(IdP) to retrieve an AuthToken to enable CloudOps members to sign in to the OCI Console. C. Use an existing SAMAL 2.0 compliant identity provider(IdP) to grant CloudOps members federated access to OCI Console via the OCI single sign-on (SSO) endpoint. D. Use OAuth 2.0 to retrieve temporary credentials to enable your CloudOps members to sign in to the OCI Console.
Multiple teams are sharing a tenancy in Oracle Cloud Infrastructure (OCI). You are asked to figure out an appropriate method to manage OC1 costs. NOT a valid technique to accurately attribute costs to resources used by each team? A. Create separate compartment for each team. Use the OCI cost analysis tools to filter costs by compartments. B. Create a Cost-Tracking tag. Apply this tag to all resources with team Information. Use the OCI cost analysis tools to filter costs by tags. C. Create an Identity and Access Management (IAM) group for each team. Create an OCI budget for each group to track spending. D. Define and use tags for resources used by each team. Analyze usage data from the OCI Usage Report which has detailed Information about resources and tags.
An organization wants to extend their existing on-premises data centers to the Oracle Cloud Infrastructure (OCI) us-phoenix-1 region. In order to achieve It, they have created an IPSec VPN connection between their Customer-Premises Equipment (CPE) and Dynamic Routing Gateway(DRG) on How can you make this connection highly available (HA)? A. Add another Dynamic Routing gateway In a different Availability Domain and create another IPSec VPN connection. B. Add another Customer-Premises Equipment (CPE) and create second IPSec VPN connection with the same Dynamic Routing Gateway (DRG). C. Create a NAT Gateway and route all traffic through a NAT Gateway, which is highly available component. D. Add another Dynamic Routing Gateway in a different Availability Domain, and create another IPSec VPN connection with another Customer Premises Equipment (CPE).
You need to set up daily Incremental backups of your database In Oracle Cloud Infrastructure (OCI) Database Service. The backups need to be retained for at least 50 days. Which of the following method allows you do accomplish this Is an efficient and cost-effective manner? A. Enable automatic backups and choose the preset retention period of 60 days. B. Enable automatic backups and set the retention period to 50 days. C. Set up a cron job with OCI Database Service CreateBackup API call to take periodic full-backups to OCI Object Store. Delete backups older than 50 days. D. Use Recovery Manager (RMAN) to take backups to an OCI Object Store bucket. Delete backups older than 50 days.
You have the following compartment structure within your company's Oracle Cloud Infrastructure (OCI) tenancy: You want to create a policy in the root compartment to allow SystemAdmins to manage VCNs only In CompartmentC. Which policy is correct? A. Allow group SystemAdmins to manage virtual-network-family in compartment CompartmentC B. Allow group SystemAdmins to manage virtual-network-family in compartment CompartmentB:CompartmentC C. Allow group SystemAdmins to manage virtual-network-family in compartment CompartmentA:CompartmentB:CompartmentC D. Allow group SystemAdmins to manage virtual-network-family in compartment Root.
You have received an email from your manager to provision new resources on Oracle Cloud Infrastructure (OCI). When researching OCI y detect that you should use OCI Resource Manager. Since this is a task that will be done multiple times for development, test, and production need to create a command that can be re-used. Which CLI command can be used In this situation? A. oci resource-manager stack update --compartment-id <compartment_OCID> --config-source prod.zip --variables file://variables.json --display-name "Production Stack build" --description "Creating new Production environment" B. oci resource-manager stack create --compartment-id <compartment_OCID> --config-source prod.zip --variables file://variables.json --display-name "Production Stack build" --description "Creating new Production environment" C. oci resource-manager stack create --tenancy-id <tenancy_OCID> --config-source prod.zip --variables file://variables.json --display-name "Production Stack build" --description "Creating new Production environment" D. oci resource-manager stack update --tenancy-id <tenancy_OCID> --config-source prod.zip --variables file://variables.json --display-name "Production Stack build" --description "Creating new Production environment" A. Option A B. Option B C. Option C D. Option D.
You have created several block volumes in the us-phoenix-1 region in a specific compartment. The compartment can be identified by the Oracle Cloud Infrastructure (OCI) unique identifier or ocid1.compartment.oc1.phx..exampleuniquelD Your manager has asked you to leverage the OCI monitoring service and write a metric query showing all read IOPS at a one-minute interval, filtered to this compartment and aggregated for the maximum. Which metric query will you create? A. lcpsRead[1m] {compartmentld=',ocid1.compartrrent.ocl.phx..exampleuniquelD").grouping().Max() B. lopsRead[1m] {compartmentld= "ocid1.com part rrent.ocl.phx..exarrpleuniquelD"}.maxO C. lopsRead[1m] {compartmentld = 'ocid1.compartrrent.ocl.phx..exampleuniqüelD"}.grouping().meanO D. lopsWrite[1m] {compartmentld=',ocid1.compartrrent.ocl.phx..exarrplejniquelD").meanO.
You have recently been asked to take over management of your company's infrastructure provisioning efforts, utilizing Terraform v0.12 to provision and manage infrastructure resources in Oracle Cloud Infrastructure (OCI). For the past few days the development environments have been failing to Provision. Terraform returns the following error: A. Modify line 15 to Deo the following: tcp_options = {min = "22", max = "22) B. Replace the curly braces '{}' in lines 11 and 16 with square braces '[ ]' C. Modify line 15 to Do the following: tcp_options {min = "22" max = "22") D. Place a command at the end of line 16.
An Insurance company has contracted you to help automate their application business continuity plan. They have the application running in eu-frankfurt-1 as the primary site and uk-london-1 as a disaster recovery site. Normally they have a DNS A record associated with the IP address of the primary endpoint In eu-frankfurt-1. In the event of a disaster, they use OCI DNS Zone Management to update the A record and replace it with the IP address of the endpoint In uk-london-1. How can you automate the failover process? A. Create a Traffic Management Steering policy with Load Balancer type and add both eu-frankfurt-1 and uk-london-1 endpoints. Attach the Traffic Management Steering policy to the A record. B. Create a Traffic Management Steering policy and attach it to a backend set with the backend servers from both eu-frankfurt-1 and uk-london-1 regions. C. Provision a Load Balancer in Frankfurt and associate it with the A record in DNS. Create a backend set with backend servers from both eu-frankfurt-1 and uk- london-1 regions. D. Create a Health Check that evaluates both regional endpoints. Create a Traffic Management Steering policy with Failover type and associate it with the Health Check.
You are configuring on alarm In Oracle Cloud Infrastructure (OCI) for a compute instance named vision. The metric needs to be triggered when the ingress network rate is greater than 1MB. Which statement will accomplish this? A. NetworksBytesIn[1MB]{resourceDisplayName - "vision"}.rate() > 1 B. NetworksBytesIn[1m]{resourceDisplayName - "vision"}.rate() > 1024 C. {resourceDisplayName = "vision"}(NetworksBytesIn[lm]).rate() > 1024 D. {resourceDisplayName = Hvision"}(NetworksBytesIn[1MB]).rate() > 1.
You have recently Joined a startup company and quickly find that nobody is tracking the amount of money spent on Oracle Cloud Infrastructure (OCI). Seeing an opportunity to help save money you begin creating a solution to better track the cost of resources provisioned by each individual on the team. Which option allows you to identify excessive spend across all resources in your tenancy? A. Use the Python SDK to write a custom application that will monitor the Audit Log. Look for CREATE events and configure the application to send you an email each time a new resource is created. B. Create a budget for each compartment that will send a notification when monthly spend reaches a pre-defined amount. C. Create a tag namespace named BILLING with a Tag Key named CostCenter. Tag each of your resources with this Tag Key and the correct value. D. Use the Events Service and create rules that will act when a new Object Storage bucket or Compute Instance has been created. Have the rule email you each time one of these events occurs.
You saw created a group for several auditors. You assign the following policies to the group:What actions are the auditors allowed to perform within your tenancy? A. Auditors are able to view all resources in the compartment. B. Auditors are able to create new instances in the tenancy. C. The Auditors can view resources in the tenancy. D. The Auditors are able to delete resources in the tenancy.
You have received an email from your manager to provision new resources on Oracle Cloud Infrastructure (OCI). When researching OCI y detect that you should use OCI Resource Manager. Since this is a task that will be done multiple times for development, test, and production need to create a command that can be re-used. Which CLI command can be used In this situation? A. (oci resource-manager stack update --compartment-id <compartment_OCID> \ -- config-source prod.zip --variables file://variables/json \ --display-names "Production stack build" \ --description Creating new Production environment) B. (oci resource-manager stack create --compartment-id <compartment_OCID> \ -- config-source prod.zip --variables file://variables/json \ --display-names "Production stack build" \ --description Creating new Production environment) C. (oci resource-manager stack create --tenancy-id <tenancy_OCID> \ -- config-source prod.zip --variables file://variables/json \ --display-names "Production stack build" \ --description Creating new Production environment) D. (oci resource-manager stack update --tenancy-id <tenancy_OCID> \ -- config-source prod.zip --variables file://variables/json \ --display-names "Production stack build" \ --description Creating new Production environment).
You have shared your Oracle Cloud Infrastructure (OCI) tenancy with a group of developers in your organization by creating a compartment called a-developer. You are an administrator in the tenancy with privileges to modify IAM policies. Developers need privileges to configure Federation to Wt Single Sign-On (SSO). would you give them permissions to complete their task In the most secure manner? A. Create a new policy with the following statements: Allow any-user to manage identity-providers in tenancy a-developer Allow any-user to manage groups in tenancy B. Create a group called Developers. Set up the following IAM policy: Allow group Developers to manage identity-providers in compartment a-developer Allow group Developers to manage groups in compartment C. Create a group called IdPAdmins. Assign the following IAM policy statement: Allow group IdPAdmins to manage identity-providers in compartment Allow group IdPAdmins to manage groups in compartment D. Create a group called IdPAdmins. Assign the following IAM policy statement: Allow group IdPAdmins to manage identity-providers in tenancy Allow group IdPAdmins to manage groups in tenancy.
You set up a bastion host in your VCN to only allow your IP address (140.19.2.140) to establish SSH connections to your Compute instances that are deployed private subnet. The Compute instances have an attached Network Security Group with a Source Type: Network security Group (NSG) , Source NSG-050504. To secure the bastion host, you added the following ingress rules to its Network Security Group: However, after checking the bastion host logs, you discovered that there are IP addresses other than your own that can access your bastion host. What is the root cause of this issue A. A netmask of /32 allows all IP address in the 140.19.2.0 network, other than your IP 110.19.2.140 B. The port 22 provides unrestricted access to 140.19.2.140 and to other IP address C. Al compute instances associated with NSG-050504 are also able to connect to the bastion host. D. The Security List allows access to all IP address which overrides the Network Security Group ingress rules.
You are using Oracle Cloud Infrastructure (0CI) services across several regions: us-phoenlx-1, us-ashburn-1, uk-london-1 and ap-tokyo-1. You have created a separate administrator group for each region: PHX-Admins, ASH-Admins, LHR-Admins and NRT-Admins, respectively. you want to restrict admin access to a specific region. E.g., PHX-Admins should be able to manage all resources In the us-phoenlx-1 region only and don't any other OCI regions. What IAM policy syntax is required to restrict PHX-Admins to manage OCI resources in the us-phoenix-1 region only? A. Allow group PHX-Admins to manage all-resources in tenancy B. Allow group PHX-Admins to use all-resources in tenancy where request.region != 'ash1' C. Allow group PHX-Admins to manage all-resources in tenancy where request.region='phx' D. Allow group PHX-Admins to manage all-resources in tenancy where target.group.name = 'ASH-Admins'.
You have created an Autonomous Data Warehouse (ADW) service in your company's Oracle Cloud Infrastructure (OCI) tenancy and you now have to load historical data Into It. You have already extracted this historical data from multiple data marts and data warehouses. This data is stored in CSV text files and these file are ranging in size from 25 MB to 20 GB. Which step Is most efficient and error tolerant method for loading data Into ADW? A. Create the tables in the ADV database 2rd then execute SQL'Loader for each SCV file to load the contents into the corresponding ADV database table B. Create Auth token, use It to create an object storage credential by executing DBMS_CLOUD.CREATE_CREDENTIAL using the web console upload the CSV files to an OCI object storage bucket, create the tables in the ADW database and then execute DBMS_CLOUD.COPY_DATA for each CSV file to copy the contents into the corresponding ADW database table C. Create Auth token, use it to create an object storage credential by executing DBMS_CLOUD.CREATE_CREDENTIAL using OCI CLI upload the CSV files to an OCI object storage bucket, create the tables In the ADW database and then execute Data Pump Import for each CSV file to copy the contents into the corresponding ADW database table. D. Create Auth token, use it to create an object storage credential by executing D3MS_CLOUD.CREATE_CREDENTlAL using OCI CLI upload the CSV files to an OCI object storage bucket, create the tables in the ADW database and then execute DBMS_CLOUD.COPY_DATA for each CSV file to copy the contents into the corresponding ADW database table.
Testing Policy describes when and how you may conduct certain types of security testing of Oracle Cloud Services, including vulnerability and penetration tests, as well as tests Involving data scraping tools. What does Oracle allow as part of this testing? A. Customers can simulate DoS attack scenarios as long as Its restricted to the customer's own environment. B. Customers can validate that their network resources are isolated from other customer resources. C. Customers are allowed to use their own testing and monitoring tools. D. Customers are allowed to test Oracle Cloud Infrastructure (OCI) hardware related to resources in their tenancy.
Which two statements about the Oracle Cloud Infrastructure (OCI) Command Line Interface (CLI) are true? A. The CLI provides an automatic way to connect with Instances provisioned on OCI. B. The CLI allows you to use the Python language to Interact with OCI APIs. C. The CLI provides the same core functionality as the Console, plus additional commands. D. You can filter CLI output using the JMESPath query option for JSON. E. You can run CLI commands from Inside OCI Regions only.
Which two statements are true about the Bulk Export of Oracle Cloud Infrastructure Audit Log Events? A. Exported log files list a single audit event per lire using csv format. B. Exported logs are available in the object storage buckets in your tenancy. C. You can specify only one region in your bulk export request. D. It will be available immediately after the Bulk Export request. E. Exported logs remain available indefinitely.
You launched a Linux compute Instance to host the new version of your company website via Apache Httpd server on HTTPS (port 443) The Instance is created in a public subnet along with other Instances. The default security list associated to the subnet Is: You want to allow access to the company website from public Internet without exposing websites eventually hosted on the other instances in the public subnet. Which two actions should you do? A. Create a new security list with a stateful rule to allow ingress access on port 443 and associate it to the public subnet. B. Access the Linux instance via SSH and configure Iptables to allow HTTPS access on port 443. C. Create a network security group, add a stateful rule to allow ingress access on port 443 and associate It to the public subnet that host the company website. D. In default security list, add a stateful rule to allow ingress access on port 443. E. Create a network security group, add a stateful rule to allow ingress access on port 443 and associate it to the instance that host the company website.
You are tasked with creating a group called volumeBackcupAdmins to manage only block volume backups. Which of the following set of policy/policies would you need to write to meet this requirement? A. Allow group VolumeBackupAdmins to use volumes in tenancy Allow group VolumeBackupAdmins to manage volume-backups in tenancy B. Allow group VolumeBackupAdmins to use volumes in tenancy Allow group VolumeBackupAdmins to manage volume-backups in tenancy Allow group VolumeBackupAdmins to use volume-attachments in tenancy Allow group VolumeBackupAdmins to use instances in tenancy C. Allow group VolumeBackupAdmins to manage volume-backups in tenancy D. Allow group VolumeBackupAdmins to use volumes in tenancy Allow group VolumeBackupAdmins to manage volume-backups in tenancy Allow group VolumeBackupAdmins to use volume-attachments in tenancy.
You provisioned an Oracle Linux compute Instance through the Oracle Cloud Infrastructure (OCI) management console then immediately realize you add an SSH key file. You notice that OCI compute service provides instance console connections that supports adding SSH keys for a running Instance. Hence, you created the console connection for your Linux server and activated it using the connection string provided. However, now you get' prompted for a username and password to login. What option should you recommend to add the SSH key to your running Instance, while minimizing the administrative overhead? A. You need to reboot the instance from the console, boot into the bash shell In maintenance mode, and add SSH keys for the opc user, B. You need to configure the boot loader to use ttySO as a console terminal on the VM. C. You need to modify the serial console connection string to include the identity file flag, -I to specify the SSH key to use. D. You need to terminate the running instance and recreate it by providing the SSH key file.
You are asked to Implement the disaster recovery (DR) and business continuity requirements for Oracle Cloud Infrastructure (OCI) Block Volumes. Two OCI regions being used: a primary/source region and a DR/destination region. The requirements are: • There should be a copy of data in the destination region to use If a region-wide disaster occurs in the source region • Minimize costs Which of the following design will help you meet these requirements? A. Clone block volumes. Copy block volume clones from source region to destination region at regular intervals. B. Back up block volumes. Use Object Storage lifecycle management to automatically move backup objects to Archive Storage. Copy Archive Storage buckets from source region to destination at regular Intervals. C. Back up block volumes. Copy block volume backups from source region to destination region at regular intervals. D. Clone block volumes. Use Object Storage lifecycle management to automatically move clone object Archive Storage. Copy Archive Storage buckets from source region to destination at regular intervals. .
Which two statements accurately describe Ansible Modules for Oracle Cloud Infrastructure (OCI)? A. OCI Ansible Modules are units of organization that allows you to abstract configuration, orchestration, and provisioning tasks into roles that you can save and share among playbooks and other users. B. OCI Ansible Modules represent discrete provisioning tasks or operations that you can not invoke individually from the command line, or else run individually or In sequence from a playbook. C. OCI Ansible Modules represent discrete provisioning tasks or operations that you can invoke individually from the command line, or else run Individually or in sequence from a playbook. D. OCI Ansible Modules is not able to provide you state control of resources. E. OCI Ansible Modules enable orchestrating, provisioning, and configuration management tasks on Oracle Cloud Infrastructure.
One of the compute Instances that you have deployed Is malfunctioning. You have created a console connection to remotely troubleshoot. Which two statements about console connections are true? A. If you do not disconnect from the session, your serial console connection will automatically be terminated after 24 hours. B. For security purpose, the console connection will not let you edit system configuration files. C. VNC console connection uses SSH port forwarding to create a secure connection from your local system to the VNC server attached to your instance's console. D. It is not possible to connect to the serial console to an Instance running Microsoft Windows, however VNC console connection can be used. E. It is not possible to use VNC console connections to connect to 3are Metal Instances.
You are using Oracle Cloud Infrastructure (OCI) console to set up an alarm on a budget to track your OCI spending. Which two are valid targets for creating a budget In OCI? A. Select Compartment as the type of target for your budget. B. Select group as the type of target for your budget. C. Select Tenancy as the type of target for your budget. D. Select Cost-Tracking Tags as the type of target for your budget. E. Select user as the type of target for your budget.
. You have a Linux compute Instance located in a public subnet in a VCN which hosts a web application. The security list attached to subnet containing the compute Instance has the following stateful Ingress rule. Which step will resolve the issue? A. In the security list, remove the ssh rule. B. In the route table, add a rule for your default traffic to be routed to service gateway. C. In the security list, add an ingress rule for port 80 (http). D. In the route table, add a rule for your default traffic to be routed to NAT gateway.
One of your development teams has asked for your help to standardize the creation of several compute instances that must be provisioned each day of the week. You initially write several Command Line Interface (CLI) commands with all appropriate configuration parameters to achieve this task later determining this method lacks flexibility. Which command generates a JSON-based template that Oracle Cloud Infrastructure (OCI) CLI can use to provision these Instances on a regular basis? A. OCl compute instance create — generate-cll-skeleton B. OCI compute instance launch —generate-cll-skeleton C. OCl compute provision-instance — generate-full-command-Json-Input D. OCI compute instance launch —generate-full-command-json-input.
What is a key benefit of using Oracle Cloud Infrastructure's Resource Manager for your Terraform provisioning and management activities? A. Resource Manager has administrative privileges by design. Even if your IAM user does not have access, you can leverage Resource Manage provision new resources to any compartment in the Tenancy. B. You can use Resource Manager to identify and maintain an Inventory of all Compute and Database Instances across your tenancy. C. You can use Resource Manager to apply patches to all existing Oracle Linux Instances In a specified compartment. D. Resource Manager manages the Terraform state file for your infrastructure and locks the file so that only one Job at a time can run on a given stack.
You have been asked to provision a new production environment on Oracle Cloud Infrastructure (OCI). After working with the solution architect you docket that you are going to automate this process. Which OCI service can help automate the provisioning of this new environment? A. OCI Resource Manager B. Oracle Container Engine for Kubernetes C. Oracle Functions D. OCI Streaming Service.
You have set up threshold alarm for CPU Utilization metric for a value greater than 80 percent. You get a notification email about this alarm. Which of the following action will help you respond to this notification? A. Modify the alarm to route notifications to Oracle Cloud Infrastructure Streaming Service (OSS) for later Investigation. B. Charge at-risk threshold for the cpu utilization metric to a lower number. C. Modify the alarm to route notifications to an Oracle Cloud Infrastructure Object Storage bucket for later investigation. D. Suppress the alarm notifications temporarily.
You have been asked to update the lifecycle policy for object storage using the Oracle Cloud Infrastructure (OCI) Command Line Interface (f command can successfully update the policy? A. oci os object-lifecycle-pollcy put -ns <object_storage_namespace> -bn <bucket_name> -Items <json_formatted_llfecycle_policy> B. oci os object-lifecycle-pollcy put -ns <object_storage_namespace> -bn <bucket name> C. cci os object-lifecycle-policy get -ns <object_storage_namespace> -bn <bucket name> D. cci os object-lifecycle-policy get -ns <object_storage_namespace> -bn <bucket name>.
Your application is using Object Storage bucket named app-data In the namespace vision, to store both persistent and temporary data. Every week all the temporary data should be deleted to limit the storage consumption. Currently you need to navigate to the Object Storage page using the web console, select the appropriate bucket to view all the objects and delete the temporary ones. To simplify the task you have configured the application to save all the temporary data with /temp prefix. You have also decided to use the Command Line Interface (CLI) to perform this operation. What is the command you should use to speed up the data cleanup? A. oci os objectstorage bulk-delete -ns vision -bn app-data --prefix /temp --force B. oci os object delete -ns vision -bn app-data --prefix /temp C. oci os object delete app-data in version where prefix = /temp D. oci os object bulk-delete -ns vision -bn app-data --prefix /temp --force.
You have a group of developers who launch multiple VM.Standard2.2 compute Instances every day into the compartment Dcv. As a result your OCI tenancy quickly hit the service limit for this shape. Other groups can no longer create new instances using VM.Standard2.2 shape. of this, your company has Issued a new mandate that the Dev compartment must include a quota to allow for use of only 20 VM.Standar shapes per Availability Domain. Your solution should not affect any other compartment In the tenancy. Which quota statement should be used to implement this new requirement? A. zero compute quotas in tenancy. set compute quota vm-standard2-2-count to 20 in tenancy dev B. zero compute quotas in tenancy. set compute quota vm-standard2-2-count to 20 in compartment dev C. set compute quota vm-standard2-2-count to 20 in compartment dev D. set compute quota vm-standard2-2-count to 20 in compartment dev where request.region = us-phoenix-1.
Your company has restructured its HR departments. As part of this change, you also need to re-organize compartments within Oracle Cloud Infrastructure (OCI) to align them to the company's new organizational structure. The following change is required: Comportment Team_x needs to be moved under a new parent compartment, Project_B The tenancy has the following policies defined for compartments Project_A and Project_B: Policy1 Allow group G1 to manage instance-family in compartment HR:Project_A Policy2 Allow group G2 to manage instance-family in compartment HR:Project_B Which two statements describe the impacts after the compartment Team_x is moved? A. Group G2 can now manage instance-families in compartment Project_B compartment Project_A and compartment Team_x B. Group G1 can now manage instance-families in compartment Project_A but not in compartment Team_x C. Group G1 can now manage instance-families in compartment project_A,compartment project_B and compartment Team_x D. Group G2 can now manage instance-families in compartment Project_B and compartment Team_x E. Group G2 can now manage instance-families in compartment Project_A but not in compartment Team_x.
Which technique does NOT help you get the optimal performance out of the Oracle Cloud Infrastructure (OCI) File Storage service? A. Increase concurrency by using multiple threads, multiple clients, and multiple mount targets. B. Serialize operations to the file system to access consecutive blocks as much as possible. C. Right size compute instances from where file system Is accessed based on their network capacity. D. Limit access to the same Availability Domain (AD.as the File Storage service where possible.
Your company will undergo a security audit in one week. Your manager has asked you to download and review recent logs from an Object Storage bucket. The current log archive file is approximately 19 GB In size. Which command would you run to download the archive file as quickly as possible? A. oci os object get -ns my-namespace -bn my-bucket --name my-large-object --multipart-download-threshold 2000 --part-size 120 B. oci os object get -ns my-namespace -bn my-bucket --name my-large-object --multipart-download-threshold 2000 --part-size 128 C. oci os object put -ns my-namespace -bn my-bucket --name my-large-object --multipart-download-threshold 20000 --part-size 128 D. oci os object get -ns my-namespace -bn my-bucket --name my-large-object --multipart-download-threshold 20000 --part-size 128.
Your company recently adopted a hybrid cloud architecture which requires them to migrate some of their on-premises web applications to Oracle Cloud Infrastructure OCI). You created a Terraform template which automatically provisions OCI resources such as compute instances, load balancer, and a database instance. After running the stack using the terraform apply command, it successfully launched the compute Instances and the load balancer, but it failed to create a new database Instance with the following error: Service error:NotAuthorizedOrNotFound. shape VM.Standard2.4 not found, http status code: 404 You discovered that the resource quotas assigned to your compartment prevent you from using VM.Standard2.4 instance shapes available in your tenancy. You edit the Terraform script and replace the shape with VM.Standard2.2. Which option would you recommend to re-run the terraform command to have required OCI resources provisioned with the least effort? A. terraform apply -auto-approve B. terraform plan -target=oci_database_db_system.db_systerr C. terraform apply -target=od_database_db_system.db_system D. terraform refresh -target=oci_database_db_system.db_system.
You have been contracted by a local e-commerce company to assist with enhancing their online shopping application. The application is currently deployed In a single Oracle Cloud Infrastructure (OCI) region. The application utilizes a public load balancer, application servers in a private subnet and a database in a separate, private subnet. The company would like to deploy another set of similar Infrastructure In a different OCI region that will act as standby site. In the event of a failure at the primary site, all customers should be routed to the failover site automatically. After deploying the additional infrastructure within the second region, how should you configure automated failover requirements? A. Deploy a new load balancer in the primary region. Create one backend set for the primary application servers and a second backend set for the standby application servers. Create a listener for the primary backend set with a timeo jt of 3 minutes. Create a listener for the secondary backend set with a timeout of 10 minutes. B. Create a new A record in DNS that points to the public load balancer at the secondary site. Create a CNAME for the sub-domain failover that will resolve to the new A record. Inform customers to prepend the website URL with failover If the primary site Is unavailable. C. Create a failover policy in the Traffic Management service. Set the IP address of the public load balancer for the primary site in answer pool 1 Set the IP address of the public load balancer for the secondary site in answer pool 2. Define a health check to monitor both sites. D. Create a load balancer policy in the Traffic Management service. Configure one answer for each site. Set the answer for the primary site with a weight of 10 and the answer for the secondary site with a weight of 100.
You have been tasked with allocating an identity to one of your compute instances that needs to retrieve and process static files that are stored in an Object Storage bucket. After creating a dynamic group with a matching rule that specifies the OCID of the compute instance, you discover the that API calls are failing. Which step should you take to resolve this issue? A. Create lAM policies to permit instances in these groups to make API calls against Oracle Cloud Infrastructure services. B. Initial credentials must be initialized using OCI console for the Instance in dynamic group. This can be a bulk operation. C. Once instance are in dynamic group no additional steps are required. D. Create lAM policies to permit users In these groups to make API calls against Oracle Cloud Infrastructure services.
You have created a geolocation steering policy in the Traffic Management service, with this configuration. What happens to requests that originate in Africa? A. The traffic will be forwarded randomly to any of the pools mentioned in the rules. B. The traffic will be dropped C. The traffic will be forwarded to Pool 1. If Pool 1 is not available, then will be forwarded to Pool 2. D. The traffic will be forwarded at the same time to both Pool 1 and Pool 2.
Team Implemented a SaaS application that requires a whole system deployment for each new customer. The Infrastructure provisioning is already automated via Terraform, and now you have been asked to develop an Ansible playbook to centralize configuration file management and deployment. What Is the most effective way to ensure your playbooks are utilizing up-to-date and accurate Inventory? A. Export an inventory list using Terraform apply command. B. Export an inventory list from the Oracle Cloud Infrastructure Web console. C. Download the dynamic inventory script provided by Oracle Cloud Infrastructure and include it in the playbook Invocation command. D. Implement a Command Line Interface script to list all the resources and run it within Ansible to generate a dynamic inventory list.
You have been brought In to help secure an existing application that leverages Object Storage buckets to distribute content. The data is currently being shared from public buckets and the security team Is not satisfied with this approach. They have stated that all data must be stored In storage buckets. Your application should be able to provide secure access to the data. The URL that is provided for access to the data must be rotated every 30 days. Which design option will meet these requirements? A. Create a private bucket only to share the data. B. Create multiple bucket and classify them as Public and Private. Use public bucket for non-sensitive data and private bucket for sensitive data. C. Use Pre-Authenticated request, even though there will be multiple URLs this will provide better security. D. Create a new group and map users to this group, create a 1AM policy providing access to Object Storage service only to this group. Users can then simply login to OCI console and retrieve needed flies.
In order to manage Alarms In Oracle Cloud Infrastructure (OCI), which three actions can be performed through the OCI Console? A. View alarm history for last 3 months. B. Manually fire an alarm. C. Update the SQL expression of an alarm. D. View all the firing alarms. E. Move an alarm to a different compartment. F. Add multiple suppressions for an alarm.
Which of the following are essential components of the Oracle Cloud Infrastructure Notifications service? A. An alarm with a name unique across the tenancy, a subscription, and a metric with the measurement of interest. B. An alarm with a name unique across the compartment, a subscription, and a metric with the measurement of interest. C. A topic with a name unique across the compartment, a subscription, and a message where content Is published. D. A topic with a name unique across the tenancy, a subscription, and a message where content is published.
Which command sample can be used to copy an object from Oracle Cloud Infrastructure (OCI) Object Storage bucket in source region to a bucket in a destination region? A. oci os object copy --bucket-name <source_bucket_name> --source-object-name <source_object> --destination-region <destination_region> --destination-bucket <destination_bucket_name> --destination-object-name <destination_object_name> B. oci os object copy --namespace-name <object_storage_namespace> --bucket-name <source_bucket_name> --source-object-name <source_object> --destination-namespace <destination_namespace_string> --destination-region <destination_region> --destination-bucket <destination_bucket_name> --destination-object-name <destination_object_name> C. oci os object copy --source-compartment-id <source_compartment_id> --bucket-name <source_bucket_name> --source-object-name <source_object> --destination-compartment-id <destination_compartment_id> --destination-region <destination_region> --destination-bucket <destination_bucket_name> --destination-object-name <destination_object_name> D. oci os object copy --bucket-name <source_bucket_name> --source-object-name <source_object> --destination-compartment-id <destination_compartment_id> --destination-region <destination_region> --destination-bucket <destination_bucket_name> --destination-object-name <destination_object_name>.
You have created the following JSON file to specify a lifecycle policy for one of your object storage buckets: How will this policy affect the objects that are stored in the bucket? A. Objects containing the name prefix LOGS will automatically be migrated from standard Storage to Archive storage 30 days then. The objects will be migrated back to standard Storage 120 days after creation B. Objects with the prefix "LOGS" will be retained for 120 days and then deleted permanently. C. Objects containing the name prefix LOGS will be automatically migrated from standard Storage to Archive storage 30 days after the (Correct) creation date. The objects will be deleted 120 days after creation. D. The objects with prefix "LOGS" will be deleted 30 days after creation date.
You are working as a Cloud Operations Administrator for your company. They have different Oracle Cloud Infrastructure (OCI) tenancies for development and production workloads. Each tenancy has resources in two regions - uk-london-1 and eu-frankfurt-1. You are asked to manage all resources and to automate all the tasks using OCI Command Line Interface (CLI). Which is the most efficient method to manage multiple environments using OCI CLI? A. Use OCI CLI profiles to create multiples set credentials in your config file, and reference the appropriate profile at runtime B. Create environment variables for the sets of credentials that align to each combination of tenancy, region and environment C. Run OCI setup config to create new credentials for each environment every time you want o access the environment D. Use different bash terminals for each environment.
Your deployment platform within Oracle Cloud Infrastructure (OCI) leverages a compute instance with multiple block volumes attached. There are multiple teams that use the same compute instance and have access to these block volumes. You want to ensure that no one accidentally deletes of these block volumes. You have started to construct the following IAM policy but need to determine which permissions should be used. A. VOLUM E_ERASE, VOLUME, ATTACHMENT_ERASE, VOLUME_BACKUP_ERASE B. DELETE,VOLUME, DELETE_VOLUME_ATTACHMENT, DELETE_VOLUME.BACKUP C. VOLUME_DELETE, VOLUME_ATTACHMENT_DELETE, VOLUME BACKUP DELETE D. ERASE.VOLUME, ERASE_VOLUME_ATTACHMENT, ERASE_VOLUME_BACKUP.
Recently your e-commerce web application has been receiving significantly more traffic than usual. Users are reporting they often encounter a 903. when trying to access your site. Sometimes the site is very slow. You check your instance pool configuration to confirm that the maximum number of instances Is configured to allow 20 compute instances. Currently 14 compute instances have been provisioned by the Instance pool. You also confirm that current CPU utilization across all hosts exceeds the scale- threshold you set in your auto-scaling policy. However, the Instance pool is not provisioning any new instances. What can you check to determine why the application is NOT functioning properly? A. Verify that the Quality Assurance team is not currently performing load-testing against production. B. Verify that the compute resource quota has not been exceeded. C. Verify that the database is accessible. D. Verify that the new offer feature code did not introduce any performance bugs.
You have been asked to update the lifecycle policy for object storage using the Oracle Cloud Infrastructure (OCI) Command Line Interface (CLI). Which command can successfully update the policy? A. oci os object-lifecycle-policy delete -ns <object_storage_namespace> -bn <bucket_name> B. oci os object-lifecycle-policy put -ns <object_storage_namespace> -bn <bucket_name> -Items <json_formated_lifecycle_policy> C. oci os object-lifecycle-policy put -ns <object_storage_namespace> -bn <bucket_name> O D. oci os object-lifecycle-policy get -ns <object_storage_namespace> -bn <bucket_name>.
Which 3 statements are true about Object Storage data security and encryption in Oracle Cloud Infrastructure (OCI)? A. OCI Key Management is used by default to provide data security. B. Server side encryption uses per-object keys which are managed by Oracle. C. All traffic to and from Object Storage service is encrypted using TLS. D. A VPN connection to OCI is required to ensure security data transfer to an object storage bucket. E. Client-side encryption is managed by the customer.
You have been asked to investigate a potential security risk on your company's Oracle Cloud Infrastructure (OCI) tenancy. You decide to start by looking through the audit logs for suspicious activity. How can you retrieve the audit logs using the OCI Command Line Interface (CLI)? A. oci audit event list --start-time Sstart-time --end-time Send-time --compartment-id Scompartment-id B. oci audit event list —start-time Sstart-time —end-time Send-time —tenancy-id Stenancy-id C. oci audit event list —start-time Sstart-time —compartment-id Scompartment-id D. oci audit event list —end-time Send-time —compartment-id $compartment-id.
64. Which two configuration formats does Terraform support? (Choose two.) A. HCL B. JSON C. XML D. YAML.
Which of the below options is NOT a recommended best practice while creating resources using Terraform provider for Oracle Cloud Infrastructure (OCI)? A. Use lower_snake_case for all nalring conventions in your terraform configuration files. B. Do not check in state files (terraform.tfstate by default) to source control. Add it to your .gitignore. C. You must use oci_core_image data source to use the same image every time while launching a compute instance. D. Use S3 Backend using OCI Object Storage's S3 Compatibility for Sharing State Files across teams .
You are using configuration management tool Ansible and Ansible playbook with Oracle Cloud Infrastructure to attach a block volume to a compute instance. Which of the below action is FALSE for such an action by Ansible playbook? A. It can create a new Block Volume for the instance, attach the volume to the instance, and specify iSCSI as the volume attachment type. B. It can connect to and then mount the volume from the compute instance by executing iscsiadm commands over SSH using an Ansible module. C. It cannot generate a temporary, host-specific SSH key pair. D. It can specify the public key from the key pair for connecting to the instance, and then launch the instance.
Which statement below is true about the Oracte Ctoud tnfrastructure (OCt) knife-oci plugin for Chef? A. The knife-oci plugin allows users to interact with OCI through Chef Knife B. OCI provides a Chef Server running in each tenancy that can be controlled by the knife-oci plugin C The knife-oci plugin allows you to run chef commands from OCI CLI D The knife-oci plugin is a Terraform provider to deploy Chef in OCI.
You are helping a customer to use Oracle Cloud Infrastructure Resource Manager to automate their infrastructure. Which of the below options is FALSE regarding Resource Manager? A. With Resource Manager, you cannot execute scripts or commands on a remote computer. B. For a given Resource Manager stack, only one job can be run at a time. C. To control access to the Terraform state file, you can create a security policy that limits access to reading jobs. D. Resource Manager consists of Terraform configuration files and each file are in HCL or JSON format.
You are using the Oracle Cloud Infrastructure (OCI) Command Line Interface (CLI) to upload a file to an object storage bucket. You enter the following command (with correct values for all parameters): oci os object put -c compartment -ns mynamespace -bn mybucket -name myfile.txt -file IUsers/me/myfile.txt The command fails. Which of the following is NOT a valid parameter in this command? A. -name myfile.txt B. -c compartmentId C. -ns mynamespace D. -file IUsers/me/myfile.txt.
You are using Terraform provider for Oracle Cloud Infrastructure to manage your resources. You notice someone in your team made changes outside of Terraform to the resources from the Oracle Cloud Infrastructure console. Which of the below options is TRUE for such a scenario? A. Terraform automatically detects the changes and makes sure your Terraform code is up to date. B. Terraform always overwrites the changes made outside of Terraform next time you apply the configuration. C. You cannot perform Terraform code changes anymore as it has corrupted the overall resource management. D. You could have avoided such a situation by adding ignore_changes parameter in configuration files.
You are using Terraform to create a sandbox environment for the development team. This environment consists of an Oracle Cloud Infrastructure virtual cloud network, two compute resources, and a database instance. As part of the Terraform configuration you need to run a script on the two compute instances that will configure the connection to the database. Which Terraform feature would you leverage to accomplish this task? A. The local-exec provisioner B. The OCI Provider C. The instance data source D. The remote-exec provisioner.
Which of the below option is a FALSE statement in regard to Oracte Ctoud tnfrastructure (OCt) CLI? A. Token-based authentication for the ell allows customers to authenticate their o session interactively, then use the ell for a single session without an API signing key. B. The oci-cli-rc comrand creates shortcuts and command abbreviations and can be used to set default compartment per ell profile. C. OCI CLI does not support combining arguments on the command line with file inputs. D. OCI CLI can simplify the process of moving large amounts of data to or from Object Storage.
Which of the below is NOT a supported SDK on Oracle Cloud Infrastructure? A. Go SDK B. .NET SDK C Ruby SDK D. Java SDK E. Python SDK.
As an administrator of your Oracle Cloud Infrastructure (OCI) tenancy, you are configuring your tenancy so that Oracle SDKs and OCI CLI can be integrated with your OCI environments. Which of the following is NOT a required action to accomplish this integration? A. Create a user in lAM for the person or system who will be calling the API , and put that user in at least one lAM group with any desired permissions. B. Add the required credentials in either a configuration file forthe SDKs and Cli or a config object in the code. C. Generate an API signing key in PEM format. Upload the public key from the key pair in the OCI Console. D. launch a compute instance in your OCI tenancy. Install and configure required development environments and CLI.
Which of the below options is TRUE while managing compartments in Oracle Cloud Infrastructure (OCI)? A. You can create sub compartments in compartments to create hierarchies that are four levels deep. B. It's not possible to recover a compartment once it has been deleted. C. If you move the resource to the new compartment, the policies that govern the new compartment apply immediately. C. Compartment names need not be unique for a given region. .
Which of the following is NOT a valid use case for using Oracle Cloud Infrastructure (OCI) cost-tracking tags? A. Fitter projected costs based on tags B. Set up autoscaling policies based on tags C. Track resource usage based on tags D. Set up budgets based on resources grouped by tags.
You as an administrator want to provide lAM group FinanceAuditors to analyze the spending in the Oracle Cloud Infrastructure tenancy. Which of the below policy statement will you define? A. Allow group FinanceAuditors to read spend-reports in tenancy B. Allow group FinanceAuditors to read usage-reports in tenancy C. Allow group FinanceAuditors to read cost·reports in tenancy D. Allow group FinanceAuditors to read usage-cost in tenancy.
Choose TWO options that show the correct scope for setting up Oracle Cloud Infrastructure (OCI) budgets A. Cost-tracking tag B. Namespace C. User-defined tag D. Compartment E. Tenancy.
Which of the following action do you need to perform to push a new image to the OCI Registry? (Select 1) A. Assign an OCI defined tag via OCI CLI to the image. B. Generate an auth token to complete the authentication via Docker CLI. C. Generate a public private key pair to authenticate via Docker CLI. D. Generate an API signing key to complete the authentication via Docker CLI.
All the developers in a DevOps team are using the same compartment called 'devops'. There are two IAM groups: 'group-dev' and 'group-ops'. Which of the following lAM policy will give users in both these groups access to manage all resources in the compartment? A. Allow any-user to manage all resources in compartment devops where request.group=!group"! B. Allow group !group"! to manage all resources in compartment devops C. Allow group group-dev group-ops to manage all resources in compartment devops D. Allow any-user to manage all resources in compartment devops where any {request. group=group-dev ,group-ops}.
How can you provide user access to an existing compartment in Oracle Cloud Infrastructure? A. by granting users access to the compartment when the compartment is created B. by adding users to a compartment; all users in the compartment will have access to the resources in the compartment C. by adding users to a group and defining policy to provide the group access to the compartment D. by granting access directly to the user when the user is created.
Which of the following statements is correct about the Oracle Cloud Infrastructure (OCI) Audit logs retention period? A. Log retention duration can not be changed B. You can configure log retention for any tirre duration C. You can configure log retention for 60 days D. You can configure log retention for up to 365 days.
In order to better manage resource utilization in your environment you have decided to create alerts that notify your team each time a new compute instance is created. Which two resources would you need to create in order to accomplish this task? A. Create a new topic in the Notifications Service. Subscribe your email address to the topic. B. Create a new instance pool and assign an Autoscaling policy to create additional instances when aggregate CPU utilization exceeds 80%. C. Create a new subscription in the Notification Service to subscribe to all Event Service rules. D. Create a rule in the Event Service that is activated by the Instance - Launch End event type. E. Create a new metrics query in the Monitoring Service with the metric namespace 'oci_computeagent' and the dimension name 'resourceld'.
You are an admin for Oracle Cloud Infrastructure (OCI) tenancy, and you are using the monitoring service to monitor your team's cloud resource usage. Which of the below option is TRUE regarding monitoring service? A. Metric and alarm data are accessible via the Console only. B. You can publish only default metrics to Monitoring service not the custom metrics. C. You cannot create alarms with nested queries. D. The Monitoring service uses metrics to monitor resources and alarms to notify about metrics.
As a solution architect of the Oracle Cloud Infrastructure tenancy, you have been asked to provide members of group CloudOps the ability to view and retrieve monitoring metrics, but only for all monitoring-enabled compute instances. Which policy statement will you define to grant this access? (Select 1) A. Allow group CloudOps to read metrics in tenancy where target. rnetri cs. narnespace='oci_computeagent' B. Restricting monitoring access only to compute instances metrics is not possible. C. Allow group CloudOps to read compute-metrics in tenancy D. Allow group CloudOps to read metrics in tenancy where target. metrics. monitoring='oci_ corrputeagent'.
You want to create an Oracle Cloud Infrastructure (OCI) Compute Instance with multiple vnics at the time of instance launch. Which one of the below options accomplishes such a task? A. By executing remote script on the compute instance. B. By using instance configurations or terraform. C. By using OCI Console. D. By using OCI CLI.
Which of the following is NOT a valid attribute of Alarms feature of Oracle Cloud Infrastructure (OCI) Monitoring service? A. compartrrentld B. metricNarre C. severity D. namespace.
The following command was successfully executed from Oracle Cloud Infrastructure (OCI) CLI for lifecyde management of objects in an OCI object storage bucket oci os object- lifecyde-policy put -ns MyNamespace -bn MyBucket -items '[ ( }. ( "action·' "ARCHVE" "is-enabled·: true. ' "name·: "ArchiveAfter30Days·, "object-nal11&-fl~er"': { }. " .. xdualon_patlerna·: null. "induslon-patlerns·: null. "induslon-prefl109S": null "time-amounr': 30. "tim&-unir': "DAYS"' "action·' "DELETE" "is-enabled"' fa lse ' "name·: -DeieteAAer18ODays·. "object-nam&-fl~er"': { }. "eJduslon-patlerns·: null. "induslon-patlerns·: null. "induslon-prefl109S": null "time-amounr': 180. "tim&-unir': "DAYS"' } A. archives objects named "null" after 30 days and deletes them after 180 days B. archives all objects after 30 days C. archives a ll objects after 30 days and deletes them after 180 days D. archives objects named "null" after 30.
As a solution architect to Oracle Cloud Infrastructure tenancy, you have been asked to provide your organization developers within the group DevOps access to regularly write and list log files to any bucket within the compartment nightly-builds. Which of the below statements will define your IAM policy? A. Allow group DevOps to inspect buckets in compartment nightly-builds Allow group DevOps to manage objects in compartment nightly- builds where any {request.permission='OBJECT CREATE'} B. Allow group DevOps to read buckets in compartment nightly-builds Allow group DevOps to manage objects in compartment nightly- builds where {request.permission='OBJECT CREATE'}, request.permission='OBJECT INSPECT} C. Allow group DevOps to read buckets in compartment nightly-builds Allow group DevOps to manage objects in compartment nightly-builds D. Allow group DevOps to inspect buckets in compartment nightly-builds Allow group DevOps to manage objects in compartment nightly-builds where any {request.permission='OBJECT CREATE'}.
You have created following JSON file to implement lifecycle policy for one of your Oracle Cloud Infrastructure Object Storage buckets. oci os object- lifecycle policy put -ns MyNamespace -bn MyBucket -~ems .[ ( -action-: -ARCHIVE-, -is-enabled-: true, -name-: -ArchIveMer3()Oays-, -object-name-Mer"": { -inclusion-prefixes-: [ -documents- I I. "time-amount”: 180, "time-unit": DAYS” I. ( -action-: DELETE-, -is-enabled-: true, -name-: -OeleteMer1800ays-, -object-name-Mer"": { -inclusion-prefixes-: null I. "time-amount”: 180, "time-unit": DAYS” }]” A. Objects containing name prefix 'documents' will automatically be moved from Standard o Object Storage to Archive storage after 30 days from the date of creation, but because of policy error have to be manually deleted after 180 days. B. Objects containing name prefix 'documents' will automatically be moved from Standard Object Storage to Archive storage after 30 days and then deleted after 180 days from the date of creation. C. Objects containing name prefix 'documents' o will automatically be moved from Standard Object Storage to Archive storage after 30 days from the date of creation. D. Objects containing name prefix 'documents' will automatically be moved from Standard Object Storage to Archive storage after 30 days from the date of creation. Other objects will be deleted after 180 days.
In the Oracle Cloud Infrastructure Console, a failed database backup for VM DB System is displaying a "Backup in Progress" status. Which of the following troubleshooting steps DOES NOT provides enough details to solve this issue? A. Looking for Database service agent issues and try restarting the dcsagent program. B. Using the OCI logging feature to collect the logs and search the logs history for the exact error. C. Using the database CLI and log files to gather more data and look for root causes. D. Testing if the host can connect to the applicable Swift endpoint by using a Swift user to make sure Object Storage connectivity is working.
You are trying to access Object Storage from your on-premise network. The image shows the configuration that you have done Which of the following statement is correct? A. The on-premise network can reach the Object Storage only through a single service gateway (Service Gateway-1) B. The on-premise network can reach the Object Storage through multiple Service Gateways (Service Gateway-2 .Service Gateway-3). though the data can only be returned via HUB VCN Service Gateway (Service Gateway-1) C. The on-premises network can reach the Object Storage through multiple Service Gateways (Service Gateway-1, Service Gateway-2. Service Gateway-3) D. The on-premise network can reach the Object Storage through multiple Service Gateways (Service Gateway-1. Service Gateway-2. Service Gateway-3) though you will need to create specific routes on each service gateway.
An eCommerce company is running on Oracle Cloud Infrastructure (OCI) and many compute instances remain unused for the most part of the year except during Black Friday and Christmas. You suggest them to use OCI’s Autoscaling feature and present them a slide to showcase the features of Autoscaling Which option below is INACCURATE in your presentation to the customer? A. Autoscaling requires an instance pool as a prerequisite so that it can automatically adjust the number of compute instances in an instance pool B. When an instance pool scales in. instances are terminated in this order: the number of instances is balanced across Availability Domains. and then balanced across Fault Domains Finally. within a Fault Domain. the newest instance is terminated first C. A cooldown period between Autoscaling events lets the system stabilize at the updated level D. Autoscaling re lies on performance metrics such as CPU utilization that are collected by OCI Monitoring service to trigger an Autoscaling event.
Which of the following is NOT a valid option for setting up redundant connections from an on-premises environment to Oracle Cloud Infrastructure (OCI)? A. Use FastConnect with Border Gateway Protocol (BGP) dynamic routing and VPN Connect with static routing B. Use VPN Connect with multiple redundant IPSec tunnels using Border Gateway Protocol (BGP) dynamic routing C. Use FastConnect with static routing and VPN Connect with static routing D. Use VPN Connect with multiple redundant IPSec tunnels using static routing.
Report abuse Terms of use
HOME
CREATE TEST
INFO
STADISTICS
RECORDS
Author's Tests