Arhitekt 3.1.
![]() |
![]() |
![]() |
Title of test:![]() Arhitekt 3.1. Description: Arhitekt 3.1. |




New Comment |
---|
NO RECORDS |
You have an Oracle Cloud Infrastructure (OCI) load balancer distributing traffic via an evenly-weighted round robin policy to your back-end web servers. You notice that one of your web servers is receiving more traffic than other web servers. How can you resolve this to make sure traffic is evenly distributed across all back-end webservers?. Create separate listeners for each backend web server. Disable SSL configuration associated with your backend set. Change keep-alive setting between the load balancer and backend server. Disable cookie-based session persistence on your backend set. Which two are Regional resources in Oracle Cloud Infrastructure? Please choose Two. Ephemeral public IPs. Compartments. Compute images. Dynamic groups. Block volume backups. You are a system administrator of your company and you are asked to manage updates and patches across all your compute instances running Oracle Linux in Oracle Cloud Infrastructure (OCI). As part of your task, you need to apply all the latest kernel security updates to all instances. Which OCI service will allow you to complete this task?. Resource Manager. OS Management. Storage Gateway. Streaming. Registry. You have compartments C and D under the root compartment in your Oracle Cloud Infrastructure (OCI) tenancy; compartment C contains a sub-compartment also named D. You are trying to move this subcompartment D to the parent compartment D like shown in the picture, but the move fails. What is the reason for this error?. You need to move all the compartments in the hierarchy to the new parent compartment. You cannot move a subcompartment to another parent compartment. Both parent and child compartments cannot have the same name. Subcompartment D needs to be empty before it can be moved. You provisioned an Oracle Autonomous Data Warehouse (ADW) on Oracle Cloud Infrastructure (OCI) and imported data into ADW. You want to give your business analyst the ability to connect to the ADW database and run queries. Which two actions can help you meet this requirement? (Choose two.). Create a database user account for the business analyst. Grant the predefined database role DWUSER to the database user. Grant unlimited tablespace privilege to the database user. Grant the predefined database role DWROLE to the database user. Grant the predefined database role DWADW to the database user. You want an instance in your compartment to make API calls to other services within Oracle Cloud Infrastructure without storing credentials in a configuration file. What do you need to do?. No action is required. By default, all VM instances are created with an Instance Principal. VM instances are treated as users. Create a user and assign the user to that VM instance. Create appropriate matching rules in the Dynamic Group to create an Instance Principal. Instances cannot access services outside their compartment. Your company uses the Oracle Cloud Infrastructure (OCI) Object Storage service to share large data sets with its data science team. The data science team consists of 20 people who work from offices in Washington, D.C., and Tokyo. While working in these offices, employees are assigned an IP address from the public IP range 129.146.31.0/27. Which two steps should you take to ensure that the Object Storage bucket used in this scenerio was only accessible from these office locations?(Choose Two). Write an IAM policy that includes the conditional statement where request.networkSource.name=CorpNet. Set the bucket visibility to public and only share the URL with the data science via email. Create a pre-authenticated request for each data set and only share the data science team via email. Create a Network Source named CorpNetwork with a CIDR block of 129.146.31.0/27. Create a Network Source named CorpNetwork with a CIDR block of 129.146.0.0/16. Write an IAM policy that includes the conditional statement where request.region=129.146.31.0/27. A financial firm is designing an application architecture for its online trading platform that must have high availability and fault tolerance. Their solution architect configured the application to use an Oracle Cloud Infrastructure Object Storage bucket located in the US West(us-phoenix-1) region to store large amount of financial data. The stored financial data in the bucket must not be affected if there is an outage in one of the Availability domains or a complete region. What should the architect do to avoid any costly service disruptions and ensure data durability?. Create a new Object Storage bucket in another region and configure lifecycle policy to move data every 5 days. Create a lifecycle policy to regularly send data from standard to archive storage. Copy the Object Storage bucket to a block volume. Create a replication policy to send data to a different bucket in another OCI region. You work for a health insurance company that stores a large number of patient health records in an Oracle Cloud Infrastructure (OCI) Object Storage bucket named "HealthRecords". Each record needs to be securely stored for a period of 5 years for regulatory compliance purposes and cannot be modified, overwritten or deleted during this time period. What can you do to meet this requirement?. Create an OCI Object Storage Lifecycle Policies rule to archive objects in the HealthRecords bucket for five years. Create an OCI Object Storage time-bound Retention Rule on the HealthRecords bucket for five years. Enable Retention Rule Lock on this bucket. Enable encryption on the HealthRecords bucket using your own vault master encryption keys. Enable versioning on the HealthRecords bucket. Which two components cannot be deleted in your Oracle Cloud Infrastructure Virtual Cloud Network? (Choose two.). Service gateway. Default security list. Routing gateway. Default route table. Default subnet. You have been asked to create an Identity and Access Management (IAM) user that will authenticate to Oracle Cloud Infrastructure (OCI) API endpoints. This user must not be given credentials that would allow them to log into the OCI console. Which two authentication options can you use? (Choose two.). SSL certificate. API signing key. SSH key pair. PEM Certificate file. Auth token. You need to set up instance principals so that an application running on an instance can call Oracle Cloud Infrastructure (OCI) public services, without the need to configure user credentials. A developer in your team has already configured the application built using an OCI SDK to authenticate using the instance principals provider. Which is NOT a necessary step to complete this set up?. Create a dynamic group with matching rules to specify which instances you want to allow to make API calls against services. Generate Auth Tokens to enable instances in the dynamic group to authenticate with APIs. Create a policy granting permissions to the dynamic group to access services in your compartment or tenancy. Deploy the application and the SDK to all the instances that belong to the dynamic group. Which of the following statements is true about the Oracle Cloud Infrastructure (OCI) Object Storage server-side encryption?. Encryption of data encryption keys with a master encryption key is optional. Customer-provided encryption keys are always stored in OCI Vault service. Encryption is enabled by default and cannot be turned off. Each object in a bucket is always encrypted with the same data encryption key. An Oracle Cloud Infrastructure tenancy administrator is not able to delete a user in the tenancy. What can cause this issue?. User has multi-factor authentication (MFA) enabled. User is member of an Identity and Access Management (IAM) group. Users can be blocked but not deleted. User needs to be deleted from federation Identity Provider (IdP) before deleting from IAM. In Oracle Cloud Infrastructure Container Engine for Kubernetes (OKE), what does a Replica Set do?. It provides declarative updates for Pods. It maintains a stable set of replica Pods running at any given time. It ensures that all Nodes run a copy of a Pod. It exposes an application running on a set of Pods. Which two methods are supported for your on-premises Oracle database to an Oracle Autonomous Transaction Processing(ATP) database in Oracle Cloud Infrastructure?(Please choose Two). Load text files into ATP using SQL Developer. Use RMAN duplicate. Use Oracle Data Pump. Transfer the physical database files and re-create the database. Use database backup and restore. As an Oracle Cloud Infrastructure tenancy administrator, you created predefined lists of values and associated them with tag key definitions. One of the users in your tenancy complains that she cannot see these predefined values. What is causing this issue?. The user is trying to use free-form tags. Some of the predefined values are null. The user is not part of an Identity and Access Management group that gives access to tagging. The user has breached either the quota or service limit for using tags. As a solution architect you are showcasing the Oracle Cloud Infrastructure (OCI) Object Storage feature about Object versioning to a customer. Which statement is not true in regards to OCI object storage versioning?. Object versioning does not provide data protection against accidental or malicious object update, overwrite or deletion. By default object versioning is disabled on a bucket. A bucket that is versioning-enabled can have many versions of an object. There is always one latest version of the object and zero or more previous versions. No object is physically deleted from a bucket that has versioning enabled. You have setup your environment as below with mount target "MT" successfully mounted on both compute instances CLIENT-X and CLIENT-Y. For security reason you want to control access file system A in such a way that CLIENT-X has READ/WRITE and CLIENT-Y has READ only permission. What should you do?. Update the OS firewall in CLIENT-X to allow READ/WRITE access. Update the security list two to restrict CLIENT-Y access to read-only. Update the mount point export options to restrict CLIENT-Y access to read-only. Update the security list one to restrict CLIENT-Y access to read only. |