Practice Test 1
![]() |
![]() |
![]() |
Title of test:![]() Practice Test 1 Description: My Practice Test |




New Comment |
---|
NO RECORDS |
You have an Oracle Cloud Infrastructure (OCI) load balancer distributing traffic via an evenly-weighted round robin policy to your back-end web servers. You notice that one of your web servers is receiving more traffic than other web servers. How can you resolve this to make sure traffic is evenly distributed across all back-end webservers?. Disable cookie-based session persistence on your backend set. Change keep-alive setting between the load balancer and backend server. Disable SSL configuration associated with your backend set. Create separate listeners for each backend web server. Which two are Regional resources in Oracle Cloud Infrastructure? (Choose two.). Ephemeral public IPs. Compartments. Compute images. Dynamic groups. Block volume backups. An Oracle Cloud Infrastructure tenancy administrator is not able to delete a user in the tenancy. What can cause this issue?. User has multi-factor authentication (MFA) enabled. User is member of an Identity and Access Management (IAM) group. Users can be blocked but not deleted. User needs to be deleted from federation Identity Provider (IdP) before deleting from IAM. You are a system administrator of your company and you are asked to manage updates and patches across all your compute instances running Oracle Linux in Oracle Cloud Infrastructure (OCI). As part of your task, you need to apply all the latest kernel security updates to all instances. Which OCI service will allow you to complete this task?. Resource Manager. OS Management. Storage Gateway. Streaming. Registry. Which of the following statements is true about the Oracle Cloud Infrastructure (OCI) Object Storage server-side encryption?. Encryption of data encryption keys with a master encryption key is optional. Customer-provided encryption keys are always stored in OCI Vault service. Encryption is enabled by default and cannot be turned off. Each object in a bucket is always encrypted with the same data encryption key. You need to set up instance principals so that an application running on an instance can call Oracle Cloud Infrastructure (OCI) public services, without the need to configure user credentials. A developer in your team has already configured the application built using an OCI SDK to authenticate using the instance principals provider. Which is NOT a necessary step to complete this set up?. Create a dynamic group with matching rules to specify which instances you want to allow to make API calls against services. Generate Auth Tokens to enable instances in the dynamic group to authenticate with APIs. Create a policy granting permissions to the dynamic group to access services in your compartment or tenancy. Deploy the application and the SDK to all the instances that belong to the dynamic group. You have been asked to create an Identity and Access Management (IAM) user that will authenticate to Oracle Cloud Infrastructure (OCI) API endpoints. This user must not be given credentials that would allow them to log into the OCI console. Which two authentication options can you use? (Choose two.). SSL certificate. API signing key. SSH key pair. PEM Certificate file. Auth token. You work for a health insurance company that stores a large number of patient health records in an Oracle Cloud Infrastructure (OCI) Object Storage bucket named "HealthRecords". Each record needs to be securely stored for a period of 5 years for regulatory compliance purposes and cannot be modified, overwritten or deleted during this time period. What can you do to meet this requirement?. Create an OCI Object Storage Lifecycle Policies rule to archive objects in the HealthRecords bucket for five years. Create an OCI Object Storage time-bound Retention Rule on the HealthRecords bucket for five years. Enable Retention Rule Lock on this bucket. Enable encryption on the HealthRecords bucket using your own vault master encryption keys. Enable versioning on the HealthRecords bucket. Which two components cannot be deleted in your Oracle Cloud Infrastructure Virtual Cloud Network? (Choose two.). Service gateway. Default security list. Routing gateway. Default route table. Default subnet. A financial firm is designing an application architecture for its online trading platform that must have high availability and fault tolerance. Their solutions architect configured the application to use an Oracle Cloud Infrastructure Object Storage bucket located in the US West (us-phoenix-1) region to store large amounts of financial data. The stored financial data in the bucket must not be affected even if there is an outage in one of the Availability Domains or a complete region. What should the architect do to avoid any costly service disruptions and ensure data durability?. Create a new Object Storage bucket in another region and configure lifecycle policy to move data every 5 days. Create a lifecycle policy to regularly send data from Standard to Archive storage. Copy the Object Storage bucket to a block volume. Create a replication policy to send data to a different bucket in another OCI region. In Oracle Cloud Infrastructure Container Engine for Kubernetes (OKE), what does a Replica Set do?. It provides declarative updates for Pods. It maintains a stable set of replica Pods running at any given time. It ensures that all Nodes run a copy of a Pod. It exposes an application running on a set of Pods. As a solution architect, you are showcasing the Oracle Cloud Infrastructure (OCI) Object Storage feature about Object Versioning to a customer. Which statement is true in regards to OCI Object Storage Versioning?. Object versioning does not provide data protection against accidental or malicious object update, overwrite, or deletion. By default, object versioning is disabled on a bucket. A bucket that is versioning-enabled can have only and always will have a latest version of the object in the bucket. Objects are physically deleted from a bucket when versioning is enabled. You created a public subnet and an internet gateway in your virtual cloud network (VCN) of Oracle Cloud Infrastructure. The public subnet has an associated route table and security list. However, after creating several compute instances in the public subnet, none can reach the Internet. Which two are possible reasons for the connectivity issue? (Choose two.). The route table has no default route for routing traffic to the internet gateway. There is no stateful egress rule in the security list associated with the public subnet. There is no dynamic routing gateway (DRG) associated with the VCN. There is no stateful ingress rule in the security list associated with the public subnet. A NAT gateway is needed to enable the communication flow to internet. You are designing a lab exercise with an application that includes a large number of graphics with large file sizes. The application becomes unresponsive if the graphics are embedded in the application. You have uploaded the graphics to Oracle Cloud Infrastructure Object Storage bucket and added the URL paths for the individual objects in the application. You need to ensure these graphics are accessible without requiring any authentication for an extended period of time. How can you achieve these requirements?. Create pre-authenticated requests (PAR) and do not specify any expiration time. Make the Object Storage bucket private, make all objects public, and use the URL found in the object "Details". Make the Object Storage bucket public and use the URL path for the individual objects. Create pre-authenticated requests (PAR) and specify 00:00:0000 as the expiration time. Which two methods are supported for migrating your on-premises Oracle database to an Oracle Autonomous Transaction Processing (ATP) database in Oracle Cloud Infrastructure? (Choose two.). Load text files into ATP using SQL Developer. Use RMAN duplicate. Use Oracle Data Pump. Transfer the physical database files and re-create the database. Use database backup and restore. You have setup your environment as shown below with the Mount Target "MT" successfully mounted on both compute instances CLIENT-X and CLIENT-Y. For security reasons you want to control the access to the File System A in such a way that CLIENT-X has READ/WRITE and CLIENT-Y has READ only permission. What you should do?. Update the OS firewall in CLIENT-X to allow READ/WRITE access. Update the security list TWO to restrict CLIENT-Y access to read-only. Update the mount target export options to restrict CLIENT-Y access to read-only. Update the security list ONE to restrict CLIENT-Y access to read only. Which statement is NOT true about the Oracle Cloud Infrastructure Object Storage service?. Object storage resources can be shared across tenancies. Immutable option for data stored in the Object Storage can be set via retention rules. Object versioning is enabled at namespace level. Object lifecycle rules can be used to either archive or delete objects. You are about to upload a large log file (5 TIB size) to Oracle Cloud Infrastructure object storage and have decided to use multipart upload capability for a more efficient and resilient upload. Which two statements are true about multipart upload? (Choose two.). The maximum size for an uploaded object is 10 TiB. You do not have to commit the upload after you have uploaded all the object parts. Individual object parts can be as small as 10 MiB or as large as 50 GiB. While a multipart upload is still active, you cannot add parts even if the total number of parts is less than 10,000. You are running an online gaming application hosted on a VM.Standard2.1 instance shape in Oracle Cloud Infrastructure. As the game becomes popular, you identify network throughput as a bottleneck on your instance when uploading user data. Though you want to resolve the issue, you want to observe the demand for a week before adding new application instances. Which action is the most efficient way to resolve this issue?. Add a secondary virtual network interface card (VNIC). Change shape of the instance to a higher network bandwidth instance. Delete the instance while preserving boot volume and spin up a new higher network bandwidth instance with this boot volume. Change the performance tier of attached block volume to High Performance. You have an AI/ML application running on Oracle Cloud Infrastructure. You identified that the application needs GPU and at least 20Gbps Network throughput. The application is currently using a VM.Standard2.1 compute without any block storage attached to it. Which two options allow you to get your required performance for your application? (Choose two.). Terminate the compute instance preserving the boot volume. Create a new compute instance using the BM.GPU2.2 shape using the boot volume preserved, but no block volume attached. Terminate the compute instance preserving the boot volume. Create a new compute instance using the VM.Standard2.2 shape using the boot volume preserved, but no block volume attached. Terminate the compute instance preserving the boot volume. Create a new compute instance using the VM.GPU3.4 shape using the boot volume preserved and use the NVMe devices to host your application. Terminate the compute instance preserving the boot volume. Create a new compute instance using the BM.HPC2.36 shape using the boot volume preserved and use the NVMe devices to host your application. Terminate the compute instance preserving the boot volume. Create a new compute instance using the BM.GPU2.2 shape using the boot volume preserved and attach a new block volume to host your application. Which option is NOT a valid action within the Oracle Cloud Infrastructure (OCI) Block Volume service?. Clone an existing volume to a new, larger volume. Restore from a volume backup to a larger volume. Shrink an existing volume in place with offline resizing. Expand an existing volume in place with offline resizing. You deployed a database on a Standard Compute instance in Oracle Cloud Infrastructure (OCI) due to cost concerns. The database requires additional storage with high I/O and you decided to use OCI Block Volume service for it. With this requirement in mind, which elastic performance option should you choose for the Block Volume?. Balanced Performance. Higher performance. Extreme performance. Lower cost. You created a virtual cloud network (VCN) with three private subnets. Two of the subnets contain application servers and the third subnet contains a DB System. The application requires a shared file system so you have provisioned one using the file storage service (FSS). You also created the corresponding mount target in one of the application subnets. The VCN security lists are properly configured so that both application servers and the DB system can access the file system. The security team determines that the DB System should have read-only access to the file system. What change should you make to satisfy this requirement?. Create an NFS export option that allows READ_ONLY access where the source is the CIDR range of the DB System subnet. Modify the security list associated with the subnet where the mount target resides. Change the ingress rules corresponding to the DB System subnet to be stateless. Create an instance principal for the DB System. Write an Identity and Access Management (IAM) policy that allows the instance principal read-only access to the file storage service. Connect via SSH to one of the application servers where the file system has been mounted. Use the Unix command chmod to change permissions on the file system directory, allowing the database user read only access. Your company uses the Oracle Cloud Infrastructure (OCI) Object Storage service to share large data sets with its data science team. The data science team consists of 20 people who work from offices in Washington, D.C., and Tokyo. While working in these offices, employees are assigned an IP address from the public IP range 129.146.31.0/27 Which two steps should you take to ensure that the Object Storage bucket used in this scenario was only accessible from these office locations? (Choose two.). Write an IAM policy that includes the conditional statement where request.networkSource.name = CorpNet. Set the bucket visibility to public and only share the URL with the data science team via email. Create a pre-authenticated request for each data set and only share with the data science team via email. Create a Network Source named CorpNetwork with a CIDR block of 129.146.31.0/27. Create a Network Source named CorpNetwork with a CIDR block of 129.146.0.0/16. Write an IAM policy that includes the conditional statement where request.region = 129.146.31.0/27. |