Pass the Oracle Oracle Cloud Infrastructure 1z0-1067-24 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

You use a bucket in Object Storage to store backups of a database. Versioning is enabled on these objects, so that every time you take a new backup, it creates a new version. You add the following life-cycle policy rule: { "action": "DELETE", "is-enabled": true, "name": "Delete-Rule", "object-name-filter": null, "target": "objects", "time-amount": 60, "time-unit": "DAYS" } Which option is true regarding this rule?

Options:

A.

Once any specific version is 60 days old, it will be deleted. Deletion will physically delete the data.


B.

If 60 days passes for an object without a new version being created, it will be deleted. Deletion marks the latest version as deleted but does not physically delete it.


C.

60 days after the initial creation, any object will be deleted. Deletion marks the latest version as deleted but does not physically delete it.


D.

60 days after the initial creation, any object will be deleted. Deletion will physically de-lete all versions of the object.


Questions # 2:

One of your development teams has asked for your help to standardize the creation of several compute instances that must be provisioned each day of the week. You initially write several Command Line Interface (CLI) commands with all appropriate configuration parameters to achieve this task later determining this method lacks flexibility. Which command generates a JSON-based template that Oracle Cloud Infrastructure (OCI) CLI can use to provision these instances on a regular basis? (Choose the best answer.)

Options:

A.

oci compute instance create --generate-cli-skeleton


B.

oci compute instance launch --generate-full-command-json-input


C.

oci compute provision-instance --generate-full-command-json-input


D.

oci compute instance launch --generate-cli-skeleton


Questions # 3:

You run a large global application with 90% of your customers based in the US and Canada. You want to test a new feature and allow a small percentage of users to access the new version of your application. Which Oracle Cloud Infrastructure (OCI) Traffic Management steering policy should you utilize?

Options:

A.

Geolocation steering


B.

IP Prefix steering


C.

ASN steering


D.

Load Balancer


Questions # 4:

You have been asked to set up connectivity between a client on-premises network and Oracle Cloud Infrastructure (OCI). The requirements are:

✑ Low latency: The applications are financial and require low latency connectivity into OCI. ✑ Consistency: The application is not tolerant of performance variation.

✑ Performance: The communications link needs to support up to 1.25 Gbps.

✑ Encryption: The communications link needs to encrypt any data in transit between the on-premises network and OCI Virtual Cloud Network (VCN). The client wants to implement the above with as low a cost as possible, while meeting all of the requirements. What should you suggest? (Choose the best answer.)

Options:

A.

Provision a site-to-site IPsec VPN between your on-premises network and your virtual cloud network (VCN) using VPN Connect.


B.

Provision FastConnect with a single public virtual circuit, and run an IPsec VPN tunnel over the top of this virtual circuit.


C.

Provision FastConnect with a single private virtual circuit, and run an IPsec VPN tunnel over the top of this virtual circuit.


D.

Provision FastConnect with a single public virtual circuit.


E.

Provision FastConnect with a single private virtual circuit.


Questions # 5:

Which statement is incorrect regarding replication being turned ON for a bucket named my-bucket?

Options:

A.

Objects deleted from my-bucket after policy creation are automatically deleted from the destination bucket.


B.

Destination bucket becomes read-only after the replication policy is created, and undated only by replication from my-bucket.


C.

Objects uploaded to my-bucket before policy creation are not replicated to the destination bucket


D.

Replication policy creation also creates the destination bucket.


Questions # 6:

You are asked to investigate a potential security risk on your company Oracle Cloud Infrastructure (OCI) tenancy. You decide to start by looking through the audit logs for suspicious activity. How can you retrieve the audit logs using the OCI Command Line Interface (CLI)? (Choose the best answer.)

Options:

A.

oci audit event list --start-time $start-time -compartment-id $compartment-id


B.

oci audit event list --end-time $end-time -compartment-id $compartment-id


C.

oci audit event list --start-time $start-time -end-time $end-time -compartment-id $com-partment-id


D.

oci audit event list --start-time $start-time -end-time $end time -tenancy-id $tenancy id


Questions # 7:

When creating an alarm query in Oracle Cloud Infrastructure (OCI) Monitoring, which of the following statement is NOT valid?

Options:

A.

You must specify Trigger rule (threshold or absence).


B.

You must specify an interval


C.

You must specify Statistic


D.

You must specify a Metric


E.

You must specify Resource Group


Questions # 8:

Security Testing Policy describes when and how you may conduct certain types of security testing of Oracle Cloud Services, including vulnerability and penetration tests, as well as tests involving data scraping tools. What does Oracle allow as part of this testing? (Choose the best answer.)

Options:

A.

Customers can validate that their network resources are isolated from other customer resources.


B.

Customers are allowed to use their own testing and monitoring tools.


C.

Customers can simulate DoS attack scenarios as long as it restricted to the customer own environment.


D.

Customers are allowed to test Oracle Cloud Infrastructure (OCI) hardware related to resources in their tenancy.


Questions # 9:

You have a web application running on Oracle Cloud Infrastructure (OCI) that lets users log in with a username and password. You notice that an attacker has tried to use SQL comment to alter the database query, remove the password check and log in as a user. You decide to prevent any future attacks. Which of the following OCI services or features would you choose to safeguard your application? (Choose the best answer.)

Options:

A.

Data Safe


B.

Web Application Framework (WAF)


C.

Vault


D.

Network Security Group


Questions # 10:

Scenario: 4  (Write Identity and Access Management Policies to Secure a Tenancy)

Scenario Description:  (Hands-On Performance Exam Certification)

Your  company has signed up for an OCI tenancy to migrate an e-commerce  application, a supply chain management (SCM) system, and a customer  relationship management (CRM) system.  You have been tasked with setting  up the requisite identity and access management (IAM) policies for your  team to begin developing on OCI.

You start by setting up the following compartment hierarchy:

    Tenancy (root)

       Common-Infra

             Network

             Security

       Applications

             E-Comm

             SCM

             CRM

You create the following groups:

    Network-Admins

    Security-Admins

    E-Comm-Admins

    SCM-Admins

    CRM-Admins

Write the IAM policies for the following use cases:

Assumptions:

Assume that all policies will be attached to the root compartment.

Write one policy per given text box.

Keep  policies as simple as possible by using verbs instead of permissions  (for example, “inspect orm-stacks” instead of “ORM_STACK_INSPECT”) and  aggregate resource types instead of individual ones (for example,  “file-family” instead of “file-systems” and “mount-targets”)

Task 1

Write  a policy statement to enable Network-Admins to create and destroy  network-related resources, such as VCNs, subnets, gateways, and so on in  the Network compartment.

Task 2

Write  policy statements to enable E-Comm-Admins to provision and destroy  compute instances in the E-Comm compartment by using networking  resources in the Network compartment.[Write one policy per given text  box]

Task 3

Write a  policy statement to enable SCM-Admins to provision, destroy, and back up  block volumes in the SCM compartment—but only in Phoenix and London.


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions