You use a bucket in Object Storage to store backups of a database. Versioning is enabled on these objects, so that every time you take a new backup, it creates a new version. You add the following life-cycle policy rule: { "action": "DELETE", "is-enabled": true, "name": "Delete-Rule", "object-name-filter": null, "target": "objects", "time-amount": 60, "time-unit": "DAYS" } Which option is true regarding this rule?
One of your development teams has asked for your help to standardize the creation of several compute instances that must be provisioned each day of the week. You initially write several Command Line Interface (CLI) commands with all appropriate configuration parameters to achieve this task later determining this method lacks flexibility. Which command generates a JSON-based template that Oracle Cloud Infrastructure (OCI) CLI can use to provision these instances on a regular basis? (Choose the best answer.)
You run a large global application with 90% of your customers based in the US and Canada. You want to test a new feature and allow a small percentage of users to access the new version of your application. Which Oracle Cloud Infrastructure (OCI) Traffic Management steering policy should you utilize?
You have been asked to set up connectivity between a client on-premises network and Oracle Cloud Infrastructure (OCI). The requirements are:
✑ Low latency: The applications are financial and require low latency connectivity into OCI. ✑ Consistency: The application is not tolerant of performance variation.
✑ Performance: The communications link needs to support up to 1.25 Gbps.
✑ Encryption: The communications link needs to encrypt any data in transit between the on-premises network and OCI Virtual Cloud Network (VCN). The client wants to implement the above with as low a cost as possible, while meeting all of the requirements. What should you suggest? (Choose the best answer.)
Which statement is incorrect regarding replication being turned ON for a bucket named my-bucket?
You are asked to investigate a potential security risk on your company Oracle Cloud Infrastructure (OCI) tenancy. You decide to start by looking through the audit logs for suspicious activity. How can you retrieve the audit logs using the OCI Command Line Interface (CLI)? (Choose the best answer.)
When creating an alarm query in Oracle Cloud Infrastructure (OCI) Monitoring, which of the following statement is NOT valid?
Security Testing Policy describes when and how you may conduct certain types of security testing of Oracle Cloud Services, including vulnerability and penetration tests, as well as tests involving data scraping tools. What does Oracle allow as part of this testing? (Choose the best answer.)
You have a web application running on Oracle Cloud Infrastructure (OCI) that lets users log in with a username and password. You notice that an attacker has tried to use SQL comment to alter the database query, remove the password check and log in as a user. You decide to prevent any future attacks. Which of the following OCI services or features would you choose to safeguard your application? (Choose the best answer.)
Scenario: 4 (Write Identity and Access Management Policies to Secure a Tenancy)
Scenario Description: (Hands-On Performance Exam Certification)
Your company has signed up for an OCI tenancy to migrate an e-commerce application, a supply chain management (SCM) system, and a customer relationship management (CRM) system. You have been tasked with setting up the requisite identity and access management (IAM) policies for your team to begin developing on OCI.
You start by setting up the following compartment hierarchy:
Tenancy (root)
Common-Infra
Network
Security
Applications
E-Comm
SCM
CRM
You create the following groups:
Network-Admins
Security-Admins
E-Comm-Admins
SCM-Admins
CRM-Admins
Write the IAM policies for the following use cases:
Assumptions:
Assume that all policies will be attached to the root compartment.
Write one policy per given text box.
Keep policies as simple as possible by using verbs instead of permissions (for example, “inspect orm-stacks” instead of “ORM_STACK_INSPECT”) and aggregate resource types instead of individual ones (for example, “file-family” instead of “file-systems” and “mount-targets”)
Task 1
Write a policy statement to enable Network-Admins to create and destroy network-related resources, such as VCNs, subnets, gateways, and so on in the Network compartment.
Task 2
Write policy statements to enable E-Comm-Admins to provision and destroy compute instances in the E-Comm compartment by using networking resources in the Network compartment.[Write one policy per given text box]
Task 3
Write a policy statement to enable SCM-Admins to provision, destroy, and back up block volumes in the SCM compartment—but only in Phoenix and London.