Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

When defining a query for metric data in Monitoring, which field provides the time window for aggregating metric data points plotted on the metric chart?

A.

Dimension

B.

Namespace

C.

Statistic

D.

Interval

Full Access
Question # 5

As a network architect you have deployed a public subnet on your Virtual Cloud Network (VCN) with this security list:

You have also created a network security group (NSG) as shown in the table here, and assigned it to your bastion host:

You have confirmed that routing is correct but when you SSH to the VM from your home over the Internet you are unable to connect.

What could be the problem?

A.

User will be able to SSH to the VM from the Internet as SSH is open on the NSG.

B.

Public subnet does not have a route rule to the Internet Gateway.

C.

Internet traffic should be allowed only on the NSG.

D.

SSH traffic is not allowed in the security list nor on the NSG from the Internet.

Full Access
Question # 6

You are using a custom application with third-party APIs to manage the application and data hosted in an Oracle Cloud Infrastructure (OCI) tenancy. Although your third-party APIs do not support OCI’s signature-based

authentication, you want them to communicate with OCI resources. Which authentication option should you use to ensure this?

A.

Auth Tokens

B.

OCI Username and Password

C.

API Signing Key

D.

SSH Key Pair with 2048-bit algorithm

Full Access
Question # 7

You have an instance running in Oracle Cloud Infrastructure (OCI) that cannot be live-migrated during an

infrastructure maintenance event. OCI schedules a maintenance due date within 14 to 16 days and sends you a notification.

What would happen if you choose not to proactively reboot the instance before the scheduled maintenance due date?

A.

The instance will get terminated.

B.

The instance is either reboot-migrated or rebuilt in place for you.

C.

You will receive another notification to reboot within the next 14 days.

D.

You will receive another notification to reboot within the next 7 days.

Full Access
Question # 8

Oracle Cloud Agent is a lightweight process that manages plugins running on compute instances.

Which is NOT a valid Oracle Cloud Agent plugin name?

A.

Live Migration Agent

B.

OS Management Service Agent

C.

Compute Instance Run Command

D.

Bastion

Full Access
Question # 9

You are a system administrator of your company and you are managing a complex environment consisting of compute instances running Oracle Linux on Oracle Cloud Infrastructure (OCI). It's your task to apply all the latest kernel security updates to all instances.

Which OCI service will allow you to complete this task?

A.

OCI Streaming service

B.

OS Management service

C.

OCI Registry

D.

OCI Security Zones to achieve automatic security updates

E.

OCI Cloud Guard to monitor and install the security updates

Full Access
Question # 10

You need to set up instance principals so that an application running on an instance can call Oracle Cloud Infrastructure (OCI) public services, without the need to configure user credentials.

A developer in your team has already configured the application built using an OCI SDK to authenticate using the instance principals provider.

Which is NOTa necessary step to complete this set up?

A.

Create a dynamic group with matching rules to specify which instances can make API calls against services.

B.

Generate Auth Tokens to enable instances in the dynamic group to authenticate with APIs.

C.

Create a policy granting permissions to the dynamic group to access services in your compartment or

tenancy.

D.

Deploy the application and the SDK to all the instances that belong to the dynamic group.

Full Access
Question # 11

You want a full-featured Identity-as-a-Service (IDaaS) solution that helps you manage workforce authentication and access to all of your Oracle and non-Oracle applications, whether they are SaaS apps, on-premises enterprise apps, or apps that are hosted in the cloud. Which IAM Identity Domain type should you create?

A.

Free

B.

Oracle Apps Premium

C.

Premium

D.

External User

Full Access
Question # 12

Which TWO statements are NOTcorrect regarding the Oracle Cloud Infrastructure (OCI) burstable instances?

A.

If the instance's average CPU utilization over the past 24 hours is below the baseline, the system allows it to burst above the baseline.

B.

Baseline utilization is a fraction of each CPU core, either 25% or 75%.

C.

Burstable instances cost less than regular instances with the same total OCPU count.

D.

Burstable instances are designed for scenarios where an instance is not typically idle and has high CPU utilization.

E.

Burstable instances are charged according to the baseline OCPU.

Full Access
Question # 13

Which TWO statements about the Oracle Cloud Infrastructure (OCI) File Storage Service are accurate?

A.

Communication with file systems in a mount target is encrypted via HTTPS.

B.

File systems use Oracle-managed keys by default.

C.

Customer can encrypt data in their file system using their own Vault encryption key.

D.

Mount targets use Oracle-managed keys by default.

E.

Customer can encrypt the communication to a mount target via export options.

Full Access
Question # 14

When creating an Oracle Cloud Infrastructure (OCI) Virtual Cloud Network (VCN) with the VCN wizard, which THREE gateways are created automatically?

A.

Internet Gateway

B.

Local Peering Gateway

C.

Dynamic Routing Gateway

D.

NAT Gateway

E.

Storage Gateway

F.

Bastion Host

G.

Service Gateway

Full Access
Question # 15

You created a virtual cloud network (VCN) with three private subnets. Two of the subnets contain application servers and the third subnet contains a DB System. The application requires a shared file system, therefore you have provisioned one using the file storage service (FSS).

You have also created the corresponding mount target in one of the application subnets. The VCN security lists are properly configured so that the application servers can access FSS. The security team changed the settings for the DB System to have read-only access to the file system. However when they test it, they are unable to access FSS.

How would you allow access to FSS?

A.

Create an NFS export option that allows READ_ONLY access where the source is the CIDR range of the DB System subnet.

B.

Create an instance principal for the DB System. Write an Identity and Access Management (IAM) policy that allows the instance principal read-only access to the file storage service.

C.

Modify the security list associated with the subnet where the mount target resides. Change the ingress rules corresponding to the DB System subnet to be stateless.

D.

Modify the security list associated with the subnet where the mount target resides.

E.

Change the ingress rules corresponding to the DB System subnet to be stateful.

Full Access
Question # 16

You are responsible for creating and maintaining an enterprise application that consists of multiple storage volumes across multiple compute instances in Oracle Cloud Infrastructure (OCI).

The storage volumes include boot volumes and block volumes for your data storage. You need to create a backup for the boot volumes that will be done daily and a backup for the block volumes that will be done every six hours.

How can you meet this requirement?

A.

Create clones of all boot volumes and block volumes one at a time.

B.

Group the boot volumes into a volume group and create a custom backup policy. Group the block volumes and create a custom backup policy.

C.

Create on-demand full backups of block volumes, and create custom images from the boot volumes. Use a function to run at a specific time to start the backup process.

D.

Group multiple storage volumes in a volume group and create volume group backups.

Full Access