Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What are the TWO main reasons you would choose to implement a serverless architecture? (Choose two.)

A.

No need for integration testing

B.

Automatic horizontal scaling

C.

Easier to run long-running operations

D.

Reduced operational cost

E.

Improved in-function state management

Full Access
Question # 5

From a DevOps process standpoint, it is a good practice to keep changes to an application under version control. Which of the following allows changes to a Docker image to be stored in a version control system?

A.

Updating docker-compose.yml

B.

Executing docker commit

C.

Executing docker save

D.

Updating Dockerfile

Full Access
Question # 6

What is the open source engine for Oracle Functions?

A.

Fn Project

B.

Apache OpenWhisk

C.

OpenFaas

D.

Knative

Full Access
Question # 7

You are building a container image and pushing it to Oracle Cloud Infrastructure Registry (OCIR). You need to ensure that these images never get deleted from the repository. Which action should you take?

A.

Write a policy to limit access to the specific repository in your compartment.

B.

Create a group and assign a policy to perform lifecycle operations on images.

C.

Set global policy of image retention to "Retain All Images".

D.

Edit the tenancy global retention policy.

Full Access
Question # 8

You have just finished building and compiling the software required to implement the API microservice component. You need to rebuild the API docker image, and plan to tag it as: ocIdevops/api:latest Which docker command would re-create the API docker image?

A.

docker build -t OCIdevops/api:latest

B.

docker create -t OCIdevops/api:latest

C.

docker image -t OCIdevops/api:latest

D.

docker compile -t OCI devops/api:latest

Full Access
Question # 9

As a developer, you have been tasked with implementing a microservices-based application. Which THREE technologies are best suited to accomplish the task? (Choose three.)

A.

Terraform

B.

Big Data

C.

Anomaly Detection

D.

Service Mesh

E.

Docker

F.

Kubemetes

Full Access
Question # 10

Which statement about microservices is FALSE?

A.

They are typically designed around business capabilities.

B.

It is fairly common for them to communicate with HTTP.

C.

Multiple microservices can run in one process.

D.

They are independently deployable.

Full Access
Question # 11

Your organization is developing serverless applications with Oracle Functions. Many functions will need to store state data in a database, which will require using appropriate credentials. However, your corporate security standards mandate encryption of secret information, such as database passwords. How would you address this security requirement?

A.

Use OCI Console to enter the password in the function configuration section in the provided input field.

B.

Leverage application-level configuration variables to store passwords because they are automatically encrypted by Oracle Functions.

C.

Use the OCI Vault service to auto-encrypt the password and then set an application-level configuration variable to reference the auto-decrypted password inside your function container.

D.

Encrypt the password using the OCI Vault service and then decrypt this password in your function code with the generated key.

Full Access
Question # 12

You are instructed to automate manual tasks and help software teams manage complex environments at scale using the Oracle Cloud Infrastructure (OCI) services. Which THREE OCI services can be leveraged to securely store and version your application's source code, and automate the building, testing, and deployment of applications to the OCI platform? (Choose three.)

A.

DevOps

B.

Container Engine for Kubernetes

C.

Oracle APEX Application Development

D.

Resource Manager

E.

Oracle Cloud Infrastructure Registry

F.

Oracle Cloud Logging Analytics

Full Access
Question # 13

Which of the following step is NOT required for setting up the Container Engine for Kubernetes (OKE) cluster access using a local installation of kubectl?

A.

Generate Auth token from the OCI console to access the OKE cluster using kubectl.

B.

Install and configure the Oracle Cloud Infrastructure (OCI) CLI.

C.

Set up the kubeconfig file.

D.

Generate an API signing key pair (if you do not already have one) and upload the public key of the API signing key pair.

Full Access
Question # 14

Which THREE are valid statements regarding the OCI Container Engine for Kubernetes (OKE) service? (Choose three.)

A.

You must have access to an Oracle Cloud Infrastructure tenancy. Your tenancy must have sufficient quota on different types of resources.

B.

OKE cannot use existing network resources for the creation of a new cluster.

C.

OKE automatically creates and configures new network resources for the new cluster.

D.

There is a limit of three clusters within each region, but there is no limit on the number of nodes and pods you can create within each cluster.

Full Access
Question # 15

What is the maximum execution time of Oracle Functions?

A.

240 seconds

B.

300 seconds

C.

60 seconds

D.

120 seconds

Full Access
Question # 16

You need to push a new Docker container image to a repository in the Oracle Cloud Infrastructure (OCI) Registry. Which mechanism must you use to provide authentication?

A.

Generate an API signing key to complete the authentication via the Docker CLI.

B.

Generate an Auth Token to complete the authentication via the OCI CLI.

C.

Generate an API signing key to complete the authentication via the OCI CLI.

D.

Generate an Auth Token to complete the authentication via the Docker CLI.

Full Access
Question # 17

You deployed a Python application to an Oracle Container Engine for Kubernetes (OKE) cluster. However, while testing you found a bug, which you rectified and then created a new Docker image. You now need to ensure that if this new image does not work once deployed, you should be able to roll back to the previous version. Using kubect1, which strategy should you use?

A.

Blue/Green Deployment

B.

Canary Deployment

C.

Rolling Update

D.

A/B Testing

Full Access
Question # 18

(CHK_4>2) Which TWO statements are NOT valid regarding the Oracle Cloud Infrastructure (OCI) Streaming service? (Choose two.)

A.

OCI Streaming stores all data for 24 hours by default, but that can be extended up to 7 days.B

B.

Although OCI Streaming automatically encrypts all data while in transit, it is the developer's responsibility to encrypt data at rest, if needed.

C.

The throughput of a stream is defined by a partition. A partition provides 1 MB/sec data input and 2 MB/sec data output.

D.

A stream can be configured with either a public or a private endpoint with support for customer managed encryption keys.

E.

OCI Streaming can support up to 2,000 requests per second to each partition.

Full Access
Question # 19

A Docker image consists of one or more layers, each of which represents a Dockerfile instruction. The layers are stacked and each one is a delta of the changes from the previous layer. What permission is associated with these layers?

A.

read mostly

B.

write only

C.

movable

D.

read only

E.

write once

Full Access
Question # 20

As a Cloud Native developer, you have written a web service for your company. However, your security team has suggested that your web service should address Distributed Denial-of-Service (DDoS) attack. You are time-constrained and you need to ensure that this is implemented as soon as possible. What should you do in this scenario? (Choose the best answer.)

A.

Use a third party service integration to Implement DDoS attack mitigation.

B.

Re-write your web service and implement rate limiting.

C.

Use the OCI Virtual Cloud Network (VCN) segregation to control DDoS.

D.

Use the OCI API Gateway service and configure rate limiting.

Full Access
Question # 21

In the DevOps lifecycle, what is the difference between continuous delivery and continuous deployment? (Choose two.)

A.

Continuous delivery involves automation of developer tasks, while continuous deployment involves manual operational tasks.

B.

Continuous delivery utilizes automatic deployment to a development environment, while continuous deployment involves automatic deployment to a production environment.

C.

Continuous delivery requires more automatic linting, while continuous deployment testing must be run manually.

D.

Continuous delivery is a process that initiates deployment manually, while continuous deployment is based on automating the deployment process.

Full Access
Question # 22

Your team has been tasked with debugging a Cloud Native application developed using the following Oracle Cloud Infrastructure (OCI) services: Object Storage, Events, Functions, API Gateway, and Autonomous Database. Which of these is NOT a valid option for troubleshooting issues in OCI? (Choose the best answer.)

A.

View service metric information from the OCI Monitoring service.

B.

Configure the application to send logs to the OCI Logging service.

C.

Use OCI Service Connector Hub to configure a service connector to automatically send logs to the OCI Logging Analytics service.

D.

Trace performance issues In the Application Performance Monitoring service by enabling Function traces.

E.

Leverage OCI Cloud Guard to extract and visualize the debug logs generated by your application.

Full Access
Question # 23

Kubernetes includes various elements such as compute, network, and storage. Compute is essentially CPU (units) and memory (bytes). Within an OKE cluster, what is considered to be the smallest unit of deployment with respect to compute?

A.

Container

B.

Service

C.

Pod

D.

Namespace

E.

Deployment resource

Full Access
Question # 24

Which open source engine is used by Oracle Cloud Infrastructure (OCI) to power Oracle Functions?

A.

Knative

B.

Kubeless

C.

Apache OpenWhisk

D.

Fn Project

Full Access
Question # 25

Your team has created a serverless application deployed in Oracle Functions. It uses a Python function leveraging the Oracle Cloud Infrastructure (OCI) Python SDK to stop any OCI compute instance that does not comply with your corporate security standards. Although there are three non-compliant OCI compute instances, when you invoke this function, none of the instances were stopped. With respect to this issue, which of the following is a valid troubleshooting strategy?

A.

Enable function logging in the OCI console, add some print statements in your function code, and then view the logs to troubleshoot.

B.

Enable function remote debugging in the OCI console, and then use your favorite IDE to inspect the function running on Oracle Functions.

C.

Ensure that the application is deployed within the same OCI compartment as the instance, because you cannot enable function execution data from the OCI console.

D.

Enable function tracing in the OCI console, and then go to the OCI Monitoring console to view the function stack trace.

Full Access
Question # 26

A company is developing a new application that needs to process transactions in real time. The company wants to ensure that all transactions are processed in order and that no transaction is lost. Which of these is a correct strategy for leveraging OCI Queue in this scenario?

A.

Use a separate queue for each type of transaction.

B.

Use a single queue to process all transactions.

C.

Use a separate queue for each application instance.

D.

Use a priority queue to prioritize requests.

Full Access
Question # 27

Your Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) administrator has created an OKE cluster with one node pool in a public subnet. You have been asked to provide a log file from one of the nodes for troubleshooting purpose. Which step should you take to obtain the log file?

A.

Use the username opc and password to login.

B.

It is impossible because OKE is a managed Kubernetes service.

C.

SSH into the nodes using the private key.

D.

SSH into the node using the public key.

Full Access
Question # 28

Which of these is NOT a valid authentication method for accessing an OCI API Gateway deployment?

A.

HTTP Basic

B.

API Key

C.

OAuth

D.

SAML Token

Full Access
Question # 29

Which of these is a valid use case for OCI Queue?

A.

Managing network traffic between services

B.

Storing and retrieving large files

C.

Sending real-time streaming data

D.

Building decoupled and scalable systems

Full Access
Question # 30

As a Cloud Native developer, you develop two services in Node.js and deploy them to two different Container Engine for Kubernetes (OKE) clusters that use the same Virtual Cloud Network (VCN). Your security team wants to analyze the network communication between them. How can this requirement be met in the most cost-effective way?

A.

Rewrite the application and send the application logs to an outside log aggregator.

B.

Deploy a third-party logging service and aggregate the network flow logs.

C.

Use the OCI Logging service and enable VCN flow logs.

D.

Deploy Wireshark and intercept the packets.

Full Access