You are a system administrator of your company and you are asked to manage updates and patches across all your compute instances running Oracle Linux in Oracle Cloud Infrastructure (OCI). As part of your task, you need to apply all the latest kernel security updates to all instances. Which OCI service will allow you to complete this task?
A. Resource Manager
B. OS Management
C. Storage Gateway
D. Streaming E. Registry
You have been asked to create an Identity and Access Management (IAM) user that will authenticate to
Oracle Cloud Infrastructure (OCI) API endpoints. This user must not be given credentials that would allow
them to log into the OCI console.
Which two authentication options can you use? (Choose two.)
A. SSL certificate
B. API signing key
C. SSH key pair
D. PEM Certificate file
E. Auth token
Which statement Is true about Data Guard implementation in Oracle Cloud Infrastructure (OCI) bare metal and virtual machine database systems?
A. Primary and standby databases must be in the same OCI region.
B. Both database systems must be in the same compartment.
C. Database systems need not be the same shape type (e.g, primary database can be a virtual machine, and standby database a bare metal shape, and vice versa).
D. Primary and standby database versions and editions need not be Identical.
Which two configuration formats does Terraform support? (Choose two.)
A. YAML
B. JSON
C. HCL
D. XML
Which five are the required parameters to launch an instance in Oracle Cloud Infrastructure? (Choose five.)
A. subnet
B. Availability Domain
C. Virtual Cloud Network
D. host name
E. instance shape
F. image operating system
G. private IP address
When creating a subnet, one or more placeholder security lists are often associated with the subnet. Why?
A. Each operator needs its own security list.
B. Each protocol needs its own security list.
C. Each network endpoint or instance in the subnet needs its own security list.
D. It is not possible to add or remove security lists after a subnet is created.
A customer wants to do development on premise while leveraging services such as Java Cloud, Mobile Developer Cloud, and App Builder Services. The customer would also like to scale out the application, stretching from on-premises to the cloud by using a common API. Which two Infrastructure options can the customer leverage to do this? (Choose two.)
A. Oracle Cloud at Customer
B. Oracle Cloud Infrastructure Classic
C. Oracle Cloud Ravello service
D. Oracle Cloud Infrastructure
You are in the process of setting up a highly available student registration website on Oracle Cloud Infrastructure (OCI). You use a load balancer and a database service on OCI. You launch two compute instances each in a different subnet and add them to the back end set of a public load balancer. The load balancer is configured correctly and working. You then deploy the student registration application on these two compute instances. The application can communicate with the database service. However, when you type the URL of this student registration application in your browser, no web page appears. What could be the cause?
A. The security lists of the subnets on which the two instances are located do not have "allow" rules for port 80 and 443.
B. The load balancer performed a health check on the application and found that compute instances were not in a healthy state and terminated the instances.
C. The client requested https access to the application and the load balancer service does not support end-to-end SSL from the client to the listener to the back-end set.
D. The Dynamic Routing Gateway is preventing the client traffic from your data center network from reaching the public IP of the load balancer.
You are the Cloud Architect of a company, and are designing a solution on Oracle Cloud Infrastructure where you want to have all your compute instances resistant to hardware failure. Which two are recommended best practices to achieve the requirement on Oracle Cloud Infrastructure? (Choose two.)
A. Create a custom image of your system drive each time you change the image.
B. Attach block volumes from different Availability Domains to compute instances in different Availability Domains for high availability.
C. Design your system with redundant compute modes in different Availability Domains to support the failover capability.
D. Create backups of your block volumes that are associated with compute instances in different regions.
Where are DB Systems backups stored by default?
A. ASM disk group
B. locally attached NVMe on virtual machine
C. block volume
D. object storage on Oracle Cloud Infrastructure
Which two are a valid image source when launching a new compute instance? (Choose two.)
A. bare metal instance
B. object storage
C. custom image
D. boot volume
Your Operations team has recently created a new, standard image that will be used to launch all new application servers in the Finance compartment. The custom image currently exists in the Operations compartment. You have access to manage all-resources in the Finance compartment and do not have access to the Operations compartment. Which two methods would make the new image available for you to use when deploying new servers in the Finance compartment? (Choose two.)
A. Instruct the Operations team to reassign the custom image to the Finance compartment so you can select it from a drop-down list when launching new compute resources.
B. Instruct the Operations team to export the image to an object storage bucket, create a preauthenticated request (PAR), and provide you with the URL. Download the custom image to your laptop and import it as a custom image in the Finance compartment.
C. Instruct the Administrators team to grant you access to use instance-images in the Operations compartment. Use the Oracle Cloud Identifier (OCID) of the custom image when launching new compute resources in the Finance compartment.
D. Instruct the Operations team to export the image to an object storage bucket, create a PAR, and provide you with the URL. Use that URL as the source when importing a custom image. Import the custom image into the Finance compartment.
E. Instruct the Operations team to export the image to an object storage bucket. Instruct the Administrators team to grant you access to the object storage bucket where the custom image is stored. Use the download URL of the custom image as the image source when launching new compute resources in the Finance compartment.
Which two statements are true about Oracle Cloud Infrastructure (OCI) DB Systems?
A. Customers have no control over database patching.
B. The database and backups are encrypted by default.
C. Customers can consolidate multiple database homes on a single virtual machine database host.
D. Customers can manage the TDE Wallet after DB Systems is provisioned.
You have the following compartment structure in your tenancy. Root compartment->Training- >Training
subl ->Training-sub2 You create a policy in the root compartment to allow the default admin for the account
(Administrators) to manage block volumes in compartment Training-sub2.
What policy would you write to meet this requirement?
A. Allow group Administrators to manage volume-family in root compartment
B. Allow group Administrators to manage volume-family in compartment Training-sub1 :Training- sub2
C. Allow group Administrators to manage volume-family in compartment Training: Training-sub 1 :Training-sub2
D. Allow group Administrators to manage volume-family in compartment Training-sub2
You have two NFS clients running in two different subnets within the same Oracle Cloud Infrastructure (OCI) Virtual Cloud Network (VCN). You have created a shared file system for the two NFS clients who want to connect to the same file system, but you want to restrict one of the clients to have READ access while the other has READ/Write access. Which OCr feature would you leverage to meet this requirement?
A. Use VCN security rules to control access for the NFS clients
B. Use OCI Identity Access Management to control access for the NFS clients
C. Use File Storage NFS Export Options to control access for the NFS clients
D. Use NFS security to control access for the NES clients