You have been asked to set up connectivity between a client's on-premises network and Oracle Cloud
Infrastructure (OCI). The requirements are:
Low latency: The applications are financial and require low latency connectivity into OCI.
Consistency: The application isn't tolerant of performance variation.
Performance: The communications link needs to support up to 1.25 Gbps.
Encryption: The communications link needs to encrypt any data in transit between the on-premises
network and OCI Virtual Cloud Network (VCN).
The client wants to implement the above with as low a cost as possible, while meeting all of the
requirements. What should you suggest? (Choose the best answer.)
A. Provision FastConnect with a single private virtual circuit, and run an IPsec VPN tunnel over the top of this virtual circuit.
B. Provision FastConnect with a single public virtual circuit.
C. Provision a site-to-site IPsec VPN between your on-premises network and your virtual cloud network (VCN) using VPN Connect.
D. Provision FastConnect with a single private virtual circuit.
E. Provision FastConnect with a single public virtual circuit, and run an IPsec VPN tunnel over the top of this virtual circuit.
Which two statements about the Oracle Cloud Infrastructure (OCI) Command Line Interface (CLI) are TRUE? (Choose two.)
A. You can run CLI commands from inside OCI Regions only.
B. You can filter CLI output using the JMESPath query option for JSON.
C. The CLI provides an automatic way to connect with instances provisioned on OCI.
D. The CLI allows you to use the Python language to interact with OCI APIs.
E. The CLI provides the same core functionality as the Console, plus additional commands.
You have created a geolocation steering policy in the Oracle Cloud Infrastructure (OCI) Traffic Management service, with this configuration:
What happens to requests that originate in Africa? (Choose the best answer.)
A. The traffic will be forwarded at the same time to both Pool 1 and Pool 2.
B. The traffic will be dropped.
C. The traffic will be forwarded randomly to any of the pools mentioned in the rules.
D. The traffic will be forwarded to Pool 1. If Pool 1 is not available, then it will be forwarded to Pool 2.
A developer has created a file system in Oracle Cloud Infrastructure (OCI) File Storage service. She launches an Oracle Linux compute instance and successfully mounts the file system from the instance.
She then tries writing to the file system from the compute instance using the following command:
touch /mnt/yourmountpoint/helloworld
But gets an error message:
touch: cannot touch ‘/mnt/yourmountpoint/helloworrld’: Permission denied
Which is a reason for this error? (Choose the best answer.)
A. ‘touch’ command is not available in Oracle Linux by default.
B. Service limits or quota for file system writes have been breached.
C. User is not part of any OCI Identity and Access Management group with write permissions to File Storage service.
D. User is connecting as the default Oracle Linux user ‘opc’ instead of ‘root’ user.
You have ordered two FastConnect connections that provide a high availability connection architecture between your on-premises data center and Oracle Cloud Infrastructure (OCI). You want to run these connections in an ACTIVE/PASSIVE architecture.
How can you accomplish this? (Choose the best answer.)
A. Decrease the prefix length of AS for the FastConnect you want to use as PASSIVE connection.
B. Enable BGP on the FastConnect that you want as the ACTIVE connection.
C. Use AS PATH prepending with your routes.
D. Adjust one of the connections to have a higher ASN.
You have been asked to update the lifecycle policy for object storage using the Oracle Cloud Infrastructure (OCI) Command Line Interface (CLI).
Which command can successfully update the policy? (Choose the best answer.)
A. oci os object-lifecycle-policy delete –ns
B. oci os object-lifecycle-policy put –ns
C. oci os object-lifecycle-policy put –ns
D. oci os object-lifecycle-policy get –ns
You have been asked to investigate a potential security risk on your company's Oracle Cloud Infrastructure (OCI) tenancy. You decide to start by looking through the audit logs for suspicious activity.
How can you retrieve the audit logs using the OCI Command Line Interface (CLI)? (Choose the best answer.)
A. oci audit event list –-end-time $end-time –-compartment-id $compartment-id
B. oci audit event list –-start-time $start-time –-compartment-id $compartment-id
C. oci audit event list –-start-time $start-time –-end-time $end-time –-compartment-id $compartment-id
D. oci audit event list –-start-time $start-time –-end-time $end–time –-tenancy-id $tenancy–id
Which technique does NOT help you get the optimal performance out of the Oracle Cloud Infrastructure (OCI) File Storage service? (Choose the best answer.)
A. Limit access to the same Availability Domain (AD) as the File Storage service where possible.
B. Serialize operations to the file system to access consecutive blocks as much as possible.
C. Right size compute instances from where file system is accessed based on their network capacity.
D. Increase concurrency by using multiple threads, multiple clients, and multiple mount targets.
Security Testing Policy describes when and how you may conduct certain types of security testing of Oracle Cloud Services, including vulnerability and penetration tests, as well as tests involving data scraping tools.
What does Oracle allow as part of this testing? (Choose the best answer.)
A. Customers are allowed to use their own testing and monitoring tools.
B. Customers can simulate DoS attack scenarios as long as it's restricted to the customer's own environment.
C. Customers can validate that their network resources are isolated from other customer resources.
D. Customers are allowed to test Oracle Cloud Infrastructure (OCI) hardware related to resources in their tenancy.
An insurance company has contracted you to help automate their application business continuity plan. They have the application running in eu-frankfurt-1 as the primary site and uk-london-1 as a disaster recovery site. Normally they have a DNS A record associated with the IP address of the primary endpoint in eu-frankfurt-1. In the event of a disaster, they use OCI DNS Zone Management to update the A record and replace it with the IP address of the endpoint in uk-londond-1.
How can you automate the failover process? (Choose the best answer.)
A. Create a Health Check that evaluates both regional endpoints. Create a Traffic Management Steering policy with Failover type and associate it with the Health Check.
B. Create a Traffic Management Steering policy with Load Balancer type and add both eu-frankfurt-1 and uk-london-1 endpoints. Attach the Traffic Management Steering policy to the A record.
C. Provision a Load Balancer in Frankfurt and associate it with the A record in DNS. Create a backend set with backend servers from both eu-frankfurt-1 and uk-london-1 regions.
D. Create a Traffic Management Steering policy and attach it to a backend servers from both eu-frankfurt1 and uk-london-1 regions.