You are designing a lab exercise for your team that has a large number of graphics with large file sizes.
The application becomes unresponsive if the graphics are embedded in the application. You have
uploaded the graphics to Oracle Cloud Infrastructure and only added the URL in the application. You need
to ensure these graphics are accessible without requiring any authentication for an extended period of
time.
How can you achieve these requirements?
A. Create pre-authenticated requests (PAR) and specify 00:00:0000 as the expiration time.
B. Make the object storage bucket private and all objects public and use the URL found in the Object "Details".
C. Make the object storage bucket public and use the URL found in the Object "Details".
D. Create PARs and do not specify an expiration date.
Your company uses the Oracle Cloud Infrastructure (OCI) Object Storage service to share large data sets with its data science team. The data science team consists of 20 people who work from offices in Washington, D.C., and Tokyo. While working in these offices, employees are assigned an IP address from the public IP range 129.146.31.0/27 Which two steps should you take to ensure that the Object Storage bucket used in this scenario was only accessible from these office locations? (Choose two.)
A. Write an IAM policy that includes the conditional statement where request.networkSource.name =CorpNet
B. Set the bucket visibility to public and only share the URL with the data science team via email
C. Create a pre-authenticated request for each data set and only share with the data science team via email
D. Create a Network Source named CorpNetwork with a CIDR block of 129.146.31.0/27
E. Create a Network Source named CorpNetwork with a CIDR block of 129.146.0.0/16
F. Write an IAM policy that includes the conditional statement where request.region = 129.146.31.0/27
You provisioned an Oracle Autonomous Data Warehouse (ADW) on Oracle Cloud Infrastructure (OCI) and
imported data into ADW.
You want to give your business analyst the ability to connect to the ADW database and run queries. Which
two actions can help you meet this requirement? (Choose two.)
A. Create a database user account for the business analyst.
B. Grant the predefined database role DWROLE to the database user.
C. Grant unlimited tablespace privilege to the database user.
D. Grant the predefined database role DWADW to the database user.
E. Grant the predefined database role DWUSER to the database user.
You are responsible for creating and maintaining an enterprise application that consists of multiple storage volumes across multiple compute instances in Oracle Cloud Infrastructure (OCI). The storage volumes include boot volumes and block volumes for your data storage. You need to create backups of these storage volumes in the most time-efficient manner. How can you meet this requirement?
A. Create clones of all boot volumes and block volumes one at a time.
B. Create on-demand full backups of boot volumes, and copy data in block volumes to Object Storage using OCI CLI.
C. Create on-demand full backups of block volumes, and create custom images from the boot volumes.
D. Group together multiple storage volumes in a volume group and create volume group backups.
At the end of a terraform apply operation, what is the default output?
A. nothing by default
B. statistics about what was added, changed, and destroyed
C. the entire state file
D. statistics about what was added, changed, and destroyed, and the values of outputs
Which two identity providers can your administrator federate with Oracle Cloud Infrastructure? (Choose two.)
A. Microsoft Active Directory
B. Oracle Identity Cloud Services
C. AWS Directory Services
D. Google Directory Federation Services
You have a shared file system between two web servers using File Storage Service (FSS) and you were tasked to create a backup plan for this environment to protect the data placed into the shared file system. What is the recommended approach to create this backup using FSS features?
A. Implement a backup policy to execute a snapshot of the shared volume.
B. Implement a backup policy to copy data from the shared volume to object storage.
C. Compress the data that is in the shared volume and copy it into a different folder on the boot volume disk.
D. Use the rsync tool to send data from the shared volume to a boot volume disk.
E. Use the rsync tool to send data from the shared volume to a block volume.
Which two Oracle Cloud Infrastructure database services allow you to dynamically both scale CPU and storage? (Choose two.)
A. bare metal DB system
B. virtual machine DB system
C. Autonomous Data Warehouse (ADW)
D. Autonomous Transaction Processing (ATP)
You have provisioned an Autonomous Data Warehouse (ADW) database with 16 enabled OCPUs and need to configure the consumer group for your application. Which two are true when deciding the number of sessions for each application? (Choose two.)
A. The MEDIUM and LOW consumer group can run up to 16 concurrent SQL statements if HIGH consumer group has 0 SQL statements
B. The HIGH consumer group can run up to 16 concurrent SQL statements as long as MEDIUM and LOW consumer groups have 0 SQL statements
C. The MEDIUM consumer group can run 20 concurrent SQL statements when HIGH consumer group has 0 SQL statements
D. The HIGH consumer group can run up to 16 concurrent SQL statements in addition to 32 concurrent SQL statements in MEDIUM and LOW consumer group each
E. The HIGH consumer group can run 3 concurrent SQL statements when MEDIUM consumer group has 0 SQL statements
You have launched a compute instance running Oracle database in a private subnet in the Oracle Cloud Infrastructure US East region. You have also created a Service Gateway to back up the data files to OCI Object Storage in the same region. You have modified the security list associated with the private subnet to allow traffic to the Service Gateway, but your instance still cannot access OCI Object Storage. How can you resolve this issue?
A. Add a stateful rule that enables ingress HTTPS (TOP port 443) traffic to 001 Object Storage in the security list associated with the private subnet
B. Add a stateful rule that enables egress HTTPS (TCP port 443) traffic to OCI Object Storage in the security list associated with the private subnet
C. Add a rule in the Route Table associated with the private subnet with Target type as "Service Gateway" and destination service as all IAD services in the Oracle Service Network.'
D. Use the default Security List, which has ports open for OCI Object Storage