لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
You have created the following JSON file to specify a lifecycle policy for one of your object storagebuckets:How will this policy affect the objects that are stored in the bucket? (Choose the best answer.)
A. Reattach the boot volume and restart the instance
B. Attach the resized boot volume to a second instance as a data volume; extend the partition and grow the file system in the resized boot volume
B. Objects containing the name prefix LOGS will be automatically migrated from standard Storage to Archive storage 30 days after the creation date
C. Stop the instance and detach the boot volume
C. The objects with prefix “LOGS” will be deleted 30 days after creation date
D. Resize the boot volume by specifying a larger value than the boot volume’s current size
D. Objects containing the name prefix LOGS will be automatically migrated from standard Storage to Archive storage 30 days after the creation date
E. Create a RAID 0 configuration to extend the boot volume file system onto another block volume
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Multiple teams are sharing a tenancy in Oracle Cloud Infrastructure (OCI). You are asked to figure outan appropriate method to manage OCI costs.Which is NOT a valid technique to accurately attribute costs to resources used by each team?(Choose the best answer.)
A. Network Security GroupA
B. Data Safe
B. Create separate compartment for each team
C. Web Application Framework (WAF)
C. Create an Identity and Access Management (IAM) group for each team
D. Vault
D. Define and use tags for resources used by each team
عرض الإجابة
اجابة صحيحة: C
السؤال #3
You are working as a Cloud Operations Administrator for your company. They have different Oracle Cloud Infrastructure (OCI) tenancies for development and production workloads. Each tenancy has resources in two regions -- uk-london-1 and eu-frankfurt-1. You are asked to manage all resources and to automate all the tasks using OCI Command Line Interface (CLI). Which is the most efficient method to manage multiple environments using OCI CLI? (Choose the best answer.)
A. se OCI CLI profiles to create multiple sets of credentials in your config file, and reference the appropriate profile at runtime
B. reate environment variables for the sets of credentials that align to each combination of tenancy, region, and environment
C. un oci setup config to create new credentials for each environment every time you want to access the environment
D. se different bash terminals for each environment
عرض الإجابة
اجابة صحيحة: A
السؤال #4
You have set an alarm to be generated when the CPU usage of a specified instance is greater than10%. In the alarm behavior view below you notice that the critical condition happened around 23:30.You were expecting a notification after 1 minute, however, the alarm firing state did not begin until23:33.What should you change to fix it? (Choose the best answer.)
A. Create an instance pool with a VM
B. Create an instance with 1 OCPU shape
B. Change the alarm condition to be grater than 3%
C. Create an instance with 1 OCPU shape
C. Change the notification topic that you previously associated with the alarm
D. Create an instance pool with a VM
D. Change the alarm’s trigger delay minutes value to 1
عرض الإجابة
اجابة صحيحة: D
السؤال #5
The boot volume on your Oracle Linux instance has run out of space. Your application has crasheddue to a lack of swap space, forcing you to increase the size of the boot volume.Which step should NOT be included in the process used to solve the issue? (Choose the best answer.)
A. set compute quota vm-standard2–2count to 10 in compartment dev where request
B. set compute quota vm-standard2–2–count to 20 in compartment dev
B. Attach the resized boot volume to a second instance as a data volume; extend the partition and grow the file system in the resized boot volume
C. zero compute quotas in tenancy set compute quota vm–standard2–2–count to 20 in compartment dev
C. Stop the instance and detach the boot volume
D. zero compute quotas in tenancy set compute quota vm–standard2–2–count to 20 in tenancy dev
D. Resize the boot volume by specifying a larger value than the boot volume’s current size
E. Create a RAID 0 configuration to extend the boot volume file system onto another block volume
عرض الإجابة
اجابة صحيحة: B
السؤال #6
You are launching a Windows server in your Oracle Cloud Infrastructure (OCI) tenancy. You provideda startup script during instance initialization, but it was not executed successfully.What is a possible reason for this error? (Choose the best answer.)
A. Limit access to the same Availability Domain (AD) as the File Storage service where possible
B. Serialize operations to the file system to access consecutive blocks as much as possible
B. Wrote a custom script which tried to install GPU drivers
C. Right size compute instances from where file system is accessed based on their network capacity
C. Ran a cloudbase-init script instead of cloud-init
D. Increase concurrency by using multiple threads, multiple clients, and multiple mount targets
D. Specified a #directive on the first line of your script
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Your deployment platform within Oracle Cloud Infrastructure (OCI) leverages a compute instancewith multiple block volumes attached. There are multiple teams that use the same compute instanceand have access to these block volumes. You want to ensure that no one accidentally deletes any ofthese block volumes. You have started to construct the following IAM policy but need to determinewhich permissions should be used.allow group DeploymentUsers to manage volume-family where ANY{ request.permission != , r
A. OS Management Service agent (osms) must be installed on the instances
B. Audit logs for the instances should be enabled
B. VOLUME_ERASE, VOLUME_ATTACHMENT_ERASE, VOLUME_BACKUP_ERASE
C. Service gateway should be setup to allow instances to send metrics to monitoring service
C. ERASE_VOLUME, ERASE_VOLUME_ATTACHMENT, ERASE_VOLUME_BACKUP
D. Monitoring for the instances should not be enabled
D. DELETE_VOLUME, DELETE_VOLUME_ATTACHMENT, DELETE_VOLUME_BACKUP
عرض الإجابة
اجابة صحيحة: A
السؤال #8
You have a group pf developers who launch multiple VM.Standard2.2 compute instances every dayinto the compartment Dev. As a result, your OCI tenancy quickly hit the service limit for this shape.Other groups can no longer create new instances using VM.Standard2.2 shape.Because of this, your company has issued a new mandate that the Dev compartment must include aquota to allow for use of only 20 VM.Standard2.2 shapes per Availability Domain. Your solutionshould not affect any other compartment in the tenancy.
A. Client-side encryption is managed by the customer
B. Data needs to be decrypted on the client side before retrieving it
B. set compute quota vm-standard2–2–count to 20 in compartment dev
C. OCI Vault Management is used by default to provide data security
C. zero compute quotas in tenancy set compute quota vmstandard22count to 20 in compartment dev
D. All traffic to and from Object Storage service is encrypted using TLS
D. zero compute quotas in tenancy set compute quota vmstandard22count to 20 in tenancy dev
E. A VPN connection to OCI is required to ensure secure data transfer to an object storage bucket
عرض الإجابة
اجابة صحيحة: B
السؤال #9
You set up a bastion host in your VCN to only allow your IP address (140.19.2.140) to establish SSHconnections to your Compute Instances that are deployed in a private subnet. The ComputeInstances have an attached Network Security Group with a Source Type: Network Security Group(NSG), Source NSG: NSG-050504. To secure the bastion host, you added the following ingress rules toits Network Security Group:However, after checking the bastion host logs, you discovered that there are IP addresses other thanyour ow
A. An ALARM with a name unique across the tenancy, a SUBSCRIPTION, and a METRIC with the measurement of interest
B. A TOPIC with a name unique across the tenancy, a SUBSCRIPTION, and a MESSAGE where content is published
B. All compute instances associated with NSG-050504 are also able to connect to the bastion host
C. A TOPIC with a name unique across the compartment, a SUBSCRIPTION, and a MESSAGE where content is published
C. The port 22 provides unrestricted access to 140
D. An ALARM with a name unique across the compartment, a SUBSCRIPTION, and a METRIC with the measurement of interest
D. A netmask of /32 allows all IP address in the 140
عرض الإجابة
اجابة صحيحة: B
السؤال #10
You launched a Linux compute instance to host the new version of your company website via ApacheHttpd server on HTTPS (port 443). The instance is created in a public subnet along with otherinstances. The default security list associated to the subnet is:You want to allow access to the company website from public internet without exposing websiteseventually hosted on the other instances in the public subnet.Which action would you take to accomplish the task? (Choose the best answer.)
A. Create Auth token, use it to create an object storage credential by executing DBMS_CLOUD
B. Create the tables in the ADW database and then execute SQL*Loader for each CSV file to load the contents into the corresponding ADW database table
B. In default security list, add a stateful rule to allow ingress access on port 443
C. Create Auth token, use it to create an object storage credential by executing DBMS_CLOUD
C. Create a new security list with a stateful rule to allow ingress access on port 443 and associate it to the public subnet
D. Create Auth token, use it to create an object storage credential by executing DBMS_CLOUD
D. Create a network security group, add a stateful rule to allow ingress access on port 443 and associate it to the instance that hosts the company website
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Which statement about Oracle Cloud Infrastructure paravirtualized block volume attachments isTRUE? (Choose the best answer.)
A. 10
B. 10
B. Paravirtualized is required to manage iSCSI configuration for virtual machine instances
C. 10
C. Paravirtualized volumes become immediately available on bare metal compute instances
D. 10
D. Paravirtualization utilizes the internal storage stack of compute instance OS and network hardware virtualization to access block volumes
عرض الإجابة
اجابة صحيحة: A
السؤال #12
You have ordered two FastConnect connections that provide a high availability connectionarchitecture between your on-premises data center and Oracle Cloud Infrastructure (OCI). You wantto run these connections in an ACTIVE/PASSIVE architecture.How can you accomplish this? (Choose the best answer.)
A. The Security List allows access to all IP address which overrides the Network Security Group ingress rules
B. All compute instances associated with NSG-050504 are also able to connect to the bastion host
B. Enable BGP on the FastConnect that you want as the ACTIVE connection
C. The port 22 provides unrestricted access to 140
C. Use AS PATH prepending with your routes
D. A netmask of /32 allows all IP address in the 140
D. Adjust one of the connections to have a higher ASN
عرض الإجابة
اجابة صحيحة: C
السؤال #13
An insurance company has contracted you to help automate their application business continuity plan. They have the application running in eu-frankfurt-1 as the primary site and uk-london-1 as a disaster recovery site. Normally they have a DNS A record associated with the IP address of the primary endpoint in eu-frankfurt-1. In the event of a disaster, they use OCI DNS Zone Management to update the A record and replace it with the IP address of the endpoint in uk-londond-1. How can you automate the failover
A. reate a Health Check that evaluates both regional endpoints
B. reate a Traffic Management Steering policy with Load Balancer type and add both eu-frankfurt-1 and uk- london-1 endpoints
C. rovision a Load Balancer in Frankfurt and associate it with the A record in DNS
D. reate a Traffic Management Steering policy and attach it to a backend servers from both eu-frankfurt-1 and uk-london-1 regions
عرض الإجابة
اجابة صحيحة: A
السؤال #14
You have been asked to investigate a potential security risk on your companys Oracle CloudInfrastructure (OCI) tenancy. You decide to start by looking through the audit logs for suspiciousactivity.How can you retrieve the audit logs using the OCI Command Line Interface (CLI)? (Choose the bestanswer.)
A. –tA
B. – –image-id
B. oci audit event list –-start-time $start-time –-compartment-id $compartment-id
C. – –shape “”
C. oci audit event list -start-time $start-time -end-time $end-time - compartment-id $compartment-id
D. –c
D. oci audit event list –-start-time $start-time –-end-time $end–time –-tenancy-id $tenancy–id
E. – –subnet-id
عرض الإجابة
اجابة صحيحة: C
السؤال #15
You are using Oracle Cloud Infrastructure (OCI) services across several regions: us-phoenix-1, us-ashburn-1, uk-london-1 and ap-tokyo-1. You have creates a separate administrator group for eachregion: PHX-Admins, ASH-Admins, LHR-Admins and NRT-Admins, respectively.You want to restrict admin access to a specific region. E.g., PHX-Admins should be able to manage allresources in the us-phoenix-1 region only and not any other OCI regions.What IAM policy syntax is required to restrict PHX-Admins to manage OCI re
A. VOLUME_DELETE, VOLUME_ATTACHMENT_DELETE, VOLUME_BACKUP_DELETEA
B. VOLUME_ERASE, VOLUME_ATTACHMENT_ERASE, VOLUME_BACKUP_ERASE
B. Allow group PHX-Admins to manage all-resources in tenancy where request
C. ERASE_VOLUME, ERASE_VOLUME_ATTACHMENT, ERASE_VOLUME_BACKUP
C. Allow group PHX-Admins to manage all-resources in tenancy where request
D. DELETE_VOLUME, DELETE_VOLUME_ATTACHMENT, DELETE_VOLUME_BACKUP
D. Allow group PHX-Admins to manage all-resources in tenancy where request
عرض الإجابة
اجابة صحيحة: A
السؤال #16
You have been asked to update the lifecycle policy for object storage using the Oracle CloudInfrastructure (OCI) Command Line Interface (CLI).Which command can successfully update the policy? (Choose the best answer.)
A. Allow group SystemAdmins to manage virtual-network-family in compartment CompartmentB:CompartmentCA
B. Allow group SystemAdmins to manage virtual-network-family in compartment Root
B. oci os object-lifecycle-policy put –ns –bn
C. Allow group SystemAdmins to manage virtual-network-family in compartment CompartmentA:CompartmentB:CompartmentC
C. oci os object-lifecycle-policy put ns bn items
D. Allow group SystemAdmins to manage virtual-network-family in compartment CompartmentC
D. oci os object-lifecycle-policy get –ns –bn
عرض الإجابة
اجابة صحيحة: C
السؤال #17
A developer has created a file system in Oracle Cloud Infrastructure (OCI) File Storage service. She launches an Oracle Linux compute instance and successfully mounts the file system from the instance. She then tries writing to the file system from the compute instance using the following command: touch /mnt/yourmountpoint/helloworld But gets an error message: touch: cannot touch '/mnt/yourmountpoint/helloworrld': Permission denied Which is a reason for this error? (Choose the best answer.) https://docs.ora
A. touch' command is not available in Oracle Linux by default
B. ervice limits or quota for file system writes have been breached
C. ser is not part of any OCI Identity and Access Management group with write permissions to File Storage service
D. ser is connecting as the default Oracle Linux user 'opc' instead of 'root' user
عرض الإجابة
اجابة صحيحة: D
السؤال #18
You created an Oracle Linux compute instance through the Oracle Cloud Infrastructure (OCI)management console then immediately realize you forgot to add an SSH key file. You notice that OCIcompute service provides instance console connections that supports adding SSH keys for a runninginstance. Hence, you created the console connection for your Linux server and activated it using theconnection string provided. However, now you get prompted for a username and password to login.What option should you recommend
A. oci os object-lifecycle-policy delete –ns –bnA
B. oci os object-lifecycle-policy put –ns –bn
B. You need to terminate the running instance and recreate it by providing the SSH key file
C. oci os object-lifecycle-policy put –ns –bn – –items
C. You need to reboot the instance from the console, boot into the bash shell in maintenance mode, and add SSH keys for the opc user
D. oci os object-lifecycle-policy get –ns –bn
D. You need to modify the serial console connection string to include the identity file flag, i to specify the SSH key to use
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: