لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which two statements are true about Oracle Cloud Infrastructure IPSec VPN Connect?
A. Each OCI IPSec VPN consists of multiple redundant IPSec tunnels
B. OCI IPSec VPN tunnel supports only static routes to route traffic
C. OCI IPSec VPN can be configured in tunnel mode only
D. OCI IPSec VPN can be configured in trans port mode only
عرض الإجابة
اجابة صحيحة: AC
السؤال #2
Your application consists of three Oracle Cloud Infrastructure compute instances running behind apublic load balancer. You have configured the load balancer to perform health checks on theseinstances, but one of the three instances fails to pass the configured health check. Which of thefollowing action will the load balancer perform?
A. Stop sending traffic to the instance that failed health check
B. Terminate the instance that failed health check
C. Stop the instances that failed health check
D. Remove the instance that failed the health check from the backend set
عرض الإجابة
اجابة صحيحة: A
السؤال #3
You have objects stored in an OCI Object Storage bucket that you want to share with a partner company. You decide to use pre-authenticated requests to grant access to the objects. Which statement is true about preauthenticated requests? You cannot edit a pre-authenticated request is a true statement about pre-authenticated requests. Pre-authenticated requests are URLs that allow users to access objects or buckets in OCI Object Storage without requiring additional authentication or authorization. Pre-authent
A. ou cannot edit a pre-authenticated request
B. eleting a pre-authenticated request does not revoke user access to the associated bucket or object
C. ou need to provide your OCI credentials to the partner company
D. re-authenticated requests can be used to delete buckets or objects
عرض الإجابة
اجابة صحيحة: A
السؤال #4
You are running several Linux based operating systems in your on .premises environment that youwant to import to OCI as custom images. You can launch your imported images as OCI computeVirtual machines. Which two modes below can be used to launch these imported Linux VMs?
A. Native
B. Mixed
C. Paravirtualized
D. Emulated
عرض الإجابة
اجابة صحيحة: CD
السؤال #5
You are using a custom application with third-party APIs to manage the application and data hosted in an Oracle Cloud Infrastructure (OCI) tenancy. Although your third-party APIs do not support OCI's signature-based authentication, you want them to communicate with OCI resources. Which authentication option should you use to ensure this? Auth Tokens is the authentication option that you should use to ensure that your custom application with third-party APIs can communicate with OCI resources. Auth Tokens ar
A. uth Tokens
B. CI Username and Password
C. PI Signing Key
D. SH Key Pair with 2048-bit algorithm
عرض الإجابة
اجابة صحيحة: A
السؤال #6
You have launched a compute instance running Oracle database in a private subnet in the OracleCloud Infrastructure US East region. You have also created a Service Gateway to back up the data filesto OCI Object Storage in the same region. You have modified the security list associated with theprivate subnet to allow traffic to the Service Gateway, but your instance still cannot access OCI ObjectStorage. How can you resolve this issue?
A. Add a stateful rule that enables ingress HTTPS (TOP port 443) traffic to 001 Object Storage in the security list associated with the private subnet
B. Add a stateful rule that enables egress HTTPS (TCP port 443) traffic to OCI Object Storage in the security list associated with the private subnet
C. Add a rule in the Route Table associated with the private subnet with Target type as "Service Gateway" and destination service as all IAD services in the Oracle Service Network
D. Use the default Security List, which has ports open for OCI Object Storage
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which two Oracle Cloud Infrastructure services use a Dynamic Routing Gateway?
A. OCI FastConnect Public Peering
B. Local Peering
C. OCI FastConnect Private Peering
D. Internet Gateway
E. OCI IPSec VPN Connect
عرض الإجابة
اجابة صحيحة: CE
السؤال #8
You have a working application in the US East region. The app is a 3-tier app with a database backend- you take regular backups of the database into OCI Object Storage in the US East region. For Businesscontinuity; you are leveraging OCI Object Storage cross-region copy feature to copy database backupsto the US West region. Which of the following three steps do you need to execute to meet yourrequirement?
A. Write an IAM policy and authorize the Object Storage service to manage objects on your behalf
B. Specify an existing destination bucket
C. Specify the bucket visibility for both the source and destination buckets
D. Provide a destination object name
E. Provide an option to choose bulk copying of objects
F. Choose an overwrite rule
عرض الإجابة
اجابة صحيحة: ABF
السؤال #9
You have deployed a compute instance (VM.Standard2.24) to run an Oracle database. With this setup, you run into some performance issues and want to leverage an OCI Dense IO shape(VM.DenseIO2.24), with which you get 25.6 TB local NVMe SSD. You do not want to lose theconfiguration changes you made to the instance. Which of the following TWO steps ARE NOTrequired to make this transition?
A. Terminate the VM
B. Create a new instance using the VM
C. Terminate the VM
D. Create a new instance using a VM
عرض الإجابة
اجابة صحيحة: AD
السؤال #10
You want a full-featured Identity-as-a-Service (IDaaS) solution that helps you manage workforce authentication and access to all of your Oracle and non-Oracle applications, whether they are SaaS apps, on-premises enterprise apps, or apps that are hosted in the cloud. Which IAM Identity Domain type should you create? Premium is the IAM Identity Domain type that you should create if you want a full-featured IDaaS solution that helps you manage workforce authentication and access to all of your Oracle and non-
A. ree
B. racle Apps Premium
C. remium
D. xternal User
عرض الإجابة
اجابة صحيحة: C
السؤال #11
You have two line of business operations (LOB1, LOB2) leveraging Oracle Cloud Infrastructure. LOB1is deployed in VCN1 in the OCI US East region, while LOB2 is deployed in VCN2 in the US West region.You need to peer VCN1 and VCN2 for disaster recovery and data backup purposes. To ensure you canutilize the OCI Virtual Cloud Network remote peering feature, which CIDR ranges should be used?
A. VCN1 (10
B. VCN1 (10
C. VCN1 (172
D. VCN1 (192
عرض الإجابة
اجابة صحيحة: B
السؤال #12
A financial firm is designing an application architecture for its online trading platform that should have high availability and fault tolerance. Their solutions architects configured the application to use an Oracle Cloud Infrastructure (OCI) Object Storage bucket located in the US West (us-phoenix-1) region to store large amounts of financial dat a. The stored financial data in the bucket should not be impacted even if there is an outage in one of the Availability Domains or a complete region. What shoul
A. reate a replication policy to send data to a different bucket in another OCI region
B. opy the Object Storage bucket to a block volume
C. reate a lifecycle policy to regularly send data from the Standard to Archive storage
D. reate a new Object Storage bucket in another region and configure lifecycle policy to move data every 5 days
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which of the following statement is true regarding Oracle Cloud Infrastructure Object Storage Pre-Authenticated Requests?
A. It Is not possible to create pre-authenticated requests for "archive" storage tier
B. Changing the bucket visibility does not change existing pre-authenticated requests
C. It is not possible to create pre-authenticated requests for the buckets, but only for the objects
D. Pre-authenticated requests don't have an expiration
عرض الإجابة
اجابة صحيحة: B
السؤال #14
You have an instance running in a development compartment that needs to make API calls againstother OCI services, but you do not want to configure user credentials or a store a configuration file onthe instance. How can you meet this requirement?
A. Create a dynamic group with matching rules to include your instance
B. Instances can automatically make calls to other OCI services
C. Instances are secure and cannot make calls to other OCI services
D. Create a dynamic group with matching rules to include your instance and write a policy for this dynamic group
عرض الإجابة
اجابة صحيحة: D
السؤال #15
Your IT department wants to cut down storage costs, but also meet compliance requirements as setup by the central audit group. You have a legacy bucket with both Word does (*.docx) and Excel files(*.xlsx). Your auditors want to retain only Excel files for compliance purposes. Your IT departmentswants to keep all other files for 365 days only. What two steps can you take to meet thisrequirement?
A. Create Object Storage Lifecycle rules to archive objects from the legacy bucket after 365 days without any pattern matching
B. Create Object Storage Lifecycle rules to delete objects from the legacy bucket after 365 days with a filter type - include by pattern: ''
C. It is not possible to meet this requirement
D. Create Object Storage Lifecycle rules to delete objects from the legacy bucket after 365 days with a filter type - exclude by pattern: ''
E. Create Object Storage Lifecycle rules to delete objects from the legacy bucket after 365 days without any pattern matching
عرض الإجابة
اجابة صحيحة: BD
السؤال #16
You are a network architect of an application running on Oracle Cloud Infrastructure (OCI). Yoursecurity team has informed you about a security patch that needs to be applied immediately to oneof the backend web servers. What should you do to ensure that the OCI load balancer does notforward traffic to this backend server during maintenance?
A. Drain all existing connections to this backend server and mark the backend web server offline
B. Create another OCI load balancer for the backend web servers, which are active and handling traffic
C. Edit the security list associated with the subnet to avoid traffic connectivity to this backend serve
D. Stop the load balancer for maintenance and restart the load balancer after the maintenance is finished
عرض الإجابة
اجابة صحيحة: A
السؤال #17
You have the following compartment structure in your tenancy. Root compartment->Training->Training-subl ->Training-sub2 You create a policy in the root compartment to allow the defaultadmin for the account (Administrators) to manage block volumes in compartment Training-sub2.What policy would you write to meet this requirement?
A. Allow group Administrators to manage volume-family in root compartment
B. Allow group Administrators to manage volume-family in compartment Training-sub1 :Training- sub2
C. Allow group Administrators to manage volume-family in compartment Training: Training-sub 1 :Training-sub2
D. Allow group Administrators to manage volume-family in compartment Training-sub2
عرض الإجابة
اجابة صحيحة: C
السؤال #18
You have two NFS clients running in two different subnets within the same Oracle CloudInfrastructure (OCI) Virtual Cloud Network (VCN). You have created a shared file system for the twoNFS clients who want to connect to the same file system, but you want to restrict one of the clients tohave READ access while the other has READ/Write access. Which OCr feature would you leverage tomeet this requirement?
A. Use VCN security rules to control access for the NFS clients
B. Use OCI Identity Access Management to control access for the NFS clients
C. Use File Storage NFS Export Options to control access for the NFS clients
D. Use NFS security to control access for the NES clients
عرض الإجابة
اجابة صحيحة: C
السؤال #19
You have three compartments: ProjectA, ProjectB, and ProjectC. For each compartment, there is an admin group set up: A-Admins, B-Admins, and C-Admins. Each admin group has full access over their respective compartments as shown in the graphic below. Your organization has set up a tag namespace, EmployeeGroup.Role and all your admin groups are tagged with a value of 'Admin'. You want to set up a Test compartment for members of the three projects to share. You also need to provide admin access to all three
A. llow all-group to manage all-resources in compartment Test where
request. rincipal
B. llow dynamic-group to manage all-resources in compartment Test where
request. rincipal
C. llow group any-group to manage all-resources in compartment Test where
request. rincipal
D. llow any-user to manage all-resources in compartment Test where
request. rincipal
عرض الإجابة
اجابة صحيحة: D
السؤال #20
You have created a new compartment called Production to host some production apps. You have alsocreated users in your tenancy and added them to a Group called "production group". Your users arestill unable to access the Production compartment. How can you resolve this situation?
A. Every compartment you create comes with a predefined set of policies, so no further action is needed
B. Your users get automatic access to all compartments, so no further action is needed
C. Write an IAM Policy for each specific user granting them access to the production compartment
D. Write an IAM Policy for "production_group" granting it access to the production compartment
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: