Вы находитесь на странице: 1из 5

1) What are three key characteristics of block storage volumes?

a. They can be converted into a Boot Volume


b. They can be detached from one compute instance and attached to another in the same
AD
c. They can be cloned
d. They can be suspended while not in use to avoid paying for utilization
e. They can be backed up to the Object Storage Service
2) What is the default backup location for automatic database backups on Database Systems
within OCI
a. ASM disk groups
b. Locally attached NVMe storage
c. Block volumes
d. Object Storage on Oracle Cloud Infrastructure
3) Which two statements about the availability of the Oracle File Storage Service are accurate?
a. A file system created with the Oracle File Storage Service provides a mount target in
single subnet of your choice but is mountable by instances in all Ads within a region
b. A file system created with the OFS can provide a mount target in multiple subnets local
to each AD within a region.
c. A file system created with the OFS service provides a mount target within a single
subnet and is only accessible to instances in the AD of the subnet.
d. Multiple file systems can be exposed via a single mount target.
4) You are in the process of setting up a HA student registration website on OCI. You use a LB and
ad a DB service on OCI. You launch two Compute instances each in a different subnet and add
them to backend set of a public load balancer. The LB is configured correctly and working . You
then deploy the student registration app on these two compute instances. The app can
communicate with the database service. However, when you type the URL of this student
registration application in your browser, no web page appears. What could be the cause?
a. The client requested https access to the application and the load balancer service does
not support end-to-end SSL from the client to the listener to the backend set.
b. The security lists of the subnets on which the two instances are located do not have
“allow” rules for port 80 and 443
c. The dynamic routing gateway is preventing the client traffic from your data center
network from reaching the public IP of the load balancer.
d. The load balancer performed a health check on the application and found that compute
instances were not in a healthy state and terminated the instances.
5) Which three steps do you perform to configure a highly available and secure hybrid network
between OCI and you data center?
a. Create a dynamic routing gateway (DRG) in more than one AD in your region.
b. Configure two or more CPEs to leverage each of the IPSec tunnels created by the
connection process
c. Define a non overlapping IP address space between the data center and cloud
d. Configure two or more customer premise equipments that map to the private IP
addresses of the customer routers used in the IPSec VPN tunnel
e. Define a route table entry for the virtual cloud network (VCN), which directs traffic to
your data center network via a single DRG.
6) Which two statements are true about IAM policies?
a. A policy specifies who can access which OCI resources that your company has and how
b. You can utilize read , write, manage and inspect as verbs for defining a policy.
c. You can deny access to a group via policies.
d. Users must be members of one or more groups where appropriate policies have be
defined.
7) Which two statements are true about boot volumes?
a. You can create a backup of boot volumes.
b. You can delete the boot volume that is currently attached to an instance
c. You can detach a boot volume from a running instance
d. You can launch another instance by using an unused boot volume.
8) When terminating a compute instance, which statement is true?
a. All block volumes attached to the instance are terminated
b. The boot volume is always deleted
c. The instance needs to be stopped first and then terminated
d. Users can preserve the boot volume associated with the instance.
9) Which two characteristics do you need to consider when choosing a method to migrate a
database to OCI?
a. On premises host OS platform and network bandwidth
b. On premises database version and quantity of data, including indexes.
c. On-premises connectivity using remote and local virtual cloud network ( VCN) peering
d. On-premises database character set and application version
10) You have a compute instance with five 1TB block volumes attached to it and you need to create
a backup of those volumes. Which is the recommended method to ensure time-consistent
backups of those volumes
a. Group all five volumes into a volume group and create a backup of the volume group.
b. Clone each block volume individually
c. Crate a script with five sequential backup OCI command line commands
d. Create a shell script to clone each volume individually.
11) You have a shared file system between two web servers by using file storage service (FSS) and
are tasked with creating a backup plan for this environment to protect the data placed in the
shared file system. What is the recommended approach to create this backup using FSS
features?
a. Use rsync tool to send data from the shared file system to a boot volume on the same
region.
b. Use rsync tool to send data from the shared file system to a block volume and take a
backup of this volume in a different region
c. Execute a snapshot of the shared file system and replicate your data to another FSS in a
different region using rsync
d. Implement a cron job to copy data from the shared file system to object storage
e. Compress the data that is in the shared file system and copy to a different folder on
block volume.
12) Which statement about the Oracle Cloud Infrastructure (OCI) object storage URL path (URI) is
correct?
https://objectstorage.us-ashburn-1.oraclecloud.com/n/testnamespace/b/myBucket/o/file.log
a. The object “file.log” is stored in the folder “MyBucket” without any namespace
b. The object “file.log” is stored in the bucket “testnamespace/b/myBucket”
c. The object “file.log” is stored in the bucket “objectstorage.us-ashburn-
1.oraclecloud.com/n/testnamepsace/b/myBucket”
d. The object “file.log” is stored in the bucket “myBucket” in the namespace
“testnamespace”
13) You company is moving an internet facing, 2-tier web application to OCI. The application must
have a highly available architecture. Which two design options would you consider”?
a. Configure a NAT instance in your virtual cloud network ( VCN) . Create a route rule by
using the private IP of the NAT instance as a route target for all the private subnets in
your VCN.
b. Place all web servers behind a public load balancer.
c. Distribute all web servers across two or more availability domains.
d. Configure a dynamic routing gateway in your VCN and make it highly available.
14) You are asked to configure a VPN connection to connect your on-premise network to OCI VCN.
After the VCN has been create, what steps do you need to take on OCI to create an IPSec
tunnel?
a. Crate an Internet Gateway, configure a CPE with appliance information and then
configure the IGW to open an IPSec connection
b. Create a DRG, configure a CPE with appliance information and then configure the DRG
to open an IPSec connection.
c. Create a Dynamic Routing Gateway (DRG) , attach the DRG to the VCN, update the
routing in your route table to use DRG, create a CPE and then configure the DRG to open
IPSec connection to the CPE object
d. Create an Internet Gateway (IGW) , attach the IGW to the VCN, update the routing in
your route table to use DRG, create a Customer Premise Equipment (CPE) and then
configure the IGW to open an IPSec connection to the CPE Object.
15) You are designing an application to use a public load balancer to load balance your incoming
traffic across your backend servers residing in all three availability domains. All the back-end
servers have similar processing capacity. Which load balancing policy is best for this scenario?
a. IP Hash
b. Round Robin
c. Least Connection
d. Least response time
16) What is the customers responsibility on the OCI database system?
a. Choosing when to automatically apply Database patches.
b. Creating the first, default databases on the database system
c. Installing the operating system, grid infrastructure, and database software
d. Creating ASM disc groups for the datafile and tempfile storage
17) What is the main purpose of the Internet Gateway (IG)?
a. It provides communication between compute instances within your VCN.
b. It Provides a path for network traffic between your VCN and the public internet.
c. It generates and assigns a public IP address to each compute instance you create.
d. It provides a connection between two or more VCNs.
18) What is the difference between VM Standard and VM Dense IO shapes?
a. VM Standard has more memory than VM Dense IO.
b. VM Standard is ideal for extreme transactional workload while VM Dense IO is not
c. VM Dense IO will perform worse than VM Standard.
d. VM Dense IO will provide local NVMe drives and VM Standard will provide block storage
only
19) Where are IAM resources ( such as users and groups) created?
a. In each Availability domain
b. Globally
c. In each region
d. IN each compartment
20) Which two best practices should you follow when creating new users and assigning permissions
in Identity and Access Management (IAM)?
a. Notify all users that they must create a complex password with a minimum length of 8
characters
b. You should create a default IAM group that allows users access to inspect all-resources
in tenancy, and then add each new user to this group.
c. You should create IAM groups that correspond to specific project teams and roles.
Assign policies that confirm to the concept of least privileged access. Add each new user
to the appropriate group.
d. Provide a name that is unique across all users in the tenancy
e. Provide each new user an API signing key so they can reset their password the first time
they log in
f. Provide a name that is unique across all users in the compartment.
21) Which resource is tied to an Availability Domain?
a. Security lists
b. Route table
c. Block Volume
d. VCN
e. Autonomous Data Warehouse
22) Which three components are created by default when creating a new virtual cloud network?
a. Internet gateway
b. Route table
c. DHCP options
d. Dynamic routing gateway
e. Security list
23) You are a network architect of an application running on OCI. Your security team has informed
you about a security patch that needs to be applied immediately to one of the backend web
servers. What should you do to ensure that the OCI load balancer does not forward traffic to
this backend server during maintenance?
a. Edit the security list associated with the subnet to avoid traffic connectivity to this
backend server
b. Stop the load balancer for maintenance and restart the load balancer after the
maintenance is finished
c. Drain all existing connections to this backend server and mark the backend web server
offline
d. Create another OCI load balancer for the backend web servers , which are active and
handling traffic.
24) Which two statements are true about Autonomous Data Warehouse (ADW) backups?
a. You must backup ADW database to object storage bucket name ADW_backup.
b. You can backup ADW database only to a standard bucket type in object storage in OCI
c. You can perform manual backups to OCI object storage in addition to automated
backups available on ADW
d. Oracle cloud Infrastructure (OCI) recommends backing up ADW databases manually to
on-premises storage devices.

Вам также может понравиться