Where is the tenancy Oracle Cloud Identifier (OCID) located?
A. given by support on account creation
B. at the bottom of every console page
C. on the Identity ?Users page
D. contained within the compartment OCID
When creating a subnet, one or more placeholder security lists are often associated with the subnet. Why?
A. Each operator needs its own security list.
B. Each protocol needs its own security list.
C. Each network endpoint or instance in the subnet needs its own security list.
D. It is not possible to add or remove security lists after a subnet is created.
Which statement is true about a pre-authenticated request in Oracle Cloud Infrastructure Object Storage?
A. You can create only 1, 000 pre-authenticated requests per bucket.
B. You can create a pre-authenticated request only for public buckets.
C. You cannot retire a pre-authenticated request before it expires.
D. You cannot extend the expiration date on a pre-authenticated request.
You need to create a high performance shared file system service, and have been advised to use OCI File Storage Service. You have logged into the OCI Console, created a File System in an availability domain, and followed the steps to mount the shared file system on your Oracle Linux virtual Instance. However, you are still unable to access the shared file system from your Linux instance.
What is the likely reason for this?
A. There are no security list rules for mount target traffic
B. There is no IGW set up for mount target traffic
C. There is no IAM policies set up to allow you to access the mount target
D. There is no route in your VCN's route table for mount target traffic
Which three methods can you use to manage Oracle Cloud Infrastructure services? (Choose three.)
A. Oracle Cloud Infrastructure Desktop Client
B. Oracle Cloud Infrastructure Console
C. SSH or RDP
D. Command-line Interface
E. REST API
Which two statements are true about policies?
A. You can use read, write, manage, and inspect as verbs for defining a policy.
B. A policy is a document that specifies who can access which Oracle Cloud Infrastructure resources that your company has, and how.
C. Users need not do anything but still have to be added to a group with appropriate policies defined.
D. You can deny access to a group via policies.
You have provisioned an Autonomous Data Warehouse (ADW) database with 16 enabled OCPUs and
need to configure the consumer group for your application.
Which two are true when deciding the number of sessions for each application? (Choose two.)
A. The MEDIUM and LOW consumer group can run up to 16 concurrent SQL statements if HIGH consumer group has 0 SQL statements
B. The HIGH consumer group can run up to 16 concurrent SQL statements as long as MEDIUM and LOW consumer groups have 0 SQL statements
C. The MEDIUM consumer group can run 20 concurrent SQL statements when HIGH consumer group has 0 SQL statements
D. The HIGH consumer group can run up to 16 concurrent SQL statements in addition to 32 concurrent SQL statements in MEDIUM and LOW consumer group each
E. The HIGH consumer group can run 3 concurrent SQL statements when MEDIUM consumer group has 0 SQL statements
You are deploying a highly available web application in Oracle Cloud Infrastructure and have decided to
use a public load balancer. The back-end web servers will be distributed across all three availability
domains (ADs).
How many subnets should you create to deliver a secure highly available application?
A. three subnets in total; one subnet in each AD
B. five subnets in total; two subnets each in the first and second AD with a single subnet in the third AD
C. six subnets in total; two subnets in each AD; one for the load balancer and one for the web servers
D. four subnets in total; one subnet in each AD for the web servers and a single subnet in any one AD for the load balancer
You are designing a two-tier web application in Oracle Cloud Infrastructure (OCI). Your clients want to
access the web servers from anywhere, but want to prevent access to the database servers from the
Internet.
Which is the recommended way to design the network architecture?
A. Create public subnets for web servers and private subnets for database servers in your virtual cloud network (VCN), and associate separate internet gateways for each subnet.
B. Create public subnets for web servers and associate a dynamic routing gateway with that subnet, and a private subnet for database servers with no association to dynamic gateway.
C. Create public subnets for web servers and private subnets for database servers in your VCN, and associate separate security lists and route tables for each subnet.
D. Create a single public subnet for your web servers and database servers, and associate only your web servers to internet gateway.
Which two statements are true about data guard service on DB Systems in Oracle Cloud Infrastructure (OCI)? (Choose two.)
A. Data guard implementation requires two DB Systems, one running the primary database on a virtual machine and the standby database running on bare metal
B. Data guard configuration on the OCI is limited to one standby database per primary database
C. Data guard configuration on the OCI is limited to a virtual machine only
D. Data guard implementation requires two DB Systems, one containing the primary database and one containing the standby database