You have created the following JSON file to specify a lifecycle policy for one of your object storage buckets:
Answer : B
You have set an alarm to be generated when the CPU usage of a specified instance is greater than 10%. In the alarm behavior view below you notice that the critical condition happened around 23:30. You were expecting a notification after 1 minute, however, the alarm firing state did not begin until 23:33.
Answer : D
You have ordered two FastConnect connections that provide a high availability connection architecture between your on-premises data center and Oracle Cloud
Infrastructure (OCI). You want to run these connections in an ACTIVE/PASSIVE architecture.
How can you accomplish this? (Choose the best answer.)
Answer : C
Reference:
https://docs.oracle.com/en-us/iaas/Content/Resources/Assets/whitepapers/connectivity-redundancy-guide.pdf
(5)
The boot volume on your Oracle Linux instance has run out of space. Your application has crashed due to a lack of swap space, forcing you to increase the size of the boot volume.
Which step should NOT be included in the process used to solve the issue? (Choose the best answer.)
Answer : B
You launched a Linux compute instance to host the new version of your company website via Apache Httpd server on HTTPS (port 443). The instance is created in a public subnet along with other instances. The default security list associated to the subnet is:
Answer : D
You are using Oracle Cloud Infrastructure (OCI) services across several regions: us-phoenix-1, us-ashburn-1, uk-london-1 and ap-tokyo-1. You have creates a separate administrator group for each region: PHX-Admins, ASH-Admins, LHR-Admins and NRT-Admins, respectively.
You want to restrict admin access to a specific region. E.g., PHX-Admins should be able to manage all resources in the us-phoenix-1 region only and not any other OCI regions.
What IAM policy syntax is required to restrict PHX-Admins to manage OCI resources in the us-phoenix-1 region only? (Choose the best answer.)
Answer : A
You created an Oracle Linux compute instance through the Oracle Cloud Infrastructure (OCI) management console then immediately realize you forgot to add an
SSH key file. You notice that OCI compute service provides instance console connections that supports adding SSH keys for a running instance. Hence, you created the console connection for your Linux server and activated it using the connection string provided. However, now you get prompted for a username and password to login.
What option should you recommend to add the SSH key to your running instance, while minimizing the administrative overhead? (Choose the best answer.)
Answer : D
Reference:
https://docs.oracle.com/en-us/iaas/Content/Compute/References/serialconsole.htm
You are launching a Windows server in your Oracle Cloud Infrastructure (OCI) tenancy. You provided a startup script during instance initialization, but it was not executed successfully.
What is a possible reason for this error? (Choose the best answer.)
Answer : C
Reference:
https://blogs.oracle.com/cloud-infrastructure/windows-custom-startup-scripts-and-cloud-init-on-oracle-cloud-infrastructure
You have been asked to update the lifecycle policy for object storage using the Oracle Cloud Infrastructure (OCI) Command Line Interface (CLI).
Which command can successfully update the policy? (Choose the best answer.)
Answer : C
Which statement about Oracle Cloud Infrastructure paravirtualized block volume attachments is TRUE? (Choose the best answer.)
Answer : A
Reference:
https://blogs.oracle.com/cloud-infrastructure/paravirtualized-block-volume-attachments-for-vms
Multiple teams are sharing a tenancy in Oracle Cloud Infrastructure (OCI). You are asked to figure out an appropriate method to manage OCI costs.
Which is NOT a valid technique to accurately attribute costs to resources used by each team? (Choose the best answer.)
Answer : C
You have been asked to investigate a potential security risk on your companyג€™s Oracle Cloud Infrastructure (OCI) tenancy. You decide to start by looking through the audit logs for suspicious activity.
How can you retrieve the audit logs using the OCI Command Line Interface (CLI)? (Choose the best answer.)
Answer : C
Your deployment platform within Oracle Cloud Infrastructure (OCI) leverages a compute instance with multiple block volumes attached. There are multiple teams that use the same compute instance and have access to these block volumes. You want to ensure that no one accidentally deletes any of these block volumes.
You have started to construct the following IAM policy but need to determine which permissions should be used. allow group DeploymentUsers to manage volume-family where ANY { request.permission != <???>, request.permission != <???
>, request.permission != <???> }
Which permissions can you use in place of <???> in this policy? (Choose the best answer.)
Answer : A
You have a group pf developers who launch multiple VM.Standard2.2 compute instances every day into the compartment Dev. As a result, your OCI tenancy quickly hit the service limit for this shape. Other groups can no longer create new instances using VM.Standard2.2 shape.
Because of this, your company has issued a new mandate that the Dev compartment must include a quota to allow for use of only 20 VM.Standard2.2 shapes per
Availability Domain. Your solution should not affect any other compartment in the tenancy.
Which quota statement should be used to implement this new requirement? (Choose the best answer.)
Answer : A
You set up a bastion host in your VCN to only allow your IP address (140.19.2.140) to establish SSH connections to your Compute Instances that are deployed in a private subnet. The Compute Instances have an attached Network Security Group with a Source Type: Network Security Group (NSG), Source NSG:
NSG-050504. To secure the bastion host, you added the following ingress rules to its Network Security Group:
Answer : B