Oracle Cloud Infrastructure 2021 Cloud Operations Associate v1.0 (1z0-1067-21)

Page:    1 / 4   
Total 55 questions

You have created the following JSON file to specify a lifecycle policy for one of your object storage buckets:


How will this policy affect the objects that are stored in the bucket? (Choose the best answer.)

  • A. Objects with the prefix ג€LOGSג€ will be retained for 120 days and then deleted permanently.
  • B. Objects containing the name prefix LOGS will be automatically migrated from standard Storage to Archive storage 30 days after the creation date. The object will be deleted 120 days after creation.
  • C. The objects with prefix ג€LOGSג€ will be deleted 30 days after creation date.
  • D. Objects containing the name prefix LOGS will be automatically migrated from standard Storage to Archive storage 30 days after the creation date. The object will be migrated back to standard Storage 120 days after creation.


Answer : B

You have set an alarm to be generated when the CPU usage of a specified instance is greater than 10%. In the alarm behavior view below you notice that the critical condition happened around 23:30. You were expecting a notification after 1 minute, however, the alarm firing state did not begin until 23:33.


What should you change to fix it? (Choose the best answer.)

  • A. Change the alarmג€™s metric interval to 1.
  • B. Change the alarm condition to be grater than 3%.
  • C. Change the notification topic that you previously associated with the alarm.
  • D. Change the alarmג€™s trigger delay minutes value to 1.


Answer : D

You have ordered two FastConnect connections that provide a high availability connection architecture between your on-premises data center and Oracle Cloud
Infrastructure (OCI). You want to run these connections in an ACTIVE/PASSIVE architecture.
How can you accomplish this? (Choose the best answer.)

  • A. Decrease the prefix length of AS for the FastConnect you want to use as PASSIVE connection.
  • B. Enable BGP on the FastConnect that you want as the ACTIVE connection.
  • C. Use AS PATH prepending with your routes.
  • D. Adjust one of the connections to have a higher ASN.


Answer : C

Reference:
https://docs.oracle.com/en-us/iaas/Content/Resources/Assets/whitepapers/connectivity-redundancy-guide.pdf
(5)

The boot volume on your Oracle Linux instance has run out of space. Your application has crashed due to a lack of swap space, forcing you to increase the size of the boot volume.
Which step should NOT be included in the process used to solve the issue? (Choose the best answer.)

  • A. Reattach the boot volume and restart the instance.
  • B. Attach the resized boot volume to a second instance as a data volume; extend the partition and grow the file system in the resized boot volume.
  • C. Stop the instance and detach the boot volume.
  • D. Resize the boot volume by specifying a larger value than the boot volumeג€™s current size.
  • E. Create a RAID 0 configuration to extend the boot volume file system onto another block volume.


Answer : B

You launched a Linux compute instance to host the new version of your company website via Apache Httpd server on HTTPS (port 443). The instance is created in a public subnet along with other instances. The default security list associated to the subnet is:


You want to allow access to the company website from public internet without exposing websites eventually hosted on the other instances in the public subnet.
Which action would you take to accomplish the task? (Choose the best answer.)

  • A. Create a network security group, add a stateful rule to allow ingress access on port 443 and associate it to the public subnet that hosts the company website.
  • B. In default security list, add a stateful rule to allow ingress access on port 443.
  • C. Create a new security list with a stateful rule to allow ingress access on port 443 and associate it to the public subnet.
  • D. Create a network security group, add a stateful rule to allow ingress access on port 443 and associate it to the instance that hosts the company website.


Answer : D

You are using Oracle Cloud Infrastructure (OCI) services across several regions: us-phoenix-1, us-ashburn-1, uk-london-1 and ap-tokyo-1. You have creates a separate administrator group for each region: PHX-Admins, ASH-Admins, LHR-Admins and NRT-Admins, respectively.
You want to restrict admin access to a specific region. E.g., PHX-Admins should be able to manage all resources in the us-phoenix-1 region only and not any other OCI regions.
What IAM policy syntax is required to restrict PHX-Admins to manage OCI resources in the us-phoenix-1 region only? (Choose the best answer.)

  • A. Allow group PHX-Admins to manage all-resources in tenancy where request.region= ג€˜phxג€™
  • B. Allow group PHX-Admins to manage all-resources in tenancy where request.permission= ג€˜phxג€™
  • C. Allow group PHX-Admins to manage all-resources in tenancy where request.target= ג€˜phxג€™
  • D. Allow group PHX-Admins to manage all-resources in tenancy where request.location= ג€˜phxג€™


Answer : A

You created an Oracle Linux compute instance through the Oracle Cloud Infrastructure (OCI) management console then immediately realize you forgot to add an
SSH key file. You notice that OCI compute service provides instance console connections that supports adding SSH keys for a running instance. Hence, you created the console connection for your Linux server and activated it using the connection string provided. However, now you get prompted for a username and password to login.
What option should you recommend to add the SSH key to your running instance, while minimizing the administrative overhead? (Choose the best answer.)

  • A. You need to configure the boot loader to use ttyS0 as a console terminal on the VM.
  • B. You need to terminate the running instance and recreate it by providing the SSH key file.
  • C. You need to reboot the instance from the console, boot into the bash shell in maintenance mode, and add SSH keys for the opc user.
  • D. You need to modify the serial console connection string to include the identity file flag, ג€"i to specify the SSH key to use.


Answer : D

Reference:
https://docs.oracle.com/en-us/iaas/Content/Compute/References/serialconsole.htm

You are launching a Windows server in your Oracle Cloud Infrastructure (OCI) tenancy. You provided a startup script during instance initialization, but it was not executed successfully.
What is a possible reason for this error? (Choose the best answer.)

  • A. Didnג€™t include anything in user_data.
  • B. Wrote a custom script which tried to install GPU drivers.
  • C. Ran a cloudbase-init script instead of cloud-init.
  • D. Specified a #directive on the first line of your script.


Answer : C

Reference:
https://blogs.oracle.com/cloud-infrastructure/windows-custom-startup-scripts-and-cloud-init-on-oracle-cloud-infrastructure

You have been asked to update the lifecycle policy for object storage using the Oracle Cloud Infrastructure (OCI) Command Line Interface (CLI).
Which command can successfully update the policy? (Choose the best answer.)

  • A. oci os object-lifecycle-policy delete ג€"ns <object_storage_namespace> ג€"bn <bucket_name>
  • B. oci os object-lifecycle-policy put ג€"ns <object_storage_namespace> ג€"bn <bucket_name>
  • C. oci os object-lifecycle-policy put ג€"ns <object_storage_namespace> ג€"bn <bucket_name> ג€" ג€"items <json_formatted_lifecycle_policy>
  • D. oci os object-lifecycle-policy get ג€"ns <object_storage_namespace> ג€"bn <bucket_name>


Answer : C

Which statement about Oracle Cloud Infrastructure paravirtualized block volume attachments is TRUE? (Choose the best answer.)

  • A. Paravirtualized volumes may reduce the maximum IOPS performance for larger block volumes.
  • B. Paravirtualized is required to manage iSCSI configuration for virtual machine instances.
  • C. Paravirtualized volumes become immediately available on bare metal compute instances.
  • D. Paravirtualization utilizes the internal storage stack of compute instance OS and network hardware virtualization to access block volumes.


Answer : A

Reference:
https://blogs.oracle.com/cloud-infrastructure/paravirtualized-block-volume-attachments-for-vms

Multiple teams are sharing a tenancy in Oracle Cloud Infrastructure (OCI). You are asked to figure out an appropriate method to manage OCI costs.
Which is NOT a valid technique to accurately attribute costs to resources used by each team? (Choose the best answer.)

  • A. Create a Cost-Tracking tag. Apply this tag to all resources with team information. Use the OCI cost analysis tools to filter costs by tags.
  • B. Create separate compartment for each team. Use the OCI cost analysis tools to filter costs by compartment.
  • C. Create an Identity and Access Management (IAM) group for each team. Create an OCI budget for each group to track spending.
  • D. Define and use tags for resources used by each team. Analyze usage data from the OCI Usage Report which has detailed information about resources and tags.


Answer : C

You have been asked to investigate a potential security risk on your companyג€™s Oracle Cloud Infrastructure (OCI) tenancy. You decide to start by looking through the audit logs for suspicious activity.
How can you retrieve the audit logs using the OCI Command Line Interface (CLI)? (Choose the best answer.)

  • A. oci audit event list ג€"-end-time $end-time ג€"-compartment-id $compartment-id
  • B. oci audit event list ג€"-start-time $start-time ג€"-compartment-id $compartment-id
  • C. oci audit event list ג€"-start-time $start-time ג€"-end-time $end-time ג€"-compartment-id $compartment-id
  • D. oci audit event list ג€"-start-time $start-time ג€"-end-time $endג€"time ג€"-tenancy-id $tenancyג€"id


Answer : C

Your deployment platform within Oracle Cloud Infrastructure (OCI) leverages a compute instance with multiple block volumes attached. There are multiple teams that use the same compute instance and have access to these block volumes. You want to ensure that no one accidentally deletes any of these block volumes.
You have started to construct the following IAM policy but need to determine which permissions should be used. allow group DeploymentUsers to manage volume-family where ANY { request.permission != <???>, request.permission != <???
>, request.permission != <???> }
Which permissions can you use in place of <???> in this policy? (Choose the best answer.)

  • A. VOLUME_DELETE, VOLUME_ATTACHMENT_DELETE, VOLUME_BACKUP_DELETE
  • B. VOLUME_ERASE, VOLUME_ATTACHMENT_ERASE, VOLUME_BACKUP_ERASE
  • C. ERASE_VOLUME, ERASE_VOLUME_ATTACHMENT, ERASE_VOLUME_BACKUP
  • D. DELETE_VOLUME, DELETE_VOLUME_ATTACHMENT, DELETE_VOLUME_BACKUP


Answer : A

You have a group pf developers who launch multiple VM.Standard2.2 compute instances every day into the compartment Dev. As a result, your OCI tenancy quickly hit the service limit for this shape. Other groups can no longer create new instances using VM.Standard2.2 shape.
Because of this, your company has issued a new mandate that the Dev compartment must include a quota to allow for use of only 20 VM.Standard2.2 shapes per
Availability Domain. Your solution should not affect any other compartment in the tenancy.
Which quota statement should be used to implement this new requirement? (Choose the best answer.)

  • A. set compute quota vm-standard2ג€"2count to 10 in compartment dev where request.region = us-phoenixג€"1
  • B. set compute quota vm-standard2ג€"2ג€"count to 20 in compartment dev
  • C. zero compute quotas in tenancy set compute quota vmג€"standard2ג€"2ג€"count to 20 in compartment dev
  • D. zero compute quotas in tenancy set compute quota vmג€"standard2ג€"2ג€"count to 20 in tenancy dev


Answer : A

You set up a bastion host in your VCN to only allow your IP address (140.19.2.140) to establish SSH connections to your Compute Instances that are deployed in a private subnet. The Compute Instances have an attached Network Security Group with a Source Type: Network Security Group (NSG), Source NSG:
NSG-050504. To secure the bastion host, you added the following ingress rules to its Network Security Group:


However, after checking the bastion host logs, you discovered that there are IP addresses other than your own that can access your bastion host.
What is the root cause of this issue? (Choose the best answer.)

  • A. The Security List allows access to all IP address which overrides the Network Security Group ingress rules.
  • B. All compute instances associated with NSG-050504 are also able to connect to the bastion host.
  • C. The port 22 provides unrestricted access to 140.19.2.140 and to other IP address.
  • D. A netmask of /32 allows all IP address in the 140.19.2.0 network, other than your IP 140.19.2.140


Answer : B

Page:    1 / 4   
Total 55 questions