Oracle Cloud Infrastructure 2022 Architect Associate v1.0 (1z0-1072-22)

Page:    1 / 4   
Total 55 questions

Your IT team has asked you to provision an Autonomous Database in Oracle Cloud Infrastructure (OCI), but they want it to operate similar to what you have currently on-premises.
What are the TWO prerequisites for successfully deploying an Autonomous Dedicated Database in OCI? (Choose two.)

  • A. Exadata Infrastructure
  • B. Identity and Access Management (IAM) Policies
  • C. Object Storage
  • D. Autonomous Container Database


Answer : AB

You need to implement automatic backups for your database system. You can easily check "Enable Automatic Backup" in the web console. Before you do that though, you need to have which of the following TWO prerequisites in place? (Choose two.)

  • A. VCN configured with VPN for secure access to the Oracle Cloud Infrastructure (OCI) Object Storage service
  • B. Private SSH key to the database
  • C. Access to the OCI Object Storage service
  • D. Connectivity to Swift endpoints


Answer : AC

Which TWO predefined service names can you use when connecting to an Oracle Cloud Infrastructure (OCI) Autonomous Data Warehouse? (Choose two.)

  • A. TP for a connection service when you do not want to run with parallelism.
  • B. TPUrgent for a connection service when you do want to run with parallelism.
  • C. High for the highest level of resources to process each SQL statement.
  • D. Medium for a lower level of resources to process each SQL statement.


Answer : AB

You want to have an exact copy of your database system to demonstrate the feasibility of a method you have in mind. You decide to clone your database system.
Which of the following statement is true about cloning a database system?

  • A. Cloning creates a copy of the source DB system as it exists at the time of scheduling the cloning operation, including the storage configuration software and database volumes.
  • B. Cloning creates a copy of the source DB System as it exists at a later time, including the storage configuration software and database volumes.
  • C. Cloning creates a copy of the source DB system as it exists at an earlier time, including the storage configuration software and database volumes.
  • D. Cloning creates a copy of the source DB system as it exists at the time of the cloning operation, including the storage configuration software and database volumes.


Answer : D

You create a file system and then add a 2 GB file. You then take a snapshot of the file system.
What would be the total meteredBytes shown by the File Storage service after the hourly update cycle is complete?

  • A. 2.5 GB
  • B. 2 GB
  • C. 3 GB
  • D. 4GB


Answer : B

A few Object Storage buckets in your Oracle Cloud Infrastructure (OCI) tenancy should remain public, and yet you do not want the Cloud Guard service to detect these as problems.
In which TWO ways would you address this requirement? (Choose two.)

  • A. Fix the base line by configuring Conditional Groups for the detector.
  • B. Dismiss the problems associated with those resources.
  • C. Cloud Guard will keep detecting it because a public bucket is a security risk.
  • D. Resolve or remediate those problems and you should not see Cloud Guard triggering on these resources ever again.


Answer : AB

In an Object Storage bucket you have two objects named ObjectA and ObjectB. ObjectA was last modified six months ago and ObjectB was modified 14 months ago. You create a retention rule and specify a duration of 1 year.
What does the rule do?

  • A. It prevents the modification or deletion of ObjectA for the next 6 months and allows the modification or deletion of ObjectB.
  • B. It prevents the modification or deletion of ObjectA for the next 6 months and prevents the modification or deletion of ObjectB for the next 2 months.
  • C. It prevents the modification or deletion of ObjectA for the next 12 months and prevents the modification or deletion of ObjectB for the next 14 months.
  • D. It prevents the modification or deletion of ObjectA and ObjectB for the next 12 months.


Answer : D

Which Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM) policy is invalid?

  • A. Allow dynamic-group FrontEnd to manage instance-family in compartment Project-A
  • B. Allow any-user to inspect users in tenancy
  • C. Allow group A-Admins to manage all-resources in compartment Project-A
  • D. Allow group A-Developers to create volumes in compartment Project-A


Answer : B

Which TWO statements are NOT correct regarding the Oracle Cloud Infrastructure (OCI) burstable instances? (Choose two.)

  • A. Burstable instances cost less than regular instances with the same total OCPU count.
  • B. Burstable instances are designed for scenarios where an instance is not typically idle and has high CPU utilization.
  • C. If the instance's average CPU utilization over the past 24 hours is below the baseline, the system allows it to burst above the baseline.
  • D. Baseline utilization is a fraction of each CPU core, either 25% or 75%.
  • E. Burstable instances are charged according to the baseline OCPU.


Answer : DE

You are launching a new project in the US West (Phoenix) region. You would like to reserve the compute capacity mentioned below so that the capacity is available for your workloads when you need it.
10 VM.Standard2.2 Instances
6 VM.Standard.E4.Flex Instances
The project also requires you to be mindful about high availability and place the instances in at least two Availability Domains.
At a bare minimum, how many capacity reservations would you create to meet this requirement?

  • A. One
  • B. Four
  • C. Two
  • D. Three


Answer : D

You want to run compute virtual machine (VM) instances in Oracle Cloud Infrastructure (OCI). Your business unit has the following requirements that need to be considered before you launch the VMs:
Requirement 1: Shared infrastructure should not be used to deploy VMs.
Requirement 2: Meet node-based licensing requirements that require you to license an entire server.
Which compute capacity type would you select to meet these requirements?

  • A. Preemptible capacity
  • B. Dedicated host
  • C. Capacity reservation
  • D. On-demand capacity


Answer : B

Which statement is true regarding the run command feature in the Oracle Cloud Infrastructure (OCI) Compute service?

  • A. You cannot run commands on an instance if the instance does not have SSH access or open inbound ports.
  • B. The maximum size for a script file that you upload directly to an instance in plain text is 4 KB.
  • C. The run command feature does not require any Oracle Cloud Agent plugins to be enabled and running.
  • D. The run command feature is not supported on compute instances that use the Windows Server platform images.


Answer : C

You need to set up instance principals so that an application running on an instance can call Oracle Cloud Infrastructure (OCI) public services, without the need to configure user credentials.
A developer in your team has already configured the application built using an OCI SDK to authenticate using the instance principals provider.
Which is NOT a necessary step to complete this set up?

  • A. Generate Auth Tokens to enable instances in the dynamic group to authenticate with APis.
  • B. Create a policy granting permissions to the dynamic group to access services in your compartment or tenancy.
  • C. Deploy the application and the SDK to all the instances that belong to the dynamic group.
  • D. Create a dynamic group with matching rules to specify which instances can make API calls against services.


Answer : C

You have a high-demand web application running on Oracle Cloud Infrastructure (OCI). Your tenancy administrator has set up a schedule-based autoscaling policy on instance pool with an initial size of 5 instances for the application.
Policy 1:

Target pool size: 10 instances -
Execution time: 8:30 a.m. Monday through Friday, every month, every year
Cron expression: 0 30 8 ? * MON-FRI *
Which statement accurately explains the goal of this policy?

  • A. Goal: A recurring daily schedule. At 8.30 a.m. on weekday mornings, a scale out to 10 instances.
  • B. Goal: A one-time schedule with only one scaling out event. At 8:30 a.m. on December 31, 2022, scale the instance pool to 10 instances from 5.
  • C. Goal: A recurring weekly schedule. At 8.30 a.m. on all days of the week, scale out the pool to 10 instances from the initial size of 5.
  • D. Goal: A recurring monthly schedule. On all days of the month, set the initial pool size to 5 instances. At 8.30 a.m. every day of the month, scale out to 10 instances.


Answer : C

You created a virtual cloud network (VCN) with three private subnets. Two of the subnets contain application servers and the third subnet contains a DB System. The application requires a shared file system, therefore you have provisioned one using the file storage service (FSS).
You have also created the corresponding mount target in one of the application subnets. The VCN security lists are properly configured so that the application servers can access FSS. The security team changed the settings for the DB System to have read-only access to the file system. However, when they test it, they are unable to access FSS.
How would you allow access to FSS?

  • A. Modify the security list associated with the subnet where the mount target resides. Change the ingress rules corresponding to the DB System subnet to be stateless.
  • B. Modify the security list associated with the subnet where the mount target resides. Change the ingress rules corresponding to the DB System subnet to be stateful.
  • C. Create an NFS export option that allows READ_ONLY access where the source is the CIDR range of the DB System subnet.
  • D. Create an instance principal for the DB System. Write an Identity and Access Management (IAM) policy that allows the instance principal read-only access to the file storage service.


Answer : D

Page:    1 / 4   
Total 55 questions