AND SOLUTIONS RATED A+
✔✔A new customer has logged into OCI as an administrator for the first time. The
admin would like to deploy infrastructure into a region other than their home region.
- Use API endpoints to create resources in the desired region.
- Navigate to the desired region and begin creating resources.
- Subscribe to the desired region.
- File 1 SR for access to such additional regions. - ✔✔Subscribe to the desired region.
✔✔Which is NOT required to register and log support request in MOS?
- Your account password
- Your resource OCID (Oracle Cloud Identifier)
- your Customer Support Identifier(CSI)
-Your Tenancy OCID (Oracle CLoud Identifier) - ✔✔account password
✔✔Budgets can be set on which two options?
- Variables
- Regions
- Cost-Tracking Tags
- Compartments - ✔✔- Cost-Tracking Tags
- Compartments
✔✔Which kind of scaling is supported by virtual machine in OCI?
- Only scaling up or down
- Only scaling out
- Scaling up or down, and scaling in or out.
- Only Scaling In - ✔✔Scaling up or down, and scaling in or out.
✔✔Which is a key benefit of using OCI Autonomous Data Warehouse?
- Maintain root level access to the underlying operating systems.
- Apply database patches as they become available.
- No username and password needed.
- Scale both CPU and Storage without downtime. - ✔✔Scale both CPU and Storage
without downtime.
✔✔You have mission critical application which requires to be globally available at all
time. Which deployment strategy should you adopt?
- Use multiple fault domain in any availability domain with multiple regions.
- Use multiple fault domains in one regions
- Use multiple fault domains in each availability domain in each region
,- Use multiple availability domains in one Region - ✔✔Use multiple fault domain in any
availability domain with multiple regions
Explanation:
Availability domains are isolated from each other, fault tolerant, and very unlikely to fail
simultaneously. Because availability domains do not share infrastructure such as power
or cooling, or the internal availability domain network, a failure at one availability domain
within a region is unlikely to impact the availability of the others within the same region.
fault domain is a grouping of hardware and infrastructure within an availability domain.
Each availability domain contains three fault domains. Fault domains provide anti-
affinity: they let you distribute your instances so that the instances are not on the same
physical hardware within a single availability domain. A hardware failure or Compute
hardware maintenance event that affects one fault domain does not affect instances in
other fault domains. In addition, the physical hardware in a fault domain has
independent and redundant power supplies, which prevents a failure in the power
supply hardware within one fault domain from affecting other fault domains.
✔✔According to standard security model which 2 are a customer's responsibilities in
OCI?
- Physical Security of OCI data center facilities
- Object Storage Data Security
- Virtual Machine Hypervisor
- Customer Data
- Local data persistence - ✔✔Customer Data & Object Storage Data Security
✔✔Which 3 services integrate with OCI Key Management?
- File Storage
- Auto Scaling
- Identity and Access Management
- Object Storage
- Block Volume
- Functions - ✔✔- File Storage
- Object Storage
- Block Volume
Explanation:
DATA ENCRYPTIONProtect customer data at-rest and in-transit in a way that allows
customers to meet their security and compliance requirements for cryptographic
algorithms and key management
The Oracle Cloud Infrastructure Block Volume service always encrypts all block
volumes, boot volumes, and volume backups at rest by using the Advanced Encryption
Standard (AES) algorithm with 256-bit encryption. By default all volumes and their
backups are encrypted using the Oracle-provided encryption keys. Each time a volume
is cloned or restored from a backup the volume is assigned a new unique encryption
key.
, The File Storage service encrypts all file system and snapshot data at rest. By default
all file systems are encrypted using Oracle-managed encryption keys. You have the
option to encrypt all of your file systems using the keys that you own and manage using
the Vault service.
Object Storage employs 256-bit Advanced Encryption Standard (AES-256) to encrypt
object data on the server. Each object is encrypted with its own data encryption key.
Data encryption keys are always encrypted with a master encryption key that is
assigned to the bucket. Encryption is enabled by default and cannot be turned off. By
default, Oracle manages the master encryption key.
✔✔Which OCI service allows you to run code without provisioning any underlying
infrastructure resources (such as virtual machines) ?
- Compute Service
- Storage Gateway
- Oracle Container Engine for Kubernetes
- Oracle Function - ✔✔- Oracle Function
Explanation
Oracle Functions is a fully managed, multi-tenant, highly scalable, on-demand,
Functions-as- a-Service platform. It is built on enterprise-grade Oracle Cloud
Infrastructure and powered by the Fn Project open source engine. Use Oracle
Functions (sometimes abbreviated to just Functions) when you want to focus on writing
code to meet business needs.
The serverless and elastic architecture of Oracle Functions means there's no
infrastructure administration or software administration for you to perform. You don't
provision or maintain compute instances, and operating system software patches and
upgrades are applied automatically.
✔✔Which 2 OCI resources can be used to group/categorize expenses?
- Tags
- Users
- Policies
- Compartments
- Groups - ✔✔- Tags
- Compartments
✔✔Which statement about OCI shared security model is true?
- You are responsible for managing security control within the physical OCI network.
- You are not responsible for any aspect of security in OCI.
- You are responsible for securing all data that you place in OCI
- You are responsible for securing the hypervisor within OCI Compute Service. - ✔✔You
are responsible for securing all data that you place in OCI
✔✔Which 3 components are part of OCI Identity And Access Management service ?
Regional Subnets