Your company has implemented a new VPN connection policy,
three months after you connected your on-premises network to Oracle Cloud
Infrastructure. Your chief security officer has instructed you to edit the
IPSec connection and replace the shared secrets with the new ones that he
provided you. Where do you edit the shared secrets?
A.
Individual tunnels
B.
Customer Premises Equipment
C. IPSEC connection
D.
Dynamic Routing Gateway
Answer
C
Which value must an
application have to retrieve a secret bundle from Oracle Cloud Infrastructure?
A. Vault OCID
B.
Bundle OCID
C.
Key OCID
D.
Secret OCID
Answer
A
Hardware Security Modules (HSMS) in Oracle Key Management
meet which Federal Information Processing Standard (FIPS) standard security
certification that requires HSMS to be temper- resistance and authentication to
be identity based?
A.
FIPS 140-3 Level 3
B. FIPS 140-2 Level 3
C.
FIPS 140-1 Level
D.
FIPS 140-2 Level 2
Answer
B
You have created several Oracle Cloud Infrastructure Groups
with the prefix of 'Test' in your tenancy. For example, TestEcommerce,
Testcatalog, and TestAdministration. You want to create another group called
TestGroupsAdmin to manage all the groups that start with "Test"
except for the group TestAdministration.
A.
allow group TestGroupsAdmin to manage groups in
tenancy where
target.group.name%D/Test*/ &&
!(target.group.name = 'TestAdministration')
B. allow group TestGroupsAdmin to
manage groups in tenancy where all
{target.group.name = / Test*/.target.group.name !=
'TestAdministration'}
C.
allow group TestGroupsAdmin to manage groups in
tenancy Where any
{target.group.name = / Test*
/,target.group.name l= 'TestAdministration}
D.
allow group TestGroupsAdmin to manage groups in
tenancy where
target.group.name = /Test*/ and =
'TestAdministration')
Answer
B
Your
company has hired a consulting firm to audit your Oracle Cloud Infrastructure
activity and configuration. You have created a set of OCI Users who will be
performing the audit. You assigned these Users to the OrgAuditgrp group. The
auditors require the ability to see the
configuration of all resources within the tenant. You have agreed to exempt the
Dev compartment from the audit. You must follow the least privilege principle.
Which IAM policy should be created to grant the orgAuditGrp the ability to look
at configuration for all resources, except for those resources inside the Dev
compartment?
A. allow group OrgAuditGrp to inspect
all-resources in tenancy
where target.compartment.name != 'Dev'
B.
allow group OrgAuditGrp to read all-resources in
tenancy
where target.compartment.name != 'Dev'
C.
allow group OrgAuditGrp to read all-resources in
compartment !! = Dev
D.
allow group OrgAuditGrp to inspect all-resources
in
compartment ! = Dev
Answer
A
Which two services can leverage Vault symmetric encryption
keys for data-at-rest?
A.
Load Balancer
B. Block volume
C.
API Gateway
D. Object Storage
E.
CDN
F.
WAF
Answer
B,D
You want to enable Cloud Guard in your tenancy. Which is NOT
a prerequisite?
A.
Ensure that you have a paid tenancy.
B.
Add the required IAM policy for the user to
access Cloud Guard.
C. Install the monitoring agent on
the instances you want to monitor.
D.
Create IAM policies that allow Cloud Guard to
read Oracle Cloud Infrastructure (OCI) resources.
Answer
C
You have subscribed to a tenancy, in which you want to
isolate the OCI resources from different users logically for governance. Which
OCI resource will help you achieve logical separation?
A.
Fault Domain
B.
Availability Domain
C. Compartment
D.
Dynamic Group
E.
Group
Answer
C
In OCI Secret management within a Vault, you have created a
secret and rotated the secret one time. The current version state shows:
Version Number | Status
2 (latest) | Current
1 | Previous
In order to rollback to version 1, what should the Administrator
do?
A. From the version 1 menu, select
"Promote to Current".
B.
From the version 2 (latest) menu, select "Rollback..."
and select version 1 when given the option.
C.
Deprecate version 2 (latest). Create new Secret Version
3. Create soft link from version 3 to version 1.
D.
Create a new secret version 3 and set top ding. Copy
the contents of Version 1 into version 3.
Answer
A
Which three resources are required to encrypt a Block Volume
with a Customer-managed key?
A. Symmetric Master Enctyption Key
B. IAM Policy allowing service blockstorage
to use keys
C. a Vault
D.
a Secret
E.
Maximum Security Zone
F.
Block Key
Answer
A,B,C
0 comments:
Post a Comment
If you have any doubts, please let me know. I will help you.