Which two are characteristics of microservices?
A. Microservices communicate over
lightweight APIS.
B. Microservices can be
independently deployed.
C.
C. Microservices can be implemented in limited
number of programming languages.
D.
D. Microservices are hard to test in isolation.
E.
E. All microservices share a data store.
Answer
A,B
Which header is NOT required when signing GET requests to
Oracle Cloud Infrastructure APIS?
A. content-type
B.
host
C.
(request-target)
D.
date or x-date
Answer
A
A leading insurance firm is hosting its customer portal in
Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes with an OCI
Autonomous Database.
Their support team discovered a lot of SQL injection
attempts and cross-site scripting attacks to the portal, which is starting to
affect the production environment.
What should they implement to mitigate this attack?
A.
Network Security Groups
B.
Network Security Firewall
C. Web Application Firewall
D.
Network Security Lists
Answer
C
You are working on a cloud native e-commerce application on
Oracle Cloud Infrastructure (OCI).
Your application architecture has multiple OCI services,
including Oracle Functions. You need to trigger these functions directly from
other OCI services, without having to run custom code.
Which OCI service cannot trigger your functions directly?
A. OCI Registry Correct)
B.
Oracle Integration
C.
OCI Events Service
D.
OCI API Gateway
Answer
A
You have been asked to create a stateful application
deployed in Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes
(OKE) that requires all of your worker nodes to mount and write data to
persistent volumes.
Which two OCI storage services should you use?
A. Use OCI Block Volume backed
persistent volume.
B. Use OCIObject Storage as
persistent volume.
C.
Use OCI File Services as persistent volume.
D.
Use open-source storage solutions on top of OCI.
E.
Use GlusterFS as persistent volume.
Answer
A,B
A developer using Oracle Cloud Infrastructure (OCI) API
Gateway must authenticate the API requests to their web application. The
authentication process must be implemented using a custom scheme which accepts
string parameters from the API caller.
Which method can the developer use in this scenario?
A.
Create a cross account functions authorizer.
B.
Create an authorizer function using OCI Identity
and Access Management based authentication.
C. Create an authorizer function
using token-based authorization.
D.
Create an authorizer function using request
header authorization.
Answer
C
You need to execute a script on a remote instance through
Oracle Cloud Infrastructure Resource Manager.
Which option can you use?
A. • Use remote-exec
B.
• Download the script to a local desktop and
execute the script.
C.
• It cannot be done.
D.
• Use /bin/sh with the full path to the location
of the script to execute the script.
Answer
A
Which two are required to enable Oracle Cloud Infrastructure
(OCI) Container Engine for Kubernetes (OKE) cluster access from the kubectl
CLI?
A.
А. OCI Identity and Access Management Auth Token
B. A configured OCI API signing key
pair
C. Install and configure the OCI
CLI
D.
Tiller enabled on the OKE cluster
E.
An SSH key pair with the public key added to
cluster worker nodes.
Answer
B,C
Which two statements accurately describe an Oracle Functions
application?
A.
A small block of code invoked in response to an
Oracle Cloud Infrastructure (OCI) Events
service
B.
An application based on Oracle Functions, Oracle
Cloud Infrastructure (OCI) Events and OCI API Gateway services
C. A common context to store
configuration variables that are available to all functions in C. the application
D. A logical group of functions
E.
A Docker image containing all the functions that
share the same configuration
Answer
C,D
You are building a container image and pushing it to the
Oracle Cloud Infrastructure Registry (OCIR). You need to make sure that these
images never get deleted from the repository.
Which action should you take?
A.
Set global policy of image retention to
"Retain All Images".
B.
In your compartment, write a policy to limit
access to the specific repository.
C. Edit the tenancy global
retention policy.
D.
Create a group and assign a policy to perform
lifecycle operations on images.
Answer
C
Which two "Action Type" options are NOT available
in an Oracle Cloud Infrastructure (OCI) Events rule definition?
A.
Notifications
B. Email
C. Slack
D.
Functions
E.
Streaming
Answer
B,C
You are deploying an API via Oracle Cloud Infrastructure
(OCI) API Gateway and you want to implement request policies to control access.
Which is NOT available in OCI API Gateway?
A.
Limiting the number of requests sent to backend
services
B. Controlling access to OCI
resources
C.
Enabling CORS (Cross-Origin Resource Sharing)
support
D.
Providing authentication and authorization
Answer
B
Which is NOT a valid option to execute a function deployed
on Oracle Functions?
A. Invoke from Docker CLI
B.
Invoke from Fn Project CLI
C.
Send a signed HTTP requests to the function's
invoke endpoint
D.
Trigger by an event in Oracle Cloud
Infrastructure Events service
E.
Invoke from Oracle Cloud Infrastructure CLI
Answer
A
With the volume of communication that can happen between
different components in cloud-native applications, it is vital to not only test
functionality, but also service resiliency.
Which statement is true with regards to service resiliency?
A.
A goal of resiliency is not to bring a service
to a functioning state after a failure.
B. Resiliency is about recovering
from failures without downtime or data loss.
C.
Resiliency testing can be only done in a test
environment.
D.
Resiliency is about avoiding failures.
Answer
B
A pod security policy (PSP) is implemented in your Oracle
Cloud Infrastructure Container Engine for Kubernetes cluster.
Which rule can you use to prevent a container from running
as root using PSP ?
A.
RunOnlyAsUser
B. MustRunAsNonRoot
C.
forbiddenRoot
D.
NoPrivilege
You have two microservices, A and B running in production.
Service A relies on APIs from service B. You want to test changes to service A
without deploying all its dependencies, which includes service B.
Which approach should you take to test service A?
A.
There is no need to explicitly test APIS.
B. Test using API mocks.
C.
Test against production API.
D.
Test the APIs in private environments.
Answer
B
To effectively test your cloud-native applications, you
might utilize separate environments (development, testing, staging, production,
etc.) Which Oracle Cloud Infrastructure (OCI) service can you use to create and
manage your infrastructure?
A.
OCI Container Engine for Kubernetes
B.
OCI API Gateway
C. OCI Resource Manager
D.
OCI Compute
Answer
C
You want to push a new image in the Oracle Cloud
Infrastructure (OCI) Registry.
Which two actions do you need to perform?
A. Assign an OCI defined tag via
OCI CLI to the image.
B. Generate an auth token to complete
the authentication via Docker CLI.
C.
Generate an API signing key to complete the
authentication via Docker CLI.
D.
Assign a tag via Docker CLI to the image.
E.
Generate an OCI tag namespace in your
repository.
Answer
A,B
You have written a Node.js function and deployed it to
Oracle Functions. Next, you need to call this function from a microservice written
in Java deployed on Oracle Cloud Infrastructure (OCI) Container Engine for
Kubernetes (OKE).
Which can help you to achieve this? DUMPS.
A.
Use the OCI CLI with kubectl to invoke the
function from the microservice.
B.
Oracle Functions does not allow a microservice
deployed on OKE to invoke a function.
C. Use the OCI Java SDK to invoke
the function from the microservice.
D.
OKE does not allow a microservice to invoke a
function from Oracle Functions.
Answer
C
What is the minimum amount of storage that a persistent
volume claim can obtain in Oracle Cloud Infrastructure Container Engine for
Kubernetes (OKE)?
A. 50 GB
B.
1 ТВ
C.
1 GB
D.
10 GB
Answer
A
Which of the below concept is NOT related to Oracle Cloud
Infrastructure Resource Manager?
A.
Job
B. Queue
C.
Plan
D.
Stack
Answer
B
Which two handle Oracle Functions authentication automatically?
A. Oracle Cloud Infrastructure CLI
B.
Signed HTTP Request
C. Fn Project CLI
D.
Oracle Cloud Infrastructure SDK
Answer
A,C
As a cloud-native developer, you have written a web service
for your company. You have used Oracle Cloud Infrastructure (OCI) API Gateway
service to expose the HTTP backend. However, your security team has suggested
that your web service should handle Distributed Denial-of-Service (DDOS)
attack. You are time- constrained and you need to make sure that this is
implemented as soon as possible.
What should you do in this scenario?
A.
Use OCI virtual cloud network (VCN) segregation
to control DDOS.
B. Use OCI API Gateway service and
configure rate limiting.
C.
Use a third party service integration to
implement a DDOS attack mitigation.
D.
Re-write your web service and implement rate
limiting
Answer
B
Which two statements are true for serverless computing and
serverless architectures?
A. Applications running on a FaaS
(Functions as a Service) platform
B.
Application DevOps team is responsible for
scaling
C.
Long running tasks are perfectly suited for
serverless
D. Serverless function state should
never be stored externally
E.
Serverless function execution is fully managed
by a third party
Answer
A,D
I hope it's helpful for you. If you have any queries, don't hesitate to contact me.
0 comments:
Post a Comment
If you have any doubts, please let me know. I will help you.