Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

1z0-1084-23 Sample Questions Answers

Questions 4

Which TWO are characteristics of microservices? (Choose two.)

Options:

A.

Microservices communicate over lightweight APIs.

B.

Microservices can be implemented in limited number of programming languages.

C.

All microservices share a data store.

D.

Microservices are hard to test in isolation.

E.

Microservices can be independently deployed.

Buy Now
Questions 5

Your company has recently deployed a new web application that uses Oracle Functions. Your manager instructs you to implement monitoring metrics to manage your systems more effectively. You know that Oracle Functions automatically monitors functions on your behalf and reports metrics via Oracle Cloud Infrastructure (OCI) Monitoring. Which TWO metrics are collected and made available by this feature? (Choose two.)

Options:

A.

Amount of CPU used by a function

B.

Length of time a function runs

C.

Number of times a function Is removed

D.

Amount of RAM used by a function

E.

Number of times a function is invoked

Buy Now
Questions 6

You are using Oracle Cloud Infrastructure (OCI) Resource Manager to manage your infrastructure lifecycle and wish to receive an email each time a Terraform action begins. How should you use the OCI Events service to do this without writing any code?

Options:

A.

Create a rule in OCI Events service matching the "Resource Manager Stack - Update" condition. Then select "Action Type: Email" and provide the destination email address.

B.

Create an OCI Notification topic and email subscription with the destination email address. Then create an OCI Events rule matching "Resource Manager Job - Create" condition, and select the notification topic for the corresponding action.

C.

Create an OCI Email Delivery configuration with the destination email address. Then create an OCI Events rule matching "Resource Manager Job - Create" condition, and select the email configuration for the corresponding action.

D.

Create an OCI Notifications topic and email subscription with the destination email address. Then create an OCI Events rule matching "Resource Manager Stack - Update" condition, and select the notification topic for the corresponding action.

Buy Now
Questions 7

A developer using Oracle Cloud Infrastructure (OCI) API Gateway needs to authenticate the API requests to their web application. The authentication process must be implemented using a custom scheme which accepts string-based parameters from the API caller. Which approach should the developer use in this scenario?

Options:

A.

Create a cross account functions authorizer.

B.

Create an authorizer function using OCI Identity and Access Management 91AM) based authentication.

C.

Create an authorizer function using request header authorization.

D.

Create an authorizer function using token-based authorization.

Buy Now
Questions 8

(CHK_4>2) You have a scenario where a DevOps team wants to store secrets in Oracle Cloud Infrastructure (OCI) Vault so that it can inject the secrets into an app's environment variables (for example, MYSQL_DB_PASSWD) at deployment time. Which is NOT valid about managing secrets in the OCI Vault service?

Options:

A.

New secret versions automatically expire in 90 days unless you configure an expiry rule.

B.

You can manually create new secrets as well as new secret versions using the OCI Console:

C.

A unique OCID is automatically generated for each secret and remains unchanged even when creating a new secret version.

D.

A secret reuse rule prevents the use of secret contents across different versions of a secret.

Buy Now
Questions 9

Your organization has mandated that all deployed container images used for microservices must be signed by a specified master encryption key (MEK). You have appropriately signed the container images as part of your build process, but must now ensure that they are automatically verified when they are deployed to Oracle Cloud Infrastructure (OCI) Container Engine for Kubemetes (OKE) clusters. Which option should be used to mandate image verification when deploying to OKEclusters, assuming that MEK is already stored in an available OCI Vault? (Choose the best answer.)

Options:

A.

Enable image verification policies separately for each Kubemetes pod deployment because this is enforced at the pod level.

B.

Enable image verification policies separately for each node pool within each OKE cluster because this is enforced at the node pool level.

C.

Enable image verification policies separately for each OKE cluster because this is enforced at the cluster level.

(Correct)

D.

Enable Image verification policies for your OKE service control plane which will enforce this for all OKE clusters.

Buy Now
Questions 10

You plan to implement logging in your services that will run in Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE). Which statement describes the appropriate logging approach?

Options:

A.

All services log to standard output only.

B.

Each service logs to its own log file.

C.

All services log to an external logging system.

D.

All serviceAAs log to a shared log file.

Buy Now
Questions 11

What can you use to dynamically make Kubernetes resources discoverable to public DNS servers? (Choose the best answer.)

Options:

A.

kubeDNS

B.

DynDNS

C.

CoreDNS

D.

ExternalDNS

Buy Now
Questions 12

A Docker image consists of one or more layers, each of which represents a Dockerfile instruction. The layers are stacked and each one is a delta of the changes from the previous layer. What permission is associated with these layers?

Options:

A.

read mostly

B.

write only

C.

movable

D.

read only

E.

write once

Buy Now
Questions 13

Which TWO statements are true for serverless computing and serverless architectures? (Choose two.)

Options:

A.

Serverless function execution is fully managed by third party.

B.

Applications running on a FaaS (Functions as a Service) platform.

C.

Long running tasks are perfectly suited for serverless.

D.

Application DevOps team is responsible for scaling.

E.

Serverless function state should never be stored externally.

Buy Now
Questions 14

Which statement best describes the term "cloud native"?

Options:

A.

Cloud native refers to the process of migrating applications from on-premises infrastructure to the cloud.

B.

Cloud native refers to the use of cloud-based development tools to build traditional on-premises applications.

C.

Cloud native refers to the design and deployment of applications that are optimized for cloud infrastructure.

D.

Cloud native refers to the use of cloud infrastructure to run traditional on-premises applications.

Buy Now
Questions 15

Your Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) administrator has created an OKE cluster with one node pool in a public subnet. You have been asked to provide a log file from one of the nodes for troubleshooting purpose. Which step should you take to obtain the log file?

Options:

A.

Use the username opc and password to login.

B.

It is impossible because OKE is a managed Kubernetes service.

C.

SSH into the nodes using the private key.

D.

SSH into the node using the public key.

Buy Now
Questions 16

You have two microservices, A and B running in production. Service A relies on APIs from service B. You want to test changes to service A without deploying all of its dependencies, which includes service B. Which approach should you take to test service A?

Options:

A.

Test using a previous test version of service B.

B.

Test using an API mock of service B.

C.

Test using the current production version of service B.

D.

This is not possible because service B is a dependency.

Buy Now
Questions 17

In the shared responsibility model, who should perform patching, upgrading, and maintaining of the worker nodes in provisioned Oracle Container Engine for Kubernetes (OKE) clusters?

Options:

A.

Oracle Support does it.

B.

It is the responsibility of the customer.

C.

It is an automated process.

Buy Now
Questions 18

You developed a microservices-based application that runs in an Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) cluster. Your security team wants to use SSL termination for this application. What should you do to create a secure SSL termination for this application using the fewest steps possible?

Options:

A.

Create a self-signed certificate and its corresponding key. Create a Kubernetes secret using the certificate and the key. Then add these annotations to the Kubernetes service: annotations: service.beta.kubernetes.io/oci-load-balancer-ssl-ports: "443" service.beta.kubernetes.io/oci-load-balancer-tls-secret: ssl certificate-secret

B.

Create a self-signed certificate and its corresponding key. Create a Kubernetes secret using the certificate and the key. Then add these annotations to the Kubernetes service: annotations: service.beta.kubernetes.io/oci-load-balancer-ssl-ports: "443" service.beta.kubernetes.io/oci-load-balancer-security-list management-mode: "Frontend"

C.

Add these annotations to the kubernetes service: annotations: service.beta.kubernetes.io/oci-load-balancer-ssl-ports: "443" service.beta.kubernetes.io/oci-load-balancer-ssl-secret-key: ssl secret-key

D.

Generate a self-signed certificate using Let's Encrypt. Use that certificate on OCI Load Balancer. Create the Kubernetes service using this load balancer.

Buy Now
Questions 19

Your team has been tasked with debugging a Cloud Native application developed using the following Oracle Cloud Infrastructure (OCI) services: Object Storage, Events, Functions, API Gateway, and Autonomous Database. Which of these is NOT a valid option for troubleshooting issues in OCI? (Choose the best answer.)

Options:

A.

View service metric information from the OCI Monitoring service.

B.

Configure the application to send logs to the OCI Logging service.

C.

Use OCI Service Connector Hub to configure a service connector to automatically send logs to the OCI Logging Analytics service.

D.

Trace performance issues In the Application Performance Monitoring service by enabling Function traces.

E.

Leverage OCI Cloud Guard to extract and visualize the debug logs generated by your application.

Buy Now
Questions 20

You deployed a Python application to an Oracle Container Engine for Kubernetes (OKE) cluster. However, while testing you found a bug, which you rectified and then created a new Docker image. You now need to ensure that if this new image does not work once deployed, you should be able to roll back to the previous version. Using kubect1, which strategy should you use?

Options:

A.

Blue/Green Deployment

B.

Canary Deployment

C.

Rolling Update

D.

A/B Testing

Buy Now
Questions 21

You are tasked with developing an application that requires the use of Oracle Cloud Infrastructure (OCI) APIs to POST messages to a stream in the OCI Streaming service. Which statement is incorrect? (Choose the best answer.)

Options:

A.

The Content-Type header must be set to applicationhttps://www.dumpspedia.com/json

B.

The request must include an authorization signing string including (but not limited to) x-content-sha256, content-type, and content-length headers.

C.

The request does not require an Authorization header.

D.

An HTTP 401 will be returned if the client's clock is skewed more than 5 minutes from the server's.

Buy Now
Questions 22

A DevOps engineer is troubleshooting the Meshifyd application, which is running in an Oracle Cloud Infrastructure (OCI) environment. The engineer has set up the OCI Logging service to store access logs for the application but notices that the logs from the Meshifyd application are not showing up in the logging service. The engineer suspects that there might be an issue with the logging configuration. Which two statements are potential reasons for logs from the Meshifyd application not showing up in the OCI Logging service?

Options:

A.

The logconfig.json file has incorrect or missing OCID for the custom log in the logobjectId field.

B.

The OCI Logging service is set up to pre access logs by creating a log group and custom log within the same compartment.

C.

The logconfig.json file has incorrect or missing information in the application namespace in the paths field.

D.

The logconfig.json file has incorrect or missing information in the application namespace in the src field.

E.

The logconfig.json file has incorrect or missing OCID for the custom log group in the logGroupObjectId field.

Buy Now
Questions 23

A service you are deploying to Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) uses a docker image from a private repository in OCI Registry (OCIR). Which configuration is necessary to provide access to this repository from OKE?

Options:

A.

Create a docker-registry secret for OCIR with API key credentials on the cluster, and specify the imagePullSecret property in the application deployment manifest.

B.

Create a docker-registry secret for OCIR with identity Auth Token on the cluster, and specify the imagePullSecret property in the application deployment manifest.

C.

Create a dynamic group for nodes in the cluster, and a policy that allows the dynamic group to read repositories in the same compartment.

D.

Add a generic secret on the cluster containing your identity credentials. Then specify a registryCredentials property in the deployment manifest.

Buy Now
Questions 24

You are developing a serverless application with Oracle Functions and Oracle Cloud Infrastructure Object Storage. Your function needs to read a JSON file object from an Object Storage bucket named "input-bucket" in compartment "qa-compartment". Your corporate security standards mandate the use of Resource Principals for this use case. Which two statements are needed to implement this use case? (Choose two.)

Options:

A.

Set up a policy to grant all functions read access to the bucket: allow all functions in compartment qa-compartment to read objects in target.bucket.name= "input-bucket'

B.

Set up a policy to grant your user account read access to the bucket: allow user XYZ to read objects in compartment qa-compartment where target.bucket.name= "input-bucket'

C.

Set up the following dynamic group for your function's OCID: Name: read-file-dg Rule: resource.id = "ocid1.fnfunc.oc1.phx.aaaaaaaakeaobctakezjz5i4ujj7g25q7sx5m vr55pms6f4da'

D.

No policies are needed. By default, every function has read access to Object Storage buckets in the tenancy.

E.

Set up a policy with the following statement to grant read access to the bucket: allow dynamic-group read-file-dg to read objects in compartment qa- compartment where target.bucket.name= 'input-bucket'

Buy Now
Questions 25

Which is NOT a valid option to execute a function deployed in Oracle Functions?

Options:

A.

Invoke from the Docker CLI.

B.

Send signed HTTP requests to the function's invoke endpoint.

C.

Invoke from the Fn Project CLI.

D.

Trigger by an event in the Oracle Cloud Infrastructure (OCI) Events service.

E.

Invoke from the OCI CLI.

Buy Now
Questions 26

How are cloud native application versions deployed to an OKE cluster when using a blue/green deployment strategy?

Options:

A.

Current applications are slowly replaced with new application versions.

B.

New application versions are deployed in minor increments to a select group of people.

C.

Both old and new application versions are deployedto production at the same time.

Buy Now
Questions 27

Which open source engine is used by Oracle Cloud Infrastructure (OCI) to power Oracle Functions?

Options:

A.

Knative

B.

Kubeless

C.

Apache OpenWhisk

D.

Fn Project

Buy Now
Questions 28

You are building a container image and pushing it to Oracle Cloud Infrastructure Registry (OCIR). You need to ensure that these images never get deleted from the repository. Which action should you take?

Options:

A.

Create a group and assign a policy to perform lifecycle operations on images.

B.

Write a policy to limit access to the specific repository in your compartment.

C.

Edit the tenancy global retention policy.

D.

Set global policy of image retention to "Retain All Images".

Buy Now
Questions 29

You are creating an API deployment in Oracle Cloud Infrastructure (OCI) API Gateway and you want to configure request policies to control access. Which is NOT available in OCI API Gateway?

Options:

A.

Controlling access to the backend OCI resources.

B.

Limiting the number of requests sent to the backend services.

C.

Enabling Cross-Origin Resource Sharing (CORS) support.

D.

Providing authentication and authorization.

Buy Now
Questions 30

Assuming that your function does NOT have the --provisioned-concurrency option enabled, which parameter is used to configure the time period during which an idle function will remain in memory before Oracle Functions removes its container image from memory?

Options:

A.

timeout

B.

access-timeout

C.

idle-timeout

D.

None, as this time is not configurable.

Buy Now
Exam Code: 1z0-1084-23
Exam Name: Oracle Cloud Infrastructure 2023 Developer Professional
Last Update: Sep 9, 2024
Questions: 100
$64  $159.99
$48  $119.99
$40  $99.99
buy now 1z0-1084-23