Black Friday Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

1z0-1104-23 Sample Questions Answers

Questions 4

Challenge 1 - Task 5 of 5

Authorize OCI Resources to Retrieve the Secret from the Vault

Scenario

You are working on a Python program running on a compute instance that needs to access an external service. To access the external service, the program needs credentials (password). Given that it is not a best security practice, you decide not to hard code the credential in the program. Instead, you store the password (secret) in a vault using the OCI Vault service. The requirement now is to authorize the compute instance so that the Python program can retrieve the password (secret) by making an API call to the OCI Vault.

Preconfigured

To complete this requirement, you are provided with:

  • An OCI Vault to store the secret required by the program, which is created in the root compartment as PBT_Vault_SP.
  • An instance principal IAM service, which enables instances to be authorized actors (principals) that can retrieve the secret from the OCI Vault.
  • A dynamic group named PBT_Dynamic_Group_SP with permissions to access the OCI Vault. This dynamic group includes all of the instances in your compartment.
  • Access to Cloud Shell.
  • Permissions to perform only the tasks within the challenge.

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99234021-C01 and Region us-ashburn-1.

Options:

Buy Now
Questions 5

Challenge 3 - Task 3 of 4

Set Up a Bastion Host to Access the Compute Instance in a Private Subnet Scenario

A compute instance is provisioned in a private subnet that is not accessible through the Internet. To access the compute instance resource in a private subnet, you must provide a time-bound SSH session without deploying and maintaining a public subnet and a jump server, which eliminates the hassle and potential attack surface from remote access.

To complete this deployment, you have to perform the following tasks in the environment provisioned for you:

• Configure a Virtual Cloud Network (VCN) and a Private Subnet.

• Provision a Compute Instance in the private subnet and enable Bastion Plugin.

• Create a Bastion and Bastion session.

• Connect to a compute instance using Managed SSH session.

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99233424-C01 and Region us-ashburn-1

Complete the following tasks in the provisioned OCI environment:

1.      Create a Bastion with the name SPPBTBASTION99233424-lab.user01

[Eliminate Specical Characters] Eg:SPPBTBASTION992831403labuser13

2.      Create a Session with the name PBT-1-Session-01, for compute instance in private subnet, with default username as "opc"

Options:

Buy Now
Questions 6

Challenge 4 - Task 4 of 6

Configure Web Application Firewall to Protect Web Server Against XSS Attack

Scenario

You have to protect web applications hosted on OCI from cross-site scripting (XSS) attacks. You can use the OCI Web Application Firewall (WAF) capabilities to create rules that compare against incoming requests to determine if the request contains an XSS attack payload. If a request is determined to be an attack, WAF should return the HTTP Service Unavailable (503) error.

To ensure that the configured WAF blocks the XSS attack, run the following script: [http:// /index.html?

](http:// /index.html?

)

To complete this deployment, you have to perform the following tasks in the environment provisioned for you:

  • Configure a Virtual Cloud Network (VCN)
  • Create a Compute Instance and install the Web Server
  • Create a Load Balancer and update Security List
  • Create a WAF policy
  • Configure Protection Rules against XSS attacks
  • Verify the created environment against XSS attacks

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99233424-C01 and Region us-ashburn-1.

Complete the following task in the provisioned OCI environment:

Create a WAF policy with the name IAD-SP-PBT-WAF-01_99233424-lab.user01

Eg: IAD-SP-PBT-WAF-01_99232403-lab.user02

Options:

Buy Now
Questions 7

Which statements are CORRECT about Multi-Factor Authentication in OCI ? Select TWO correct answers

Options:

A.

Members of the Administrators group can disable MFA for other users

B.

Users cannot enable MFA for themselves

C.

A user can registermultiple devices to use for MFA.

D.

Members of the Administrators group cannot enable MFA for another user

Buy Now
Questions 8

Which two Cloud Guard tasks can be configured using API or Console? (Choose two.)

Options:

A.

Run behavior analytics on your users.

B.

Create your own rules within the existing recipes

C.

Clone config detector recipes to customize your security policies

D.

Create targets against your compartments to monitor resources within those.

Buy Now
Questions 9

Which OCI services can encrypt all data-at-rest? Select TWO correct answers

Options:

A.

File Storage

B.

NAT Gateway

C.

Block Volumes

D.

Geolocation Steering

Buy Now
Questions 10

Challenge 3 - Task 2 of 4

Set Up a Bastion Host to Access the Compute Instance in a Private Subnet Scenario

A compute instance is provisioned in a private subnet that is not accessible through the Internet. To access the compute instance resource in a private subnet, you must provide a time-bound SSH session without deploying and maintaining a public subnet and a jump server, which eliminates the hassle and potential attack surface from remote access.

To complete this deployment, you have to perform the following tasks in the environment provisioned for you:

• Configure a Virtual Cloud Network (VCN) and a Private Subnet.

• Provision a Compute Instance in the private subnet and enable Bastion Plugin.

• Create a Bastion and Bastion session.

• Connect to a compute instance using Managed SSH session.

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99233424-C01 and Region us-ashburn-1

Complete the following tasks in the provisioned OCI environment:

 

Create a Compute Instance with the name PBT-BAS-VM-01, using the "Oracle Linux 8" image and shape "VM.Standard2.1", without SSH key and enable Bastion plugin.

Options:

Buy Now
Questions 11

Challenge 3 - Task 4 of 4

Set Up a Bastion Host to Access the Compute Instance in a Private Subnet Scenario

A compute instance is provisioned in a private subnet that is not accessible through the Internet. To access the compute instance resource in a private subnet, you must provide a time-bound SSH session without deploying and maintaining a public subnet and a jump server, which eliminates the hassle and potential attack surface from remote access.

To complete this deployment, you have to perform the following tasks in the environment provisioned for you:

• Configure a Virtual Cloud Network (VCN) and a Private Subnet.

• Provision a Compute Instance in the private subnet and enable Bastion Plugin.

• Create a Bastion and Bastion session.

• Connect to a compute instance using Managed SSH session.

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99233424-C01 and Region us-ashburn-1

Complete the following tasks in the provisioned OCI environment:

 

Connect to a compute instance using a Managed SSH Bastion session from your local machine terminal or Cloud shell.

Options:

Buy Now
Questions 12

Challenge 4 - Task 5 of 6

Configure Web Application Firewall to Protect Web Server Against XSS Attack

Scenario

You have to protect web applications hosted on OCI from cross-site scripting (XSS) attacks. You can use the OCI Web Application Firewall (WAF) capabilities to create rules that compare against incoming requests to determine if the request contains an XSS attack payload. If a request is determined to be an attack, WAF should return the HTTP Service Unavailable (503) error.

To ensure that the configured WAF blocks the XSS attack, run the following script: [http:// /index.html?

](http:// /index.html?

)

To complete this deployment, you have to perform the following tasks in the environment provisioned for you:

  • Configure a Virtual Cloud Network (VCN)
  • Create a Compute Instance and install the Web Server
  • Create a Load Balancer and update Security List
  • Create a WAF policy
  • Configure Protection Rules against XSS attacks
  • Verify the created environment against XSS attacks

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99233424-C01 and Region us-ashburn-1.

Complete the following task in the provisioned OCI environment:

1. Create a Protection Rule with name WAF-PBT-XSS-Protection against XSS attack. for protecting web server

2. Create a New Rule Action with name WAF-PBT-XSS-Action where http response code will be 503 (Service Unavailable).

Options:

Buy Now
Questions 13

Challenge 4 - Task 6 of 6

Configure Web Application Firewall to Protect Web Server Against XSS Attack

Scenario

You have to protect web applications hosted on OCI from cross-site scripting (XSS) attacks. You can use the OCI Web Application Firewall (WAF) capabilities to create rules that compare against incoming requests to determine if the request contains an XSS attack payload. If a request is determined to be an attack, WAF should return the HTTP Service Unavailable (503) error.

To ensure that the configured WAF blocks the XSS attack, run the following script: [http:// /index.html?

](http:// /index.html?

)

To complete this deployment, you have to perform the following tasks in the environment provisioned for you:

  • Configure a Virtual Cloud Network (VCN)
  • Create a Compute Instance and install the Web Server
  • Create a Load Balancer and update Security List
  • Create a WAF policy
  • Configure Protection Rules against XSS attacks
  • Verify the created environment against XSS attacks

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99233424-C01 and Region us-ashburn-1.

Complete the following task in the provisioned OCI environment:

You will connect to the web server and append an XSS script. The protection rule will evaluate the requests and respond accordingly.

Options:

Buy Now
Questions 14

Challenge 1 - Task 1 of 5

Authorize OCI Resources to Retrieve the Secret from the Vault

Scenario:

You are working on a Python program running on a compute instance that needs to access an external service. To access the external service, the program needs credentials (password). Given that it is not a best security practice, you decide not to hard code the credential in the program. Instead, you store the password (secret) in a vault using the OCI Vault service. The requirement now is to authorize the compute instance so that the Python program can retrieve the password (secret) by making an API call to the OCI Vault.

Preconfigured:

To complete this requirement, you are provided with:

  • An OCI Vault to store the secret required by the program, which is created in the root compartment as PBT_Vault_SP.
  • An instance principal IAM service, which enables instances to be authorized actors (principals) that can retrieve the secret from the OCI Vault.
  • A dynamic group named PBT_Dynamic_Group_SP with permissions to access the OCI Vault. This dynamic group includes all of the instances in your compartment.
  • Access to Cloud Shell.
  • Permissions to perform only the tasks within the challenge.

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99234021-C01 and Region us-ashburn-1.

Complete the following tasks in the OCI environment provisioned:

  • Create Master Encryption Key with the name my_pbt_msk with 256 bits shape.
  • Create a Secret with the name my-pbt-secret_99234021-lab.user01 and secret content.

For example: If your user name is 99346163-lab.user02, then the secret should be named as my-pbt-secret_99346163-lab.user02.

Options:

Buy Now
Questions 15

Challenge 2

Least-Privileged Model Enforcement Leveraging Custom Security Zones

Scenario

In deploying a new application, a cloud customer needs to reflect different security postures. If a security zone is enabled with the Maximum Security Zone recipe, the customer will be unable to create or update a resource in the Security Zone if the action violates the attached Maximum Security Zone policy.

As an application requirement, the customer requires a compute instance in the public subnet. You, therefore, need to configure Custom Security Zones that allow the creation of compute instances in the public subnet.

To complete this deployment, you have to perform the following tasks in the environment provisioned for you:

• Create a Custom Security Zone recipe to allow compute instances in the public subnet.

• Create a Security Zone using the Custom Security Zone recipe.

• Configure a Virtual Cloud Network (VCN) and Public Subnet.

• Provision a Compute Instance in the public subnet.

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99234021-C01 and Region us-ashburn-1

Complete the following tasks in the provisioned OCI environment:

  • Create a Custom Recipe with the name
  • Create a Security Zone with the name
  • Create a VCN with the name IAD-SP-PBT-VCN-01
  • Create a Public Subnet with the name IAD-SP-PBT-PUBSNET-01
  • Create a Compute Instance with the name IAD-SP-PBT-1-VM-01, using the "Oracle Linux 8" image and "VM.Standard2.1" as shape

Options:

Buy Now
Questions 16

Challenge 1 - Task 4 of 5

Authorize OCI Resources to Retrieve the Secret from the Vault

Scenario

You are working on a Python program running on a compute instance that needs to access an external service. To access the external service, the program needs credentials (password). Given that it is not a best security practice, you decide not to hard code the credential in the program. Instead, you store the password (secret) in a vault using the OCI Vault service. The requirement now is to authorize the compute instance so that the Python program can retrieve the password (secret) by making an API call to the OCI Vault.

Preconfigured

To complete this requirement, you are provided with:

  • An OCI Vault to store the secret required by the program, which is created in the root compartment as PBT_Vault_SP.
  • An instance principal IAM service, which enables instances to be authorized actors (principals) that can retrieve the secret from the OCI Vault.
  • A dynamic group named PBT_Dynamic_Group_SP with permissions to access the OCI Vault. This dynamic group includes all of the instances in your compartment.
  • Access to Cloud Shell.
  • Permissions to perform only the tasks within the challenge.

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99234021-C01 and Region us-ashburn-1.

Complete the following tasks in the OCI environment provisioned:

  • Create a Linux Instance with the name [Provide Name Here] within the compartment.

Provide your own public key to SSH the instance.

Options:

Buy Now
Questions 17

When creating an OCI Vault, which factors may lead to select the Virtual Private Vault? Select TWO correct answers

Options:

A.

Need for more than 9211 key versions

B.

Greater degree of isolation

C.

To mask Pll data for non-production environment

D.

Ability to back up the vault

Buy Now
Questions 18

Which cache rules criterion matches if the concatenation of the requested URL path and query are identical to the contents of the value field?

Options:

A.

URL_PART_CONTAINS

B.

URL_IS

C.

URL_PART_ENDS_WITH

D.

URL_STARTS_WITH

Buy Now
Questions 19

You are using a custom application with third-party APIs to manage application and data hosted in an Oracle Cloud Infrastructure (OCI) tenancy. Although your third-party APIs do not support OCI's signature-based authentication, you want them to communicate with OCI resources Which authentication option should you use to ensure this? (Choose the best Answer.)

Options:

A.

Auth Tokens

B.

At Signing Key

C.

OCI Username and password

D.

SSH Kay Par with 2048-bit algorithm

Buy Now
Questions 20

A company needs to have somebuckets as public in the compartment. You want Cloud Guard to ignore the problem associated with public bucket. Select TWO correct answers

Options:

A.

Dismiss the issues associated with these resources

B.

Make the bucket private so that Cloud Guard won't detectit

C.

Configure Conditional groups for the detector to fix base line

D.

First make the bucket private and after few days make the bucket public again

Buy Now
Questions 21

As a security administrator, you found out that there are users outside your co network who are accessing OCI Object Storage Bucket. How can you prevent these users from accessing OCI resources in corporate network?

Options:

A.

Create an 1AM policy and create WAF rules

B.

Create an 1AM policy and add a network source

C.

Make OCI resources private instead of public

D.

Create PAR to restrict access the access

Buy Now
Questions 22

you want to create a stateless rule forSSH in security list and the ingress role has already been properly configured what combination should you use on the engress role what commination should you use on the egress rule?

Options:

A.

select udp for protocol: enter 22 for source port" and all for destination port

B.

select tcp for protocol: enter 22 for source port" and 22 for destination port

C.

select tcp for protocol: enter all for source port" and 22 for destination port.

D.

select tcp for protocol: enter 22 for source port" and all for destinationport

Buy Now
Questions 23

Which of the following is necessary step when creating a secret in vault?

Options:

A.

Vault-managed key is necessary to encrypt the secret

B.

Digest Hash shouldbe created of the secret value

C.

Object Storage must be created to run secret service

D.

Shamir's secret sharing algorithm should be used to unseal the vault

Questions 24

Which statement about Oracle Cloud Infrastructure Multi-Factor Authentication (MFA)is NOT valid?

Options:

A.

Users cannot disable MFA for themselves.

B.

A user can register only one device to use for MFA.

C.

Users must install a supported authenticator app on the mobile device they intend to register for MFA.

D.

An administrator can disable MFA for another user.

Buy Now
Questions 25

Which two reasons would a crytpo admin have to select the Virtual Private Vault option when creating an Oracle Cloud Infrastructure Vault? (Choose two.)

Options:

A.

to scale to over 10,000 keys

B.

ability to back up and restore the Vault for redundancy.

C.

ability to export keys from the vault

D.

banking requirements, including chip card reloading and PIN Processing

E.

more isolation for encryption keys with a dedicated HSM partition

Buy Now
Questions 26

Which securityissues can be identified by Oracle Vulnerability Scanning Service? Select TWO correct answers

Options:

A.

Distributed Denial of Service (DDoS)

B.

Ports that are unintentionally left open can be a potential attack vector for cloud resources

C.

SQL Injection

D.

CISpublished Industry-standard benchmarks

Buy Now
Questions 27

Which statements are CORRECT about Security Zone policy in OCI ? Select TWO correct answers

Options:

A.

Block volume canbe moved from a security zone to a standard compartment

B.

Bucket can't be moved from a security zone to a standard compartment

C.

Resources in a security zone must be accessible from internet

D.

Resources in a security zone must be encrypted using customer-managed keys

Buy Now
Questions 28

A company plans to use Oracle Cloud services for their production and development environments, but they have different security requirements. Their security policy forbids development environment users from having access to the production environment and requires separate administrators to manage each environment. The company has only one tenancy in Oracle Cloud. How can they ensure that their security requirements are met in Oracle Cloud? (Choose the best Answer.)

Options:

A.

Create multiple identity domains, one for the production environment and another for the development environment.

B.

Use a single identity domain for both production and development environments to simplify administration.

C.

Assign the same identity domain administrator to both the production and development environments.

D.

Create a separate tenancy for the production environment to isolate administrative control.

Buy Now
Questions 29

Which IAM policy should be created to give XYZ the ability to list contents of a resource excluding the fneeds to authenticatein prod compartment ? Principle of least priviledge should be used.

Options:

A.

Allow group XYZ to manage all resources in compartment != prod

B.

Allow group XYZ to use all resources in compartment != prod

C.

Allow group XYZ to inspect all resources in tenancy where target.compartment.name != prod

D.

Allow group XYZ to read all resources in tenancy where target.compartment.name != prod

Buy Now
Questions 30

You configured the events service for your Cloud Guard problems to send email notifications, but you do not see any, which three things should you check to resolve this? (Choose three.)

Options:

A.

Ensure that you have the Cloud Guard retention policy configured,

B.

Ensure that your Cloud Guard targets have the Cloud Event responder recipe attached with the notification rule enabled.

C.

Ensure that the Event rule is created in the same compartment (or parent of it) where your problem resource exists.

D.

Ensure that the event is configured in the Cloud Guard reporting region.

E.

Ensure that Cloud Guard is enabled in every single region individually

Buy Now
Questions 31

Which is NOT a part of Observability and Management Services?

Options:

A.

Event Services

B.

OCI Management Service

C.

Logging Analytics

D.

Logging

Buy Now
Questions 32

Which are the two responsibilities of Oracle when you move your IT infrastructure to Oracle Cloud Infrastructure (OCI)?

Options:

A.

Strong Identity Access Management (IAM) framework

B.

Storage isolation

C.

Maintaining customer data

D.

Account access management

E.

Providing strong security lists

Buy Now
Questions 33

Which storage type is most effective when you want to move some unstructured data, consisting of images and videos, to cloud storage?

Options:

A.

Standard storage

B.

File storage

C.

Archivestorage

D.

Block volume

Buy Now
Questions 34

Which two services can leverage Vault symmetric encryption keys for data-at-rest? (Choose two.) OR Which OCI services can encrypt all data-at-rest? (Choose two.)

Options:

A.

Load Balancer

B.

Object Storage

C.

Block Volume

D.

WAF

E.

API Gateway

F.

CDN

Buy Now
Questions 35

A customer has multiple virtual machines in a subnet that require access to the public Internet. They want to implement URL filtering to restrict access to certain websites. They have identified the following requirements: All virtual machines should be able to access educational websites. Some virtual machines should not be able to access gaming websites. Some virtual machines should not be able to access social media websites. Which is the best method to implement these requirements? (Choose the best Answer.)

Options:

A.

Use the network firewall to generate URL lists based on the access requirements of the virtual machines, and then configure security rules to filter traffic accordingly.

B.

Create separate subnets for each group of virtual machines with different access requirements and apply different security lists to each subnet.

C.

Use routing rules to direct traffic to different Internet gateways based on the virtual machines' access requirements.

D.

Create a single security list for the subnet and apply URL filtering rules based on the requirements.

Buy Now
Questions 36

You subscribe to a PaaS service that follows the Shared Responsibility model.

Which type of security is your responsibility?

Options:

A.

Network

B.

Infrastructure

C.

Data

D.

Guest OS

Questions 37

In Oracle Cloud Infrastructure (OCI) Secret management within OCI Vault, you have created a secret and rotated the secret one time. The current version state shows: Version Number | Status 2 (latest) | current 1 | Previous In order to rollback to version 1, What should the Administrator do? (Choose the best Answer.)

Options:

A.

From the version 2 (latest) menu, select "Rollback and choose version 1 when given the option

B.

Create a new secret version 3 and set to Pending. Copy the contents of version 1 into version

C.

Deprecate version 2 (test). Create new Secret Version 3. Create soft link from version 3 to version 1.

from the version 1 menu, select "Promote to Current"

Buy Now
Questions 38

A number of malicious requests for a web application is coming from a set of IP addresses

originating from Antartica.

Which of the following statement will help to reduce these types of unauthorized requests ?

Options:

A.

Delete NAT Gateway from Virtual Cloud Network

B.

Use WAF policy using Access Control Rules

C.

List specific set of IP addresses then deny rules in Virtual Cloud Network Security Lists

D.

Change your home region in which your resources are currently deployed

Buy Now
Questions 39

Challenge 1 - Task 3 of 5

Authorize OCI Resources to Retrieve the Secret from the Vault

Scenario

You are working on a Python program running on a compute instance that needs to access an external service. To access the external service, the program needs credentials (password). Given that it is not a best security practice, you decide not to hard code the credential in the program. Instead, you store the password (secret) in a vault using the OCI Vault service. The requirement now is to authorize the compute instance so that the Python program can retrieve the password (secret) by making an API call to the OCI Vault.

Preconfigured

To complete this requirement, you are provided with:

  • An OCI Vault to store the secret required by the program, which is created in the root compartment as PBT_Vault_SP.
  • An instance principal IAM service, which enables instances to be authorized actors (principals) that can retrieve the secret from the OCI Vault.
  • A dynamic group named PBT_Dynamic_Group_SP with permissions to access the OCI Vault. This dynamic group includes all of the instances in your compartment.
  • Access to Cloud Shell.
  • Permissions to perform only the tasks within the challenge.

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99234021-C01 and Region us-ashburn-1.

Complete the following task in the OCI environment provisioned:

Create a new VCN with the name PBT_SECRET_VCN01 and public subnet within your assigned compartment.

Options:

Buy Now
Questions 40

Challenge 1 - Task 2 of 5

Authorize OCI Resources to Retrieve the Secret from the Vault

Scenario

You are working on a Python program running on a compute instance that needs to access an external service. To access the external service, the program needs credentials (password). Given that it is not a good security practice, you decide not to hard code the credential in the program. Instead, you store the password (secret) in a vault using the OCI Vault service. The requirement now is to authorize the compute instance so that the Python program can retrieve the password (secret) by making an API call to the OCI Vault.

Preconfigured:

To complete this requirement, you are provided with:

  • An OCI Vault to store the secret required by the program, which is created in the root compartment as PBT_Vault_SP.
  • An instance principal IAM service, which enables instances to be authorized actors (principals) that can retrieve the secret from the OCI Vault.
  • A dynamic group named PBT_Dynamic_Group_SP with permissions to access the OCI Vault. This dynamic group includes all of the instances in your compartment.
  • Access to Cloud Shell.
  • Permissions to perform only the tasks within the challenge.

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99234021-C01 and Region us-ashburn-1.

Complete the following task:

In the field below, write the IAM policy, which allows a program running on a computer instance (principal instance) to retrieve a secret from the OCI Vault.

Options:

Buy Now
Questions 41

Challenge 4 - Task 1 of 6

Configure Web Application Firewall to Protect Web Server Against XSS Attack

Scenario

You have to protect web applications hosted on OCI from cross-site scripting (XSS) attacks. You can use the OCI Web Application Firewall (WAF) capabilities to create rules that compare against incoming requests to determine if the request contains an XSS attack payload. If a request is determined to be an attack, WAF should return the HTTP Service Unavailable (503) error.

To ensure that the configured WAF blocks the XSS attack, run the following script: [http:// /index.html?

](http:// /index.html?

)

To complete this deployment, you have to perform the following tasks in the environment provisioned for you:

  • Configure a Virtual Cloud Network (VCN)
  • Create a Compute Instance and install the Web Server
  • Create a Load Balancer and update Security List
  • Create a WAF policy
  • Configure Protection Rules against XSS attacks
  • Verify the created environment against XSS attacks

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99233424-C01 and Region us-ashburn-1.

Complete the following task in the provisioned OCI environment:

Create a VCN using wizard with the name IAD-WAF-PBT-VCN-01

Options:

Buy Now
Exam Code: 1z0-1104-23
Exam Name: Oracle Cloud Infrastructure 2023 Security Professional
Last Update: Nov 25, 2024
Questions: 167
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 1z0-1104-23