Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Oracle 1z0-1072-24 Dumps

Page: 1 / 5
Total 51 questions

Oracle Cloud Infrastructure 2024 Architect Associate Questions and Answers

Question 1

Which statement accurately describes the key features and benefits of OCI Confidential Computing?

Options:

A.

It optimizes network performance through advanced routing algorithms.

B.

It provides automatic scalability and load balancing capabilities.

C.

It encrypts and isolates in-use data and the applications processing that data.

D.

It enables users to securely store and retrieve data by using distributed file systems.

Question 2

Which TWO statements are NOT correct regarding the Oracle Cloud Infrastructure (OCI) burstable instances?

Options:

A.

Burstable instances cost less than regular instances.

B.

Burstable instances are charged according to the baseline OCPU.

C.

If the instance's average CPU utilization is below the baseline, it can burst above the baseline.

D.

Baseline utilization is a fraction of each CPU core.

Question 3

Which TWO options will accomplish a fully redundant connection from an on-premises data center to a Virtual Cloud Network (VCN) in the us-ashburn-1 region?

Options:

A.

Configure a Site-to-Site VPN from a single on-premises CPE.

B.

Configure two FastConnect virtual circuits to the us-ashburn-1 region and terminate them in diverse hardware on-premises.

C.

Configure one FastConnect virtual circuit to the us-ashburn-1 region and the second FastConnect virtual circuit to the us-phoenix-1 region.

D.

Configure one FastConnect virtual circuit to the us-ashburn-1 region and a Site-to-Site VPN to the us-ashburn-1 region.

Question 4

What is the primary purpose of the Web Application Acceleration service offered by Oracle Cloud Infrastructure (OCI)?

Options:

A.

Monitoring and analyzing HTTP traffic patterns

B.

Improving the reliability of layer 7 HTTP load balancers

C.

Encrypting HTTP traffic

D.

Speeding up traffic on layer 7 HTTP load balancers

Question 5

Which statement accurately describes ephemeral principals?

Options:

A.

Ephemeral principals are temporary credentials granted to resources.

B.

Ephemeral principals are another term for dynamic groups.

C.

Ephemeral principals are user accounts with limited lifespans.

D.

Ephemeral principals represent long-lived service accounts.

Question 6

What is a key advantage of utilizing administrator roles for access control within OCI IAM identity domains?

Options:

A.

Offer a wider range of permission combinations

B.

Simplify access management by eliminating policy creation

C.

Can be used to grant access to resources outside the identity domain

D.

Provide granular control over user access to specific compartments

Question 7

What is the primary function of the Network Path Analyzer (NPA) tool provided by Oracle Cloud Infrastructure (OCI)?

Options:

A.

Collecting and analyzing network configuration to identify virtual network configuration issues impacting connectivity

B.

Optimizing network performance by dynamically adjusting routing paths based on trafficpatterns

C.

Sending actual traffic between source and destination to diagnose connectivity issues

D.

Providing real-time monitoring of network traffic to detect security threats and unauthorized access attempts

Question 8

Which statement is true about pre-authenticated requests?

Options:

A.

You cannot edit a pre-authenticated request.

B.

Deleting a pre-authenticated request does not revoke access.

C.

You need to provide your OCI credentials to the partner company.

D.

Pre-authenticated requests can be used to delete buckets.

Question 9

Which OCI service would you use to apply kernel security updates to all instances?

Options:

A.

Container Registry

B.

Data Safe

C.

Artifact Registry

D.

OS Management Service

Question 10

What are the two types of capture filters that can be created for network monitoring?

Options:

A.

Flow control capture filters and traffic capture filters

B.

Flow log capture filters and packet capture filters

C.

VTAP capture filters and network capture filters

D.

Flow log capture filters and VTAP capture filters

Question 11

How can an organization securely grant a third-party application access to specific OCI resources?

Options:

A.

By implementing OAuth 2.0 with the application

B.

By creating an IAM policy granting full access to the tenancy

C.

By configuring the application to utilize Instance Principal

D.

By sharing user credentials for an OCI administrator

Question 12

Why was SSH still possible after port 22 was removed from the Security Lists?

Options:

A.

The VCN where that compute instance resides still has an Internet Gateway.

B.

The VNIC of that compute instance is attached to a Cluster Network.

C.

The VCN where that compute instance resides still has a route rule.

D.

The VNIC of that compute instance is attached to a Network Security Group (NSG).

Question 13

Which statement is true about File System Replication in Oracle Cloud Infrastructure (OCI)?

Options:

A.

You cannot specify a replication interval when you create the replication resource.

B.

You can replicate the data in one file system to another file system in the same region or a different region.

C.

Only a file system that has been exported can be used as a target file system.

D.

You can replicate the data in one file system to another file system only in the same region.

Question 14

Which image option allows you to create identical instances with minimal effort?

Options:

A.

Bring your own image

B.

Select an image from the OCI Marketplace

C.

Use Oracle-provided images

D.

Create a custom image

Question 15

Which OCI feature should be used to ensure that communication between database servers and OCI Object Storage is secure?

Options:

A.

Use a Local Peering Gateway

B.

Use a NAT Gateway

C.

Use a VPN Gateway

D.

Use a Service Gateway

Page: 1 / 5
Total 51 questions