One of the compute instances that you have deployed on Oracle Cloud Infrastructure (OCI) is malfunctioning. You have created a console connection to remotely troubleshoot it.
Which two statements about console connections are TRUE? (Choose two.)
A. It is not possible to use VNC console connections to connect to Bare Metal Instances.
B. VNC console connection uses SSH port forwarding to create a secure connection from your local system to the VNC server attached to your instance's console.
C. It is not possible to connect to the serial console to an instance running Microsoft Windows, however VNC console connection can be used.
D. For security purpose, the console connection will not let you edit system configuration files.
E. If you do not disconnect from the session, your serial console connection will automatically be terminated after 24 hours.
You have created an Autonomous Data Warehouse (ADW) service in your company's Oracle Cloud Infrastructure (OCI) tenancy and you now have to load historical data into it. You have already extracted this historical data from multiple data marts and data warehouses. This data is stored in multiple CSV text files and these files are ranging in size from 25 MB to 20 GB.
Which is the most efficient and error tolerant method for loading data into ADW? (Choose the best answer.)
A. Create Auth token, use it to create an object storage credential by executing DBMS_CLOUD.CREATE_CREDENTIAL, using the web console upload the CSV files to an OCI object storage bucket, create the tables in the ADW database and then execute DBMS_CLOUD.COPY_DATA for each CSV file to copy the contents into the corresponding ADW database table.
B. Create the tables in the ADW database and then execute SQL*Loader for each CSV file to load the contents into the corresponding ADW database table.
C. Create Auth token, use it to create an object storage credential by executing DBMS_CLOUD.CREATE_CREDENTIAL, using OCI CLI upload the CSV files to an OCI object storage bucket, create the tables in the ADW database and then execute Data Pump Import for each CSV file to copy the contents into the corresponding ADW database table.
D. Create Auth token, use it to create an object storage credential by executing DBMS_CLOUD.CREATE_CREDENTIAL, using OCI CLI upload the CSV files to an OCI object storage bucket, create the tables in the ADW database and then execute DBMS_CLOUD.COPY_DATA for each CSV file to copy the contents into the corresponding ADW database table.
You are using Oracle Cloud Infrastructure (OCI) console to set up an alarm on a budget to track your OCI spending.
Which two are valid targets for creating a budget in OCI? (Choose two.)
A. Select group as the type of target for your budget.
B. Select Tenancy as the type of target for your budget.
C. Select user as the type of target for your budget.
D. Select Cost-Tracking Tags as the type of target for your budget.
E. Select Compartment as the type of target for your budget.
You have created the following JSON file to specify a lifecycle policy for one of your object storage buckets:
How will this policy affect the objects that are stored in the bucket? (Choose the best answer.)
A. Objects with the prefix “LOGS” will be retained for 120 days and then deleted permanently.
B. Objects containing the name prefix LOGS will be automatically migrated from standard Storage to Archive storage 30 days after the creation date. The object will be deleted 120 days after creation.
C. The objects with prefix “LOGS” will be deleted 30 days after creation date.
D. Objects containing the name prefix LOGS will be automatically migrated from standard Storage to Archive storage 30 days after the creation date. The object will be migrated back to standard Storage 120 days after creation.
Multiple teams are sharing a tenancy in Oracle Cloud Infrastructure (OCI). You are asked to figure out an appropriate method to manage OCI costs.
Which is NOT a valid technique to accurately attribute costs to resources used by each team? (Choose the best answer.)
A. Create a Cost-Tracking tag. Apply this tag to all resources with team information. Use the OCI cost analysis tools to filter costs by tags.
B. Create separate compartment for each team. Use the OCI cost analysis tools to filter costs by compartment.
C. Create an Identity and Access Management (IAM) group for each team. Create an OCI budget for each group to track spending.
D. Define and use tags for resources used by each team. Analyze usage data from the OCI Usage Report which has detailed information about resources and tags.
You set up a bastion host in your VCN to only allow your IP address (140.19.2.140) to establish SSH connections to your Compute Instances that are deployed in a private subnet. The Compute Instances have an attached Network Security Group with a Source Type: Network Security Group (NSG), Source NSG: NSG-050504. To secure the bastion host, you added the following ingress rules to its Network Security Group:
However, after checking the bastion host logs, you discovered that there are IP addresses other than your own that can access your bastion host.
What is the root cause of this issue? (Choose the best answer.)
A. The Security List allows access to all IP address which overrides the Network Security Group ingress rules.
B. All compute instances associated with NSG-050504 are also able to connect to the bastion host.
C. The port 22 provides unrestricted access to 140.19.2.140 and to other IP address.
D. A netmask of /32 allows all IP address in the 140.19.2.0 network, other than your IP 140.19.2.140
What is a key benefit of using Oracle Cloud Infrastructure's Resource Manager for your Terraform provisioning and management activities? (Choose the best answer.)
A. You can use Resource Manager to apply patches to all existing Oracle Linux interfaces in a specified compartment.
B. Resource Manager has administrative privileges by design. Even if your IAM user does not have access, you can leverage Resource Manager to provision new resources to any compartment in the Tenancy.
C. You can use Resource Manager to identify and maintain an inventory of all Compute and Database instances across your tenancy.
D. Resource Manager manages to Terraform state file for your infrastructure and locks the file so that only one job at a time can run on a given stack.
Security Testing Policy describes when and how you may conduct certain types of security testing of Oracle Cloud Services, including vulnerability and penetration tests, as well as tests involving data scraping tools.
What does Oracle allow as part of this testing? (Choose the best answer.)
A. Customers are allowed to use their own testing and monitoring tools.
B. Customers can simulate DoS attack scenarios as long as it's restricted to the customer's own environment.
C. Customers can validate that their network resources are isolated from other customer resources.
D. Customers are allowed to test Oracle Cloud Infrastructure (OCI) hardware related to resources in their tenancy.
You are working as a Cloud Operations Administrator for your company. They have different Oracle Cloud Infrastructure (OCI) tenancies for development and production workloads. Each tenancy has resources in two regions – uk-london-1 and eu-frankfurt-1. You are asked to manage all resources and to automate all the tasks using OCI Command Line Interface (CLI).
Which is the most efficient method to manage multiple environments using OCI CLI? (Choose the best answer.)
A. Use OCI CLI profiles to create multiple sets of credentials in your config file, and reference the appropriate profile at runtime.
B. Create environment variables for the sets of credentials that align to each combination of tenancy, region, and environment.
C. Run oci setup config to create new credentials for each environment every time you want to access the environment.
D. Use different bash terminals for each environment.
Your team implemented a SaaS application that requires a whole system deployment for each new customer. The infrastructure provisioning is already automated via Terraform, and now you have been asked to develop an Ansible playbook to centralize configuration file management and deployment.
What is the most effective way to ensure your playbooks are utilizing up-to-date and accurate inventory? (Choose the best answer.)
A. Export an inventory list from the Oracle Cloud Infrastructure Web console.
B. Export an inventory list using Terraform apply command.
C. Implement a Command Line Interface script to list all the resources and run it within Ansible to generate a dynamic inventory list.
D. Download the dynamic inventory script provided by Oracle Cloud Infrastructure and include it in the playbook invocation command.