You are working as a solution architect for an online retail store to create a portal to allow the users to pay for their groceries using credit cards. Since the application is not fully compliant with the Payment Card Industry Data Security Standard (PCI DSS), your company is looking to use a third party payment service to process credit card payments.
The third party service allows a maximum of Spelunk IP addresses 5 public IP addresses at a time However, your website is using Oracle Cloud Infrastructure (OCI) Instance Pool Auto Scaling policy to create up to create up to 15 Instances during peak traffic demand, which are launched In VCN private in VCN private subnets and attached to an OCI public Load Balancer. Upon user payment, the portal connects to the payment service over the Interne! to complete the transaction
What solution can you implement to make sure that all compute Instances can connect to the third party system to process the payments aw peak traffic demand?
A. Route credit card payment request from the compute instances through the NAT Gateway. On the third-party services, whitelist the public IP associated with the NAT Gateway.
B. Create an OCI Command Line Interface (CLI) script to automatically reserve public IP address for the compute instances. On the third-party services, whitelist the Reserved public IP.
C. Whitelist the Internet Gateway Public IP on the third party service and route all payment requests through the Internet Gateway.
D. Route payment request from the compute instances through the OCI Load Balancer, which will then be routed to the third party service.
You have configured backups for your Oracle Cloud Infrastructure (OCI) 2-node RAC DB systems on virtual machines. In the console, the database backup displays a Failed status.
Which of the following options is the most likely reason for this backup issue?
A. The master key stored in OCI Key Management for encryption and decryption of data in the database is not accessible to the backup service.
B. The auth token being used by the Object Store Swift endpoint is incorrect.
C. The allocated storage on the OCI File Storage service file system attached with the database is full.
D. The RMAN backup agent is not compatible with the version of database being used.
You work for a large bank where security and compliance are critical. As part of the security overview meeting, your company decided to minimize the installation of local tools on your laptop. You have been running Ansible and kubectl to spin up Oracle Container Engine for Kubernetes (OKE) clusters and deployed your application.
For authentication, you are using an Oracle Cloud Infrastructure (OCI) CLI config file that contains OCIDs, Fingerprint, and a locally stored PEM file. Your security team doesn't want you to store any local API key and certificate, or any other local tools.
Which two actions should you perform to spin up the OKE cluster and interact with it? (Choose two.)
A. Create a developer workstation on OCI. Install Ansible and kubectl on it. Use resource principal to authenticate against OCI API and create the OKE Cluster.
B. Develop your own code using OCI SDK to deploy the OKE cluster.
C. Work on OCI Cloud Shell to use built-in Ansible and kubectl to deploy the OKE cluster. Use OCI_CLI_AUTH=instance_obo_user environment variable to authenticate using built- in token.
D. Work on OCI Cloud Shell to use built-in Ansible and kubectl to deploy the OKE cluster. Bring in your own config file and certificate to authenticate against OCI API.
E. Create a developer workstation on OCI. Install Ansible and kubectl on it. Use instance principal to authenticate against OCI API and create the OKE Cluster.
You have decided to migrate your application to Oracle Cloud Infrastructure and use Oracle Functions to deploy your microservices.
Which monitoring metrics are available to help you calculate your total cost for using Oracle Functions per month? (Choose Two)
A. Amount of RAM used by your functions.
B. Length of time a function runs.
C. Number of times a function is invoked.
D. Amount of storage used by your functions.
E. Network bandwidth used by your functions.
A2Z corporation is into e-commerce business and is the choice of millions for the best offers it launches. It has a rich set of intelligent applications that runs 24x7 and are very critical to their business.
Continuous infrastructure management and maintenance, rise in customer base and workloads, have made them to think of migrating all workloads to cloud. They have selected Oracle Cloud Infrastructure for migrating both their application
and database workload.
You, as an oracle pre-sales consultant has been asked to provide complete migration strategy for their source database workloads which includes oracle and MSSQL. They are particularly concerned about their oracle databases which
cannot afford any downtime. They would be establishing fast connect from their data center to oracle data center to avoid any network impact. Their oracle database is around 90TB and MSSQL is around 10TB.
How would you propose the safe migration of customer database while meeting their availability requirement?
A. Propose the use of zero-downtime migration tool for oracle database and use combination of SQL Developer and Oracle SQL Loader for MSSQL migration
B. Propose the use of Oracle datapump for oracle databases and SQL Developer for MSSQL database
C. Propose the use of zero-downtime migration tool for oracle database and use combination of SQL Developer and Oracle GoldenGate for MSSQL migration
D. Propose the use of Oracle GoldenGate to perform zero downtime migration for both MSSQL and Oracle source databases
You are working as a security consultant with a global insurance organization which is using Microsoft Azure Active Directory as an identity provider to manage user login/passwords. When a user logs in to Oracle Cloud Infrastructure (OCI) console, it should get authenticated by Azure AD.
Which set of steps are required to be configured in OCI to meet this requirement?
A. Setup Azure AD as an Identity Provider, import users and groups from Azure AD to OCI, set up IAM policies to govern access to Azure AD groups.
B. Setup Azure AD as an Enterprise Application, configure OCI for single sign-on, map Azure AD groups to OCI groups, set up the IAM policies to govern access to Azure AD groups.
C. Setup Azure AD as an Enterprise Application, map Azure AD users, groups and policies to OCI groups and users.
D. Setup Azure AD as an Identity Provider, map Azure AD groups to OCI groups, set up the IAM policies to govern access to Azure AD groups.
A large financial company has a web application hosted in their on-premises data center. They are migrating their application to Oracle Cloud Infrastructure (OCI) and require no downtime while the migration is on-going. In order to achieve this, they have decided to divert only 30% of the application works fine, they divert all traffic to OCI.
As a solution architect working with this customer, which suggestion should you provide them?
A. Use OCI Traffic management with failover steering policy and distribute the traffic between OC1 and on premises infrastructure.
B. Use OCI Traffic management with Load Balancing steering policy and distribute the traffic between OCI and on premises infrastructure.
C. Use an OCI load Balancer and distribute the traffic between OCI and on premises infrastructure.
D. Use VPN connectivity between on premises Infrastructure and OCI, and create routing tables to distribute the traffic between them.
Your company needs to migrate a business critical application from your data center to Oracle Cloud Infrastructure (OCI). The application runs on Oracle
Database and both the application and database servers run on Oracle Linux version 7. The application server is WebLogic server running on multiple 4-core servers and the database is deployed as an Oracle Database Enterprise Edition RAC database on 2 servers (4-cores each).
Which method of database migration should you choose so that the application has minimal impact? (Choose the best answer.)
A. Deploy Virtual Machine RAC DB system on OCI and use the Oracle Database Backup module with RMAN to migrate the data from customer on-premises to OCI.
B. Deploy Virtual Machine RAC DB system on OCI and use the ZDM tool for the database migration.
C. Deploy Autonomous Transaction Processing Database on OCI and use the MV2ADB tool for the database migration.
D. Deploy Exadata Cloud Service Base rack and use Oracle Data Pump tool to migrate the data from customer on-premises to OCI.
An upcoming e-commerce company has deployed their online shopping application on OCI. The application was deployed on compute instances with autoscaling configuration for application servers fronted by a load balancer and OCI Autonomous Transaction Processing (ATP) in the backend.
In order to promote their e-commerce platform 50% discount was announced on all the products for a limited period. During the day 1 of promotional period it was observed that the application is running slow and company's hotline is flooded with complaints.
What could be two possible reasons for this situation?
A. The health check on some of the backend servers has failed and the load balancer has taken those servers temporarily out of rotation
B. As part of autoscaling, the load balancer shape has dynamically changed to a larger shape to handle more incoming traffic and the system was slow for a short time during this change
C. The health check on some of the backend servers has failed and the load balancer was rebooting these servers.
D. The autoscaling has already scaled to the maximum number of instances specified in the configuration and there is no room of scaling
You are a solution architect working with a startup that has decided to move their workload to Oracle Cloud Infrastructure. Since their workload is small, upon architecting, you decide its sufficient to use 8 compute instances to run their workload. The company wants to use a common storage for their instances. So, you propose the idea of attaching a block volume to multiple instances to provide a common storage.
Which of the below option is NOT true for such a solution?
A. If the block volume is already attached to an instance as read/write non-shareable you can't attach it to another instance until you detach it from the first instance.
B. Block volumes attached as read-only are configured as shareable by default.
C. You can delete a block volume from one instance without detaching it from all other instances there by keeping other instance's storage intact.
D. Once you attach a block volume to an instance as read-only, it can only be attached to other instances as read-only.