Are you looking for free 1Z0-1072-22 exam materials? You’ve come to the right place, leads4pass 1Z0-1072-22 exam dumps https://www.leads4pass.com/1z0-1072-22.html provides you with updated 1Z0-1072-22 exam materials (PDF or VCE) to help you pass the exam with ease.
Pass the Oracle 1Z0-1072-22 exam the first time using the updated leads4pass 1Z0-1072-22 exam dumps (237 Q&A) and free 1Z0-1072-22 exam materials.
1Z0-1072-22 Exam Materials, Practice Test Q And As
1Z0-1072-22 free dumps are questions from the latest full 1Z0-1072-22 dumps.
Question 1:
You have an Oracle Cloud Infrastructure (OCI) load balancer distributing traffic via an evenly- weighted
round robin policy to your back-end web servers. You notice that one of your web servers is receiving
more traffic than other web servers.
How can you resolve this to make sure traffic is evenly distributed across all back-end web servers?
A. Disable cookie-based session persistence on your backend set.
B. Change kee
C. Disable the SSL configuration associated with your backend set.
D. Create separate listeners for each backend web server.
Correct Answer: D
Reference: https://docs.cloud.oracle.com/en-us/iaas/Content/Balance/Concepts/balanceoverview.htm
Question 2:
Which two are Regional resources in Oracle Cloud Infrastructure? (Choose two.)
A. Ephemeral public IPs
B. Compartments
C. Compute images
D. Dynamic groups
E. Block volume backups
Correct Answer: BD
Reference: https://docs.cloud.oracle.com/en-us/iaas/Content/General/Concepts/regions.htm
Question 3:
An Oracle Cloud Infrastructure tenancy administrator is not able to delete a user in the tenancy. What can cause this issue?
A. User has multi-factor authentication (MFA) enabled.
B. User is a member of an Identity and Access Management (IAM) group.
C. Users can be blocked but not deleted.
D. User needs to be deleted from the federation Identity Provider (IdP) before deleting from IAM.
Correct Answer: A
Question 4:
You are a system administrator of your company and you are asked to manage updates and patches across all your compute instances running Oracle Linux in Oracle Cloud Infrastructure (OCI). As part of your task, you need to apply all the latest kernel security updates to all instances. Which OCI service will allow you to complete this task?
A. Resource Manager
B. OS Management
C. Storage Gateway
D. Streaming E. Registry
Correct Answer: B
Reference: https://blogs.oracle.com/cloud-infrastructure/os-management-with-oracle-cloud-infrastructure
Question 5:
Which of the following statements is true about the Oracle Cloud Infrastructure (OCI) Object Storage server-side encryption?
A. Encryption of data encryption keys with a master encryption key is optional.
B. Customer-provided encryption keys are always stored in the OCI Vault service.
C. Encryption is enabled by default and cannot be turned off.
D. Each object in a bucket is always encrypted with the same data encryption key.
Correct Answer: B
Reference: https://docs.cloud.oracle.com/en-us/iaas/Content/Object/Tasks/usingyourencryptionkeys.htm
Question 6:
You need to set up instance principals so that an application running on an instance can call Oracle Cloud Infrastructure (OCI) public services, without the need to configure user credentials. A developer in your team has already configured the application built using an OCI SDK to authenticate using the instance principals provider. Which is NOT a necessary step to complete this setup?
A. Create a dynamic group with matching rules to specify which instances you want to allow to make API calls against services.
B. Generate Auth Tokens to enable instances in the dynamic group to authenticate with APIs.
C. Create a policy granting permissions to the dynamic group to access services in your compartment or tenancy.
D. Deploy the application and the SDK to all the instances that belong to the dynamic group.
Correct Answer: D
Reference: https://blogs.oracle.com/cloud-infrastructure/announcing-instance-principals-for-identity- and access management
Question 7:
You work for a health insurance company that stores a large number of patient health records in an Oracle Cloud Infrastructure (OCI) Object Storage bucket named “HealthRecords”. Each record needs to be securely stored for a period of 5 years for regulatory compliance purposes and cannot be modified, overwritten, or deleted during this time period. What can you do to meet this requirement?
A. Create an OCI Object Storage Lifecycle Policies rule to archive objects in the HealthRecords bucket for five years.
B. Create an OCI Object Storage time-bound Retention Rule on the HealthRecords bucket for five years. Enable Retention Rule Lock on this bucket.
C. Enable encryption on the HealthRecords bucket using your own vault master encryption keys.
D. Enable versioning on the HealthRecords bucket.
Correct Answer: B
Reference: https://docs.cloud.oracle.com/en-us/iaas/Content/Object/Tasks/usingretentionrules.htm
Question 8:
As a solution architect, you are showcasing the Oracle Cloud Infrastructure (OCI) Object Storage feature
about Object Versioning to a customer.
Which statement is true in regard to OCI Object Storage Versioning?
A. Object versioning does not provide data protection against accidental or malicious object update, overwrite, or deletion.
B. By default, object versioning is disabled on a bucket.
C. A bucket that is versioning-enabled can have only and always will have the latest version of the object in the bucket.
D. Objects are physically deleted from a bucket when versioning is enabled.
Correct Answer: A
Reference: https://docs.cloud.oracle.com/en-us/iaas/Content/Object/Tasks/usingversioning.htm
Question 9:
You are designing a lab exercise for your team that has a large number of graphics with large file sizes.
The application becomes unresponsive if the graphics are embedded in the application. You have
uploaded the graphics to Oracle Cloud Infrastructure and only added the URL in the application. You need
to ensure these graphics are accessible without requiring any authentication for an extended period of
time.
How can you achieve these requirements?
A. Create pre-authenticated requests (PAR) and specify 00:00:0000 as the expiration time.
B. Make the object storage bucket private and all objects public and use the URL found in the Object “Details”.
C. Make the object storage bucket public and use the URL found in the Object “Details”.
D. Create PARs and do not specify an expiration date.
Correct Answer: C
Pre-authenticated requests provide a way to let you access a bucket or an object without having your own credentials. For example, you can create a request that lets you upload backups to a bucket without owning API keys. When you create a bucket, the bucket is considered a private bucket, and access to the bucket and bucket contents requires authentication and authorization. However, Object Storage supports anonymous, unauthenticated access to a bucket. You make a bucket public by enabling read access to the bucket. pre-authenticated requests have to select an expiration date
Question 10:
You have setup your environment as shown below with the Mount Target “MT” successfully mounted on
both compute instances CLIENT-X and CLIENT-Y.
For security reasons you want to control the access to File System A in such a way that CLIENT-X has
READ/WRITE and CLIENT-Y has READ only permission.
What you should do?
A. Update the OS firewall in CLIENT-X to allow READ/WRITE access.
B. Update the security list TWO to restrict CLIENT-Y access to read-only.
C. Update the mount target export options to restrict CLIENT-Y access to read-only.
D. Update the security list ONE to restrict CLIENT-Y access to read-only.
Correct Answer: D
Question 11:
You have an AI/ML application running on Oracle Cloud Infrastructure. You identified that the application
needs GPU and at least 20Gbps Network throughput. The application is currently using a VM.Standard2.1
compute without any block storage attached to it.
Which two options allow you to get the required performance for your application? (Choose two.)
A. Terminate the compute instance preserving the boot volume. Create a new compute instance using the BM.GPU2.2 shape using the boot volume preserved, but no block volume attached.
B. Terminate the compute instance preserving the boot volume. Create a new compute instance using the VM.Standard 2.2 shape using the boot volume preserved, but no block volume attached.
C. Terminate the compute instance preserving the boot volume. Create a new compute instance using the VM.GPU3.4 shape using the boot volume preserved and use the NVMe devices to host your application.
D. Terminate the compute instance preserving the boot volume. Create a new compute instance using the BM.HPC2.36 shape using the boot volume preserved and use the NVMe devices to host your application.
E. Terminate the compute instance preserving the boot volume. Create a new compute instance using the BM.GPU2.2 shape using the boot volume preserved and attach a new block volume to host your application.
Correct Answer: DE
Question 12:
Which option is NOT a valid action within the Oracle Cloud Infrastructure (OCI) Block Volume service?
A. Clone an existing volume to a new, larger volume.
B. Restore from a volume backup to a larger volume.
C. Shrink an existing volume in place with offline resizing.
D. Expand an existing volume in place with offline resizing.
Correct Answer: C
Question 13:
You deployed a database on a Standard Compute instance in Oracle Cloud Infrastructure (OCI) due to
cost concerns. The database requires additional storage with high I/O and you decided to use OCI Block
Volume service for it.
With this requirement in mind, which elastic performance option should you choose for the Block Volume?
A. Balanced Performance
B. Higher performance
C. Extreme performance
D. Lower cost
Correct Answer: B
Reference: https://docs.cloud.oracle.com/en-us/iaas/Content/Block/Concepts/blockvolumeperformance.htm
Question 14:
You have created a virtual cloud network (VCN) with three private subnets. Two of the subnets contain application servers and the third subnet contains a DB System. The application requires a shared file system so you have provisioned one using the file storage service (FSS). You also created the corresponding mount target in one of the application subnets. The VCN security lists are properly configured so that both application servers and the DB System can access the file system. The security team determines that the DB System should have read-only access to the file system. What change would you make to satisfy this requirement?
A. Create an NFS export option that allows READ_ONLY access where the source is the CIDR range of the DB System subnet.
B. Connect via SSH to one of the application servers where the file system has been mounted. Use the Unix command chmod to change permissions on the file system directory, allowing the database user read-only access.
C. Modify the security list associated with the subnet where the mount target resides. Change the ingress rules corresponding to the DB System subnet to be stateless.
D. Create an instance principal for the DB System. Write an Identity and Access Management (IAM) policy that allows the instance principal read-only access to the file storage service.
Correct Answer: A
NFS export options enable you to create more granular access control than is possible using just security list rules to limit VCN access. You can use NFS export options to specify access levels for IP addresses or CIDR blocks connecting to file systems through exports in a mount target.
Question 15:
Your company uses the Oracle Cloud Infrastructure (OCI) Object Storage service to share large data sets with its data science team. The data science team consists of 20 people who work from offices in Washington, D.C., and Tokyo. While working in these offices, employees are assigned an IP address from the public IP range 129.146.31.0/27 Which two steps should you take to ensure that the Object Storage bucket used in this scenario was only accessible from these office locations? (Choose two.)
A. Write an IAM policy that includes the conditional statement where requested. network source. name =CorpNet
B. Set the bucket visibility to the public and only share the URL with the data science team via email
C. Create a pre-authenticated request for each data set and only share it with the data science team via email
D. Create a Network Source named CorpNetwork with a CIDR block of 129.146.31.0/27
E. Create a Network Source named CorpNetwork with a CIDR block of 129.146.0.0/16
F. Write an IAM policy that includes the conditional statement where requested.region = 129.146.31.0/27
Correct Answer: CE
At last
Remember that using the leads4pass 1Z0-1072-22 exam dumps is your shortcut to easily passing the 1Z0-1072-22 exam, and it’s also important to keep enough practice. Here, get real 1Z0-1072-22 exam dumps. Come on, certificates are waiting for you.
Good luck with the Oracle 1Z0-1072-22 exam.