11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

1z0-1084-24 Exam Dumps - Oracle Cloud Infrastructure 2024 Developer Professional

Question # 4

What is the maximum execution time of Oracle Functions?

A.

240 seconds

B.

300 seconds

C.

60 seconds

D.

120 seconds

Full Access
Question # 5

You plan to implement logging in your services that will run in Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE). Which statement describes the appropriate logging approach?

A.

All services log to standard output only.

B.

Each service logs to its own log file.

C.

All services log to an external logging system.

D.

All serviceAAs log to a shared log file.

Full Access
Question # 6

Which "Action Type" option is NOT available in an Oracle Cloud Infrastructure (OCI) Events rule definition?

A.

Streaming

B.

Email

C.

Notifications

D.

Functions

Full Access
Question # 7

To effectively test your cloud native applications for "unknown unknowns", you need to employ various testing and deployment strategies. Which strategy involves exposing new functionality or features to only a small set of users?

A.

A/B Testing

B.

Component Testing

C.

Blue/Green Deployment

D.

Canary Deployment

Full Access
Question # 8

You are building a cloud native serverless travel application with multiple Oracle Functions in Java, Python, and Node.js. You need to build and deploy these functions to a single application named travel-app. Which command will help you complete this task successfully?

A.

fn function deploy app travel-app--all

B.

fn app deploy --app travel-app --all

C.

fn app --app travel-app deploy --ext java pyljs

D.

fn deploy--app travel-app --all

Full Access
Question # 9

Which one of the following is NOT a valid backend-type supported by Oracle Cloud Infrastructure (OCI) API Gateway?

A.

STOCK_RESPONSE_BACKEND

B.

HTTP BACKEND

C.

ORACLE_FUNCTIONS_BACKEND

D.

ORACLE_STREAMS_BACKEND

Full Access
Question # 10

As a developer, you have been tasked with implementing a microservices-based application. Which THREE technologies are best suited to accomplish the task? (Choose three.)

A.

Terraform

B.

Big Data

C.

Anomaly Detection

D.

Service Mesh

E.

Docker

F.

Kubemetes

Full Access
Question # 11

Kubernetes includes various elements such as compute, network, and storage. Compute is essentially CPU (units) and memory (bytes). Within an OKE cluster, what is considered to be the smallest unit of deployment with respect to compute?

A.

Container

B.

Service

C.

Pod

D.

Namespace

E.

Deployment resource

Full Access
Question # 12

A Docker image consists of one or more layers, each of which represents a Dockerfile instruction. The layers are stacked and each one is a delta of the changes from the previous layer. What permission is associated with these layers?

A.

read mostly

B.

write only

C.

movable

D.

read only

E.

write once

Full Access
Question # 13

Which of these is a valid use case for OCI Queue?

A.

Managing network traffic between services

B.

Storing and retrieving large files

C.

Sending real-time streaming data

D.

Building decoupled and scalable systems

Full Access
Question # 14

Which two "Action Type" options are NOT available in an Oracle Cloud Infrastructure (OCI) Events rule definition? (Choose two.)

A.

Email

B.

Streaming

C.

Slack

D.

Functions

E.

Notifications

Full Access
Question # 15

You are developing a polyglot serverless application using Oracle Functions. Which language cannot be used to write your function code?

A.

PL/SQL

B.

Python

C.

Node.js

D.

Go

E.

Java

Full Access
Question # 16

As a Cloud Native developer, you develop two services in Node.js and deploy them to two different Container Engine for Kubernetes (OKE) clusters that use the same Virtual Cloud Network (VCN). Your security team wants to analyze the network communication between them. How can this requirement be met in the most cost-effective way?

A.

Rewrite the application and send the application logs to an outside log aggregator.

B.

Deploy a third-party logging service and aggregate the network flow logs.

C.

Use the OCI Logging service and enable VCN flow logs.

D.

Deploy Wireshark and intercept the packets.

Full Access
Question # 17

Which option best defines microservices?

A.

A statically typed and compiled language.

B.

An open-source system for automating deployment, scaling, and management of containerized applications.

C.

A finely tuned piece of software that performs a single or small collection of tasks.

D.

An organized collection of structured information or data, typically stored electronically in a computer system.

Full Access
Question # 18

Which of the following TWO statements are TRUE about deleting a Kubernetes cluster? (Choose two.)

A.

Upon deleting a cluster, other resources created during the cluster creation process or associated with the cluster (such as VCNS, Internet Gateways, NAT Gateways, Route Tables, Security Lists, B. Load Balancers, and Block Volumes) are deleted automatically.

B.

If you change the auto-generated name of a worker node and then delete the cluster, the renamed worker node is not deleted.

C.

Upon deleting a cluster, no other resources created during the cluster creation process or associated with the cluster (such as VCNS. Internet Gateways, NAT Gateways, Route Tables, Security Lists. Load Balancers, and Block Volumes) are deleted automatically.

D.

Changing the auto-generated name of a worker node does not affect the deletion of the worker node when the cluster in which it is created is deleted.

E.

You cannot change the autogenerated names of the worker nodes in the format oke-c--- within a Kubernetes cluster.

Full Access
Question # 19

Your company has recently deployed a new web application that uses Oracle Functions. Your manager instructs you to implement monitoring metrics to manage your systems more effectively. You know that Oracle Functions automatically monitors functions on your behalf and reports metrics via Oracle Cloud Infrastructure (OCI) Monitoring. Which TWO metrics are collected and made available by this feature? (Choose two.)

A.

Amount of CPU used by a function

B.

Length of time a function runs

C.

Number of times a function Is removed

D.

Amount of RAM used by a function

E.

Number of times a function is invoked

Full Access
Question # 20

To enforce mutual TLS (mTLS) authentication for clients of your microservices, your team has chosen to leverage the Oracle Cloud Infrastructure (OCI) API Gateway service to create new API Deployments that will direct requests to your microservices. Which is NOT valid regarding the mTLS options in OCI API Gateway?

A.

Custom CA or custom CA bundles can be added to your gateway's trust store ONLY if they already exist in the OCI Certificates service.

B.

Adding a custom certificate authority (CA) or custom CA bundle to your gateway's trust store for mTLS is optional unless you need to reject certificates that do not contain particular values (such as a domain name).

C.

The mTLS request policy can only be enabled at the API deployment specification level, which then applies globally to ALL routes in that deployment.

D.

Once the mTLS request policy is enabled, ALL requests with valid certificates are routed to the backend unless you have defined one or more particular values (such as a domain name).

Full Access
Question # 21

You are creating an API deployment in Oracle Cloud Infrastructure (OCI) API Gateway and you want to configure request policies to control access. Which is NOT available in OCI API Gateway?

A.

Controlling access to the backend OCI resources.

B.

Limiting the number of requests sent to the backend services.

C.

Enabling Cross-Origin Resource Sharing (CORS) support.

D.

Providing authentication and authorization.

Full Access
Question # 22

With the volume of communication that can happen between different components in cloud-native applications, it is vital to not only test functionality, but also service resiliency. Which statement is true regarding service resiliency?

A.

Resiliency is about avoiding failures.

B.

Resiliency testing can be done only in a test environment.

C.

Resiliency is about recovering from failures without downtime or data loss.

D.

Resiliency is about not bringing a service to a functioning state after a failure.

Full Access
Question # 23

Which of the following is NOT a criterion that is usually met by a microservice?

A.

Organized around business capabilities.

B.

Tightly coupled

C.

Highly maintainable

D.

Independently deployable

Full Access
Question # 24

You want to push a new image in the Oracle Cloud Infrastructure (OCI) Registry. Which TWO actions would you need to perform? (Choose two.)

A.

Generate an API signing key to complete the authentication via Docker CLI.

B.

Generate an auth token to complete the authentication via Docker CLI.

C.

Assign an OCI defined tag via OCI CLI to the image.

D.

Assign a tag via Docker CLI to the image.

E.

Generate an OCI tag namespace in your repository.

Full Access
Question # 25

Which TWO are part of the Cloud Native Computing Foundation (CNCF) container runtime? (Choose two.)

A.

rkt-o

B.

runc

C.

getcd

D.

containerd

Full Access
Question # 26

As a Cloud Native developer, you have written a web service for your company. However, your security team has suggested that your web service should address Distributed Denial-of-Service (DDoS) attack. You are time-constrained and you need to ensure that this is implemented as soon as possible. What should you do in this scenario? (Choose the best answer.)

A.

Use a third party service integration to Implement DDoS attack mitigation.

B.

Re-write your web service and implement rate limiting.

C.

Use the OCI Virtual Cloud Network (VCN) segregation to control DDoS.

D.

Use the OCI API Gateway service and configure rate limiting.

Full Access
Question # 27

You are building a container image and pushing it to Oracle Cloud Infrastructure Registry (OCIR). You need to ensure that these images never get deleted from the repository. Which action should you take?

A.

Create a group and assign a policy to perform lifecycle operations on images.

B.

Write a policy to limit access to the specific repository in your compartment.

C.

Edit the tenancy global retention policy.

D.

Set global policy of image retention to "Retain All Images".

Full Access
Question # 28

Which is NOT a valid backend-type option available when configuring an Oracle Cloud Infrastructure (OCI) API Gateway Deployment?

A.

HTTP_BACKEND

B.

ORACLE STREAMS_BACKEND

C.

ORACLE_FUNCTIONS_BACKEND

Full Access
Question # 29

A company is developing a new application that needs to process transactions in real time. The company wants to ensure that all transactions are processed in order and that no transaction is lost. Which of these is a correct strategy for leveraging OCI Queue in this scenario?

A.

Use a separate queue for each type of transaction.

B.

Use a single queue to process all transactions.

C.

Use a separate queue for each application instance.

D.

Use a priority queue to prioritize requests.

Full Access
Question # 30

You need to push a new Docker container image to a repository in the Oracle Cloud Infrastructure (OCI) Registry. Which mechanism must you use to provide authentication?

A.

Generate an API signing key to complete the authentication via the Docker CLI.

B.

Generate an Auth Token to complete the authentication via the OCI CLI.

C.

Generate an API signing key to complete the authentication via the OCI CLI.

D.

Generate an Auth Token to complete the authentication via the Docker CLI.

Full Access