Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following 1z0-997-22 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 1z0-997-23

1z0-997-22 Exam Dumps - Oracle Cloud Infrastructure 2022 Architect Professional

Go to page:
Question # 9

You have created compartment called Dev for developers. There are two IAM groups for developers: group-devl and group-dev2. You need to write an Identity and Access Management (IAM) policy to give users in these groups access to manage all resources in the compartment Dev.

Which of the following IAM policy will accomplish this?

A.

Allow any-user to manage all resources in compartment Dev where request.group= /group-dev*/

B.

Allow group group-devl group-dev2 to manage all resources in compartment Dev

C.

Allow group /group-dev*/ to manage all resources in compartment Dev

D.

Allow any-user to manage all resources in tenancy where target.comparment= Dev

Full Access
Question # 10

There are two compartments: Networks and Devlnstances

There are two groups: NetworkAdmins with a user named Nick, and Devs with a user named Dave

The following IAM policies are being used:

*Allow group NetworkAdmins to manage virtual-network-family in compartment Networks

*Allow group NetworkAdmins to manage instance-family in compartment Networks

*Allow group Devs to use virtual-network-family in compartment Networks

*Allow group Devs to manage all-resources in compartment Devlnstances

Nick creates a VCN in Networks compartment. Dave creates a VCN in Devlnstances compartment.

Which of the following statements is INCORRECT?

A.

Dave launches instances in Devlnstances using the VCN in Networks compartment

B.

Nick cannot launch new instances in Devlnstances compartment

C.

Nick launches instances in Networks using VCN in Devlnstances compartment

D.

Dave cannot launch new instances in Networks compartment

Full Access
Question # 11

As part of planning the network design on Oracle Cloud Infrastructure, you have been asked to create an Oracle Cloud Infrastructure Virtual Cloud Network (VCN) with 3 subnets, one in each Availability Domain. Each subnet needs to have a minimum of 64 usable IP addresses.

What is the smallest subnet and VCN size you should use to implement this design? The requirements are static, so no growth is expected.

A.

122 for the VCN; 124 for the subnets

B.

/23 for the VCN; /25 for the subnets

C.

/24 for the VCN; /24 for the subnets

D.

/22 for the VCN; /25 for the subnets

Full Access
Question # 12

Which of the following is NOT a good use case for the Oracle Cloud Infrastructure (OCI) Streaming service?

A.

Meeting compliance requirements for data to remain unchanged over a long time, so that it can be retrieved for audit purposes.

B.

Messaging with a pull-based communication model and the ability to feed multiple consumers with the same data independently.

C.

Ingesting metric and log data to help make critical operational data more quickly available for indexing, analysis, and visualization.

D.

Providing a unified entry point for cloud components to report their life cycle events for audit, accounting, and related activities.

Full Access
Question # 13

A data analytics company has been building its next-generation big data and analytics platform on Oracle Cloud Infrastructure (OCI) in the US East (Ashburn) region. They need a storage service that provides the scale and performance that their big data applications require such as high throughput to compute nodes coupled with low latency file operations.

In addition, they need to allow concurrent connections from multiple compute instances hosted in multiple Availability Domains and want to be able to quickly restore a previous version of the data in case of a need to roll back any major update.

Which option can they use to meet these requirements in the most cost-effective way?

A.

Create a file system and mount target in the OCI File Storage service. Mount it into all the required compute instances. Take snapshots of the file system before each update.

B.

Create block volume, attach it with read/write, shareable access type to all the required compute instances. Take a backup of the volume before each update.

C.

Create an Object Storage bucket with object versioning enabled. Provision a compute instance to host the Storage Gateway and share the bucket via NFS, Mount the NFS into all the required compute instances.

D.

Create a connection with the on-premises data center via FastConnect. Mount the shared NFS hosted on-premises.

Full Access
Question # 14

Your team is conducting a root analysis (RCA) following a recent, unplanned outage. One of the block volumes attached to your production WebLogic server was deleted and you have tasked with identifying the source of the action. You search the Audit logs and find several Delete actions that occurred in the previous 24 hours. Given the sample of this event.

Which item from the event log helps you identify the individual or service that initiated the DeleteVolume API call?

A.

requestAgent

B.

eventource

C.

principalld

D.

requestOrigin

E.

eventId

Full Access
Question # 15

You work for a large bank where security and compliance are critical. As part of the security overview meeting, your company decided to minimize the installation of local tools on your laptop. You have been running Ansible and kubectl to spin up Oracle Container Engine for Kubernetes (OKE) clusters and deployed your application.

For authentication, you are using an Oracle Cloud Infrastructure (OCI) CLI config file that contains OCIDs, Fingerprint, and a locally stored PEM file. Your security team doesn't want you to store any local API key and certificate, or any other local tools.

Which two actions should you perform to spin up the OKE cluster and interact with it? (Choose two.)

A.

Create a developer workstation on OCI. Install Ansible and kubectl on it. Use resource principal to authenticate against OCI API and create the OKE Cluster.

B.

Develop your own code using OCI SDK to deploy the OKE cluster.

C.

Work on OCI Cloud Shell to use built-in Ansible and kubectl to deploy the OKE cluster. Use OCI_CLI_AUTH=instance_obo_user environment variable to authenticate using built-in token.

D.

Work on OCI Cloud Shell to use built-in Ansible and kubectl to deploy the OKE cluster. Bring in your own config file and certificate to authenticate against OCI API.

E.

Create a developer workstation on OCI. Install Ansible and kubectl on it. Use instance principal to authenticate against OCI API and create the OKE Cluster.

Full Access
Question # 16

You notice that a majority of your Oracle Cloud Infrastructure (OCI) resources like compute instances, block volumes, and load balancers are not tagged. You have received a mandate from your CIO to add a predefined set of tags to identify owners for respective OCI resources. E.g. if Chris and Larry each create compute instances in a compartment, the instances that Chris creates include tags that contain his name as the value, while the instances that Larry creates have his name.

Which option is the simplest way to implement this new tagging requirement?

A.

Create a default tag for each compartment, which ensure that appropriate tags are applied at the time of resource creation.

B.

Create an OCI Identity and Access Management policy requiring users to tag resources with their user name.

C.

Create an OCI Identity and Access Management policy to automatically tag a resource with the user name.

D.

Create tag variables to automatically tag a resource with the user name.

Full Access
Go to page: