You need to create a high performance shared file system service, and have been advised to use OCI File Storage Service. You have logged into the OCI Console, created a File System in an availability domain, and followed the steps to mount the shared file system on your Oracle Linux virtual Instance. However, you are still unable to access the shared file system from your Linux instance.
What is the likely reason for this?
A. There are no security list rules for mount target traffic
B. There is no IGW set up for mount target traffic
C. There is no IAM policies set up to allow you to access the mount target
D. There is no route in your VCN's route table for mount target traffic
When terminating a compute instance, which statement is true?
A. The instance needs to be stopped first, and then terminated.
B. The boot volume is always deleted.
C. All block volumes attached to the instance are terminated.
D. Users can preserve the boot volume associated with the instance.
Which two statements about the Oracle File Storage Service (FSS) Security are accurate? (Choose two.)
A. Oracle IAM controls which filesystems are mountable by which instances.
B. Security lists can be used as a virtual firewall to prevent an instance from mounting an FSS mount target within a subnet.
C. Encryption of file storage in FSS is optional.
D. Data in transit to an FSS mount target is encrypted.
E. FSS leverages UNIX user group and permission checking for file access security.
You had an outage in your application caused by the loss of a shared volume provisioned by File Storage Service (FSS). At this point, you need to restore the data from a snapshot you created of the FSS. What are the steps to restore the data?
A. Access the directory where the shared volume is mounted, then cd into .snapshot folder, find the snapshot folder you want to recover and use cp or rsync tool to copy the files to the original location.
B. Open OCI Console, select File Storage Service, find the shared storage, then click on snapshot and restore.
C. Open OCI Console, select File Storage Service, find the snapshot you created and click restore.
D. Access the directory, where you mounted the shared volume, then cd into .snapshot folder and find the snapshot folder you want to recover and rename that folder to the original folder name.
Where do you find the tnsnames.ora for your Autonomous Data Warehouse (ADW) database?
A. You can download tnsnames.ora from Oracle Cloud Infrastructure web console under ADW details page
B. The tnsnames.ora file is included in credentials.zip file that you download from service console of ADW
C. The ADW database will place the tnsnames.ora file in an object storage bucket
D. You are automatically prompted to download the tnsnames.ora file upon creation of the ADW database
Which two statements are true about an Oracle Cloud Infrastructure object storage bucket? (Choose two.)
A. You can associate a bucket with multiple compartments
B. You cannot change a bucket from private to public after it is created
C. You can associate a bucket with only a single compartment
D. You cannot edit or append data to an object, but you can replace the entire object
Which statement is true about Oracle Cloud Infrastructure FastConnect?
A. For private peering, FastConnect extends your existing infrastructure to allow you to consume object storage from your on-premises data center
B. For private peering, FastConnect extends your existing infrastructure to a virtual cloud network C. The FastConnect provider network offers only 1 Gbps port connection speed increments
D. For public peering, a dynamic routing gateway must be configured and attached to the virtual cloud network (VCN)
You are asked to create a user that will access programmatic endpoints in Oracle Cloud Infrastructure.
The user must not be allowed to authenticate by username and password.
Which two authentication options can you use? (Choose two.)
A. PEM Certificate file
B. Auth tokens
C. API signing key
D. Windows password
E. SSH key pair
You are designing a lab exercise for your team that has a large number of graphics with large file sizes. The application becomes unresponsive if the graphics are embedded in the application. You have
uploaded the graphics to Oracle Cloud Infrastructure and only added the URL in the application. You need
to ensure these graphics are accessible without requiring any authentication for an extended period of
time.
How can you achieve these requirements?
A. Create pre-authenticated requests (PAR) and specify 00:00:0000 as the expiration time.
B. Make the object storage bucket private and all objects public and use the URL found in the Object "Details".
C. Make the object storage bucket public and use the URL found in the Object "Details".
D. Create PARs and do not specify an expiration date.
Which two statements are true about data guard service on DB Systems in Oracle Cloud Infrastructure (OCI)?
A. Data guard implementation requires two DB Systems, one running the primary database on a virtual machine and the standby database running on bare metal.
B. Data guard implementation requires two DB Systems, one containing the primary database and one containing the standby database.
C. Data guard configuration on the OCI is limited to a virtual machine only.
D. Both DB Systems must use the same VCN, and port 1521 must be open.