Exam Code: | 1z0-932 |
Exam Name: | Oracle Cloud Infrastructure 2018 Architect Associate |
Certification Provider: | Oracle |
Free Question Number: | 93 |
Version: | v2019-07-28 |
Rating: | |
# of views: | 2783 |
# of Questions views: | 81015 |
Start Practice Test |
Valid 1z0-932 Dumps shared by Lead1Pass.com for Helping Passing 1z0-932 Exam! Lead1Pass.com now offer the newest 1z0-932 exam dumps, the Lead1Pass.com 1z0-932 exam questions have been updated and answers have been corrected get the newest Lead1Pass.com 1z0-932 dumps with Test Engine here:
Access Premium Version
(166 Q&As Dumps, 40%OFF Special Discount: freecram)
Recent Comments (The most recent comments are at the top.)
No.# good explanation
No.# Correct answer is D
It's not anymore at the bottom of every console page.
It's in Identity -> Compartment -> Root compartment / is the tenancy
No.# As per Oracle Cloud Infrastructure Architect Professional Workshop in learn.oracle, this solution should be the DNS Traffic Management Steering Policies - Geolocation Policy... so none of the above is accurate :(
No.# Answer is D:
As mentioned in the Service Gateway FAQ:
If you're using a service gateway, you can define an IAM policy that allows access to a bucket only if the requests come from a specific VCN or CIDR range. The IAM policy works only for traffic routed through the service gateway. Access is blocked if the IAM policy is in place and the traffic instead goes through an internet gateway.
No.# it should be C, because by default OCI DB service creates first DB
No.# A is correct
No.# A is correct.
No.# Answer A : Is not correct due VCN peering in same home region, we use Local VCN Peering (Within Region).
Reference: https://docs.cloud.oracle.com/en-us/iaas/Content/Network/Tasks/localVCNpeering.htm
correct answer is D.
No.# Answer should be A.
Reference: https://docs.cloud.oracle.com/en-us/iaas/Content/Identity/Tasks/callingservicesfrominstances.htm
No.# ans: A,B
No.# A and E
No.# A , C and D
Using the dbaascli utility, you can:
Change the password of a database user.
Start and stop a database.
Start and stop the Oracle Net listener
Check the status of the Oracle Data Guard configuration.
Perform switchover and failover in an Oracle Data Guard configuration.
Patch the database deployment.
Perform database recovery.
Rotate the master encryption key.
No.# D is correct
No.# B is correct
No.# B is correct
No.# A and D
No.# B and C
No.# A , D and E
No.# A and B
No.# B
https://docs.oracle.com/en/cloud/paas/autonomous-data-warehouse-cloud/user/connect-download-wallet.html#GUID-B06202D2-0597-41AA-9481-3B174F75D4B1
No.# A and B
No.# Answer shall be D as in all other we have overlapping IP Range.
No.# As per Oracle they do not have any 2 regions which are located within a range of 300 miles from each other and each region is in different country.
Mostly we shall go with A as it speaks about different AD in same domain.
No.# Answer should be C
No.# https://medium.com/@tigerbabu/oracle-cloud-infrastructure-associate-architect-notes-
4495b25b24a4
Above link also not showing anything which can proof option D is correct.
No.# Option C and D are correct option, for detail please login to OCI console and click on create instance button , while selecting image, there are 6 options are available (Platform Image, Partners Image , Image OCID, Boot volume, Custom image)
No.# As requirement is to access public cloud (object storage), so Public peering should be the correct option, and with Fastconnect BGP routs suits this requirement, private peering again add more complexity as it will require DRG which should associate with VCN , then with service gateway the same can achieve which should not be a good architecture so option D should be the correct option.
No.# Option B should be the correct one, Option C should not be correct as database should not be accessible through internet.
No.# Option D should be the correct option, as by default no access is granted in OCI, and here to use Instance principle , matching rule and dynamic group needs to be defined.
No.# https://docs.cloud.oracle.com/iaas/Content/File/Concepts/filestorageoverview.htm
As per above doc, below is the statement:
"Oracle Cloud Infrastructure users require resource permissions to create, delete, and manage resources. Without the appropriate IAM permissions, you cannot export a file system through a mount target. Until a file system has been exported, Compute instances cannot mount it. "
In a question , already followed the steps to mount the shared file system on your Oracle Linux virtual Instance, however issue is still unable to access the shared file system from your Linux instance..
IAM policy is ok and that is why able to follow the step to mount it, however file system is not accessible due to ports are not open through security list , so correct option should be A.
No.# As the requirement are:
1. should be far away from home site
2. distance should be more than 300 miles
To meet the above requirement, two separate regions would be the better solution, and VCNs on different region can be connected with remote peering.
No.# https://docs.cloud.oracle.com/iaas/Content/Balance/Concepts/balanceoverview.htm
As Web servers are placed in different ADs, so - 3 Subnet
For load balancer , i 2 subnets are required {one is primary and one is standby} in two different ADs, in case of regional subnet only one subnet will be required, however here the question is related with AD specific subnets so total required subnets will be 5.
No.# https://blogs.oracle.com/cloud-infrastructure/introducing-volume-groups:-enabling-coordinated-backups-and-clones-for-application-protection-and-lifecycle-management
No.# Boot volume or Block volume, both are block volume only and as per FAQ, below question is showing deatil about volume backup applicable for both types of backup, so option B should be the correct option.
What is a volume group backup? How does it work?
A coordinated point-in-time crash consistent backup of the entire set of volumes that are in a volume group. This operation creates a volume group backup. There is no impact to the source volume group and volumes during the backup process.
Volume group backups are replicated across all Availability Domains within the region where the source volume group resides. A volume group backup can then be used to create a new volume group to any Availability Domain within the region the backup resides, by restoring all the volumes data that are in the volume group.
No.# Correct answer should be B, https://cloud.oracle.com/storage/data-transfer-appliance/faq
No.# As per Data transfer FAQ, option B should be the correct answer.
No.# Option B cannot be the correct option, as Public and Private subnets can be in same AD for a given VCN.
Option A and D should be correct answers
No.# Option A should be the correct option as per doc https://cloud.oracle.com/storage/file-storage/faq
Description of NFS export options :NFS export options apply access control to network security lists and NFS version 3 UNIX authentication. You can use NFS export options to limit access levels by IP addresses or CIDR blocks that connect to multiple file systems through exports of an associated mount target. As a result, access can be restricted so that each client’s file system is completely inaccessible and invisible to the others, which provides security for multitenant or managed-hosted environments. Moreover, you can set permissions for read-only, read/write, or root-squash for your file systems.
No.# https://dyn.com/blog/internet-intelligence-now-available-in-the-oracle-cloud-infrastructure-console/
No.# Option A cannot be correct , as per doc https://docs.cloud.oracle.com/iaas/Content/Network/Tasks/managingDRGs.htm.
One VCN can have only one DRG attached
B,C,E should be the correct option, D should not be the accurate answer as question is about high availability but not only to setup hybrid connection.
Below doc describe why B and C are correct.
https://cloud.oracle.com/iaas/whitepapers/best-practices-deploying-ha-architecture-oci.pdf
No.# As per https://cloud.oracle.com/en_US/bare-metal-network/vcn/faq, below question clearly describe Service gateway is regional service, so option B cannot be the correct option.
Correct option should be A, as route table should have rule to send object storage related traffic through service gateway instead of NAT or Internet Gateway
Below question from FAQ:
Can I configure the service gateway to access services running in a different region?
--No, the service gateway is regional and can access only services running in the same region.
No.# D option should be the correct one as per https://cloud.oracle.com/storage/file-storage/faq ,
question :How do I manage security and access control for my file systems?
-- NFS version 3 manages security with standard UNIX-style read/write/execute permissions, based on user and group IDs. We verify the UNIX security model for authentication each time files are accessed.
No.# OPtion A clearly showing "Instance Subnet Route table", this option is more accurate then option B.
Option D: As ping has been tried from compute instance on OCI, so traffic should be allowed for outbound connection , so egrass should be the correct option for ICMP traffic.
No.# Answer should be B and C, the reason of C is , instances are not able to access internet those are in public subnet, so egrass rule needs to be checked.
No.# Block Volume and Instance are Availability domain specific, so it is not possible to attach block volume of different AD to instance running on different AD, so answer B & C are correct answers , C is correct as per FAQ "https://cloud.oracle.com/database/faq"
No.# DBCS provides options like RAC and data guard for high availability, which would be manual process if use Oracle database in compute instance, so here answer should be A, as DBCS service provides feature to use RAC by selection just node option.
No.# Correct answer should be D, as requirement is the DR site should be at least 300 miles far from home OCI region.
No.# Answer should be B as there is option available on same place as describing in point B
No.# Answer should be A & D, as DRG is for something connect without using internet, and here Instances required to connect to Internet those are in public subnet, so main cause should be egrass rule in security list or Route table is not set to Internet Gateway.