1z0-1072-20 Premium Bundle

1z0-1072-20 Premium Bundle

Oracle Cloud Infrastructure 2020 Architect Associate Certification Exam

4.5 
(53385 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
May 20, 2024Last update

Oracle 1z0-1072-20 Free Practice Questions

Master the 1z0-1072-20 Oracle Cloud Infrastructure 2020 Architect Associate content and be ready for exam day success quickly with this Pass4sure 1z0-1072-20 download. We guarantee it!We make it a reality and give you real 1z0-1072-20 questions in our Oracle 1z0-1072-20 braindumps.Latest 100% VALID Oracle 1z0-1072-20 Exam Questions Dumps at below page. You can use our Oracle 1z0-1072-20 braindumps and pass your exam.

Online Oracle 1z0-1072-20 free dumps demo Below:

NEW QUESTION 1

Which two are Regional resources in Oracle Cloud Infrastructure? (Choose two.)

  • A. Ephemeral public IPs
  • B. Compartments
  • C. Compute images
  • D. Dynamic groups
  • E. Block volume backups

Answer: BD

Explanation:
Reference: https://docs.cloud.oracle.com/en-us/iaas/Content/General/Concepts/regions.htm

NEW QUESTION 2

You deployed a database on a Standard Compute instance in Oracle Cloud Infrastructure (OCI) due to cost concerns. The database requires additional storage with high I/O and you decided to use OCI Block Volume service for it.
With this requirement in mind, which elastic performance option should you choose for the Block Volume?

  • A. Balanced Performance
  • B. Higher performance
  • C. Extreme performance
  • D. Lower cost

Answer: B

Explanation:
Reference: https://docs.cloud.oracle.com/en-us/iaas/Content/Block/Concepts/blockvolumeperformance.htm

NEW QUESTION 3

Your company is moving an Internet-facing, 2-tier web application into Oracle Cloud Infrastructure. The application must have a highly available architecture.
Which two design options would you consider? (Choose two.)

  • A. Configure a Dynamic Route Gateway in your VCN and make it highly available.
  • B. Configure a NAT instance in your Virtual Cloud Network (VCN). Create a route rule by using the private IP of the NAT instance as a route target for all the private subnets in your VCN.
  • C. Create an Internet Gateway and attach it to your VC
  • D. Deploy public load balancer nodes into two Available Domains.
  • E. Place all web servers behind a public load balancer.

Answer: CD

NEW QUESTION 4

Your company has been running several small applications in Oracle Cloud Infrastructure and is planning a proof-of-concept (POC) to deploy PeopleSoft.
If your existing resources are being maintained in the root compartment, what is the recommended approach for defining security for the upcoming POC?

  • A. Create a new compartment for the POC and grant appropriate permissions to create and manage resources within the compartment.
  • B. Provision all new resources into the root compartmen
  • C. Grant permissions that only allow for creation and management of resources specific to the POC.
  • D. Provision all new resources into the root compartmen
  • E. Use defined tags to separate resources that belong to different applications.
  • F. Create a new tenancy for the PO
  • G. Provision all new resources into the root compartmen
  • H. Grant appropriate permissions to create and manage resources within the root compartment.

Answer: A

Explanation:
If your organization is small, or if you are still in the proof-of-concept stage of evaluating OracleCloud Infrastructure, consider placing all of your resources in the root compartment (tenancy). This approach makes it easy for you to quickly view and manage all your resources. You can still write policies and create groups to restrict permissions on specific resources to only the users who need access.If you plan to maintain all your resources in the root compartment, we recommend setting up aseparate sandbox compartment to give users a dedicated space to try out features. In the sandbox compartment, you can grant users permissions to create and manage resources, whilemaintaining stricter permissions on the resources in your tenancy (root) compartment.
https://www.oracle.com/a/ocom/docs/best-practices-for-iam-on-oci.pdf

NEW QUESTION 5

Which two statements are true about an Oracle Cloud Infrastructure (OCI) virtual cloud network (VCN)? (Choose two.)

  • A. To delete a VCN, its subnets must contain no resources.
  • B. A VCN can have multiple CIDR blocks associated with it.
  • C. In regions with multiple Availability Domains (AD), each AD should have their own VCN assigned to it.
  • D. If you own a block of public IPs, you can assign it to one of your VCNs.
  • E. A VCN covers a single, contiguous IPv4 CIDR block of your choice.

Answer: AE

Explanation:
Reference: https://docs.cloud.oracle.com/en-us/iaas/Content/Network/Tasks/managingVCNs.htm

NEW QUESTION 6

You are working for a financial institution that is currently running two web applications in Oracle Cloud Infrastructure (OCI). All resources were created in the root compartment.
Your manager asked you to deploy new resources to support a proof-of-concept (PoC) for Oracle FlexCube. D18912E1457D5D1DDCBD40AB3BF70D5D
You must ensure that the FlexCube resources are secured and cannot be affected by the team that manages the two web applications.
Which two tasks should you complete to ensure the required security of your resources? (Choose two.)

  • A. Create a new compartment for the two web applications and move the existing resources into thecompartmen
  • B. Deploy the FlexCube application into the root compartmen
  • C. Create a new policy in the rootcompartment that gives the FlexCube project team the ability to manage all resources in the tenancy.
  • D. Create a new policy in the root compartment for the FlexCube project tea
  • E. Assign a policy statement that grants the FlexCube project team the ability to manage all resources in the tenancy, where a specific tag key and tag value are present.
  • F. Create a Tag Default within the root compartment with a default value of ${iam.principle.name} so that each new resource created is tagged with the name of the person who created i
  • G. Create a new IAMpolicy that allows users to only modify resources they created.
  • H. Create a new compartment for the two web applications and move the existing resources into this compartmen
  • I. Modify the existing policy for the team that manages these applications so that the scopeof access is defined as this new compartment.
  • J. Create a new compartment for the FlexCube application deploymen
  • K. Create a policy in this compartment for the project team that gives them the ability to manage all resources within the scope of thiscompartment.

Answer: CD

NEW QUESTION 7

You are managing a tier-1 OLTP application on an Autonomous Transaction Processing (ATP) database. Your business needs to run hourly batch processes on this ATP database that may consume more CPUs than what is available on the server.
How can you limit these batch processes to not interfere with the OLTP transactions?

  • A. Configure ATP resource management rules to change CPU/IO shares for the consumer group of batch processes.
  • B. Copy OLTP data into new tables in a new table space and run batch processes against these new tables.
  • C. Disable automated backup during the batch process operations.
  • D. ATP is designed for OLTP workload only, you cannot run batch processes on ATP.

Answer: A

Explanation:
Autonomous Transaction Processing comes with predefined CPU/IO shares assigned to different consumer groups. You can modify these predefined CPU/IO shares if your workload requires different CPU/IO resource allocations.
By default, the CPU/IO shares assigned to the consumer groups TPURGENT, TP, HIGH, MEDIUM, and LOW are 12, 8, 4, 2, and 1, respectively. The shares determine how much CPU/IO resources a consumer
group can use with respect to the other consumer groups. With the default settings the consumer group TPURGENT will be able to use 12 times more CPU/IO resources compared to LOW, when needed. The consumer group TP will be able to use 4 times more CPU/IO resources compared to MEDIUM, when needed.

NEW QUESTION 8

Which three are capabilities of the dbaascli utility? (Choose three.)

  • A. Patching the primary database deployment
  • B. Open port 1521 in the VCN to allow for traffic to the listener
  • C. Start and open the database instance
  • D. Switchover and failover in an Oracle Guard configuration
  • E. Clone a DB

Answer: ACD

Explanation:
https://docs.oracle.com/en/cloud/paas/database-dbaas-cloud/csdbi/dbaascli.html Using the dbaascli utility, you can:
Change the password of a database user. Start and stop a database.
Start and stop the Oracle Net listener
Check the status of the Oracle Data Guard configuration.
Perform switchover and failover in an Oracle Data Guard configuration. Patch the database deployment.
Perform database recovery. Rotate the master encryption key.
https://docs.oracle.com/en/cloud/paas/database-dbaas-cloud/csdbi/dbaascli.html

NEW QUESTION 9

When terminating a compute instance, which statement is true?

  • A. The instance needs to be stopped first, and then terminated.
  • B. The boot volume is always deleted.
  • C. All block volumes attached to the instance are terminated.
  • D. Users can preserve the boot volume associated with the instance.

Answer: D

Explanation:
You can permanently terminate (delete) instances that you no longer need. Any attached VNICs and volumes are automatically detached when the instance terminates. Eventually, the instance's public and private IP addresses are released and become available for other instances. By default, the instance's boot volume is deleted when you terminate the instance, however you can preserve the boot volume associated with the instance, so that you can attach it to a different instance as a data volume, or use it to launch a new instance.

NEW QUESTION 10

Which of the following statements is true about the Oracle Cloud Infrastructure (OCI) Object Storage serverside encryption?

  • A. Encryption of data encryption keys with a master encryption key is optional.
  • B. Customer-provided encryption keys are always stored in OCI Vault service.
  • C. Encryption is enabled by default and cannot be turned off.
  • D. Each object in a bucket is always encrypted with the same data encryption key.

Answer: B

Explanation:
Reference: https://docs.cloud.oracle.com/en-us/iaas/Content/Object/Tasks/usingyourencryptionkeys.htm

NEW QUESTION 11

Which storage would you use if your big data workload requires shared access and an NFS based interface?

  • A. File Storage
  • B. Storage Software Cloud Appliance
  • C. Object Storage
  • D. Archive Storage
  • E. Block Volume

Answer: A

Explanation:
References: https://docs.cloud.oracle.com/iaas/Content/File/Concepts/filestorageoverview.htm
The File Storage service is designed to meet the needs of applications and users that need an enterprise file system across a wide range of use cases, including the following:
General Purpose File Storage: Access to an unlimited pool of file systems to manage growth of structured
and unstructured data.
Big Data and Analytics: Run analytic workloads and ussehared file systems
to store persistent data.
Lift and Shift of Enterprise Applications: Migrate existing Oracle applications that need NFS storage, such as Oracle E-Business Suite and PeopleSoft.
Databases and Transactional Applications: Run test and development workloads with Oracle, MySQL, or other databases.
Backups, Business Continuity, and Disaster Recovery: Host a secondary copy of relevant file systems from on premises to the cloud for backup and disaster recovery purposes.
MicroServices and Docker: Deliver stateful persistence for containers. Easily scale as your container-based environments grow.

NEW QUESTION 12

There are multiple options of migrating Oracle Databases from on-premises to Oracle Cloud Infrastructure.
Which two characteristics do you need to consider when choosing a migration method? (Choose two.)

  • A. On-premises database character set and application version
  • B. On-premises database version and quantity of data, including indexes
  • C. On-premises host operating system platform and network bandwidth
  • D. On-premises connectivity using remote and local VCN peering

Answer: BC

Explanation:
References: https://docs.cloud.oracle.com/iaas/Content/Database/Tasks/migrating.htm Some of the characteristics and factors to consider when choosing a migration method are:
On-premises database versionDatabase service database versionOn-premises host operating system and versionOn-premises database character setQuantity of data, including indexesData types used in the
on-premises databaseStorage for data stagingAcceptable length of system outageNetwork bandwidth

NEW QUESTION 13

Which statement is true about Oracle Cloud Infrastructure Object Storage Service?

  • A. An Archive Object Storage tier bucket can be upgraded to the Standard Object Storage tier.
  • B. You cannot directly download an object from an Archive Object Storage bucket.
  • C. An existing Standard Object Storage tier bucket can be downgraded to the Archive Object Storage tier.
  • D. Data retrieval in Archive Object Storage is instantaneous.

Answer: B

NEW QUESTION 14

You are a network architect and have designed the network infrastructure of a three-tier application on Oracle Cloud Infrastructure (OCI). In the architecture, back-end DB servers are in a private subnet. One of your DB administrators requests to have access to OCI object storage service.
How can you meet this requirement?

  • A. Add a new route rule to the private subnet route table to route default traffic to the internet gateway.
  • B. Attach a public IP address to the instances in the private subnet, and then add a new route rule to the private subnet route table to route default traffic to the internet gateway.
  • C. Create a dynamic routing gateway (DRG) and attach it to your virtual cloud network (VCN). Add a default route rule to the private subnets route table and set the target as DRG.
  • D. Create a service gateway, add a new route rule to the private subnet route table that uses object storage as target type.

Answer: D

Explanation:
A service gateway lets resources in your VCN privately access specific Oracle services, without exposing the data to an internet gateway or NAT. The resources in the VCN can be in a private subnet and use only private IP addresses. The traffic from the VCN to the service of interest travels over the Oracle network fabric and never traverses the internet.
To give your VCN access to a given service CIDR label, you must enable that service CIDR label for the VCN's service gateway. You can do that when you create the service gateway, or later after it's created. You can also disable a service CIDR label for the service gateway at any time.
For traffic to be routed from a subnet in your VCN to a service gateway, you must add a rule accordingly to the subnet's route table. The rule must use the service gateway as the target.
Reference:
https://blogs.oracle.com/cloud-infrastructure/connect-private-instances-with-oracle-servicesthrough-an-oracle-cl

NEW QUESTION 15

You are designing a networking infrastructure in multiple Oracle Cloud Infrastructure regions and require connectivity between workloads in each region. You have created a dynamic routing gateway (DRG) and a remote peering connection. However, your workloads are unable to communicate with each other.
What are two reasons for this? (Choose two.)

  • A. The security lists associated with subnets in each virtual cloud network (VCN) do not have the appropriate ingress rules
  • B. Identity and Access Management (IAM) policies have not been defined to allow connectivity across the two VCNs in different regions
  • C. A local peering gateway needs to be created in each VCN with a default route rule added in the route table forwarding the traffic to the local peering gateway
  • D. An Internet gateway needs to be created in each VCN with a default route rule added in the route table forwarding the traffic to the Internet Gateway
  • E. The route table associated with subnets in each VCN do not have a route rule defined to forward the traffic to their respective DRGs

Answer: AE

Explanation:
Setting Up a Remote Peering
Create the RPCs: Each VCN administrator creates an RPC for their own VCN's DRG. Share information: The administrators share the basic required information.
Set up the required IAM policies for the connection: The administrators set up IAM policies to enable the connection to be established.
Establish the connection: The requestor connects the two RPCs (see Important Remote Peering Concepts the definition of the requestor and acceptor).
Update route tables: Each administrator updates their VCN's route tables to enable traffic between the peered VCNs as desired.
Update security rules: Each administrator updates their VCN's security rules to enable traffic between the peered VCNs as desired.

NEW QUESTION 16

You provisioned an Oracle Autonomous Data Warehouse (ADW) on Oracle Cloud Infrastructure (OCI) and imported data into ADW.
You want to give your business analyst the ability to connect to the ADW database and run queries. Which two actions can help you meet this requirement? (Choose two.)

  • A. Create a database user account for the business analyst.
  • B. Grant the predefined database role DWROLE to the database user.
  • C. Grant unlimited tablespace privilege to the database user.
  • D. Grant the predefined database role DWADW to the database user.
  • E. Grant the predefined database role DWUSER to the database user.

Answer: BC

Explanation:
Reference:
https://oracle.github.io/learning-library/oci-library/L100-LAB/Autonomous_Data_Warehouse/ADW_HOL.html

NEW QUESTION 17

Which three methods can you use to manage Oracle Cloud Infrastructure services? (Choose three.)

  • A. Oracle Cloud Infrastructure Desktop Client
  • B. Oracle Cloud Infrastructure Console
  • C. SSH or RDP
  • D. Command-line Interface
  • E. REST API

Answer: BDE

Explanation:
https://docs.cloud.oracle.com/iaas/Content/GSG/Concepts/baremetalintro.htm

NEW QUESTION 18

You are responsible for setting up access for all the cloud users of a large enterprise. You log in to the Phoenix region and start creating users and policies. You then realize that some users might be creating resources in the Ashburn region.
Which step should you perform to enable those users?

  • A. You can assign a region to each of the users at the time of creation.
  • B. IAM users are global and non-admin users can add resources to any region by default.
  • C. You need to log in to each region separately to create users for that particular region.
  • D. IAM users are globa
  • E. As an administrator, make sure that you subscribe to the Ashburn region.

Answer: D

NEW QUESTION 19

You had an outage in your application caused by the loss of a shared volume provisioned by File Storage Service (FSS). At this point, you need to restore the data from a snapshot you created of the FSS.
What are the steps to restore the data?

  • A. Access the directory where the shared volume is mounted, then cd into .snapshot folder, find the snapshot folder you want to recover and use cp or rsync tool to copy the files to the original location.
  • B. Open OCI Console, select File Storage Service, find the shared storage, then click on snapshot and restore.
  • C. Open OCI Console, select File Storage Service, find the snapshot you created and click restore.
  • D. Access the directory, where you mounted the shared volume, then cd into .snapshot folder and find the snapshot folder you want to recover and rename that folder to the original folder name.

Answer: B

NEW QUESTION 20

You are designing a lab exercise for your team that has a large number of graphics with large file sizes. The application becomes unresponsive if the graphics are embedded in the application. You have uploaded the graphics to Oracle Cloud Infrastructure and only added the URL in the application. You need to ensure these graphics are accessible without requiring any authentication for an extended period of time.
How can you achieve these requirements?

  • A. Create pre-authenticated requests (PAR) and specify 00:00:0000 as the expiration time.
  • B. Make the object storage bucket private and all objects public and use the URL found in the Object “Details”.
  • C. Make the object storage bucket public and use the URL found in the Object “Details”.
  • D. Create PARs and do not specify an expiration date.

Answer: C

Explanation:
Pre-authenticated requests provide a way to let you access a bucket or an object without having your own credentials. For example, you can create a request that lets you upload backups to a bucket without owning API keys.
When you create a bucket, the bucket is considered a private bucket and the access to the bucket and bucket contents requires authentication and authorization. However, Object Storage supports anonymous, unauthenticated access to a bucket. You make a bucket public by enabling read access to the bucket.
pre-authenticated requests have to select expiration date
1Z0-1072-20 dumps exhibit

NEW QUESTION 21

You are responsible for creating and maintaining an enterprise application that consists of multiple storage
volumes across multiple compute instances in Oracle Cloud Infrastructure (OCI).
The storage volumes include boot volumes and block volumes for your data storage. You need to create backups of these storage volumes in the most time-efficient manner.
How can you meet this requirement?

  • A. Create clones of all boot volumes and block volumes one at a time.
  • B. Create on-demand full backups of boot volumes, and copy data in block volumes to Object Storage using OCI CLI.
  • C. Create on-demand full backups of block volumes, and create custom images from the boot volumes.
  • D. Group together multiple storage volumes in a volume group and create volume group backups.

Answer: D

Explanation:
Reference: https://docs.cloud.oracle.com/en-us/iaas/Content/Block/Concepts/volumegroups.htm

NEW QUESTION 22

boot volume for a minimum of 15 days so you have to increase the boot
You have created a virtual cloud network (VCN) with three private subnets. Two of the subnets contain application servers and the third subnet contains a DB System. The application requires a shared file system so you have provisioned one using the file storage service (FSS). You also created the corresponding mount target in one of the application subnets. The VCN security lists are properly configured so that both application servers and the DB System can access the file system. The security team determines that the DB System should have read-only access to the file system.
What change would you make to satisfy this requirement?

  • A. Create an NFS export option that allows READ_ONLY access where the source is the CIDR range of the DB System subnet.
  • B. Connect via SSH to one of the application servers where the file system has been mounte
  • C. Use the Unix command chmod to change permissions on the file system directory, allowing the database user read only access.
  • D. Modify the security list associated with the subnet where the mount target reside
  • E. Change the ingress rules corresponding to the DB System subnet to be stateless.
  • F. Create an instance principal for the DB Syste
  • G. Write an Identity and Access Management (IAM) policy that allows the instance principal read-only access to the file storage service.

Answer: A

Explanation:
NFS export options enable you to create more granular access control than is possible using just security list rules to limit VCN access. You can use NFS export options to specify access levels
blocks connecting to file systems through exports in a mount target.

NEW QUESTION 23
......

Recommend!! Get the Full 1z0-1072-20 dumps in VCE and PDF From Surepassexam, Welcome to Download: https://www.surepassexam.com/1z0-1072-20-exam-dumps.html (New 238 Q&As Version)


START 1z0-1072-20 EXAM