New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

1z0-1084-23 Questions and Answers

Question # 6

Which statement about microservices is FALSE?

A.

They are typically designed around business capabilities.

B.

It is fairly common for them to communicate with HTTP.

C.

Multiple microservices can run in one process.

D.

They are independently deployable.

Full Access
Question # 7

Which TWO are required to access the Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) cluster from the kubectl CLI? (Choose two.)

A.

Tiller enabled on the OKE cluster.

B.

An SSH key pair with the public key added to the cluster worker nodes.

C.

Install and configure the OCI CLI.

D.

A configured OCI API signing key pair.

E.

OCI Identity and Access Management (IAM) Auth Token.

Full Access
Question # 8

You encounter an unexpected error when invoking Oracle Functions from your Cloud Shell session named myfunction in the myapp application. Which option will get you more information on theerror?

A.

fn --verbose invoke myapp myfunction

B.

fn --debug invoke myapp myfunction

C.

Contact Oracle support with your error message

D.

DEBUG=1 fn invoke myapp myfunction

Full Access
Question # 9

Your company has recently deployed a new web application that uses Oracle Functions. Your manager instructs you to implement monitoring metrics to manage your systems more effectively. You know that Oracle Functions automatically monitors functions on your behalf and reports metrics via Oracle Cloud Infrastructure (OCI) Monitoring. Which TWO metrics are collected and made available by this feature? (Choose two.)

A.

Amount of CPU used by a function

B.

Length of time a function runs

C.

Number of times a function Is removed

D.

Amount of RAM used by a function

E.

Number of times a function is invoked

Full Access
Question # 10

Which of these is NOT a valid authentication method for accessing an OCI API Gateway deployment?

A.

HTTP Basic

B.

API Key

C.

OAuth

D.

SAML Token

Full Access
Question # 11

You have just finished building and compiling the software required to implement the API microservice component. You need to rebuild the API docker image, and plan to tag it as: ocIdevops/api:latest Which docker command would re-create the API docker image?

A.

docker build -t OCIdevops/api:latest

B.

docker create -t OCIdevops/api:latest

C.

docker image -t OCIdevops/api:latest

D.

docker compile -t OCI devops/api:latest

Full Access
Question # 12

A developer has created another version of a microservice and wants 10% of the traffic to flow towards it for testing purposes. The application is already configured using OCI (Oracle Cloud Infrastructure) Service Mesh. Which of the following steps is the right approach to achieve this goal?

A.

Create a new Kubernetes deployment for the new version of the microservice and set the trafficsplitting percentage to 10% in the Kubernetes service manifest.

B.

Use Kubernetes HPA (Horizontal Pod Autoscaler) to scale the new version of the microservice to handle 10% of the traffic automatically.

C.

Create a new entry in the routeRules field of the ingress gateway route table manifest to configure traffic splitting between the old and new versions of the microservice and set the percentage to 10%.

D.

Create a new entry in the routeRules field of the virtual service route table manifest to configure traffic splitting between the old and new versions of the microservice and set the percentage to 10%.

Full Access
Question # 13

(CHK_4>2) You have a scenario where a DevOps team wants to store secrets in Oracle Cloud Infrastructure (OCI) Vault so that it can inject the secrets into an app's environment variables (for example, MYSQL_DB_PASSWD) at deployment time. Which is NOT valid about managing secrets in the OCI Vault service?

A.

New secret versions automatically expire in 90 days unless you configure an expiry rule.

B.

You can manually create new secrets as well as new secret versions using the OCI Console:

C.

A unique OCID is automatically generated for each secret and remains unchanged even when creating a new secret version.

D.

A secret reuse rule prevents the use of secret contents across different versions of a secret.

Full Access
Question # 14

Having created a Container Engine for Kubernetes (OKE) cluster, you can use Oracle Cloud Infrastructure (OCI) Logging to view and search the logs of applications running on the worker node compute instances in the cluster. Which task is NOT required to collect and parse applicationlogs? (Choose the best answer.)

A.

Create a dynamic group with a rule that includes all worker nodes In the cluster.

B.

Set the OCI Logging option to Enabled for the cluster.

C.

Enable monitoring for all worker nodes in the cluster.

D.

Configure a custom log in OCI Logging with the appropriate agent configuration.

Full Access
Question # 15

Which is NOT a valid option to execute a function deployed in Oracle Functions?

A.

Invoke from the Docker CLI.

B.

Send signed HTTP requests to the function's invoke endpoint.

C.

Invoke from the Fn Project CLI.

D.

Trigger by an event in the Oracle Cloud Infrastructure (OCI) Events service.

E.

Invoke from the OCI CLI.

Full Access
Question # 16

Who is responsible for patching, upgrading, and maintaining the worker nodes in Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE)? (Choose the best answer.)

A.

Oracle Support

B.

It is automated

C.

The user

D.

Independent Software Vendors

Full Access
Question # 17

What is the difference between blue/green and canary deployment strategies? (Choose the best answer.)

A.

In blue/green, current applications are slowly replaced with new ones. In canary, the application Is deployed Incrementally to a select group of people.

B.

In blue/green, both old and new applications are in production at the same time. In canary, the application Is deployed incrementally to a select group of people.

C.

In blue/green, current applications are slowly replaced with new ones. In canary, both old and new applications are in production at the same time.

D.

In blue/green, the application Is deployed In minor Increments to a select group of people. In canary, both old and new applications are simultaneously in production.

Full Access
Question # 18

With the volume of communication that can happen between different components in cloud-native applications, it is vital to not only test functionality, but also service resiliency. Which statement is true regarding service resiliency?

A.

Resiliency is about avoiding failures.

B.

Resiliency testing can be done only in a test environment.

C.

Resiliency is about recovering from failures without downtime or data loss.

D.

Resiliency is about not bringing a service to a functioning state after a failure.

Full Access
Question # 19

You are developing a distributed application and you need a call to a path to always return a specific JSON content deploy an OCI API Gateway with the below API deployment specification. What is the correct value for type? { "routes" : [{ "path" : "/hello", "methods" : ["Get"), "backend" : { "type" : " ---------------- ", "status" : 200, "headers" : [{ "name" : "Content-Type", "value" : "application/json" }] "body" : "{\"myjson\": \"consistent response\"}" }}]}

A.

STOCK_RESPONSE_BACKEND

B.

CONSTANT_BACKEND

C.

JSON_BACKEND

D.

HTTP_BACKEND

Full Access
Question # 20

Which testing measure should be considered when using test cases that simultaneously validate a deployment and perform a selected set of functional tasks?

A.

Resource Utilization

B.

Functionality

C.

Scalability

D.

Robust Deployment

E.

Resiliency

Full Access
Question # 21

Which TWO statements accurately describe an Oracle Functions application? (Choose two.)

A.

A common context to store configuration variables that are available to all functions in the application. A Docker image containing all the functions that share the same configuration.

B.

An application based on Oracle Functions, Oracle Cloud Infrastructure (OCI) Events, and OCI API Gateway services.

C.

A small block of code invoked in response to an OCI Events service.

A logical group of functions.

D.

A Docker image containing all the functions that share the same configuration.

Full Access
Question # 22

Which statement accurately describes the Oracle Cloud Infrastructure (OCI) Load Balancer integration with OCI Container Engine for Kubernetes (OKE)?

A.

OKE service provisions an OCI Load Balancer instance for each Kubernetes service with LoadBalancer type in the YAML configuration.

B.

OKE service provisions a single OCI Load Balancer instance shared with all the Kubernetes services with LoadBalancer type in the YAML configuration.

C.

OCI Load Balancer instance provisioning is triggered by the OCI Events service for each Kubernetes service with LoadBalancer type in the YAML configuration.

D.

OCI Load Balancer instance must be manually provisioned for each Kubernetes service that requires traffic balancing.

Full Access
Question # 23

Your Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) administrator has created an OKE cluster with one node pool in a public subnet. You have been asked to provide a log file from one of the nodes for troubleshooting purpose. Which step should you take to obtain the log file?

A.

Use the username opc and password to login.

B.

It is impossible because OKE is a managed Kubernetes service.

C.

SSH into the nodes using the private key.

D.

SSH into the node using the public key.

Full Access
Question # 24

What are the TWO main reasons you would choose to implement a serverless architecture? (Choose two.)

A.

No need for integration testing

B.

Automatic horizontal scaling

C.

Easier to run long-running operations

D.

Reduced operational cost

E.

Improved in-function state management

Full Access
Question # 25

What is the difference between continuous delivery and continuous deployment in the DevOps methodology? (Choose the best answer.)

A.

Continuous delivery involves automation of developer tasks, whereas continuous deployment involves manual operational tasks.

B.

Continuous delivery requires automatic linting, whereas continuous deployment testing must be run manually.

C.

Continuous delivery utilizes automatic deployment to a development environment, whereas continuous deployment involves automatic deployment to a production environment.

D.

Continuous delivery is a process that Initiates deployment manually, whereas continuous deployment is based on automating the deployment process.

Full Access
Question # 26

As a Cloud Native developer, you have written a web service for your company. However, your security team has suggested that your web service should address Distributed Denial-of-Service (DDoS) attack. You are time-constrained and you need to ensure that this is implemented as soon as possible. What should you do in this scenario? (Choose the best answer.)

A.

Use a third party service integration to Implement DDoS attack mitigation.

B.

Re-write your web service and implement rate limiting.

C.

Use the OCI Virtual Cloud Network (VCN) segregation to control DDoS.

D.

Use the OCI API Gateway service and configure rate limiting.

Full Access
Question # 27

Your organization has mandated that all deployed container images used for microservices must be signed by a specified master encryption key (MEK). You have appropriately signed the container images as part of your build process, but must now ensure that they are automatically verified when they are deployed to Oracle Cloud Infrastructure (OCI) Container Engine for Kubemetes (OKE) clusters. Which option should be used to mandate image verification when deploying to OKEclusters, assuming that MEK is already stored in an available OCI Vault? (Choose the best answer.)

A.

Enable image verification policies separately for each Kubemetes pod deployment because this is enforced at the pod level.

B.

Enable image verification policies separately for each node pool within each OKE cluster because this is enforced at the node pool level.

C.

Enable image verification policies separately for each OKE cluster because this is enforced at the cluster level.

(Correct)

D.

Enable Image verification policies for your OKE service control plane which will enforce this for all OKE clusters.

Full Access
Question # 28

Which open source engine is used by Oracle Cloud Infrastructure (OCI) to power Oracle Functions?

A.

Knative

B.

Kubeless

C.

Apache OpenWhisk

D.

Fn Project

Full Access
Question # 29

You are tasked with developing an application that requires the use of Oracle Cloud Infrastructure (OCI) APIs to POST messages to a stream in the OCI Streaming service. Which statement is incorrect? (Choose the best answer.)

A.

The Content-Type header must be set to application/json

B.

The request must include an authorization signing string including (but not limited to) x-content-sha256, content-type, and content-length headers.

C.

The request does not require an Authorization header.

D.

An HTTP 401 will be returned if the client's clock is skewed more than 5 minutes from the server's.

Full Access
Question # 30

Which TWO statements are true for serverless computing and serverless architectures? (Choose two.)

A.

Serverless function execution is fully managed by third party.

B.

Applications running on a FaaS (Functions as a Service) platform.

C.

Long running tasks are perfectly suited for serverless.

D.

Application DevOps team is responsible for scaling.

E.

Serverless function state should never be stored externally.

Full Access