New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

1z0-1084-24 Questions and Answers

Question # 6

Your organization is developing serverless applications with Oracle Functions. Many functions will need to store state data in a database, which will require using appropriate credentials. However, your corporate security standards mandate encryption of secret information, such as database passwords. How would you address this security requirement?

A.

Use OCI Console to enter the password in the function configuration section in the provided input field.

B.

Leverage application-level configuration variables to store passwords because they are automatically encrypted by Oracle Functions.

C.

Use the OCI Vault service to auto-encrypt the password and then set an application-level configuration variable to reference the auto-decrypted password inside your function container.

D.

Encrypt the password using the OCI Vault service and then decrypt this password in your function code with the generated key.

Full Access
Question # 7

What is the maximum execution time of Oracle Functions?

A.

240 seconds

B.

300 seconds

C.

60 seconds

D.

120 seconds

Full Access
Question # 8

What can you use to dynamically make Kubernetes resources discoverable to public DNS servers? (Choose the best answer.)

A.

kubeDNS

B.

DynDNS

C.

CoreDNS

D.

ExternalDNS

Full Access
Question # 9

What is the difference between blue/green and canary deployment strategies? (Choose the best answer.)

A.

In blue/green, current applications are slowly replaced with new ones. In canary, the application Is deployed Incrementally to a select group of people.

B.

In blue/green, both old and new applications are in production at the same time. In canary, the application Is deployed incrementally to a select group of people.

C.

In blue/green, current applications are slowly replaced with new ones. In canary, both old and new applications are in production at the same time.

D.

In blue/green, the application Is deployed In minor Increments to a select group of people. In canary, both old and new applications are simultaneously in production.

Full Access
Question # 10

Which is ONE of the differences between a microservice and a serverless function?

A.

Microservices are used for long running operations while serverless functions are used for short running operations.

B.

Microservices are triggered by events while serverless functions are not.

C.

Microservices are stateless while serverless functions are stateful.

D.

Microservices always use a data store while serverless functions never use a data store.

Full Access
Question # 11

In the shared responsibility model, who should perform patching, upgrading, and maintaining of the worker nodes in provisioned Oracle Container Engine for Kubernetes (OKE) clusters?

A.

Oracle Support does it.

B.

It is the responsibility of the customer.

C.

It is an automated process.

Full Access
Question # 12

Which one of the following is NOT a valid backend-type supported by Oracle Cloud Infrastructure (OCI) API Gateway?

A.

STOCK_RESPONSE_BACKEND

B.

HTTP BACKEND

C.

ORACLE_FUNCTIONS_BACKEND

D.

ORACLE_STREAMS_BACKEND

Full Access
Question # 13

You are developing a polyglot serverless application using Oracle Functions. Which language cannot be used to write your function code?

A.

PL/SQL

B.

Python

C.

Node.js

D.

Go

E.

Java

Full Access
Question # 14

Which is NOT a valid option to execute a function deployed in Oracle Functions?

A.

Invoke from the Docker CLI.

B.

Send signed HTTP requests to the function's invoke endpoint.

C.

Invoke from the Fn Project CLI.

D.

Trigger by an event in the Oracle Cloud Infrastructure (OCI) Events service.

E.

Invoke from the OCI CLI.

Full Access
Question # 15

Which of these is NOT a valid authentication method for accessing an OCI API Gateway deployment?

A.

HTTP Basic

B.

API Key

C.

OAuth

D.

SAML Token

Full Access
Question # 16

You are tasked with developing an application that requires the use of Oracle Cloud Infrastructure (OCI) APIs to POST messages to a stream in the OCI Streaming service. Which statement is incorrect? (Choose the best answer.)

A.

The Content-Type header must be set to application/json

B.

The request must include an authorization signing string including (but not limited to) x-content-sha256, content-type, and content-length headers.

C.

The request does not require an Authorization header.

D.

An HTTP 401 will be returned if the client's clock is skewed more than 5 minutes from the server's.

Full Access
Question # 17

Kubernetes includes various elements such as compute, network, and storage. Compute is essentially CPU (units) and memory (bytes). Within an OKE cluster, what is considered to be the smallest unit of deployment with respect to compute?

A.

Container

B.

Service

C.

Pod

D.

Namespace

E.

Deployment resource

Full Access
Question # 18

To effectively test your cloud native applications for "unknown unknowns", you need to employ various testing and deployment strategies. Which strategy involves exposing new functionality or features to only a small set of users?

A.

A/B Testing

B.

Component Testing

C.

Blue/Green Deployment

D.

Canary Deployment

Full Access
Question # 19

From a DevOps process standpoint, it is a good practice to keep changes to an application under version control. Which of the following allows changes to a Docker image to be stored in a version control system?

A.

Updating docker-compose.yml

B.

Executing docker commit

C.

Executing docker save

D.

Updating Dockerfile

Full Access
Question # 20

Which of the following is NOT a criterion that is usually met by a microservice?

A.

Organized around business capabilities.

B.

Tightly coupled

C.

Highly maintainable

D.

Independently deployable

Full Access
Question # 21

You encounter an unexpected error when invoking Oracle Functions from your Cloud Shell session named myfunction in the myapp application. Which option will get you more information on the error?

A.

fn --verbose invoke myapp myfunction

B.

fn --debug invoke myapp myfunction

C.

Contact Oracle support with your error message

D.

DEBUG=1 fn invoke myapp myfunction

Full Access
Question # 22

Which TWO are required to access the Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) cluster from the kubectl CLI? (Choose two.)

A.

Tiller enabled on the OKE cluster.

B.

An SSH key pair with the public key added to the cluster worker nodes.

C.

Install and configure the OCI CLI.

D.

A configured OCI API signing key pair.

E.

OCI Identity and Access Management (IAM) Auth Token.

Full Access
Question # 23

Which of these is a valid use case for OCI Queue?

A.

Managing network traffic between services

B.

Storing and retrieving large files

C.

Sending real-time streaming data

D.

Building decoupled and scalable systems

Full Access
Question # 24

Which term describes a group formed by a master machine and a worker machine in a Kubernetes architecture?

A.

Cluster

B.

Node

C.

Deployment

D.

Container

E.

Pod

Full Access
Question # 25

Which command is used to get a Docker image from Oracle Cloud Infrastructure Registry (OCIR) to the client machine?

A.

docker pull .ocir.io//:

B.

docker pull /.ocir.io/:

C.

docker fetch .ocir.io//:

D.

docker fetch /.ocir.io/:

Full Access
Question # 26

Which testing measure should be considered when using test cases that simultaneously validate a deployment and perform a selected set of functional tasks?

A.

Resource Utilization

B.

Functionality

C.

Scalability

D.

Robust Deployment

E.

Resiliency

Full Access
Question # 27

What is the open source engine for Oracle Functions?

A.

Fn Project

B.

Apache OpenWhisk

C.

OpenFaas

D.

Knative

Full Access
Question # 28

Having created a Container Engine for Kubernetes (OKE) cluster, you can use Oracle Cloud Infrastructure (OCI) Logging to view and search the logs of applications running on the worker node compute instances in the cluster. Which task is NOT required to collect and parse application logs? (Choose the best answer.)

A.

Create a dynamic group with a rule that includes all worker nodes In the cluster.

B.

Set the OCI Logging option to Enabled for the cluster.

C.

Enable monitoring for all worker nodes in the cluster.

D.

Configure a custom log in OCI Logging with the appropriate agent configuration.

Full Access
Question # 29

Which of the following TWO statements are TRUE about deleting a Kubernetes cluster? (Choose two.)

A.

Upon deleting a cluster, other resources created during the cluster creation process or associated with the cluster (such as VCNS, Internet Gateways, NAT Gateways, Route Tables, Security Lists, B. Load Balancers, and Block Volumes) are deleted automatically.

B.

If you change the auto-generated name of a worker node and then delete the cluster, the renamed worker node is not deleted.

C.

Upon deleting a cluster, no other resources created during the cluster creation process or associated with the cluster (such as VCNS. Internet Gateways, NAT Gateways, Route Tables, Security Lists. Load Balancers, and Block Volumes) are deleted automatically.

D.

Changing the auto-generated name of a worker node does not affect the deletion of the worker node when the cluster in which it is created is deleted.

E.

You cannot change the autogenerated names of the worker nodes in the format oke-c--- within a Kubernetes cluster.

Full Access
Question # 30

To enforce mutual TLS (mTLS) authentication for clients of your microservices, your team has chosen to leverage the Oracle Cloud Infrastructure (OCI) API Gateway service to create new API Deployments that will direct requests to your microservices. Which is NOT valid regarding the mTLS options in OCI API Gateway?

A.

Custom CA or custom CA bundles can be added to your gateway's trust store ONLY if they already exist in the OCI Certificates service.

B.

Adding a custom certificate authority (CA) or custom CA bundle to your gateway's trust store for mTLS is optional unless you need to reject certificates that do not contain particular values (such as a domain name).

C.

The mTLS request policy can only be enabled at the API deployment specification level, which then applies globally to ALL routes in that deployment.

D.

Once the mTLS request policy is enabled, ALL requests with valid certificates are routed to the backend unless you have defined one or more particular values (such as a domain name).

Full Access