Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

1z0-1124-25 Questions and Answers

Question # 6

Your organization uses a combination of OCI and AWS. Applications in OCI frequently access services hosted in AWS. You are experiencing slow and inconsistent data transfer speeds when transferring large files between the two clouds. You have a Site-to-Site VPN, but are considering other options. Which option is NOT a valid design consideration for improving the data transfer performance between OCI and AWS?

A.

Evaluate the distance between the OCI and AWS regions you are using.

B.

Deploy a dedicated interconnect through a network service provider that specializes in connecting OCI and AWS.

C.

Determine the pricing scheme used for all OCI compute resources so you can predict when you need to scale bandwidth.

D.

Evaluate using a third-party WAN optimization solution.

Full Access
Question # 7

You are designing a multicloud architecture where your customer wants to leverage OCI for its cost-effective compute and storage, while utilizing Microsoft Azure’s AI/ML services and AWS’s extensive serverless capabilities. The application requires low latency and high bandwidth between the clouds. Which of the following approaches provides the LEAST optimal solution for interconnecting these three cloud providers for production workloads?

A.

Establishing a dedicated, low-latency connection between each cloud provider’s nearest peering location using a third-party network provider for maximum bandwidth and minimizing network hops

B.

Creating IPSec VPN tunnels between OCI, Azure, and AWS, utilizing the native VPN gateways offered by each respective cloud provider for secure, encrypted communication

C.

Utilizing OCI FastConnect to establish private peering with Azure and AWS through supported FastConnect partners to ensure dedicated bandwidth and consistent performance

D.

Connecting OCI to Azure via OCI Azure Interconnect, then establishing an IPSec VPN tunnel from Azure to AWS using Azure’s VPN Gateway

Full Access
Question # 8

In a complex multi-region OCI environment using DRGs for transitive routing, which method is most efficient for ensuring that route updates from on-premises networks are propagated to all connected VCNs?

A.

Manually updating static routes in each VCN's route table.

B.

Using a centralized DRG route table with route distribution enabled.

C.

Attaching each VCN to a separate DRG and configuring static routing between them.

D.

Implementing a Service Gateway to broadcast route updates.

Full Access
Question # 9

You are designing a highly available application that requires low latency communication between OCI regions. You have two VCNs, VCN-A in Region 1 and VCN-B in Region 2. These VCNs have non-overlapping CIDR blocks and you want to establish a private, direct connection between them for optimal performance. Which of the following steps are necessary to establish this cross-region connectivity using the native OCI networking capabilities?

A.

Create a Remote Peering Connection (RPC) in each VCN, establish the peering, and update the route tables in each VCN to route traffic to the peer VCN’s CIDR block through the RPC.

B.

Configure an IPSec VPN tunnel between the VCNs and update the route tables in each VCN to route traffic to the peer VCN’s CIDR block through the IPSec VPN tunnel.

C.

Create a Service Gateway in each VCN, and configure a Dynamic Routing Gateway (DRG) toroute traffic between the Service Gateways.

D.

Create a NAT Gateway in each VCN and configure route rules to route traffic to the other NAT Gateway’s public IP address.

Full Access
Question # 10

You are configuring a VCN with multiple subnets for a customer. The security team requires that all instances have IPv6 addresses. You configure the VCN with an IPv6 ULA CIDR block of fc00:1:1::/48 and create two private subnets. After launching instances in the two private subnets, you notice that they only have IPv4 addresses assigned. You have not manually configured any IPv6 addresses on the instances themselves. What steps are necessary to ensure the instances automatically receive IPv6 addresses?

A.

No further steps are needed. Instances will automatically receive IPv6 addresses within the configured subnets upon launch.

B.

Ensure that SLAAC (Stateless Address Autoconfiguration) is enabled on the operating system of the instances within the two subnets.

C.

IPv6 address assignment is only supported on instances launched in public subnets.

D.

Make sure the "Assign public IPv4 address" option is not selected during instance creation. This will force the instance to default to IPv6 allocation.

Full Access
Question # 11

When migrating workloads requiring high availability and redundancy for on-premises connectivity to OCI, which approach is recommended?

A.

Single FastConnect connection

B.

Site-to-Site VPN over a single internet connection

C.

Dual FastConnect connections with diverse paths

D.

Internet Gateway with multiple public IPs

Full Access
Question # 12

A company wants to leverage a best-of-breed approach for their application stack. They plan to use OCI for its Autonomous Database, Azure for its container orchestration (AKS), and AWS for its object storage (S3). Considering cost optimization and minimizing data egress charges, which strategy is the MOST efficient for transferring large datasets between these services?

A.

Moving data directly between OCI Autonomous Database, Azure AKS, and AWS S3 using public internet, as this is the most cost-effective option

B.

Establishing a hub-and-spoke model, using a central cloud provider as the data transfer hub, incurring egress charges from each cloud to the hub and then ingress charges from the hub to the destination cloud

C.

Utilizing a third-party data integration platform that is strategically located at a network peering point between OCI, Azure, and AWS

D.

Using Storage Gateway service on each cloud and replicate data from one gateway to the other

Full Access
Question # 13

You are a Network Engineer designing a hybrid cloud architecture for a large enterprise. The company requires secure and private connectivity between their on-premises network and their OCI VCN. They have sensitive data that cannot traverse the public internet. Which OCI VCN gateway is most appropriate for establishing this connection, ensuring end-to-end data encryption and isolation from the public internet?

A.

A Service Gateway configured to access Oracle Services.

B.

An Internet Gateway configured with default route rules.

C.

A Dynamic Routing Gateway (DRG) connected to a FastConnect circuit.

D.

A NAT Gateway configured with public IPs for all subnets.

Full Access
Question # 14

You are setting up a Site-to-Site VPN connection between your on-premises network and OCI. You have generated the IKE pre-shared key and configured the VPN connection in OCI. You now need to configure your on-premises Customer Premises Equipment (CPE). Which information from the OCI console is ESSENTIAL for configuring your on-premises CPE to establish the VPN connection?

A.

The OCI region and availability domain.

B.

The public IP address of the OCI Dynamic Routing Gateway (DRG) and the IKE pre-shared key.

C.

The OCID (Oracle Cloud Identifier) of the VPN connection and the compartment ID.

D.

The subnet CIDR blocks within your OCI VCN.

Full Access
Question # 15

Which OCI service provides detailed logs for network traffic traversing a Network Load Balancer, offering insights into client connections and backend health checks?

A.

Flow Logs

B.

Service Logs

C.

Load Balancer Logs

D.

Audit Logs

Full Access
Question # 16

You are designing a multi-tier application within an OCI Virtual Cloud Network (VCN). The application comprises a public-facing web tier in one subnet, an application tier in another, and a database tier in a third. For security reasons, you want to ensure that only the application tier can initiate connections to the database tier. The web tier needs to be able to communicate with the application tier, but not directly with the database tier. You are using private IP addresses within your VCN. Which procedural step is MOST effective to achieve this network isolation?

A.

Create separate Network Security Groups (NSGs) for each tier and configure ingress and egress rules to restrict traffic accordingly. Configure the route table for the Web Tier subnet to route traffic destined for the Database Tier subnet through the Application Tier.

B.

Create a single Network Security Group (NSG) and associate it with all three subnets. Configure ingress and egress rules within the single NSG to restrict traffic accordingly.

C.

Create separate security lists for each subnet and configure ingress and egress rules to restrict traffic accordingly. Create appropriate route rules in each subnet’s route table.

D.

Create separate security lists for each subnet and configure ingress and egress rules to restrict traffic accordingly. Configure the route table for the Web Tier subnet to route traffic destined for the Database Tier subnet through the Application Tier.

Full Access
Question # 17

Consider a scenario where you have several private subnets within your VCN, and instances in these subnets need to access different OCI Object Storage buckets across various compartments. How can you efficiently manage and secure private access to Object Storage for all these subnets while adhering to the principle of least privilege?

A.

Configure a single Internet Gateway and use IAM policies to control access at the bucket level.

B.

Deploy a single NAT Gateway and manage access using Network Security Groups (NSGs) for each subnet.

C.

Implement a Service Gateway within the VCN and utilize IAM policies and route tables to direct traffic to the appropriate Object Storage service endpoints.

D.

Create a Private Endpoint for each Object Storage bucket within each private subnet.

Full Access
Question # 18

Which OCI logging feature allows you to correlate network traffic patterns from Flow Logs with application-level events from Service Logs for comprehensive troubleshooting?

A.

Log Groups

B.

Log Analytics

C.

Log Streams

D.

Log Export

Full Access
Question # 19

You are designing a multi-tier application in OCI, deploying the application tier in a public subnet and the database tier in a private subnet within the same VCN. The application tier requires access to specific external internet resources for software updates and third-party API calls. However, the database tier should not have direct internet access. Which of the following is the most secure and efficient method to achieve this configuration?

A.

Configure a NAT Gateway for the private subnet and a Service Gateway for the public subnet.

B.

Configure a NAT Gateway for both the public and private subnets.

C.

Configure a NAT Gateway for the public subnet and a Service Gateway for the private subnet.

D.

Configure a NAT Gateway for the private subnet and an Internet Gateway for the public subnet.

Full Access
Question # 20

You are designing a hybrid cloud architecture connecting your on-premises network to OCI. You have established a Site-to-Site VPN between your on-premises network and an OCI DRG. You have two VCNs attached to the DRG: VCN-A (10.0.0.0/16) and VCN-B (10.1.0.0/16). You need to ensure that only VCN-A can communicate with the on-premises network (192.168.1.0/24), while VCN-B should remain isolated. What is the MOST effective and secure method to achieve this connectivity requirement using DRG route tables?

A.

Create a single DRG route table. Add a route rule to the DRG route table for 192.168.1.0/24 pointing to the VPN attachment. Associate this route table with both the VCN-A and VCN-B attachments. Implement Network Security Groups (NSGs) on VCN-B to block all traffic to and from 192.168.1.0/24.

B.

Create a single DRG route table. Add a route rule to the DRG route table for 192.168.1.0/24 pointing to the VPN attachment. Associate this route table with the VCN-A attachment. Associate a default DRG route table that contains no routes for the VPN attachment with the VCN-Battachment.

C.

Create two DRG route tables: DRG-RT-A and DRG-RT-B. In DRG-RT-A, add a route rule for 192.168.1.0/24 pointing to the VPN attachment. Associate DRG-RT-A with the VCN-A attachment. In DRG-RT-B, add a route rule for 192.168.1.0/24 pointing to the VPN attachment and associate DRG-RT-B with the VCN-B attachment. Then, use security lists to block all traffic between VCN-B and the on-premises network.

D.

Create two DRG route tables: DRG-RT-A and DRG-RT-B. In DRG-RT-A, add a route rule for 192.168.1.0/24 pointing to the VPN attachment. Associate DRG-RT-A with the VCN-A attachment. Associate DRG-RT-B (containing no routes for 192.168.1.0/24) with the VCN-B attachment.

Full Access
Question # 21

When setting up cross-tenancy VCN peering using Local Peering Gateways (LPGs), which IAM permission is required in the target tenancy to accept the peering request?

A.

Allow group to manage local-peering-gateways in tenancy=

B.

Allow group to use local-peering-gateways in tenancy=

C.

Allow group to inspect local-peering-gateways in tenancy=

D.

Allow group to read virtual-network-family in tenancy=

Full Access
Question # 22

Your company is setting up a FastConnect connection with a provider. You have purchased a port from the provider, and they are requesting information to set up the connection to Oracle Cloud Infrastructure. They specifically require information to configure the VLANs. What information regarding VLAN configuration is ESSENTIAL for them to successfully establish the FastConnect circuit?

A.

The list of all VCN CIDR blocks and their associated tags.

B.

A single unused VLAN ID, your BGP ASN, and the BGP peering IP addresses you want to use.

C.

The MTU (Maximum Transmission Unit) size for all VNICs in your OCI tenancy.

D.

Your Oracle Cloud Identifier (OCID) and compartment ID.

Full Access
Question # 23

Your security team has mandated that all traffic to Oracle Cloud Infrastructure Object Storage must be encrypted end-to-end and must not be routed over the public internet. You are designing asolution where compute instances within a private subnet will frequently upload and download data from Object Storage. Which of the following options provides the most secure and compliant solution?

A.

Configure a Service Gateway to Object Storage and enable encryption at rest on the Object Storage bucket.

B.

Configure a NAT Gateway for the instances and enable encryption in transit using HTTPS for all Object Storage API calls.

C.

Configure a Service Gateway to Object Storage and ensure all API calls to Object Storage are made over HTTPS.

D.

Configure a Private Endpoint to Object Storage and ensure all API calls to Object Storage are made over HTTPS.

Full Access
Question # 24

When configuring transitive routing with a DRG across multiple VCNs and on-premises networks, which key configuration step ensures that traffic from one VCN is correctly routed through the DRG to an on-premises destination?

A.

Configuring static routes on the DRG route table with the on-premises network CIDR and the corresponding VCN attachment.

B.

Configuring dynamic routing protocol (e.g., BGP) on the DRG and the on-premises Customer Premises Equipment (CPE).

C.

Attaching all VCNs to a single LPG and configuring route tables to direct traffic to the on-premises network.

D.

Implementing a Service Gateway to facilitate direct communication between the VCNs and the on-premises network.

Full Access
Question # 25

Your company needs to connect an on-premises data center to an OCI Virtual Cloud Network (VCN) to extend their existing infrastructure to the cloud. The connection MUST be secure, reliable, and provide consistent, low-latency access to resources in both environments. Resources in the OCI VCN need access to the on-premises servers, and resources in the on-premises data center need to access the compute instances located in a private subnet within the OCI VCN. Which is the MOST appropriate architectural design for establishing connectivity in this hybrid cloud environment, considering the available endpoints and gateway options in OCI?

A.

Implement a Site-to-Site VPN connection between the on-premises network and the OCI VCN, utilizing a Dynamic Routing Gateway (DRG) in OCI.

B.

Establish a FastConnect connection between the on-premises network and the OCI VCN, utilizing a Dynamic Routing Gateway (DRG) in OCI.

C.

Configure a public endpoint for each resource in the OCI VCN that needs to be accessed from the on-premises network.

D.

Implement a FastConnect connection from the on-premises network to the OCI VCN utilizing a Dynamic Routing Gateway (DRG) in OCI and implement a Site-to-Site VPN connection as backup.

Full Access
Question # 26

Your company utilizes a hybrid cloud architecture, connecting its on-premises network to an OCIVCN using a FastConnect private peering connection. You need to ensure that instances within a specific subnet in the VCN can only communicate with resources in a designated IP address range within the on-premises network. What is the MOST effective way to achieve this specific network isolation?

A.

Configure an Internet Gateway for the subnet with a route rule to the on-premises network.

B.

Modify the VCN’s default security list to restrict traffic to the on-premises IP address range.

C.

Create a custom route table for the subnet with a route rule pointing to the Dynamic Routing Gateway (DRG) and configure network security groups (NSGs) to limit traffic to the specified on-premises IP address range.

D.

Configure a Local Peering Gateway (LPG) for the subnet to route traffic to the on-premises network.

Full Access
Question # 27

A development team has deployed a three-tier application in an OCI VCN. The application consists of a public-facing web tier, an application tier, and a database tier. The team reports that the web tier instances can communicate with the application tier instances, but the application tier instances cannot connect to the database tier instances. All security lists are configured to allow all traffic within the VCN. Which OCI Networking diagnostic tool would BEST help you quickly isolate the root cause of this connectivity issue?

A.

VCN Flow Logs

B.

Connection Diagnostics

C.

Network Firewall

D.

OCI Bastion

Full Access
Question # 28

You are designing an OCI networking architecture for a multi-tier application using Infrastructure as Code (IaC). The architecture includes an OKE cluster for the front-end, a set of Compute instances for the back-end, and an Autonomous Database. You want to ensure that all traffic between these components is encrypted. You are using Transport Layer Security (TLS) for end-to-end encryption but are concerned about the overhead of encrypting all traffic within the VCN. Which approach provides the MOST balanced approach to security and performance, minimizing the overhead of encryption while still protecting sensitive data?

A.

Implement TLS encryption only between the OKE cluster and the load balancer. Rely on the inherent security of the OCI network for traffic within the VCN.

B.

Implement mutual TLS (mTLS) for all traffic between the OKE cluster, the Compute instances, and the Autonomous Database.

C.

Use Network Security Groups (NSGs) and Security Lists to control access between components but do not implement any additional encryption within the VCN.

D.

Implement TLS encryption for traffic between the OKE cluster and the Compute instances and use Oracle Database Vault to encrypt data at rest and in transit for the Autonomous Database.

Full Access
Question # 29

As a network security engineer, you are tasked with designing a highly secure architecture for a financial application running on OCI. You have deployed a Network Firewall to protect the application’s VCN. Due to regulatory compliance requirements, you need to ensure that no direct internet access is allowed to any compute instance within the application’s private subnet, even if it is misconfigured. You need to block all outbound traffic to the internet. Which Network Firewall rule action best accomplishes this goal?

A.

ALLOW with Destination IP address set to 0.0.0.0/0.

B.

DROP with Destination IP address set to the NAT Gateway IP address.

C.

REJECT with Destination IP address set to 0.0.0.0/0.

D.

ALLOW with Destination IP address set to the Service Gateway IP address.

Full Access
Question # 30

Which OCI component facilitates transitive routing between VCNs in different regions via a dedicated, private network backbone, while also enabling connectivity to on-premises networks?

A.

Local Peering Gateway (LPG)

B.

Dynamic Routing Gateway (DRG)

C.

Service Gateway

D.

Internet Gateway

Full Access
Question # 31

You are designing a solution to implement IPSec encryption over a FastConnect circuit between your on-premises network and OCI. You are concerned about the overhead of IPSec impacting themaximum MTU (Maximum Transmission Unit) size that can be supported. What is the most important factor to consider when determining the MTU size for the IPSec tunnel interfaces in this scenario?

A.

The available bandwidth of the FastConnect circuit. A larger MTU requires a higher bandwidth connection.

B.

The smallest MTU supported by any device along the entire network path between your on-premises network and OCI, including the FastConnect provider's network.

C.

The MTU size of the underlying Ethernet frames used by the FastConnect circuit.

D.

The fragmentation settings on the DRG in OCI.

Full Access
Question # 32

When migrating workloads to OCI requiring consistent, high-bandwidth connections with minimal latency, and your on-premises data center has direct fiber connectivity, which OCI service is most suitable?

A.

Site-to-Site VPN

B.

Internet Gateway

C.

FastConnect Colocation with Oracle

D.

Dynamic Routing Gateway (DRG) with remote peering

Full Access
Question # 33

You are designing a hybrid cloud solution where sensitive data must be transferred between your on-premises data center and an OCI VCN. You require a dedicated, private connection with guaranteed bandwidth and low latency. In addition to FastConnect, what additional product would you implement to achieve encryption of the traffic traversing the FastConnect link and to ensure data confidentiality?

A.

IPSec VPN

B.

Oracle Cloud Infrastructure Vault

C.

MACsec

D.

OCI Bastion

Full Access
Question # 34

You have deployed an application on OCI that uses a Regional Load Balancer with an HTTPS listener. You want to enforce end-to-end encryption and ensure that the connection between the load balancer and the backend servers is also encrypted. Which load balancer configuration step is MANDATORY to achieve this?

A.

Upload the SSL certificate to the load balancer’s listener and configure the backend set protocol to HTTP.

B.

Upload the SSL certificate to the load balancer’s listener and configure the backend set protocol to HTTPS, uploading the appropriate certificate to the instances.

C.

Upload the SSL certificate only to the backend servers, as the load balancer automatically proxies the traffic.

D.

Configure the load balancer to use TCP proxy protocol to forward traffic directly to the backend servers without SSL termination.

Full Access
Question # 35

When applying Zero Trust principles to packet routing within OCI, what is the significance of using private endpoints instead of Service Gateways for accessing OCI services?

A.

Private endpoints eliminate the need for IAM policies.

B.

Private endpoints restrict access to specific instances of a service, enhancing security.

C.

Private endpoints automatically open all ports for service access.

D.

Private endpoints are only used for internet access.

Full Access
Question # 36

You are designing a backup solution in OCI. Compute instances in a private subnet need to back up data to OCI Object Storage. Security policy mandates that data transfer must not traverse the public internet. You need to choose the most secure and cost-effective method for accessing Object Storage. Which endpoint/gateway configuration should you implement?

A.

Configure an Internet Gateway and use public Object Storage endpoints.

B.

Configure a NAT Gateway and use public Object Storage endpoints with HTTPS enabled.

C.

Configure a Service Gateway with the Oracle Services Network service CIDR label for your region, and use regional Object Storage endpoints.

D.

Configure a Dynamic Routing Gateway (DRG) and FastConnect to a remote region and use public Object Storage endpoints.

Full Access