Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

1z0-1084-25 Questions and Answers

Question # 6

You have been asked to update an OKE cluster to a network configuration that has the least attack surface while the deployed applications are still directly available for access from the Internet. Which is a valid OKE cluster network configuration that meets this requirement? (Choose the best answer.)

A.

Private subnets for nodes, the Kubemetes API endpoint, and load balancers

B.

Private subnets for nodes; public subnets for the Kubemetes API endpoint and load balancers

C.

Private subnets for nodes and the Kubemetes API endpoint; public subnets for load balancers

D.

Private subnet for the Kubemetes API endpoint; public subnets for nodes and load balancers

Full Access
Question # 7

Which TWO statements accurately describe an Oracle Functions application? (Choose two.)

A.

A common context to store configuration variables that are available to all functions in the application. A Docker image containing all the functions that share the same configuration.

B.

An application based on Oracle Functions, Oracle Cloud Infrastructure (OCI) Events, and OCI API Gateway services.

C.

A small block of code invoked in response to an OCI Events service.

A logical group of functions.

D.

A Docker image containing all the functions that share the same configuration.

Full Access
Question # 8

Which of the following step is NOT required for setting up the Container Engine for Kubernetes (OKE) cluster access using a local installation of kubectl?

A.

Generate Auth token from the OCI console to access the OKE cluster using kubectl.

B.

Install and configure the Oracle Cloud Infrastructure (OCI) CLI.

C.

Set up the kubeconfig file.

D.

Generate an API signing key pair (if you do not already have one) and upload the public key of the API signing key pair.

Full Access
Question # 9

You are using Oracle Cloud Infrastructure (OCI) Resource Manager to manage your infrastructure lifecycle and wish to receive an email each time a Terraform action begins. How should you use the OCI Events service to do this without writing any code?

A.

Create a rule in OCI Events service matching the "Resource Manager Stack - Update" condition. Then select "Action Type: Email" and provide the destination email address.

B.

Create an OCI Notification topic and email subscription with the destination email address. Then create an OCI Events rule matching "Resource Manager Job - Create" condition, and select the notification topic for the corresponding action.

C.

Create an OCI Email Delivery configuration with the destination email address. Then create an OCI Events rule matching "Resource Manager Job - Create" condition, and select the email configuration for the corresponding action.

D.

Create an OCI Notifications topic and email subscription with the destination email address. Then create an OCI Events rule matching "Resource Manager Stack - Update" condition, and select the notification topic for the corresponding action.

Full Access
Question # 10

Your organization has mandated that all deployed container images used for microservices must be signed by a specified master encryption key (MEK). You have appropriately signed the container images as part of your build process, but must now ensure that they are automatically verified when they are deployed to Oracle Cloud Infrastructure (OCI) Container Engine for Kubemetes (OKE) clusters. Which option should be used to mandate image verification when deploying to OKE clusters, assuming that MEK is already stored in an available OCI Vault? (Choose the best answer.)

A.

Enable image verification policies separately for each Kubemetes pod deployment because this is enforced at the pod level.

B.

Enable image verification policies separately for each node pool within each OKE cluster because this is enforced at the node pool level.

C.

Enable image verification policies separately for each OKE cluster because this is enforced at the cluster level.

(Correct)

D.

Enable Image verification policies for your OKE service control plane which will enforce this for all OKE clusters.

Full Access
Question # 11

Which is the smalled unit of Kubernetes architecture?

A.

Node

B.

Container

C.

Cluster

D.

Pod

Full Access
Question # 12

Which TWO are part of the Cloud Native Computing Foundation (CNCF) container runtime? (Choose two.)

A.

rkt-o

B.

runc

C.

getcd

D.

containerd

Full Access
Question # 13

A DevOps engineer is troubleshooting the Meshifyd application, which is running in an Oracle Cloud Infrastructure (OCI) environment. The engineer has set up the OCI Logging service to store access logs for the application but notices that the logs from the Meshifyd application are not showing up in the logging service. The engineer suspects that there might be an issue with the logging configuration. Which two statements are potential reasons for logs from the Meshifyd application not showing up in the OCI Logging service?

A.

The logconfig.json file has incorrect or missing OCID for the custom log in the logobjectId field.

B.

The OCI Logging service is set up to pre access logs by creating a log group and custom log within the same compartment.

C.

The logconfig.json file has incorrect or missing information in the application namespace in the paths field.

D.

The logconfig.json file has incorrect or missing information in the application namespace in the src field.

E.

The logconfig.json file has incorrect or missing OCID for the custom log group in the logGroupObjectId field.

Full Access
Question # 14

Which option best defines microservices?

A.

A statically typed and compiled language.

B.

An open-source system for automating deployment, scaling, and management of containerized applications.

C.

A finely tuned piece of software that performs a single or small collection of tasks.

D.

An organized collection of structured information or data, typically stored electronically in a computer system.

Full Access
Question # 15

How are cloud native application versions deployed to an OKE cluster when using a blue/green deployment strategy?

A.

Current applications are slowly replaced with new application versions.

B.

New application versions are deployed in minor increments to a select group of people.

C.

Both old and new application versions are deployed to production at the same time.

Full Access
Question # 16

Which of these is NOT a valid authentication method for accessing an OCI API Gateway deployment?

A.

HTTP Basic

B.

API Key

C.

OAuth

D.

SAML Token

Full Access
Question # 17

Which is ONE of the differences between a microservice and a serverless function?

A.

Microservices are used for long running operations while serverless functions are used for short running operations.

B.

Microservices are triggered by events while serverless functions are not.

C.

Microservices are stateless while serverless functions are stateful.

D.

Microservices always use a data store while serverless functions never use a data store.

Full Access
Question # 18

A company is developing a new application that needs to process transactions in real time. The company wants to ensure that all transactions are processed in order and that no transaction is lost. Which of these is a correct strategy for leveraging OCI Queue in this scenario?

A.

Use a separate queue for each type of transaction.

B.

Use a single queue to process all transactions.

C.

Use a separate queue for each application instance.

D.

Use a priority queue to prioritize requests.

Full Access
Question # 19

You have just finished building and compiling the software required to implement the API microservice component. You need to rebuild the API docker image, and plan to tag it as: ocIdevops/api:latest Which docker command would re-create the API docker image?

A.

docker build -t OCIdevops/api:latest

B.

docker create -t OCIdevops/api:latest

C.

docker image -t OCIdevops/api:latest

D.

docker compile -t OCI devops/api:latest

Full Access
Question # 20

Which command is used to get a Docker image from Oracle Cloud Infrastructure Registry (OCIR) to the client machine?

A.

docker pull .ocir.io//:

B.

docker pull /.ocir.io/:

C.

docker fetch .ocir.io//:

D.

docker fetch /.ocir.io/:

Full Access
Question # 21

What is the open source engine for Oracle Functions?

A.

Fn Project

B.

Apache OpenWhisk

C.

OpenFaas

D.

Knative

Full Access
Question # 22

You need to push a new Docker container image to a repository in the Oracle Cloud Infrastructure (OCI) Registry. Which mechanism must you use to provide authentication?

A.

Generate an API signing key to complete the authentication via the Docker CLI.

B.

Generate an Auth Token to complete the authentication via the OCI CLI.

C.

Generate an API signing key to complete the authentication via the OCI CLI.

D.

Generate an Auth Token to complete the authentication via the Docker CLI.

Full Access
Question # 23

You are a developing a microservices application that will be a consumer of the Oracle Cloud Infrastructure (OCI) Streaming service. Which API method should you use to read and process a stream?

A.

GetStream

B.

ReadMessages

C.

ProcessStream

D.

ReadStream

E.

GetMessages

Full Access
Question # 24

Which of the following is defined as a configurable, low-latency infrastructure layer that controls the interaction between a network of microservices? (Choose the best answer.)

A.

Containers

B.

Kubernetes

C.

CI/CD Pipelines

D.

DevOps

E.

Service Mesh

Full Access
Question # 25

Having created a Container Engine for Kubernetes (OKE) cluster, you can use Oracle Cloud Infrastructure (OCI) Logging to view and search the logs of applications running on the worker node compute instances in the cluster. Which task is NOT required to collect and parse application logs? (Choose the best answer.)

A.

Create a dynamic group with a rule that includes all worker nodes In the cluster.

B.

Set the OCI Logging option to Enabled for the cluster.

C.

Enable monitoring for all worker nodes in the cluster.

D.

Configure a custom log in OCI Logging with the appropriate agent configuration.

Full Access
Question # 26

Which technique is used for testing the entire user flow as well as the moving parts of a cloud native app, ensuring that there are no high-level discrepancies?

A.

Contract Testing

B.

Integration Testing

C.

Unit Testing

D.

Component Testing

E.

End-to-end Testing

Full Access
Question # 27

Which kubectl command syntax is valid for implementing a rolling update deployment strategy in Kubernetes? (Choose the best answer.)

A.

kubectl upgrade -c --image=image:v2

B.

kubectl update --image=image:v2

C.

kubectl rolling-update --image=image:v2

D.

kubectl update -c --iniage=image: v2

Full Access
Question # 28

Which feature is typically NOT associated with Cloud Native?

A.

Immutable Infrastructure

B.

Declarative APIs

C.

Containers

D.

Application Servers

E.

Service Meshes

Full Access
Question # 29

As a developer, you have been tasked with implementing a microservices-based application. Which THREE technologies are best suited to accomplish the task? (Choose three.)

A.

Terraform

B.

Big Data

C.

Anomaly Detection

D.

Service Mesh

E.

Docker

F.

Kubemetes

Full Access
Question # 30

You have a containerized application that requires access to an Autonomous Transaction Processing (ATP) Database. Which option is NOT valid when the container is deployed in an OKE cluster? (Choose the best answer.)

A.

Use Kubernetes secrets to configure environment variables on the container with ATP instance OCID, and OCI API credentials. Then use the CreateConnection API endpoint from the service runtime.

B.

Install the Oracle Cloud Infrastructure Service Broker on the Kubernetes cluster and deploy ServiceInstance and ServiceBinding resources for ATP. Then use the specified binding name as a volume in the application deployment manifest.

C.

Create a Kubernetes secret with contents from the instance Wallet files. Use this secret to create a volume mounted to the appropriate path in the application deployment manifest.

D.

Enable Oracle REST Data Services for the required schemas and connect via HTTPS.

Full Access