Which statement about Oracle Cloud Infrastructure Multi-Factor Authentication (MFA) is NOT valid?
A
Which Security Zone policy is NOT valid?
A
You have configured the Management Agent on an Oracle Cloud Infrastructure (OCI) Linux instance
for log ingestion purposes.
Which is a required configuration for OCI Logging Analytics service to collect data from multiple logs
of this Instance?
C
Which Oracle Data Safe feature minimizes the amount of personal data and allows internal test,
development, and analytics teams to operate with reduced risk?
D
You are using a custom application with third-party APIs to manage application and data hosted in an
Oracle Cloud Infrastructure (OCI) tenancy. Although your third-party APIs don't support OCI's
signature-based authentication, you want them to communicate with OCI resources. Which
authentication option must you use to ensure this?
D
In which two ways can you improve data durability in Oracle Cloud Infrastructure Object Storage?
A
You want to make API calls against other OCI services from your instance without configuring user
credentials. How would you achieve this?
A
Explanation:
DYNAMIC GROUP
Dynamic groups allow you to groupOracle Cloud Infrastructureinstances as principal actors, similar
to user groups. You can then create policies to permit instances in these groups to make API calls
againstOracle Cloud Infrastructureservices. Membership in the group is determined by a set of
criteria
you
define,
calledmatching
rules.
https://docs.cloud.oracle.com/en-
us/iaas/Content/Identity/Tasks/callingservicesfrominstances.htm
Which statement is true about Oracle Cloud Infrastructure (OCI) Object Storage server-side
encryption?
A
Which statement is true about origin management in WAF?
Statement A: Multiple origins can be defined.
Statement B: Only a single origin can be active for a WAF.
C
Which of these protects customer data at rest and in transit in a way that allows customers to meet
their security and compliance requirements for cryptographic algorithms and key management?
C
Explanation:
DATA ENCRYPTION
Protect customer data at-rest and in-transit in a way that allows customers to meet their security and
compliance requirements for cryptographic algorithms and key management.
https://docs.oracle.com/en-us/iaas/Content/Security/Concepts/security_overview.htm
What is the minimum active storage duration for logs used by Logging Analytics to be archived?
C
Explanation:
https://docs.oracle.com/en-us/iaas/logging-analytics/doc/manage-storage.html#:~:text=The%20minimum%20Active%20Storage%20Duration,be%20archived%20is%20
30%20days
.
The minimum Active Storage Duration (Days) for logs before they can be archived is30 days.
Which components are a part of the OCI Identity and Access Management service?
A
Explanation:
https://docs.oracle.com/en-us/iaas/Content/Identity/Concepts/overview.htm
Which WAF service component must be configured to allow, block, or log network requests when
they meet specified criteria?
A
Explanation:
Protection rules
Protection rules can be configured to either allow, block, or log network requests when they meet
the specified criteria of a protection rule. The WAF will observe traffic to your web application over
time and suggest new rules to apply.
https://www.oracle.com/security/cloud-security/what-is-waf/
Which statement is true about standards?
B
Which cache rules criterion matches if the concatenation of the requested URL path and query are
identical to the contents of the value field?
B
Explanation:
URL_IS:Matches if the concatenation of request URL path and query is identical to the contents of
thevaluefield. URL must start with a/.
https://docs.oracle.com/en-us/iaas/tools/terraform-provider-oci/4.57.0/docs/d/waas_waas_policy.html