Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is the open source engine for Oracle Functions?

A.

Fn Project

B.

Apache OpenWhisk

C.

OpenFaas

D.

Knative

A service you are deploying to Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) uses a docker image from a private repository in OCI Registry (OCIR). Which configuration is necessary to provide access to this repository from OKE?

A.

Create a docker-registry secret for OCIR with API key credentials on the cluster, and specify the imagePullSecret property in the application deployment manifest.

B.

Create a docker-registry secret for OCIR with identity Auth Token on the cluster, and specify the imagePullSecret property in the application deployment manifest.

C.

Create a dynamic group for nodes in the cluster, and a policy that allows the dynamic group to read repositories in the same compartment.

D.

Add a generic secret on the cluster containing your identity credentials. Then specify a registryCredentials property in the deployment manifest.

You are building a container image and pushing it to Oracle Cloud Infrastructure Registry (OCIR). You need to ensure that these images never get deleted from the repository. Which action should you take?

A.

Write a policy to limit access to the specific repository in your compartment.

B.

Create a group and assign a policy to perform lifecycle operations on images.

C.

Set global policy of image retention to "Retain All Images".

D.

Edit the tenancy global retention policy.

A developer using Oracle Cloud Infrastructure (OCI) API Gateway needs to authenticate the API requests to their web application. The authentication process must be implemented using a custom scheme which accepts string-based parameters from the API caller. Which approach should the developer use in this scenario?

A.

Create a cross account functions authorizer.

B.

Create an authorizer function using OCI Identity and Access Management 91AM) based authentication.

C.

Create an authorizer function using request header authorization.

D.

Create an authorizer function using token-based authorization.

Which "Action Type" option is NOT available in an Oracle Cloud Infrastructure (OCI) Events rule definition?

A.

Streaming

B.

Email

C.

Notifications

D.

Functions

You have been asked to update an OKE cluster to a network configuration that has the least attack surface while the deployed applications are still directly available for access from the Internet. Which is a valid OKE cluster network configuration that meets this requirement? (Choose the best answer.)

A.

Private subnets for nodes, the Kubemetes API endpoint, and load balancers

B.

Private subnets for nodes; public subnets for the Kubemetes API endpoint and load balancers

C.

Private subnets for nodes and the Kubemetes API endpoint; public subnets for load balancers

D.

Private subnet for the Kubemetes API endpoint; public subnets for nodes and load balancers

Which is the smalled unit of Kubernetes architecture?

A.

Node

B.

Container

C.

Cluster

D.

Pod

(CHK_4>3) Your development team decides to create and deploy some business logic to serverless Oracle Functions. You are asked to help facilitate the monitoring, logging, and tracing of these services. Which is NOT valid about troubleshooting Oracle Functions?

A.

Oracle Functions invocation is enabled by default

B.

Oracle Functions invocation logs are enabled at the application level.

C.

Oracle Functions metrics are available at both the function and application level.

D.

Oracle Functions tracing is enabled at the function level.

Which of these is a valid use case for OCI Queue?

A.

Managing network traffic between services

B.

Storing and retrieving large files

C.

Sending real-time streaming data

D.

Building decoupled and scalable systems

(CHK_4>2) Which TWO statements are NOT valid regarding the Oracle Cloud Infrastructure (OCI) Streaming service? (Choose two.)

A.

OCI Streaming stores all data for 24 hours by default, but that can be extended up to 7 days.B

B.

Although OCI Streaming automatically encrypts all data while in transit, it is the developer's responsibility to encrypt data at rest, if needed.

C.

The throughput of a stream is defined by a partition. A partition provides 1 MB/sec data input and 2 MB/sec data output.

D.

A stream can be configured with either a public or a private endpoint with support for customer managed encryption keys.

E.

OCI Streaming can support up to 2,000 requests per second to each partition.