Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You are designing an OCI networking architecture for a multi-tier application using Infrastructure as Code (IaC). The architecture includes an OKE cluster for the front-end, a set of Compute instances for the back-end, and an Autonomous Database. You want to ensure that all traffic between these components is encrypted. You are using Transport Layer Security (TLS) for end-to-end encryption but are concerned about the overhead of encrypting all traffic within the VCN. Which approach provides the MOST balanced approach to security and performance, minimizing the overhead of encryption while still protecting sensitive data?

A.

Implement TLS encryption only between the OKE cluster and the load balancer. Rely on the inherent security of the OCI network for traffic within the VCN.

B.

Implement mutual TLS (mTLS) for all traffic between the OKE cluster, the Compute instances, and the Autonomous Database.

C.

Use Network Security Groups (NSGs) and Security Lists to control access between components but do not implement any additional encryption within the VCN.

D.

Implement TLS encryption for traffic between the OKE cluster and the Compute instances and use Oracle Database Vault to encrypt data at rest and in transit for the Autonomous Database.

In the context of OCI's Zero Trust Packet Routing, which principle emphasizes the necessity of explicitly defining and enforcing access controls at every stage of network communication?

A.

Implicit Trust

B.

Least Privilege

C.

Perimeter Security

D.

Network Segmentation

You are designing a highly available web application on OCI. The application needs to be accessible globally with traffic being routed to the nearest region based on user location. Additionally, you need to implement sophisticated traffic management policies, such as A/B testing and weighted traffic distribution based on application version. You also require protection against DDoS attacks. Which OCI load balancing solution is best suited for these requirements?

A.

Regional Load Balancer

B.

Network Load Balancer

C.

Global Load Balancer with Traffic Management Steering Policies

D.

Flexible Load Balancer

You are responsible for managing access to an Oracle Autonomous Database (ADB) instance inyour OCI environment. You need to configure a secure connection to the ADB from compute instances located in a private subnet. You want to limit access to the ADB to only the designated compute instances. Which type of endpoint, in conjunction with appropriate security rules, provides the MOST granular control over network access to the Autonomous Database?

A.

A public ADB endpoint with Network Security Groups (NSGs) restricting access.

B.

A Service Gateway-enabled connection with a Service Gateway configured to allow access to ADB.

C.

A private ADB endpoint with Network Security Groups (NSGs) restricting access.

D.

A Dynamic Routing Gateway (DRG) connection with appropriate route rules.

Which OCI component facilitates transitive routing between VCNs in different regions via a dedicated, private network backbone, while also enabling connectivity to on-premises networks?

A.

Local Peering Gateway (LPG)

B.

Dynamic Routing Gateway (DRG)

C.

Service Gateway

D.

Internet Gateway

Your company is setting up a FastConnect connection with a provider. You have purchased a port from the provider, and they are requesting information to set up the connection to Oracle Cloud Infrastructure. They specifically require information to configure the VLANs. What information regarding VLAN configuration is ESSENTIAL for them to successfully establish the FastConnect circuit?

A.

The list of all VCN CIDR blocks and their associated tags.

B.

A single unused VLAN ID, your BGP ASN, and the BGP peering IP addresses you want to use.

C.

The MTU (Maximum Transmission Unit) size for all VNICs in your OCI tenancy.

D.

Your Oracle Cloud Identifier (OCID) and compartment ID.