2020 1z0-1084-20 Real Exam Questions - Get Latest 1z0-1084-20 Study Materials


SAMPLE QUESTIONS:

Question No. 1

You are developing a serverless application with Oracle Functions. Your function needs to store state in a database. Your corporate security Standards mandate encryption of secret information like database passwords. As a function developer, which approach should you follow to satisfy this security requirement?

A. Use the Oracle Cloud Infrastructure Console and enter the password in the function configuration section in the provided input field.
B. Use Oracle Cloud Infrastructure Key Management to auto-encrypt the password. It will inject the auto-decrypted password inside your function container.
C. Encrypt the password using Oracle Cloud Infrastructure Key Management. Decrypt this password in your function code with the generated key.
D. All function configuration variables are automatically encrypted by Oracle Functions.

Answer: A

Question No. 2

Which one of the following is NOT a valid backend-type supported by Oracle Cloud Infrastructure (OCI) API Gateway?

A. STOCK_RESPONSE_BACKEND
B. ORACLE_FUNCTIONS_BACKEND
C. ORACLE_STREAMS_BACKEND
D. HTTP_BACKEND

Answer: C

Question No. 3

Which two are characteristics of microservices?

A. Microservices are hard to test in isolation.
B. Microservices can be independently deployed.
C. All microservices share a data store.
D. Microservices can be implemented in limited number of programming languages.
E. Microservices communicate over lightweight APIs.

Answer: B, E

Question No. 4

As a cloud-native developer, you have written a web service for your company. You have used Oracle Cloud Infrastructure (OCI) API Gateway service to expose the HTTP backend. However, your security team has suggested that your web service should handle Distributed Denial-of-Service (DDoS) attack. You are time-constrained and you need to make sure that this is implemented as soon as possible. What should you do in this scenario?

A. Use OCI virtual cloud network (VCN) segregation to control DDoS.
B. Use a third party service integration to implement a DDoS attack mitigation,
C. Use OCI API Gateway service and configure rate limiting.
D. Re-write your web service and implement rate limiting.

Answer: C

Question No. 5

A pod security policy (PSP) is implemented in your Oracle Cloud Infrastructure Container Engine for Kubernetes cluster Which rule can you use to prevent a container from running as root using PSP?

A. NoPrivilege
B. RunOnlyAsUser
C. MustRunAsNonRoot
D. ForbiddenRoot

Answer: C

FOR MORE INFORMATION

VISIT NOW:

Comments

Popular posts from this blog

CompTIA SY0-501 Dumps PDF 100% Authentic & Unique Guideline

Best DA-100 Exam Study Guide | Dumpspass4sure.com

99.9% Passing Surety With Newly Updated Isaca CISM Practice Question