Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

1z0-1084-25 Exam Dumps - Oracle Cloud Infrastructure 2025 Developer Professional

Go to page:
Question # 17

Which of the following TWO statements are TRUE about deleting a Kubernetes cluster? (Choose two.)

A.

Upon deleting a cluster, other resources created during the cluster creation process or associated with the cluster (such as VCNS, Internet Gateways, NAT Gateways, Route Tables, Security Lists, B. Load Balancers, and Block Volumes) are deleted automatically.

B.

If you change the auto-generated name of a worker node and then delete the cluster, the renamed worker node is not deleted.

C.

Upon deleting a cluster, no other resources created during the cluster creation process or associated with the cluster (such as VCNS. Internet Gateways, NAT Gateways, Route Tables, Security Lists. Load Balancers, and Block Volumes) are deleted automatically.

D.

Changing the auto-generated name of a worker node does not affect the deletion of the worker node when the cluster in which it is created is deleted.

E.

You cannot change the autogenerated names of the worker nodes in the format oke-c--- within a Kubernetes cluster.

Full Access
Question # 18

You developed a microservices-based application that runs in an Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) cluster. Your security team wants to use SSL termination for this application. What should you do to create a secure SSL termination for this application using the fewest steps possible?

A.

Create a self-signed certificate and its corresponding key. Create a Kubernetes secret using the certificate and the key. Then add these annotations to the Kubernetes service: annotations: service.beta.kubernetes.io/oci-load-balancer-ssl-ports: "443" service.beta.kubernetes.io/oci-load-balancer-tls-secret: ssl certificate-secret

B.

Create a self-signed certificate and its corresponding key. Create a Kubernetes secret using the certificate and the key. Then add these annotations to the Kubernetes service: annotations: service.beta.kubernetes.io/oci-load-balancer-ssl-ports: "443" service.beta.kubernetes.io/oci-load-balancer-security-list management-mode: "Frontend"

C.

Add these annotations to the kubernetes service: annotations: service.beta.kubernetes.io/oci-load-balancer-ssl-ports: "443" service.beta.kubernetes.io/oci-load-balancer-ssl-secret-key: ssl secret-key

D.

Generate a self-signed certificate using Let's Encrypt. Use that certificate on OCI Load Balancer. Create the Kubernetes service using this load balancer.

Full Access
Question # 19

Your team has created a serverless application deployed in Oracle Functions. It uses a Python function leveraging the Oracle Cloud Infrastructure (OCI) Python SDK to stop any OCI compute instance that does not comply with your corporate security standards. Although there are three non-compliant OCI compute instances, when you invoke this function, none of the instances were stopped. With respect to this issue, which of the following is a valid troubleshooting strategy?

A.

Enable function logging in the OCI console, add some print statements in your function code, and then view the logs to troubleshoot.

B.

Enable function remote debugging in the OCI console, and then use your favorite IDE to inspect the function running on Oracle Functions.

C.

Ensure that the application is deployed within the same OCI compartment as the instance, because you cannot enable function execution data from the OCI console.

D.

Enable function tracing in the OCI console, and then go to the OCI Monitoring console to view the function stack trace.

Full Access
Question # 20

Which term describes a group formed by a master machine and a worker machine in a Kubernetes architecture?

A.

Cluster

B.

Node

C.

Deployment

D.

Container

E.

Pod

Full Access
Question # 21

As a Cloud Native developer, you have written a web service for your company. However, your security team has suggested that your web service should address Distributed Denial-of-Service (DDoS) attack. You are time-constrained and you need to ensure that this is implemented as soon as possible. What should you do in this scenario? (Choose the best answer.)

A.

Use a third party service integration to Implement DDoS attack mitigation.

B.

Re-write your web service and implement rate limiting.

C.

Use the OCI Virtual Cloud Network (VCN) segregation to control DDoS.

D.

Use the OCI API Gateway service and configure rate limiting.

Full Access
Question # 22

Your organization has deployed their e-commerce application on Oracle Container Engine for Kubernetes (OKE) and they are using the Oracle Cloud Infrastructure Registry (OCIR) service as their Docker image repository. They have deployed the OKE cluster using the 'custom create' option, and their Virtual Cloud Network (VCN) has three public subnets with associated Route Tables, Security Lists, and Internet Gateway. However, their application containers are failing to deploy. On investigation, they discover that the images are not being pulled from the designated OCIR repository, even though the YAML configuration has the correct path to the images. What is a valid concern here that needs to be further investigated?

A.

Security List rule for TCP port 22 needs to be added to connect to the OCIR service.

B.

VCN hosting the OKE cluster worker nodes needs to have a NAT gateway to access OCIR repositories.

C.

Identity and Access Management (IAM) credentials need to be added for each user that deploys applications to the OKE cluster.

D.

OKE cluster needs to have a secret with the credentials of their OCIR repository and use that secret in the Kubernetes deployment manifest.

Full Access
Question # 23

(CHK_1>3) You have an e-commerce application that loads customers' transactional data into the Oracle Cloud Infrastructure (OCI) Streaming service. The data must now be extracted and transformed before sending it to a third-party REST endpoint. You have been directed to leverage the OCI Service Connector Hub to automate this process. Which configuration option would address this requirement?

A.

Configure a new service connector as follows: • Source: Streaming • Task: Functions • Target: Functions

B.

Configure a new service connector as follows: • Source: Streaming • Task: API Gateway • Target: Notifications

C.

Configure a new service connector as follows: • Source: Streaming • Task: None • Target: Notifications

D.

Configure a new service connector as follows: • Source: Streaming • Task: API Gateway • Target: Functions

E.

Configure a new service connector as follows: • Source: Streaming • Task: Functions • Target: API Gateway

Full Access
Question # 24

You have created a repository in Oracle Cloud Infrastructure Registry (OCIR) in the us-ashburn-1 (iad) region in your tenancy with the heyoci namespace. Which three are valid tags for an image named myapp? (Choose three.)

A.

iad.ccir.io/heyoci/myapp:latest

B.

iad.ocir.io/heyoci/myapp:0.0.2-beta

C.

iad.ocir.io/heyoci/myproject/myapp:0.0.1

D.

us-ashburn-1.ocir.io/myproject/heyoci/myapp:latest

E.

us-ashburn-1.ocir.io/heyoci/myapp:0.0.2-beta

F.

us-ashburn-1.ocir.io/heyoci/myproject/myapp:0.0.2-beta

Full Access
Go to page: