Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

1z0-1084-25 Exam Dumps - Oracle Cloud Infrastructure 2025 Developer Professional

Go to page:
Question # 25

You have been asked to update an OKE cluster to a network configuration that has the least attack surface while the deployed applications are still directly available for access from the Internet. Which is a valid OKE cluster network configuration that meets this requirement? (Choose the best answer.)

A.

Private subnets for nodes, the Kubemetes API endpoint, and load balancers

B.

Private subnets for nodes; public subnets for the Kubemetes API endpoint and load balancers

C.

Private subnets for nodes and the Kubemetes API endpoint; public subnets for load balancers

D.

Private subnet for the Kubemetes API endpoint; public subnets for nodes and load balancers

Full Access
Question # 26

As a developer, you have been tasked with implementing a microservices-based application. Which THREE technologies are best suited to accomplish the task? (Choose three.)

A.

Terraform

B.

Big Data

C.

Anomaly Detection

D.

Service Mesh

E.

Docker

F.

Kubemetes

Full Access
Question # 27

As a Cloud Native developer, you develop two services in Node.js and deploy them to two different Container Engine for Kubernetes (OKE) clusters that use the same Virtual Cloud Network (VCN). Your security team wants to analyze the network communication between them. How can this requirement be met in the most cost-effective way?

A.

Rewrite the application and send the application logs to an outside log aggregator.

B.

Deploy a third-party logging service and aggregate the network flow logs.

C.

Use the OCI Logging service and enable VCN flow logs.

D.

Deploy Wireshark and intercept the packets.

Full Access
Question # 28

Your organization has mandated that all deployed container images used for microservices must be signed by a specified master encryption key (MEK). You have appropriately signed the container images as part of your build process, but must now ensure that they are automatically verified when they are deployed to Oracle Cloud Infrastructure (OCI) Container Engine for Kubemetes (OKE) clusters. Which option should be used to mandate image verification when deploying to OKE clusters, assuming that MEK is already stored in an available OCI Vault? (Choose the best answer.)

A.

Enable image verification policies separately for each Kubemetes pod deployment because this is enforced at the pod level.

B.

Enable image verification policies separately for each node pool within each OKE cluster because this is enforced at the node pool level.

C.

Enable image verification policies separately for each OKE cluster because this is enforced at the cluster level.

(Correct)

D.

Enable Image verification policies for your OKE service control plane which will enforce this for all OKE clusters.

Full Access
Question # 29

Which of these is NOT a valid authentication method for accessing an OCI API Gateway deployment?

A.

HTTP Basic

B.

API Key

C.

OAuth

D.

SAML Token

Full Access
Question # 30

Your organization is developing serverless applications with Oracle Functions. Many functions will need to store state data in a database, which will require using appropriate credentials. However, your corporate security standards mandate encryption of secret information, such as database passwords. How would you address this security requirement?

A.

Use OCI Console to enter the password in the function configuration section in the provided input field.

B.

Leverage application-level configuration variables to store passwords because they are automatically encrypted by Oracle Functions.

C.

Use the OCI Vault service to auto-encrypt the password and then set an application-level configuration variable to reference the auto-decrypted password inside your function container.

D.

Encrypt the password using the OCI Vault service and then decrypt this password in your function code with the generated key.

Full Access
Go to page: