Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Oracle 1z0-1072-25 - Oracle Cloud Infrastructure 2025 Architect Associate

Page: 2 / 2
Total 51 questions

Which is NOT a valid action within the Oracle Cloud Infrastructure (OCI) Block Volume service?

A.

Restoring from a volume backup to a larger volume.

B.

Cloning an existing volume to a new, larger volume.

C.

Expanding an existing volume in place with offline resizing.

D.

Attaching a block volume to an instance in a different availability domain.

What happens to the performance level of a volume when it is detached from an instance?

A.

The performance level is adjusted to Balanced.

B.

The performance level remains unchanged.

C.

The performance level is adjusted to Higher Performance.

D.

The performance level is adjusted to Lower Cost (0 VPUs/GB).

Which statement accurately describes the key features and benefits of OCI Confidential Computing?

A.

It optimizes network performance through advanced routing algorithms.

B.

It provides automatic scalability and load balancing capabilities.

C.

It encrypts and isolates in-use data and the applications processing that data.

D.

It enables users to securely store and retrieve data by using distributed file systems.

Which Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM) policy is invalid?

A.

Allow dynamic-group 'Default'/'FrontEnd' to manage instance-family in compartment Project-A

B.

Allow group 'Default'/'A-Admins' to manage all-resources in compartment Project-A

C.

Allow any-user to inspect users in tenancy

D.

Allow group 'Default'/'A-Developers' to create volumes in compartment Project-A

What is the primary function of the Network Path Analyzer (NPA) tool provided by Oracle Cloud Infrastructure (OCI)?

A.

Collecting and analyzing network configuration to identify virtual network configuration issues impacting connectivity

B.

Optimizing network performance by dynamically adjusting routing paths based on traffic patterns

C.

Sending actual traffic between source and destination to diagnose connectivity issues

D.

Providing real-time monitoring of network traffic to detect security threats and unauthorized access attempts