Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Oracle 1z0-1084-25 - Oracle Cloud Infrastructure 2025 Developer Professional

Page: 1 / 3
Total 100 questions

Which of the following TWO statements are TRUE about deleting a Kubernetes cluster? (Choose two.)

A.

Upon deleting a cluster, other resources created during the cluster creation process or associated with the cluster (such as VCNS, Internet Gateways, NAT Gateways, Route Tables, Security Lists, B. Load Balancers, and Block Volumes) are deleted automatically.

B.

If you change the auto-generated name of a worker node and then delete the cluster, the renamed worker node is not deleted.

C.

Upon deleting a cluster, no other resources created during the cluster creation process or associated with the cluster (such as VCNS. Internet Gateways, NAT Gateways, Route Tables, Security Lists. Load Balancers, and Block Volumes) are deleted automatically.

D.

Changing the auto-generated name of a worker node does not affect the deletion of the worker node when the cluster in which it is created is deleted.

E.

You cannot change the autogenerated names of the worker nodes in the format oke-c--- within a Kubernetes cluster.

You have two microservices, A and B, running in production. Service A relies on APIs from service B. You want to test changes to service A without deploying all of its dependencies, which include service B. Which approach should you take to test service A?

A.

Test using API mocks.

B.

Test the APIs in private environments.

C.

Test against production APIs.

D.

There is no need to explicitly test APIs.

Which command is used to get a Docker image from Oracle Cloud Infrastructure Registry (OCIR) to the client machine?

A.

docker pull .ocir.io//:

B.

docker pull /.ocir.io/:

C.

docker fetch .ocir.io//:

D.

docker fetch /.ocir.io/:

As a Cloud Native developer, you develop two services in Node.js and deploy them to two different Container Engine for Kubernetes (OKE) clusters that use the same Virtual Cloud Network (VCN). Your security team wants to analyze the network communication between them. How can this requirement be met in the most cost-effective way?

A.

Rewrite the application and send the application logs to an outside log aggregator.

B.

Deploy a third-party logging service and aggregate the network flow logs.

C.

Use the OCI Logging service and enable VCN flow logs.

D.

Deploy Wireshark and intercept the packets.

You are creating an API deployment in Oracle Cloud Infrastructure (OCI) API Gateway and you want to configure request policies to control access. Which is NOT available in OCI API Gateway?

A.

Controlling access to the backend OCI resources.

B.

Limiting the number of requests sent to the backend services.

C.

Enabling Cross-Origin Resource Sharing (CORS) support.

D.

Providing authentication and authorization.

Which is NOT a valid use case for leveraging the Oracle Cloud Infrastructure (OCI) Events service?

A.

Capturing the OCI Monitoring service alarms and invoking autoscaling of compute instances.

B.

Publishing a notification when long-lived tasks complete, such as an OCI Autonomous Database backup completion.

C.

Triggering a notification action when a function completes its execution.

D.

Triggering a function deployed in Oracle Functions when new files are uploaded to an OCI Object Storage bucket.

E.

Publishing all the OCI resource events in a specific compartment to the OCI Streaming service for later analysis.

What is the maximum execution time of Oracle Functions?

A.

240 seconds

B.

300 seconds

C.

60 seconds

D.

120 seconds

Your organization has deployed their e-commerce application on Oracle Container Engine for Kubernetes (OKE) and they are using the Oracle Cloud Infrastructure Registry (OCIR) service as their Docker image repository. They have deployed the OKE cluster using the 'custom create' option, and their Virtual Cloud Network (VCN) has three public subnets with associated Route Tables, Security Lists, and Internet Gateway. However, their application containers are failing to deploy. On investigation, they discover that the images are not being pulled from the designated OCIR repository, even though the YAML configuration has the correct path to the images. What is a valid concern here that needs to be further investigated?

A.

Security List rule for TCP port 22 needs to be added to connect to the OCIR service.

B.

VCN hosting the OKE cluster worker nodes needs to have a NAT gateway to access OCIR repositories.

C.

Identity and Access Management (IAM) credentials need to be added for each user that deploys applications to the OKE cluster.

D.

OKE cluster needs to have a secret with the credentials of their OCIR repository and use that secret in the Kubernetes deployment manifest.

Which is NOT a valid option to execute a function deployed in Oracle Functions?

A.

Invoke from the Docker CLI.

B.

Send signed HTTP requests to the function's invoke endpoint.

C.

Invoke from the Fn Project CLI.

D.

Trigger by an event in the Oracle Cloud Infrastructure (OCI) Events service.

E.

Invoke from the OCI CLI.

A service you are deploying to Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) uses a docker image from a private repository in OCI Registry (OCIR). Which configuration is necessary to provide access to this repository from OKE?

A.

Create a docker-registry secret for OCIR with API key credentials on the cluster, and specify the imagePullSecret property in the application deployment manifest.

B.

Create a docker-registry secret for OCIR with identity Auth Token on the cluster, and specify the imagePullSecret property in the application deployment manifest.

C.

Create a dynamic group for nodes in the cluster, and a policy that allows the dynamic group to read repositories in the same compartment.

D.

Add a generic secret on the cluster containing your identity credentials. Then specify a registryCredentials property in the deployment manifest.