Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Oracle 1z0-1104-25 - Oracle Cloud Infrastructure 2025 Security Professional

Page: 1 / 1
Total 36 questions

Challenge 2 -Task 1

In deploying a new application, a cloud customer needs to reflect different security postures. If a security zone is enabled with the Maximum Security Zone recipe, the customer will be unable to create or update a resource in the security zone if the action violates the attached Maximum Security Zone policy.

As an application requirement, the customer requires a compute instance in the public subnet. You therefore, need to configure Custom Security Zones that allow the creation of compute instances in the public subnet.

Review the architecture diagram, which outlines the resoures you'll need to address the requirement:

Preconfigured

To complete this requirement, you are provided with the following:

Access to an OCI tenancy, an assigned compartment, and OCI credentials

Required IAM policies

Task 4: Create a Public Subnet

Create a public subnet named IAD-SP-PBT-PUBSNET-01, within the VCN IAD-SP-PBT-VCN-01

use a CIDR block of 10.0.1.0/24 and configure the subnet to use the internet Gateway

Task 5: Create a Certificate

Create a certificate, where:

Certificate name: PBT-CERT-01-

For example, if your username is 99008677-lab.user01, then the certificate name should be PBT-CERT-01990086771abuser01

Ensure you eliminate special characters from the user name.

Common name: PBT-CERT-OCICERT-01

Certificate Authority: PBT-CERT-CA-01 (created in the previous task)

Challenge 1 - Task 1

Integrate TLS Certificate Issued by the OCI Certificates Service with Load Balancer

You are a cloud engineer at a tech company that is migrating its services to Oracle Cloud Infrastructure (OCI). You are required to set up secure communication for your web application using OCI's Certificate service. You need to create a Certificate Authority (CA), issue a TLS/SSL server certificate, and configure a load balancer to use this certificate to ensure encrypted traffic between clients and the backend servers.

Review the architecture diagram, which outlines the resources you'll need to address the requirement.

Preconfigured

To complete this requirement, you are provided with the following:

Access to an OCI tenancy, an assigned compartment, and OCI credentials

Required IAM policies

OCI Vault to store the secret required by the program, which is created in the root compartment as PBI_Vault_SP

Task 1: Create and Configure a Virtual Cloud Network (VCN)

Create a Virtual Cloud Network (VCN) namedPBT-CERT-VCN-01with the following specifications:

    VCN with a CIDR block of 10.0.0.0/16

      Subnet 1 (Compute Instance):

        Name:Compute-Subnet-PBT-CERT

        CIDR Block:10.0.1.0/24

Subnet 2 (Load Balancer):

    Name:LB-Subnet-PBT-CERT-SNET-02

    CIDR Block:10.0.2.0/24

Internet Gatewayfor external connectivity

Route table and security lists:

    Security List namedPBT-CERT-CS-SL-01for Subnet 1 (Compute-Subnet-PBT-CERT) to allow SSH (port 22) traffic

    Security List namedPBT-CERT-LB-SL-01for Subnet 2 (LB-Subnet-PBT-CERT) to allow HTTPS (port 443) traffic

"Enter the OCID of the created VCN in the text box below.

Task 3: Create a Master Encryption Key

Note: OCI Vault to store the key required by this task is created in the root compartment as PBI_Vault_SP

Create an RSA Master Encryption Key (MEK), where:

Key name: PBT-CERT-MEK-01-

For example, if your username is 99008677-lab.user01, then the MEK name should be PBT-CERT-MEK-01990086771abuser01

Ensure you eliminate special characters from the user name.

Key shape: 4096 bits

Enter the OCID of the Master Encryption Key created in the provided text box:

Challenge 2 -Task 1

In deploying a new application, a cloud customer needs to reflect different security postures. If a security zone is enabled with the Maximum Security Zone recipe, the customer will be unable to create or update a resource in the security zone if the action violates the attached Maximum Security Zone policy.

As an application requirement, the customer requires a compute instance in the public subnet. You therefore, need to configure Custom Security Zones that allow the creation of compute instances in the public subnet.

Review the architecture diagram, which outlines the resoures you'll need to address the requirement:

Preconfigured

To complete this requirement, you are provided with the following:

Access to an OCI tenancy, an assigned compartment, and OCI credentials

Required IAM policies

Task 2: Create a Security Zone

Create a security Zone named IAD_SAP-PBT-CSZ-01 in your assigned compartement and associate it with the Custom Security Zone Recipe (IAD-SAP-PBT-CSP-01) created in the previous task.

Enter the OCID of the created Security zone in the box below.

According to the Oracle Cloud Infrastructure (OCI) Shared Responsibility Model, which statement accurately reflects OCI's responsibility for security?

A.

OCI is responsible for securing the underlying infrastructure but not customer data.

B.

Customers are responsible for securing both infrastructure and data.

C.

OCI has no security responsibilities; customers need to secure their resources.

D.

OCI provides security only for free-tier services; customers secure everything else.

Your organization needs to implement strong password policies for users in OCI.

Which of the following statements is TRUE about password policies in OCI IAM?

A.

Custom password policies allow for granular control over password complexity.

B.

The default password policy cannot be modified.

C.

Only one password policy can be applied to all users in a domain.

D.

Simple password policies are suitable for production environments.

An E-commerce company running on Oracle Cloud Infrastructure (OCI) wants to prevent accidental misconfigurations that could expose sensitive data. They need an OCI service that can enforce predefined security rules when creating or modifying cloud resources.

Which OCI service should they use?

A.

OCI Web Application Firewall (WAF)

B.

OCI Identity and Access Management (IAM)

C.

OCI Security Zone

D.

OCI Certificates

"Your company is in the process of migrating its sensitive data to Oracle Cloud Infrastructure (OCI) and is prioritizing the strongest possible security measures. Encryption is a key part of this strategy, but you are particularly concerned about the physical security of the hardware where your encryption keys will be stored.

Which characteristic of OCI Key Management Service (KMS) helps ensure the physical security of your encryption keys?

A.

Granular customer control over key access permissions

B.

Centralized key management for simplified administration

C.

Seamless integration with other OCI services for streamlined workflows

D.

Utilization of FIPS 140-2 validated Hardware Security Modules (HSMs)"

"You are part of the security operations of an organization with thousands of users accessing Oracle Cloud Infrastructure (OCI). It is reported that an unknown user action was executed resulting in configuration errors. You are tasked with identifying the details of all users who were active in the last six hours along with any REST API calls that were executed.

Which OCI feature should you use?

A.

Audit Analysis Dashboard

B.

Management Agent Log Ingestion

C.

Object Collection Rule

D.

Service Connector Hub"