Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Oracle 1z0-1084-25 Oracle Cloud Infrastructure 2025 Developer Professional Exam Practice Test

Page: 1 / 10
Total 100 questions

Oracle Cloud Infrastructure 2025 Developer Professional Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which THREE are valid statements regarding the OCI Container Engine for Kubernetes (OKE) service? (Choose three.)

Options:

A.

You must have access to an Oracle Cloud Infrastructure tenancy. Your tenancy must have sufficient quota on different types of resources.

B.

OKE cannot use existing network resources for the creation of a new cluster.

C.

OKE automatically creates and configures new network resources for the new cluster.

D.

There is a limit of three clusters within each region, but there is no limit on the number of nodes and pods you can create within each cluster.

Question 2

You plan to implement logging in your services that will run in Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE). Which statement describes the appropriate logging approach?

Options:

A.

All services log to standard output only.

B.

Each service logs to its own log file.

C.

All services log to an external logging system.

D.

All serviceAAs log to a shared log file.

Question 3

As a developer, you have been tasked with implementing a microservices-based application. Which THREE technologies are best suited to accomplish the task? (Choose three.)

Options:

A.

Terraform

B.

Big Data

C.

Anomaly Detection

D.

Service Mesh

E.

Docker

F.

Kubemetes

Question 4

Which of the following step is NOT required for setting up the Container Engine for Kubernetes (OKE) cluster access using a local installation of kubectl?

Options:

A.

Generate Auth token from the OCI console to access the OKE cluster using kubectl.

B.

Install and configure the Oracle Cloud Infrastructure (OCI) CLI.

C.

Set up the kubeconfig file.

D.

Generate an API signing key pair (if you do not already have one) and upload the public key of the API signing key pair.

Question 5

A Docker image consists of one or more layers, each of which represents a Dockerfile instruction. The layers are stacked and each one is a delta of the changes from the previous layer. What permission is associated with these layers?

Options:

A.

read mostly

B.

write only

C.

movable

D.

read only

E.

write once

Question 6

To enforce mutual TLS (mTLS) authentication for clients of your microservices, your team has chosen to leverage the Oracle Cloud Infrastructure (OCI) API Gateway service to create new API Deployments that will direct requests to your microservices. Which is NOT valid regarding the mTLS options in OCI API Gateway?

Options:

A.

Custom CA or custom CA bundles can be added to your gateway's trust store ONLY if they already exist in the OCI Certificates service.

B.

Adding a custom certificate authority (CA) or custom CA bundle to your gateway's trust store for mTLS is optional unless you need to reject certificates that do not contain particular values (such as a domain name).

C.

The mTLS request policy can only be enabled at the API deployment specification level, which then applies globally to ALL routes in that deployment.

D.

Once the mTLS request policy is enabled, ALL requests with valid certificates are routed to the backend unless you have defined one or more particular values (such as a domain name).

Question 7

Your organization has deployed their e-commerce application on Oracle Container Engine for Kubernetes (OKE) and they are using the Oracle Cloud Infrastructure Registry (OCIR) service as their Docker image repository. They have deployed the OKE cluster using the 'custom create' option, and their Virtual Cloud Network (VCN) has three public subnets with associated Route Tables, Security Lists, and Internet Gateway. However, their application containers are failing to deploy. On investigation, they discover that the images are not being pulled from the designated OCIR repository, even though the YAML configuration has the correct path to the images. What is a valid concern here that needs to be further investigated?

Options:

A.

Security List rule for TCP port 22 needs to be added to connect to the OCIR service.

B.

VCN hosting the OKE cluster worker nodes needs to have a NAT gateway to access OCIR repositories.

C.

Identity and Access Management (IAM) credentials need to be added for each user that deploys applications to the OKE cluster.

D.

OKE cluster needs to have a secret with the credentials of their OCIR repository and use that secret in the Kubernetes deployment manifest.

Question 8

Which is the smalled unit of Kubernetes architecture?

Options:

A.

Node

B.

Container

C.

Cluster

D.

Pod

Question 9

You have been asked to update an OKE cluster to a network configuration that has the least attack surface while the deployed applications are still directly available for access from the Internet. Which is a valid OKE cluster network configuration that meets this requirement? (Choose the best answer.)

Options:

A.

Private subnets for nodes, the Kubemetes API endpoint, and load balancers

B.

Private subnets for nodes; public subnets for the Kubemetes API endpoint and load balancers

C.

Private subnets for nodes and the Kubemetes API endpoint; public subnets for load balancers

D.

Private subnet for the Kubemetes API endpoint; public subnets for nodes and load balancers

Question 10

In the shared responsibility model, who should perform patching, upgrading, and maintaining of the worker nodes in provisioned Oracle Container Engine for Kubernetes (OKE) clusters?

Options:

A.

Oracle Support does it.

B.

It is the responsibility of the customer.

C.

It is an automated process.

Question 11

A developer using Oracle Cloud Infrastructure (OCI) API Gateway needs to authenticate the API requests to their web application. The authentication process must be implemented using a custom scheme which accepts string-based parameters from the API caller. Which approach should the developer use in this scenario?

Options:

A.

Create a cross account functions authorizer.

B.

Create an authorizer function using OCI Identity and Access Management 91AM) based authentication.

C.

Create an authorizer function using request header authorization.

D.

Create an authorizer function using token-based authorization.

Question 12

Which is ONE of the differences between a microservice and a serverless function?

Options:

A.

Microservices are used for long running operations while serverless functions are used for short running operations.

B.

Microservices are triggered by events while serverless functions are not.

C.

Microservices are stateless while serverless functions are stateful.

D.

Microservices always use a data store while serverless functions never use a data store.

Question 13

Which TWO are characteristics of microservices? (Choose two.)

Options:

A.

Microservices communicate over lightweight APIs.

B.

Microservices can be implemented in limited number of programming languages.

C.

All microservices share a data store.

D.

Microservices are hard to test in isolation.

E.

Microservices can be independently deployed.

Question 14

You are instructed to automate manual tasks and help software teams manage complex environments at scale using the Oracle Cloud Infrastructure (OCI) services. Which THREE OCI services can be leveraged to securely store and version your application's source code, and automate the building, testing, and deployment of applications to the OCI platform? (Choose three.)

Options:

A.

DevOps

B.

Container Engine for Kubernetes

C.

Oracle APEX Application Development

D.

Resource Manager

E.

Oracle Cloud Infrastructure Registry

F.

Oracle Cloud Logging Analytics

Question 15

In the DevOps lifecycle, what is the difference between continuous delivery and continuous deployment? (Choose two.)

Options:

A.

Continuous delivery involves automation of developer tasks, while continuous deployment involves manual operational tasks.

B.

Continuous delivery utilizes automatic deployment to a development environment, while continuous deployment involves automatic deployment to a production environment.

C.

Continuous delivery requires more automatic linting, while continuous deployment testing must be run manually.

D.

Continuous delivery is a process that initiates deployment manually, while continuous deployment is based on automating the deployment process.

Question 16

How are cloud native application versions deployed to an OKE cluster when using a blue/green deployment strategy?

Options:

A.

Current applications are slowly replaced with new application versions.

B.

New application versions are deployed in minor increments to a select group of people.

C.

Both old and new application versions are deployed to production at the same time.

Question 17

Which open source engine is used by Oracle Cloud Infrastructure (OCI) to power Oracle Functions?

Options:

A.

Knative

B.

Kubeless

C.

Apache OpenWhisk

D.

Fn Project

Question 18

You have just finished building and compiling the software required to implement the API microservice component. You need to rebuild the API docker image, and plan to tag it as: ocIdevops/api:latest Which docker command would re-create the API docker image?

Options:

A.

docker build -t OCIdevops/api:latest

B.

docker create -t OCIdevops/api:latest

C.

docker image -t OCIdevops/api:latest

D.

docker compile -t OCI devops/api:latest

Question 19

What are the TWO main reasons you would choose to implement a serverless architecture? (Choose two.)

Options:

A.

No need for integration testing

B.

Automatic horizontal scaling

C.

Easier to run long-running operations

D.

Reduced operational cost

E.

Improved in-function state management

Question 20

You want to push a new image in the Oracle Cloud Infrastructure (OCI) Registry. Which TWO actions would you need to perform? (Choose two.)

Options:

A.

Generate an API signing key to complete the authentication via Docker CLI.

B.

Generate an auth token to complete the authentication via Docker CLI.

C.

Assign an OCI defined tag via OCI CLI to the image.

D.

Assign a tag via Docker CLI to the image.

E.

Generate an OCI tag namespace in your repository.

Question 21

Which is NOT a valid option to execute a function deployed in Oracle Functions?

Options:

A.

Invoke from the Docker CLI.

B.

Send signed HTTP requests to the function's invoke endpoint.

C.

Invoke from the Fn Project CLI.

D.

Trigger by an event in the Oracle Cloud Infrastructure (OCI) Events service.

E.

Invoke from the OCI CLI.

Question 22

Which two "Action Type" options are NOT available in an Oracle Cloud Infrastructure (OCI) Events rule definition? (Choose two.)

Options:

A.

Email

B.

Streaming

C.

Slack

D.

Functions

E.

Notifications

Question 23

You deployed a Python application to an Oracle Container Engine for Kubernetes (OKE) cluster. However, while testing you found a bug, which you rectified and then created a new Docker image. You now need to ensure that if this new image does not work once deployed, you should be able to roll back to the previous version. Using kubect1, which strategy should you use?

Options:

A.

Blue/Green Deployment

B.

Canary Deployment

C.

Rolling Update

D.

A/B Testing

Question 24

Your team has chosen to use master encryption key (MEK) within an Oracle Cloud Infrastructure (OCI) Vault for encrypting Kubernetes secrets associated with your microservice deployments in OCI Container Engine for Kubernetes (OKE) clusters so that you can easily manage key rotation. Which of the following is NOT valid about rotating keys in the OCI Vault service?

Options:

A.

Once rotated, older key versions can be used for encryption until they are deleted.

B.

Both software and HSM-protected MEKS can be rotated.

C.

When you rotate an MEK, a new key version is automatically generated.

D.

Each key version is tracked internally with separate unique OCIDS.

Question 25

Your organization is developing serverless applications with Oracle Functions. Many functions will need to store state data in a database, which will require using appropriate credentials. However, your corporate security standards mandate encryption of secret information, such as database passwords. How would you address this security requirement?

Options:

A.

Use OCI Console to enter the password in the function configuration section in the provided input field.

B.

Leverage application-level configuration variables to store passwords because they are automatically encrypted by Oracle Functions.

C.

Use the OCI Vault service to auto-encrypt the password and then set an application-level configuration variable to reference the auto-decrypted password inside your function container.

D.

Encrypt the password using the OCI Vault service and then decrypt this password in your function code with the generated key.

Question 26

From a DevOps process standpoint, it is a good practice to keep changes to an application under version control. Which of the following allows changes to a Docker image to be stored in a version control system?

Options:

A.

Updating docker-compose.yml

B.

Executing docker commit

C.

Executing docker save

D.

Updating Dockerfile

Question 27

Which statement about microservices is FALSE?

Options:

A.

They are typically designed around business capabilities.

B.

It is fairly common for them to communicate with HTTP.

C.

Multiple microservices can run in one process.

D.

They are independently deployable.

Question 28

Which is NOT a valid backend-type option available when configuring an Oracle Cloud Infrastructure (OCI) API Gateway Deployment?

Options:

A.

HTTP_BACKEND

B.

ORACLE STREAMS_BACKEND

C.

ORACLE_FUNCTIONS_BACKEND

Question 29

As a cloud-native developer, you are designing an application that depends on Oracle Cloud Infrastructure (OCI) Object Storage wherever the application is running. Therefore, provisioning of storage buckets should be part of your Kubernetes deployment process for the application. Which of the following should you leverage to meet this requirement? (Choose the best answer.)

Options:

A.

Oracle Functions

B.

OCI Service Broker for Kubernetes

C.

Open Service Broker API

D.

OCI Container Engine for Kubernetes

Question 30

Which of the following TWO statements are TRUE about deleting a Kubernetes cluster? (Choose two.)

Options:

A.

Upon deleting a cluster, other resources created during the cluster creation process or associated with the cluster (such as VCNS, Internet Gateways, NAT Gateways, Route Tables, Security Lists, B. Load Balancers, and Block Volumes) are deleted automatically.

B.

If you change the auto-generated name of a worker node and then delete the cluster, the renamed worker node is not deleted.

C.

Upon deleting a cluster, no other resources created during the cluster creation process or associated with the cluster (such as VCNS. Internet Gateways, NAT Gateways, Route Tables, Security Lists. Load Balancers, and Block Volumes) are deleted automatically.

D.

Changing the auto-generated name of a worker node does not affect the deletion of the worker node when the cluster in which it is created is deleted.

E.

You cannot change the autogenerated names of the worker nodes in the format oke-c--- within a Kubernetes cluster.

Page: 1 / 10
Total 100 questions