Q: 8
When configuring inter-tenancy VCN peering, what is the purpose of the "peer ID" provided by the
requesting tenancy to the accepting tenancy?
Options
Discussion
Going With B, is correct here. Had something like this in a mock and the peer ID always meant the unique OCID for the Remote Peering Connection, not for auth or CIDR. Pretty sure they use it to link both sides during setup. Anyone disagree?
I see why some pick D, since security configuration can be confusing here. D.
A is wrong, B. The peer ID’s whole job is to uniquely identify the requesting tenancy’s RPC so peering can be set up. D is tempting but that’s handled by security lists and NSGs, not this ID. I’ve seen similar wording in Oracle docs before, so pretty confident it’s B, but let me know if someone found an edge case.
B. not D. The peer ID is just for uniquely identifying RPCs, D is a trap since security rules are handled elsewhere.
Yeah, B is the right call. The peer ID lets the accepting tenancy know exactly which Remote Peering Connection to connect to in the other tenancy-it's basically the OCID pointer. It's not for auth or CIDR and definitely not about security rules. I've double-checked Oracle docs on this, so 99% sure here. Anyone see it used differently?
B , peer ID is just how the RPC from the requesting tenancy is identified so the connection can be established. Security rules (like D) are managed separately. Pretty sure this lines up with Oracle docs but let me know if I missed anything.
D looks tempting since security rules are key for peering setups, and I assumed peer ID might relate to granting access. But on second thought, maybe that's handled elsewhere in OCI. Not totally sure so open to correction if I'm off here.
I don’t think it’s D. B fits because the peer ID is only for uniquely identifying the requesting tenancy's RPC, not for security rules-that’s handled elsewhere. Seen similar confusion on other exams.
Isn't D the correct one if you're thinking about configuring security for the peering connection?
Had something like this show up on a practice test, went with D because I thought peering configuration meant setting security rules too. Pretty sure now it's more about identifying the RPC, but at the time D seemed plausible. Anyone else think D?
Be respectful. No spam.