Q: 1
When migrating workloads from AWS to OCI, which connectivity option generally offers the LOWEST
latency and HIGHEST bandwidth for data transfer, assuming a direct, dedicated connection is
financially viable?
Options
Discussion
B, the third-party cloud exchange option, lines up with what I see in Oracle docs and a few practice exams. If you want more details on why this is the case, check the official OCI network documentation or grab some hands-on labs for multicloud connectivity scenarios.
Be respectful. No spam.
Q: 2
You are designing a multi-tier application within an OCI Virtual Cloud Network (VCN). The application
comprises a public-facing web tier in one subnet, an application tier in another, and a database tier
in a third. For security reasons, you want to ensure that only the application tier can initiate
connections to the database tier. The web tier needs to be able to communicate with the application
tier, but not directly with the database tier. You are using private IP addresses within your VCN.
Which procedural step is MOST effective to achieve this network isolation?
Options
Discussion
Honestly kinda lost on this one, but I'll go with C. Someone back me up?
Looks like C, security lists on each subnet keeps traffic locked down cleanly. OCI docs also lean on this setup.
C , NSGs (A) trip people up here but security lists per subnet is the expected OCI way.
Be respectful. No spam.
Q: 3
You are troubleshooting a connectivity issue between two compute instances within the same VCN.
Both instances are in different subnets. Instance A (IPv4: 10.0.1.10, IPv6: fc00:1:1::10) can ping its
subnet gateway (10.0.1.1) and can ping the IPv6 address of Instance B (fc00:1:2::20), but cannot ping
Instance B's IPv4 address (10.0.2.20). The security lists and network security groups (NSGs) are
configured to allow all traffic between the subnets. The route table for Instance A’s subnet has a rule
to route all traffic destined to 10.0.2.0/24 subnet to the VCN Local Peering Gateway. What is the
most probable cause?
Options
Discussion
Option B similar scenario pops up in Oracle docs and the official study guide covers subnet route table configs well. Practice labs on OCI networking help a lot with these path/return-path type routing questions. Not totally sure, but that’s where I’d focus.
Be respectful. No spam.
Q: 4
Your company utilizes a hybrid cloud architecture, connecting its on-premises network to an OCI VCN
using a FastConnect private peering connection. You need to ensure that instances within a specific
subnet in the VCN can only communicate with resources in a designated IP address range within the
on-premises network. What is the MOST effective way to achieve this specific network isolation?
Options
Discussion
C but honestly not sure if you also need a security list tweak or just NSGs. Most practice exams point to custom route table with DRG plus NSG for this kind of restriction. Anyone seen it work another way?
Be respectful. No spam.
Q: 5
You are designing a multicloud architecture where your customer wants to leverage OCI for its cost-
effective compute and storage, while utilizing Microsoft Azure’s AI/ML services and AWS’s extensive
serverless capabilities. The application requires low latency and high bandwidth between the clouds.
Which of the following approaches provides the LEAST optimal solution for interconnecting these
three cloud providers for production workloads?
Options
Discussion
D is actually better than B here, VPNs between all clouds hit latency and bandwidth the hardest. B.
Option D, since going from OCI to Azure with the Interconnect is good, but then the VPN from Azure to AWS might be slower-still, I think it could work better than B in some cases.
B Nice clear scenario here, IPSec VPNs usually bring higher latency and bandwidth limits compared to dedicated links. Matches what I've seen in similar questions.
Be respectful. No spam.
Q: 6
You are troubleshooting a network connectivity issue between a compute instance in a private
subnet within your VCN and a service on the public internet using Cloud Shell. You suspect a problem
with the network security group (NSG) rules associated with the instance's VNIC. Which Cloud Shell
command and appropriate tool combination allows you to directly inspect the NSG configuration
impacting the VNIC?
Options
Discussion
OwenM, agree with you that jq is more reliable when parsing JSON from the CLI. D looks tempting if you're used to quick shell scripting, but OCI's responses can get messy. Pretty sure B is the safest choice for structured output here, but open to other tricks if someone has a real-world edge case.
Option B is the way I'd go. Parsing with jq handles structured OCI JSON much better than awk, so it's less likely to break if the format changes. D looks close but falls for that classic brittle parsing trap.
B tbh. Awk parsing like D feels too brittle, jq is safer for JSON. Trap here is thinking D works every time.
Feels like B. jq is just way better for handling the nested JSON that OCI CLI spits out, especially when you're tracing VNICs to their NSGs. D looks clever but awk gets messy if the JSON structure changes at all. Anyone have luck making D work reliably?
Its B for sure. Using jq is more stable with OCI CLI JSON than awk in D, so you actually get the right NSG attached to the VNIC. Happy if someone can show a working D though.
Maybe D. The awk+xargs combo seems like it could grab the NSG info if you know the VNIC, at least in some scripts I've seen in exam prep guides. Haven't seen this exact string in labs but sounds workable? Check official Oracle CLI docs to be sure.
Be respectful. No spam.
Q: 7
You're automating the creation of multiple VCNs across different OCI regions using Cloud Shell
scripting. Which authentication method within Cloud Shell is best suited to programmatically
authenticate with OCI, ensuring both security and scalability for this automation task?
Options
Discussion
C imo. Instance Principals are the way to go for this, since they let you avoid storing or managing API keys entirely and OCI Cloud Shell supports them through dynamic groups. B is tempting but brings risk if keys leak, and D suits bigger IaC workflows not straight shell scripting. Pretty sure Oracle recommends C for scripting automations like this, but happy to hear other arguments if I'm missing something.
C vs D? I think C is better since Instance Principals let Cloud Shell sessions authenticate without managing API keys, so that's more secure and scales better. D feels like overkill if you're just scripting VCNs. Not 100% sure though, open to other takes.
Be respectful. No spam.
Q: 8
When configuring inter-tenancy VCN peering, what is the purpose of the "peer ID" provided by the
requesting tenancy to the accepting tenancy?
Options
Discussion
Going With B, is correct here. Had something like this in a mock and the peer ID always meant the unique OCID for the Remote Peering Connection, not for auth or CIDR. Pretty sure they use it to link both sides during setup. Anyone disagree?
Yeah, B is the right call. The peer ID lets the accepting tenancy know exactly which Remote Peering Connection to connect to in the other tenancy-it's basically the OCID pointer. It's not for auth or CIDR and definitely not about security rules. I've double-checked Oracle docs on this, so 99% sure here. Anyone see it used differently?
Pretty sure it's B. The peer ID is just there to uniquely ID the Remote Peering Connection, not for authentication or network details. If anyone thinks otherwise let me know.
Makes sense, so it's B. The peer ID is really just the OCID of the RPC, not user authentication or CIDR. I think Oracle doc even mentions this process directly. Let me know if I'm off here.
A is wrong, B. Only the peer ID actually maps to the RPC OCID across tenancies. Saw a similar question in exam reviews and they noted this catch.
Be respectful. No spam.
Q: 9
A financial services company is implementing a multicloud strategy, storing sensitive customer data
in OCI due to its enhanced security features, running analytics workloads in AWS, and utilizing a SaaS
application hosted in Google Cloud Platform (GCP). To comply with stringent data sovereignty
regulations, the company requires that all traffic between OCI and AWS must transit exclusively
within the United States. Which is the MOST critical consideration when choosing a connectivity
solution to ensure compliance?
Options
Discussion
A. Saw a similar question before, and B is a common trap since just using DRG/VGW or VPN setup doesn’t actually guarantee the traffic remains US-only. Only a FastConnect provider with a written assurance will meet strict data sovereignty regs. Happy to discuss if I missed something here.
I don’t think it’s B. A, based on similar exam reports and the Oracle docs.
Option B. DRG + VGW with VPNs in US regions seems safe since endpoints stay local, so I think that counts for keeping data inside the country.
Its A, but only if the provider truly guarantees US-only traffic-sometimes even with US endpoints, underlying routes can go international. Searched something similar for a compliance audit once, regular VPNs or just picking US regions won’t cut it unless you have that explicit commitment.
Be respectful. No spam.
Q: 10
You are managing a critical application hosted on OCI. To enhance security, you have enabled DNSSEC
for your domain using OCI DNS. You want to automate the process of monitoring the health and
validity of your DNSSEC configuration and receive alerts if any issues are detected. Which OCI service
can be MOST effectively used for this DNSSEC monitoring purpose?
Options
Discussion
Pretty sure it's B here. OCI Monitoring lets you track DNSSEC-related metrics and set up alerts automatically if something goes wrong. Not 100% but that's what I'd pick based on how Oracle sets up their monitoring tools. Agree?
Why not just use D for direct DNS log analysis? Does B really cover DNSSEC specifics?
Nah, I think it's B for sure. Monitoring Service is built exactly for setting up alarms on metrics like DNSSEC health, while Logging Analytics is better for digging into logs but not as direct with alerting. Easy to mix them up since both use log data, but B lines up more with Oracle's alerting setup. Anyone disagree?
Maybe D. Seen similar questions in some practice exams and Logging Analytics often comes up for log-driven alerting.
I'm not convinced B is the best pick. I think D would fit better since Logging Analytics can analyze DNS logs and flag anomalies, including DNSSEC issues, and you could set up queries to alert you. Audit and Vulnerability Scanning feel off-topic here. Maybe I'm missing something but D seems a valid choice too, unless there's a caveat with alerting. Thoughts?
Option D, Logging Analytics also handles DNS logs so could see why someone picks it.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2