B or C could both work depending on whether "minimal disruption" is about management simplicity or traffic failover speed. Is the requirement to keep admin overhead really low, or is instant tunnel failover more critical than having full BGP redundancy?
I think C makes more sense here since using a firewall appliance in OCI gives you extra control and inspection of the tunnel traffic, not just basic access control like NSGs. Why not C?
Actually, changing the MTU (C) often makes things worse, not better, unless every hop supports the larger size. If either end or a device in between can't handle it, you'll see more fragmentation and packet loss. Seen similar trick questions on network exams. Pretty sure C is the least likely to help here-unless both sides specifically allow higher MTUs, which isn’t stated.
Yeah, C is the one that won't really help. Increasing MTU without ensuring both sides match just increases the chance for packet fragmentation, especially over VPNs where path MTU discovery isn't always reliable. A and B actually tackle performance and prioritization, D is a bigger investment but improves stability. Unless I'm missing something, C is least likely to solve the issue here. Agree?
Call it it's B. Network Load Balancer is what Oracle recommends for raw TCP workloads, keeps latency and overhead low compared to ALB. Official docs and Oracle study guides usually make that distinction clear for database backends. If you want to double-check, I'd skim through the OCI Networking documentation and try a hands-on lab to see NLB in action.
For me, C is the way to go since Application Load Balancer can use TCP health checks and should handle TCP connections too. Plus, ALB gives more features if you need to tweak things later. Not totally sure though because NLB has lower overhead for TCP, but ALB feels like a safer default for app traffic. Agree?