This page was exported from IT Certification Exam Braindumps [ http://blog.braindumpsit.com ]
Export date: Sun Oct 6 18:29:19 2024 / +0000 GMT

[Q29-Q49] 1z0-1104-21 Certification - The Ultimate Guide [Updated 2022]




1z0-1104-21 Certification - The Ultimate Guide [Updated 2022]

1z0-1104-21 Practice Exam and Study Guides - Verified By BraindumpsIT

QUESTION 29
As a solutions architect, you need to assist operations team to write an I AM policy to give users in group-uat1 and group- uat2 access to manage all resources in the compartment Uat. Which is the CORRECT IAM policy ?

 
 
 
 

QUESTION 30
What is the matching rule syntax for a single condition?

 
 
 
 

QUESTION 31
As a security administrator, you found out that there are users outside your co network who are accessing OCI Object Storage Bucket. How can you prevent these users from accessing OCI resources in corporate network?

 
 
 
 

QUESTION 32
Which of the following is necessary step when creating a secret in vault?

 
 
 
 

QUESTION 33
Which architecture is based on the principle of “never trust, always verify”?

 
 
 
 

QUESTION 34
A number of malicious requests for a web application is coming from a set of IP addresses originating from Antartic a.
Which of the following statement will help to reduce these types of unauthorized requests ?

 
 
 
 

QUESTION 35
When creating an OCI Vault, which factors may lead to select the Virtual Private Vault ? Select TWO correct answers

 
 
 
 

QUESTION 36
Which OCI cloud service lets you centrally manage the encryption keys that protect your data and the secret credentials that you use to securely access resources?

 
 
 
 

QUESTION 37
Which type of software do you use to centrally distribute and monitor the patch level of systems throughout the enterprise?

 
 
 
 

QUESTION 38
Which of these protects customer data at rest and in transit in a way that allows customers to meet their security and compliance requirements for cryptographic algorithms and key management?

 
 
 
 

QUESTION 39
What do the features of OS Management Service do?

 
 
 
 

QUESTION 40
A http web server hosted on an Oracle cloud infrastructure compute instance in a public subnet of the vcsl virtual cloud network has a stateless security ingress rule for port 80 access through internet gateway stateful network security group notification for port 80 how will the Oci vcn handle request response traffic to the compute instance for a web page from the http server with port 80?

 
 
 
 

QUESTION 41
Which statement is true about using custom BYOI instances in Windows Servers that are managed by OS Management Service?

 
 
 
 

QUESTION 42
Operations team has made a mistake in updating the secret contents and immediately need to resume using older secret contents in OCI Secret Management within a Vault.
As a Security Administrator, what step should you perform to rollback to last version? Select TWO correct answers.

 
 
 
 

QUESTION 43
You create a new compartment, “apps,” to host some production apps and you create an apps_group and added users to it.
What would you do to ensure the users have access to the apps compartment?

 
 
 
 

QUESTION 44
Which WAF service component must be configured to allow, block, or log network requests when they meet specified criteria?

 
 
 
 

QUESTION 45
An e-commerce company needs to authenticate with third-party API that don’t support OCI’s signature-based authentication.
What can be the solution for the above scenario?

 
 
 
 

QUESTION 46
which three resources are required to encrypt a block volume with the customer managed key?

 
 
 
 
 
 

QUESTION 47
What does the following identity policy do?
Allow group my-group to use fn-invocation in compartment ABC where target.function.id = ‘<function-OCID>’

 
 
 
 

QUESTION 48
Which parameters customers need to configure while reading secrets by name using CL1 or API? Select TWO correct answers.

 
 
 
 

QUESTION 49
Which challenge is generally the first level of bot mitigation, but not sufficient with more advanced bot tools?

 
 
 
 


Oracle 1z0-1104-21 Exam Syllabus Topics:

TopicDetails
Topic 1
  • Describe OCI Shared Security Responsibility Model
  • Understand MFA, Identity Federation, and SSO
Topic 2
  • Implement security monitoring and alerting
  • Secure connectivity of virtual networks (DRG v2, Peering)
Topic 3
  • Describe use case for Penetration and Vulnerability Testing
  • Cloud Security Business Drivers and Challenges
Topic 4
  • Configure security for Oracle Autonomous Database and DB Systems
  • Configure security for OKE and Oracle Functions
Topic 5
  • Design a scalable authorization model with users, groups, and policies
  • Implement conditional and advanced policies
Topic 6
  • Configure and manage Secrets in OCI Vault
  • Secure connectivity of hybrid networks (Site-to-Site VPN, FastConnect)
Topic 7
  • Create and configure Web Application Firewall
  • Configure Network Security Groups (NSGs) and Security Lists
Topic 8
  • Describe the use case for VCN Flow Logs
  • Use Compartments to isolate resources
Topic 9
  • Describe key capabilities provided by Data Safe
  • Describe use case for auditing and review OCI Audit Logs

 

Ultimate Guide to the 1z0-1104-21 - Latest Edition Available Now: https://www.braindumpsit.com/1z0-1104-21_real-exam.html

Post date: 2022-05-11 09:42:57
Post date GMT: 2022-05-11 09:42:57
Post modified date: 2022-05-11 09:42:57
Post modified date GMT: 2022-05-11 09:42:57