Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

1z0-1084-25 Oracle Cloud Infrastructure 2025 Developer Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Oracle 1z0-1084-25 Oracle Cloud Infrastructure 2025 Developer Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 2
Total 100 questions

A service you are deploying to Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) uses a docker image from a private repository in OCI Registry (OCIR). Which configuration is necessary to provide access to this repository from OKE?

A.

Create a docker-registry secret for OCIR with API key credentials on the cluster, and specify the imagePullSecret property in the application deployment manifest.

B.

Create a docker-registry secret for OCIR with identity Auth Token on the cluster, and specify the imagePullSecret property in the application deployment manifest.

C.

Create a dynamic group for nodes in the cluster, and a policy that allows the dynamic group to read repositories in the same compartment.

D.

Add a generic secret on the cluster containing your identity credentials. Then specify a registryCredentials property in the deployment manifest.

Which of the following TWO statements are TRUE about deleting a Kubernetes cluster? (Choose two.)

A.

Upon deleting a cluster, other resources created during the cluster creation process or associated with the cluster (such as VCNS, Internet Gateways, NAT Gateways, Route Tables, Security Lists, B. Load Balancers, and Block Volumes) are deleted automatically.

B.

If you change the auto-generated name of a worker node and then delete the cluster, the renamed worker node is not deleted.

C.

Upon deleting a cluster, no other resources created during the cluster creation process or associated with the cluster (such as VCNS. Internet Gateways, NAT Gateways, Route Tables, Security Lists. Load Balancers, and Block Volumes) are deleted automatically.

D.

Changing the auto-generated name of a worker node does not affect the deletion of the worker node when the cluster in which it is created is deleted.

E.

You cannot change the autogenerated names of the worker nodes in the format oke-c--- within a Kubernetes cluster.

(CHK_4>2) You have a scenario where a DevOps team wants to store secrets in Oracle Cloud Infrastructure (OCI) Vault so that it can inject the secrets into an app's environment variables (for example, MYSQL_DB_PASSWD) at deployment time. Which is NOT valid about managing secrets in the OCI Vault service?

A.

New secret versions automatically expire in 90 days unless you configure an expiry rule.

B.

You can manually create new secrets as well as new secret versions using the OCI Console:

C.

A unique OCID is automatically generated for each secret and remains unchanged even when creating a new secret version.

D.

A secret reuse rule prevents the use of secret contents across different versions of a secret.

You are developing a serverless application with Oracle Functions and Oracle Cloud Infrastructure Object Storage. Your function needs to read a JSON file object from an Object Storage bucket named "input-bucket" in compartment "qa-compartment". Your corporate security standards mandate the use of Resource Principals for this use case. Which two statements are needed to implement this use case? (Choose two.)

A.

Set up a policy to grant all functions read access to the bucket: allow all functions in compartment qa-compartment to read objects in target.bucket.name= "input-bucket'

B.

Set up a policy to grant your user account read access to the bucket: allow user XYZ to read objects in compartment qa-compartment where target.bucket.name= "input-bucket'

C.

Set up the following dynamic group for your function's OCID: Name: read-file-dg Rule: resource.id = "ocid1.fnfunc.oc1.phx.aaaaaaaakeaobctakezjz5i4ujj7g25q7sx5m vr55pms6f4da'

D.

No policies are needed. By default, every function has read access to Object Storage buckets in the tenancy.

E.

Set up a policy with the following statement to grant read access to the bucket: allow dynamic-group read-file-dg to read objects in compartment qa- compartment where target.bucket.name= 'input-bucket'

Which kubectl command syntax is valid for implementing a rolling update deployment strategy in Kubernetes? (Choose the best answer.)

A.

kubectl upgrade -c --image=image:v2

B.

kubectl update --image=image:v2

C.

kubectl rolling-update --image=image:v2

D.

kubectl update -c --iniage=image: v2

From a DevOps process standpoint, it is a good practice to keep changes to an application under version control. Which of the following allows changes to a Docker image to be stored in a version control system?

A.

Updating docker-compose.yml

B.

Executing docker commit

C.

Executing docker save

D.

Updating Dockerfile

Your organization has mandated that all deployed container images used for microservices must be signed by a specified master encryption key (MEK). You have appropriately signed the container images as part of your build process, but must now ensure that they are automatically verified when they are deployed to Oracle Cloud Infrastructure (OCI) Container Engine for Kubemetes (OKE) clusters. Which option should be used to mandate image verification when deploying to OKE clusters, assuming that MEK is already stored in an available OCI Vault? (Choose the best answer.)

A.

Enable image verification policies separately for each Kubemetes pod deployment because this is enforced at the pod level.

B.

Enable image verification policies separately for each node pool within each OKE cluster because this is enforced at the node pool level.

C.

Enable image verification policies separately for each OKE cluster because this is enforced at the cluster level.

(Correct)

D.

Enable Image verification policies for your OKE service control plane which will enforce this for all OKE clusters.

Which is NOT a valid option to execute a function deployed in Oracle Functions?

A.

Invoke from the Docker CLI.

B.

Send signed HTTP requests to the function's invoke endpoint.

C.

Invoke from the Fn Project CLI.

D.

Trigger by an event in the Oracle Cloud Infrastructure (OCI) Events service.

E.

Invoke from the OCI CLI.

Which is NOT a valid use case for leveraging the Oracle Cloud Infrastructure (OCI) Events service?

A.

Capturing the OCI Monitoring service alarms and invoking autoscaling of compute instances.

B.

Publishing a notification when long-lived tasks complete, such as an OCI Autonomous Database backup completion.

C.

Triggering a notification action when a function completes its execution.

D.

Triggering a function deployed in Oracle Functions when new files are uploaded to an OCI Object Storage bucket.

E.

Publishing all the OCI resource events in a specific compartment to the OCI Streaming service for later analysis.

Which concept in OCI Queue is responsible for hiding a message from other consumers for a predefined amount of time after it has been delivered to a consumer?

A.

Maximum retention period

B.

Visibility timeout

C.

Delivery count

D.

Polling timeout

Page: 2 / 2
Total 100 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved