Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

1z0-1104-25 Oracle Cloud Infrastructure 2025 Security Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Oracle 1z0-1104-25 Oracle Cloud Infrastructure 2025 Security Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 36 questions

Challenge 1 - Task 1

Integrate TLS Certificate Issued by the OCI Certificates Service with Load Balancer

You are a cloud engineer at a tech company that is migrating its services to Oracle Cloud Infrastructure (OCI). You are required to set up secure communication for your web application using OCI's Certificate service. You need to create a Certificate Authority (CA), issue a TLS/SSL server certificate, and configure a load balancer to use this certificate to ensure encrypted traffic between clients and the backend servers.

Review the architecture diagram, which outlines the resources you'll need to address the requirement.

Preconfigured

To complete this requirement, you are provided with the following:

Access to an OCI tenancy, an assigned compartment, and OCI credentials

Required IAM policies

OCI Vault to store the secret required by the program, which is created in the root compartment as PBI_Vault_SP

Task 1: Create and Configure a Virtual Cloud Network (VCN)

Create a Virtual Cloud Network (VCN) namedPBT-CERT-VCN-01with the following specifications:

    VCN with a CIDR block of 10.0.0.0/16

      Subnet 1 (Compute Instance):

        Name:Compute-Subnet-PBT-CERT

        CIDR Block:10.0.1.0/24

Subnet 2 (Load Balancer):

    Name:LB-Subnet-PBT-CERT-SNET-02

    CIDR Block:10.0.2.0/24

Internet Gatewayfor external connectivity

Route table and security lists:

    Security List namedPBT-CERT-CS-SL-01for Subnet 1 (Compute-Subnet-PBT-CERT) to allow SSH (port 22) traffic

    Security List namedPBT-CERT-LB-SL-01for Subnet 2 (LB-Subnet-PBT-CERT) to allow HTTPS (port 443) traffic

"Enter the OCID of the created VCN in the text box below.

Task 6: Create Load Balancer and Attach Certificate

Create a Load Balancer with the name PBT-CERT-LB-01 in subnet LB-Subnet-PBT-CERT-SNET-02

Create a Listener for the load balancer, where:

Name: PBT-CERT-LB_LTSN_01

Protocol: HTTPS

Port: 443

Attach the certificate PBT-CERT-01- to the load balancer

Attach the security list PBT-CERT-LB-SL-01 to subnet LB-Subnet-PBT-CERT-SNET-02

Challenge 2 -Task 1

In deploying a new application, a cloud customer needs to reflect different security postures. If a security zone is enabled with the Maximum Security Zone recipe, the customer will be unable to create or update a resource in the security zone if the action violates the attached Maximum Security Zone policy.

As an application requirement, the customer requires a compute instance in the public subnet. You therefore, need to configure Custom Security Zones that allow the creation of compute instances in the public subnet.

Review the architecture diagram, which outlines the resoures you'll need to address the requirement:

Preconfigured

To complete this requirement, you are provided with the following:

Access to an OCI tenancy, an assigned compartment, and OCI credentials

Required IAM policies

Task 4: Create a Public Subnet

Create a public subnet named IAD-SP-PBT-PUBSNET-01, within the VCN IAD-SP-PBT-VCN-01

use a CIDR block of 10.0.1.0/24 and configure the subnet to use the internet Gateway

Task 3: Create a Master Encryption Key

Note: OCI Vault to store the key required by this task is created in the root compartment as PBI_Vault_SP

Create an RSA Master Encryption Key (MEK), where:

Key name: PBT-CERT-MEK-01-

For example, if your username is 99008677-lab.user01, then the MEK name should be PBT-CERT-MEK-01990086771abuser01

Ensure you eliminate special characters from the user name.

Key shape: 4096 bits

Enter the OCID of the Master Encryption Key created in the provided text box:

Challenge 2 -Task 1

In deploying a new application, a cloud customer needs to reflect different security postures. If a security zone is enabled with the Maximum Security Zone recipe, the customer will be unable to create or update a resource in the security zone if the action violates the attached Maximum Security Zone policy.

As an application requirement, the customer requires a compute instance in the public subnet. You therefore, need to configure Custom Security Zones that allow the creation of compute instances in the public subnet.

Review the architecture diagram, which outlines the resoures you'll need to address the requirement:

Preconfigured

To complete this requirement, you are provided with the following:

Access to an OCI tenancy, an assigned compartment, and OCI credentials

Required IAM policies

Task 2: Create a Security Zone

Create a security Zone named IAD_SAP-PBT-CSZ-01 in your assigned compartement and associate it with the Custom Security Zone Recipe (IAD-SAP-PBT-CSP-01) created in the previous task.

Enter the OCID of the created Security zone in the box below.

In Oracle Cloud Infrastructure (OCI), bare metal instances provide customers with direct access to the underlying hardware. To mitigate security risks when a customer terminates a bare metal instance, OCI utilizes Root-of-Trust hardware.

What is the primary function of the Root-of-Trust hardware in this context?

A.

It automatically encrypts data at rest on the bare metal instance.

B.

It ensures all non-volatile memory on the terminated instance is securely wiped before reuse.

C.

It guarantees complete isolation between customer workloads on different instances.

D.

It eliminates the need for hypervisors, reducing the potential attack surface.

A company has deployed OCI Zero Trust Packet Routing (ZPR) to secure its network. They have two compute instances, VM1-01 and VM-02, in a public subnet. VM-01 is tagged with the security attribute app:vm01, and VM-02 is tagged with app:vm02. The VCN is labeled with network:vcn01, The ZPR policy states:

"What is the expected outcome of this policy?

A.

VM-02 can SSH into VM-01, but VM-01 cannot SSH into VM-02.

B.

VM-01 can SSH into VM-02, but VM-02 cannot SSH into VM-01.

C.

Both VM-01 and VM-02 can SSH into each other.

D.

Neither VM-01 nor VM-02 can SSH into each other."

"Your company is building a highly available and secure web application on OCI. Because of increasing malicious web-based attacks, the security team has mandated that web servers should not be exposed directly to the Internet.

How should you architect the solution while ensuring fault tolerance and security?

A.

Deploy at least three web servers in different fault domains within a public subnet, each with a public IP address. Deploy Web Application Firewall (WAF), and configure an origin for each public IP.

B.

Deploy at least three web servers in different fault domains within a private subnet. Place a public load balancer in a public subnet, but skip WAF configuration.

C.

Deploy at least three web servers in different fault domains within a private subnet. Place a public load balancer in a public subnet and configure a back-end set for all web servers. Deploy Web Application Firewall (WAF) and set the load balancer public IP address as the origin.

D.

Deploy at least three web servers in different fault domains within a public subnet. Use OCI Traffic Management service for DNS-based load balancing."

During your investigation of a load balancer issue, you discovered that all back-end servers associated with one of the affected listeners were reported as unhealthy. However, when you checked the back-end servers, they seemed to be working just fine.

What might be causing this issue?

A.

Incorrect subnet configuration

B.

Misconfigured security rule

C.

Incorrect DNS configuration

D.

Overloaded back-end servers

E.

Misconfigured health check

An OCI administrator notices that a compute instance running in the production compartment is unable to create Object Storage buckets using the OCI CLI command:

oci os bucket create --name mybucket --compartment-id --auth instance_principal

The error message returned states:

"NotAuthorizedOrNotFound: You are not authorized to perform this action."

The administrator verifies that the instance has Internet access and can reach OCI endpoints.

What then could be causing the issue?

A.

The instance is using the wrong OCI CLI authentication method.

B.

The bucket name is already in use, causing a conflict.

C.

The policy is written at the root compartment instead of the production compartment.

D.

The instance is not part of any Dynamic Group or the matching rule is incorrect.

Page: 1 / 1
Total 36 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved