Free Oracle 1Z0-1067-23 Exam Questions (page: 4)

You have been brought In to help secure an existing application that leverages Object Storage buckets to distribute content. The data is currently being shared from public buckets and the security team Is not satisfied with this approach. They have stated that all data must be stored In storage buckets. Your application should be able to provide secure access to the dat

  1. The URL that is provided for access to the data must be rotated every 30 days.
    Which design option will meet these requirements?
  2. Use Pre-Authenticated request, even though there will be multiple URLs this will pro-vide better security.
  3. Create a private bucket only to share the data.
  4. Create multiple bucket and classify them as Public and Private. Use public bucket for non-sensitive data and private bucket for sensitive data.
  5. Create a new group and map users to this group, create a IAM policy providing access to Object Storage service only to this group. Users can then simply login to OCI console and retrieve needed flies.

Answer(s): A



You set up a bastion host in your Virtual Cloud Network (VCN) to allow only your IP ad-dress (140.19.2.140) to establish SSH connections with your compute instances that are deployed in a private subnet. The compute instances have an attached Network Security Group (NSG) with a

Source Type: Network Security Group (NSG), Source NSG: NSG-050504. To secure the bastion host, you add the following ingress rules to its NSG: Type: All TCP Proto-col: TCP Port Range: 22 Source:
140.19.2.140/32 Type: All TCP Protocol: TCP Port Range: 22 Source: NSG-050504 However, when you check the bastion host logs, you discover that there are IP addresses other than your own that can access your bastion host.
What is the root cause of this issue?

  1. The port 22 provides unrestricted access to 140.19.2.140 and to other IP addresses.
  2. All compute instances associated with NSG-050504 are also able to connect to the bastion host.
  3. The security list allows access to all IP addresses that override the NSG ingress rules.
  4. A netmask of /32 allows all IP addresses in the140.19.2.0 network, other than your IP 140.19.2.140.

Answer(s): B



Which of the following THREE statements are true about Versioning? (Choose three.)

  1. You can enable the Versioning and Retention rule simultaneously on bucket.
  2. If versioning enabled, even if you delete the file inside the bucket, you will be charged for the data shared as the meta data still resides inside the bucket.
  3. If Versioning is enabled and you delete the files stored in a bucket, then a delete marker is created so that you can restore the deleted file.
  4. If Versioning disabled, and you try uploading files with the same name, then a copy of the file in kept with a different name.
  5. Versioning is applied at the bucket level.

Answer(s): B,C,E



A company is developing a highly available web application, which will be hosted on Oracle Cloud Infrastructure (OCI). For high reliability, the Load Balancer's health status is very important.
Which of the following may lead to an unhealthy Load Balancer?

  1. Issue with 55 connections trying to access an instance
  2. VCN Network Security Groups (NSG) or Security Lists lock traffic.
  3. Misconfigured security rule.
  4. Storage size assigned to one of the Block Storage services.

Answer(s): C






Post your Comments and Discuss Oracle 1Z0-1067-23 exam prep with other Community members:

1Z0-1067-23 Exam Discussions & Posts