Tag Archives: access

Which OCI Identity and access management capability helps you to organize multiple users into teams?

Which OCI Identity and access management capability helps you to organize multiple users into teams? A. Policies B. Groups C. Dynamic Groups D. Users Correct Answer: B IAM Group is A collection of users who all need the same type of access to a particular set of resources or compartment.IAM DYNAMIC GROUP is A special type of group… Read More »

Which component of the Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM) service

Which component of the Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM) service can be used for controlling access to resources for authenticated principals? A. Compartment B. Policy C. Network Source D. Group Correct Answer: B

Where are permissions enabled for users to access Collaboration?

Where are permissions enabled for users to access Collaboration? A. the Business Rules configuration screen B. the Resource Information configuration screen C. the User Type configuration screen D. the Resource Type configuration screen Correct Answer: C https://docs.oracle.com/cloud/february2017/fieldservicecs_gs/FASCL/Collaboration-2.htm#FASCLConfigureUserGroupsAndHelpdesk-30EA0AD0

Which of the following services can you control access to via IAM?

Which of the following services can you control access to via IAM? A. Networking components B. Compute Instances C. All services including IAM D. DB systems Correct Answer: C Oracle Cloud Infrastructure Identity and Access Management (IAM) lets you control who has access to your cloud resources. You can control what type of access a group of users… Read More »

You have defined a user-isolated collection in Oracle Mobile Hub. Two users, Jean and Joe, can access

You have defined a user-isolated collection in Oracle Mobile Hub. Two users, Jean and Joe, can access it. Jean has Read-write access and Joe has Read-write (All Users) access. Jean has uploaded an image of an oven to the collection and Joe has uploaded an image of a dryer to the collection.What image can Jean see when accessing… Read More »

You have all the credentials to log in to Oracle Cloud Infrastructure and access Oracle Cloud Infrastructure

You have all the credentials to log in to Oracle Cloud Infrastructure and access Oracle Cloud Infrastructure Registry.What would be the name of the new repository created when you push the docker image to Oracle Cloud Infrastructure Registry without specifying the repository name? A. Name of the image tag B. Name of the image C. Username/region-code D. Tenancy… Read More »

You have all the credentials to log in to Oracle Cloud Infrastructure and access Oracle Cloud Infrastructure

You have all the credentials to log in to Oracle Cloud Infrastructure and access Oracle Cloud Infrastructure Registry. What would be the name of the new repository created when you push the docker image to Oracle Cloud Infrastructure Registry without specifying the repository name?Response: A. Tenancy name/region-code B. Name of the image C. Username/region-code D. Name of the… Read More »

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol. Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

Refer to the exhibit. An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol. Which two actions must the engineer implement to complete the SSH configuration? (Choose two.) A. Configure an IP domain name. B. Configure service password encryption. C.… Read More »

Which two statements are FALSE about creating a metadata-only clone with a private endpoint network access

Which two statements are FALSE about creating a metadata-only clone with a private endpoint network access option? A. Current settings for ACLs are cloned. B. Clone can be in a different region. C. All OML notebooks are cloned. D. All underlying data for OML notebooks is cloned. E. All resource management rules are cloned. Correct Answer: B,D https://docs.oracle.com/en/cloud/paas/autonomous-database/adbsa/autonomous-clone-notes.html#GUID-F943E7FF-8DEB-47F4-84C0-FFA5BAF9D5A9

In which four ways can Oracle Database optimally access data in Object Storage?

In which four ways can Oracle Database optimally access data in Object Storage? A. optimized data archive using hybrid partitioned tables B. scan avoidance using columnar pruning for .csv files C. scan avoidance using columnar pruning for columnar stores like parquet and orc D. scan avoidance using partitioned external tables E. optimized data archive using partitioned external tables… Read More »