Tag Archives: Shared

According to Shared security model, which two are a customer's responsibilities in Oracle Cloud Infrastructure

According to Shared security model, which two are a customer’s responsibilities in Oracle Cloud Infrastructure (OCI)? A. Physical security of OCI data center facilities B. Virtual Machine hypervisor C. Local NVMe data persistence D. Customer data E. Object Storage data durability Correct Answer: D,E Customer and Oracle’s responsibilities can be divided into the following areas:Physical Security: Oracle is… Read More »

You have an application that requires a shared file system. Which of the following services would you

You have an application that requires a shared file system. Which of the following services would you use? A. File Storage B. Archive Storage C. Object Storage D. Block Volume Correct Answer: A Explanation Oracle Cloud Infrastructure File Storage service provides a durable, scalable, secure, enterprise-grade network file system. You can connect to a File Storage service file… Read More »

You have deployed a Visual Builder Studio application and shared its URL with the enterprise. The enterprise

You have deployed a Visual Builder Studio application and shared its URL with the enterprise. The enterprise gives feedback that the deployment is incorrect and does not meet their requirement specifications regarding the URL definition.Even though the application works as expected, they are insisting that you make corrections to meet their specified requirements. What capabilities in Visual Builder… Read More »

Which two statements are correct about Autonomous Data Warehouse on Shared Exadata Infrastructure?

Which two statements are correct about Autonomous Data Warehouse on Shared Exadata Infrastructure? A. Parallelism is not enabled by default. B. Compression is enabled by default. Autonomous Data Warehouse uses Hybrid Columnar Compression for all tables by default. C. Oracle Database Result Cache is enabled by default for all SQL statements. D. You have direct access to the… Read More »

Which statement is true about connecting an OCI compute instance to a Shared Autonomous Database?

Which statement is true about connecting an OCI compute instance to a Shared Autonomous Database? A. A Private Endpoint is required to connect to the Shared-Autonomous Database. B. The Autonomous Database must be in the same VCN and Subnet as the Compute instance. C. The Autonomous Database must belong to a Network Security Group (NSG). D. The OCI… Read More »

Which statement is true when connecting OCI Marketplace image to shared autonomous database?

Which statement is true when connecting OCI Marketplace image to shared autonomous database? A. ADB must be configured with NSG B. Compute Image and Shared ADB must be in same VCN and Subnet C. ADB must be configured with Private endpoints D. Cannot connect OCI Market image to shared ADB Correct Answer: B

If Explicit Data Is Information That Is Intentionally Shared Between A Contact And A Company, What Is Implicit Data?

If Explicit Data Is Information That Is Intentionally Shared Between A Contact And A Company, What Is Implicit Data? Information gathered from website activity Information gathered from a form submission Information gathered from implied behavior Information gathered from user behavior

An administrator is configuring RADIUS on a Cisco switch with a key set to Cisc407294634 but is receiving the error “Authentication failed: 22040 Wrong password or invalid shared secret.” What must be done to address this issue?

A. Add the network device as a NAD inside Cisco ISE using the existing key. B. Configure the key on the Cisco ISE instead of the Cisco switch. C. Validate that the key is correct on both the Cisco switch as well as Cisco ISE. D. Use a key that is between eight and ten characters. Answer: Option… Read More »

What is the difference between a source tree and a shared tree in a multicast environment?

A. To route traffic from source to receiver a source tree uses a link-state routing protocol and a shared tree uses a distancevector routing protocol. B. A source tree has its root at the source, and a shared tree has its root at a designated rendezvous point. C. To stream multicast from source to receiver, a source tree… Read More »