Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Oracle 1z0-1084-25 Oracle Cloud Infrastructure 2025 Developer Professional Exam Practice Test

Demo: 30 questions
Total 100 questions

Oracle Cloud Infrastructure 2025 Developer Professional Questions and Answers

Question 1

You plan to implement logging in your services that will run in Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE). Which statement describes the appropriate logging approach?

Options:

A.

All services log to standard output only.

B.

Each service logs to its own log file.

C.

All services log to an external logging system.

D.

All serviceAAs log to a shared log file.

Question 2

(CHK_4>2) You have a scenario where a DevOps team wants to store secrets in Oracle Cloud Infrastructure (OCI) Vault so that it can inject the secrets into an app's environment variables (for example, MYSQL_DB_PASSWD) at deployment time. Which is NOT valid about managing secrets in the OCI Vault service?

Options:

A.

New secret versions automatically expire in 90 days unless you configure an expiry rule.

B.

You can manually create new secrets as well as new secret versions using the OCI Console:

C.

A unique OCID is automatically generated for each secret and remains unchanged even when creating a new secret version.

D.

A secret reuse rule prevents the use of secret contents across different versions of a secret.

Question 3

As a developer, you have been tasked with implementing a microservices-based application. Which THREE technologies are best suited to accomplish the task? (Choose three.)

Options:

A.

Terraform

B.

Big Data

C.

Anomaly Detection

D.

Service Mesh

E.

Docker

F.

Kubemetes

Question 4

As a Cloud Native developer, you have written a web service for your company. However, your security team has suggested that your web service should address Distributed Denial-of-Service (DDoS) attack. You are time-constrained and you need to ensure that this is implemented as soon as possible. What should you do in this scenario? (Choose the best answer.)

Options:

A.

Use a third party service integration to Implement DDoS attack mitigation.

B.

Re-write your web service and implement rate limiting.

C.

Use the OCI Virtual Cloud Network (VCN) segregation to control DDoS.

D.

Use the OCI API Gateway service and configure rate limiting.

Question 5

Which statement about microservices is FALSE?

Options:

A.

They are typically designed around business capabilities.

B.

It is fairly common for them to communicate with HTTP.

C.

Multiple microservices can run in one process.

D.

They are independently deployable.

Question 6

Which is NOT a valid option to execute a function deployed in Oracle Functions?

Options:

A.

Invoke from the Docker CLI.

B.

Send signed HTTP requests to the function's invoke endpoint.

C.

Invoke from the Fn Project CLI.

D.

Trigger by an event in the Oracle Cloud Infrastructure (OCI) Events service.

E.

Invoke from the OCI CLI.

Question 7

In the DevOps lifecycle, what is the difference between continuous delivery and continuous deployment? (Choose two.)

Options:

A.

Continuous delivery involves automation of developer tasks, while continuous deployment involves manual operational tasks.

B.

Continuous delivery utilizes automatic deployment to a development environment, while continuous deployment involves automatic deployment to a production environment.

C.

Continuous delivery requires more automatic linting, while continuous deployment testing must be run manually.

D.

Continuous delivery is a process that initiates deployment manually, while continuous deployment is based on automating the deployment process.

Question 8

Kubernetes includes various elements such as compute, network, and storage. Compute is essentially CPU (units) and memory (bytes). Within an OKE cluster, what is considered to be the smallest unit of deployment with respect to compute?

Options:

A.

Container

B.

Service

C.

Pod

D.

Namespace

E.

Deployment resource

Question 9

You want to push a new image in the Oracle Cloud Infrastructure (OCI) Registry. Which TWO actions would you need to perform? (Choose two.)

Options:

A.

Generate an API signing key to complete the authentication via Docker CLI.

B.

Generate an auth token to complete the authentication via Docker CLI.

C.

Assign an OCI defined tag via OCI CLI to the image.

D.

Assign a tag via Docker CLI to the image.

E.

Generate an OCI tag namespace in your repository.

Question 10

Your Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) administrator has created an OKE cluster with one node pool in a public subnet. You have been asked to provide a log file from one of the nodes for troubleshooting purpose. Which step should you take to obtain the log file?

Options:

A.

Use the username opc and password to login.

B.

It is impossible because OKE is a managed Kubernetes service.

C.

SSH into the nodes using the private key.

D.

SSH into the node using the public key.

Question 11

Assuming that your function does NOT have the --provisioned-concurrency option enabled, which parameter is used to configure the time period during which an idle function will remain in memory before Oracle Functions removes its container image from memory?

Options:

A.

timeout

B.

access-timeout

C.

idle-timeout

D.

None, as this time is not configurable.

Question 12

Which option best defines microservices?

Options:

A.

A statically typed and compiled language.

B.

An open-source system for automating deployment, scaling, and management of containerized applications.

C.

A finely tuned piece of software that performs a single or small collection of tasks.

D.

An organized collection of structured information or data, typically stored electronically in a computer system.

Question 13

You are creating an API deployment in Oracle Cloud Infrastructure (OCI) API Gateway and you want to configure request policies to control access. Which is NOT available in OCI API Gateway?

Options:

A.

Controlling access to the backend OCI resources.

B.

Limiting the number of requests sent to the backend services.

C.

Enabling Cross-Origin Resource Sharing (CORS) support.

D.

Providing authentication and authorization.

Question 14

Which of the following TWO statements are TRUE about deleting a Kubernetes cluster? (Choose two.)

Options:

A.

Upon deleting a cluster, other resources created during the cluster creation process or associated with the cluster (such as VCNS, Internet Gateways, NAT Gateways, Route Tables, Security Lists, B. Load Balancers, and Block Volumes) are deleted automatically.

B.

If you change the auto-generated name of a worker node and then delete the cluster, the renamed worker node is not deleted.

C.

Upon deleting a cluster, no other resources created during the cluster creation process or associated with the cluster (such as VCNS. Internet Gateways, NAT Gateways, Route Tables, Security Lists. Load Balancers, and Block Volumes) are deleted automatically.

D.

Changing the auto-generated name of a worker node does not affect the deletion of the worker node when the cluster in which it is created is deleted.

E.

You cannot change the autogenerated names of the worker nodes in the format oke-c--- within a Kubernetes cluster.

Question 15

You are building a container image and pushing it to Oracle Cloud Infrastructure Registry (OCIR). You need to ensure that these images never get deleted from the repository. Which action should you take?

Options:

A.

Create a group and assign a policy to perform lifecycle operations on images.

B.

Write a policy to limit access to the specific repository in your compartment.

C.

Edit the tenancy global retention policy.

D.

Set global policy of image retention to "Retain All Images".

Question 16

You developed a microservices-based application that runs in an Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) cluster. It has multiple endpoints that need to be exposed to the public internet. What is the most cost-effective way to expose multiple application endpoints without adding unnecessary complexity to the application?

Options:

A.

Use a NodePort service type in Kubernetes for each of your service endpoints using the node's public IP address to access the applications.

B.

Create a separate load balancer instance for each service using the lowest 100 Mbps option.

C.

Use a ClusterIP service type in Kubernetes for each of your service endpoints using a load balancer to expose the endpoints.

D.

Deploy an Ingress Controller and use it to expose each endpoint with its own routing endpoint.

Question 17

Your organization has mandated that all deployed container images used for microservices must be signed by a specified master encryption key (MEK). You have appropriately signed the container images as part of your build process, but must now ensure that they are automatically verified when they are deployed to Oracle Cloud Infrastructure (OCI) Container Engine for Kubemetes (OKE) clusters. Which option should be used to mandate image verification when deploying to OKE clusters, assuming that MEK is already stored in an available OCI Vault? (Choose the best answer.)

Options:

A.

Enable image verification policies separately for each Kubemetes pod deployment because this is enforced at the pod level.

B.

Enable image verification policies separately for each node pool within each OKE cluster because this is enforced at the node pool level.

C.

Enable image verification policies separately for each OKE cluster because this is enforced at the cluster level.

(Correct)

D.

Enable Image verification policies for your OKE service control plane which will enforce this for all OKE clusters.

Question 18

Which open source engine is used by Oracle Cloud Infrastructure (OCI) to power Oracle Functions?

Options:

A.

Knative

B.

Kubeless

C.

Apache OpenWhisk

D.

Fn Project

Question 19

What is the maximum execution time of Oracle Functions?

Options:

A.

240 seconds

B.

300 seconds

C.

60 seconds

D.

120 seconds

Question 20

Which command is used to get a Docker image from Oracle Cloud Infrastructure Registry (OCIR) to the client machine?

Options:

A.

docker pull .ocir.io//:

B.

docker pull /.ocir.io/:

C.

docker fetch .ocir.io//:

D.

docker fetch /.ocir.io/:

Question 21

Which feature is typically NOT associated with Cloud Native?

Options:

A.

Immutable Infrastructure

B.

Declarative APIs

C.

Containers

D.

Application Servers

E.

Service Meshes

Question 22

When developing microservices, each one can be developed in the language of choice. Which term describes this type of development? (Choose the best answer.)

Options:

A.

Agile

B.

DevOps

C.

Distributed

D.

Polyglot

Question 23

Which testing measure should be considered when using test cases that simultaneously validate a deployment and perform a selected set of functional tasks?

Options:

A.

Resource Utilization

B.

Functionality

C.

Scalability

D.

Robust Deployment

E.

Resiliency

Question 24

Which concept in OCI Queue is responsible for hiding a message from other consumers for a predefined amount of time after it has been delivered to a consumer?

Options:

A.

Maximum retention period

B.

Visibility timeout

C.

Delivery count

D.

Polling timeout

Question 25

You are developing a polyglot serverless application using Oracle Functions. Which language cannot be used to write your function code?

Options:

A.

PL/SQL

B.

Python

C.

Node.js

D.

Go

E.

Java

Question 26

You have just finished building and compiling the software required to implement the API microservice component. You need to rebuild the API docker image, and plan to tag it as: ocIdevops/api:latest Which docker command would re-create the API docker image?

Options:

A.

docker build -t OCIdevops/api:latest

B.

docker create -t OCIdevops/api:latest

C.

docker image -t OCIdevops/api:latest

D.

docker compile -t OCI devops/api:latest

Question 27

You developed a microservices-based application that runs in an Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) cluster. Your security team wants to use SSL termination for this application. What should you do to create a secure SSL termination for this application using the fewest steps possible?

Options:

A.

Create a self-signed certificate and its corresponding key. Create a Kubernetes secret using the certificate and the key. Then add these annotations to the Kubernetes service: annotations: service.beta.kubernetes.io/oci-load-balancer-ssl-ports: "443" service.beta.kubernetes.io/oci-load-balancer-tls-secret: ssl certificate-secret

B.

Create a self-signed certificate and its corresponding key. Create a Kubernetes secret using the certificate and the key. Then add these annotations to the Kubernetes service: annotations: service.beta.kubernetes.io/oci-load-balancer-ssl-ports: "443" service.beta.kubernetes.io/oci-load-balancer-security-list management-mode: "Frontend"

C.

Add these annotations to the kubernetes service: annotations: service.beta.kubernetes.io/oci-load-balancer-ssl-ports: "443" service.beta.kubernetes.io/oci-load-balancer-ssl-secret-key: ssl secret-key

D.

Generate a self-signed certificate using Let's Encrypt. Use that certificate on OCI Load Balancer. Create the Kubernetes service using this load balancer.

Question 28

Having created a Container Engine for Kubernetes (OKE) cluster, you can use Oracle Cloud Infrastructure (OCI) Logging to view and search the logs of applications running on the worker node compute instances in the cluster. Which task is NOT required to collect and parse application logs? (Choose the best answer.)

Options:

A.

Create a dynamic group with a rule that includes all worker nodes In the cluster.

B.

Set the OCI Logging option to Enabled for the cluster.

C.

Enable monitoring for all worker nodes in the cluster.

D.

Configure a custom log in OCI Logging with the appropriate agent configuration.

Question 29

What can you use to dynamically make Kubernetes resources discoverable to public DNS servers? (Choose the best answer.)

Options:

A.

kubeDNS

B.

DynDNS

C.

CoreDNS

D.

ExternalDNS

Question 30

You have been asked to update an OKE cluster to a network configuration that has the least attack surface while the deployed applications are still directly available for access from the Internet. Which is a valid OKE cluster network configuration that meets this requirement? (Choose the best answer.)

Options:

A.

Private subnets for nodes, the Kubemetes API endpoint, and load balancers

B.

Private subnets for nodes; public subnets for the Kubemetes API endpoint and load balancers

C.

Private subnets for nodes and the Kubemetes API endpoint; public subnets for load balancers

D.

Private subnet for the Kubemetes API endpoint; public subnets for nodes and load balancers

Demo: 30 questions
Total 100 questions