Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Oracle 1z0-1124-25 Oracle Cloud Infrastructure 2025 Networking Professional Exam Practice Test

Demo: 36 questions
Total 120 questions

Oracle Cloud Infrastructure 2025 Networking Professional Questions and Answers

Question 1

You are designing an OCI VCN for a new application with the following requirements: The application servers in a private subnet must be able to download software updates from public repositories on the internet; the application servers must NOT be directly accessible from the public internet; the application servers must also be able to access Oracle Cloud Infrastructure Registry (OCIR) within the same region to pull container images. Which combination of VCN Gateways BEST meets these requirements?

Options:

A.

Internet Gateway and Service Gateway

B.

NAT Gateway and Internet Gateway

C.

NAT Gateway and Service Gateway

D.

Dynamic Routing Gateway (DRG) and Internet Gateway

Question 2

When setting up cross-tenancy VCN peering using Local Peering Gateways (LPGs), which IAM permission is required in the target tenancy to accept the peering request?

Options:

A.

Allow group to manage local-peering-gateways in tenancy=

B.

Allow group to use local-peering-gateways in tenancy=

C.

Allow group to inspect local-peering-gateways in tenancy=

D.

Allow group to read virtual-network-family in tenancy=

Question 3

You are designing a solution to implement IPSec encryption over a FastConnect circuit between your on-premises network and OCI. You are concerned about the overhead of IPSec impacting themaximum MTU (Maximum Transmission Unit) size that can be supported. What is the most important factor to consider when determining the MTU size for the IPSec tunnel interfaces in this scenario?

Options:

A.

The available bandwidth of the FastConnect circuit. A larger MTU requires a higher bandwidth connection.

B.

The smallest MTU supported by any device along the entire network path between your on-premises network and OCI, including the FastConnect provider's network.

C.

The MTU size of the underlying Ethernet frames used by the FastConnect circuit.

D.

The fragmentation settings on the DRG in OCI.

Question 4

Your security policy mandates that all communication between your compute instances in a private subnet and OCI Object Storage must be authenticated and authorized using IAM policies and not rely on public IP addresses. Which OCI networking feature is the most appropriate to satisfy this requirement?

Options:

A.

Public Subnet with an Internet Gateway and IAM rules.

B.

Private Subnet with a NAT Gateway and IAM rules.

C.

Private Subnet with a Service Gateway and IAM rules.

D.

Public Subnet with a Network Firewall and IAM rules.

Question 5

You are deploying a three-tier web application using Infrastructure as Code (IaC) and Oracle Kubernetes Engine (OKE) within a single VCN. The application consists of a public-facing web tier (running in OKE), an application tier, and a database tier. You want to ensure that only the web tier can access the application tier, and only the application tier can access the database tier. You are leveraging Network Security Groups (NSGs) for granular access control. Your IaC code successfully creates all the components, but you are experiencing connectivity issues. Specifically, Pods in the web tier cannot reach the application tier. Reviewing your IaC configuration, you realize the NSG assignments for the OKE cluster's node pool are misconfigured. Which of the following NSG configuration errors would most likely cause this connectivity issue?

Options:

A.

The NSG associated with the OKE node pool (web tier) allows ingress traffic from 0.0.0.0/0 on port 80, but egress traffic to the application tier's NSG is missing a rule allowing TCP traffic on port 8080 (the port the application tier is listening on).

B.

The NSG associated with the OKE node pool (web tier) is missing an ingress rule allowing traffic from the VCN CIDR on port 443. This is causing a routing problem within the VCN.

C.

The NSG associated with the application tier allows ingress traffic from the VCN CIDR, but the NSG associated with the OKE node pool (web tier) has no ingress rules at all. Therefore, the OKE nodes are not reachable.

D.

The NSG associated with the OKE node pool (web tier) only allows egress traffic to the internet and does not have a rule permitting egress traffic to the application tier's NSG on the required port (8080).

Question 6

In a multi-tier application architecture with separate public and private subnets, where should an OCI Bastion host be placed to provide secure access to resources in the private subnets without exposing them to the internet?

Options:

A.

Directly in the private subnet.

B.

In a dedicated public subnet specifically for Bastion hosts.

C.

In a separate VCN peered with the application VCN.

D.

Behind an Internet Gateway in the public subnet.

Question 7

You're automating the creation of multiple VCNs across different OCI regions using Cloud Shell scripting. Which authentication method within Cloud Shell is best suited to programmatically authenticate with OCI, ensuring both security and scalability for this automation task?

Options:

A.

Using the default Cloud Shell user and configuring the OCI CLI with API keys in a shell script.

B.

Creating a dedicated IAM user for automation, generating API keys, storing the keys securely in Cloud Shell’s persistent storage, and using them in the scripts.

C.

Leverage Instance Principals in conjunction with a dynamic group that includes your Cloud Shell session.

D.

Using Resource Manager stack with Terraform to provision network resources including cross-region configurations, leveraging OCI Vault to handle the sensitive credentials used in Terraform scripts.

Question 8

You have deployed an application on OCI that uses a Regional Load Balancer with an HTTPS listener. You want to enforce end-to-end encryption and ensure that the connection between the load balancer and the backend servers is also encrypted. Which load balancer configuration step is MANDATORY to achieve this?

Options:

A.

Upload the SSL certificate to the load balancer’s listener and configure the backend set protocol to HTTP.

B.

Upload the SSL certificate to the load balancer’s listener and configure the backend set protocol to HTTPS, uploading the appropriate certificate to the instances.

C.

Upload the SSL certificate only to the backend servers, as the load balancer automatically proxies the traffic.

D.

Configure the load balancer to use TCP proxy protocol to forward traffic directly to the backend servers without SSL termination.

Question 9

Your organization requires that all backups of critical application data stored in OCI Object Storage from an instance within a private subnet must remain within the Oracle Cloud Infrastructure network and not traverse the public internet. Which OCI networking component should you configure to enable this secure and private access to Object Storage?

Options:

A.

Internet Gateway

B.

NAT Gateway

C.

Service Gateway

D.

Network Firewall

Question 10

A company has deployed a VCN in OCI with multiple subnets. Security requirements dictate that instances in different subnets within the same VCN should not be able to directly communicate with each other unless explicitly permitted. You are tasked with implementing this policy. What is the most appropriate approach to meet this requirement?

Options:

A.

Remove the default route rule in the VCN's route table that allows traffic between subnets.

B.

Create separate VCNs for each subnet.

C.

Configure network security groups (NSGs) for each subnet, defining strict ingress and egress rules that only allow the necessary traffic.

D.

Configure a stateful firewall in front of the VCN and configure the rules to deny inter-subnet traffic.

Question 11

As a network security engineer, you are tasked with designing a highly secure architecture for a financial application running on OCI. You have deployed a Network Firewall to protect the application’s VCN. Due to regulatory compliance requirements, you need to ensure that no direct internet access is allowed to any compute instance within the application’s private subnet, even if it is misconfigured. You need to block all outbound traffic to the internet. Which Network Firewall rule action best accomplishes this goal?

Options:

A.

ALLOW with Destination IP address set to 0.0.0.0/0.

B.

DROP with Destination IP address set to the NAT Gateway IP address.

C.

REJECT with Destination IP address set to 0.0.0.0/0.

D.

ALLOW with Destination IP address set to the Service Gateway IP address.

Question 12

When migrating workloads requiring high availability and redundancy for on-premises connectivity to OCI, which approach is recommended?

Options:

A.

Single FastConnect connection

B.

Site-to-Site VPN over a single internet connection

C.

Dual FastConnect connections with diverse paths

D.

Internet Gateway with multiple public IPs

Question 13

You are designing a highly available application that requires low latency communication between OCI regions. You have two VCNs, VCN-A in Region 1 and VCN-B in Region 2. These VCNs have non-overlapping CIDR blocks and you want to establish a private, direct connection between them for optimal performance. Which of the following steps are necessary to establish this cross-region connectivity using the native OCI networking capabilities?

Options:

A.

Create a Remote Peering Connection (RPC) in each VCN, establish the peering, and update the route tables in each VCN to route traffic to the peer VCN’s CIDR block through the RPC.

B.

Configure an IPSec VPN tunnel between the VCNs and update the route tables in each VCN to route traffic to the peer VCN’s CIDR block through the IPSec VPN tunnel.

C.

Create a Service Gateway in each VCN, and configure a Dynamic Routing Gateway (DRG) toroute traffic between the Service Gateways.

D.

Create a NAT Gateway in each VCN and configure route rules to route traffic to the other NAT Gateway’s public IP address.

Question 14

When configuring a network appliance within a VCN to enable transitive routing, which of the following is essential to ensure traffic flows correctly between interconnected VCNs?

Options:

A.

Attaching the network appliance to a Service Gateway.

B.

Configuring static routes on the DRG route tables pointing to the network appliance's private IP address.

C.

Implementing a Load Balancer in front of the network appliance.

D.

Using a Local Peering Gateway (LPG) to connect the network appliance to the DRG.

Question 15

Your company is utilizing a multi-cloud architecture with applications running on both OCI and AWS. You have established a Site-to-Site VPN connection between OCI and AWS for secure communication. Over time, you observe that the VPN tunnel becomes unstable and frequently disconnects, particularly during peak hours. You suspect this is due to increased network latency and packet loss. Which action is least likely to improve the stability and reliability of your OCI-AWS Site-to-Site VPN connection in this scenario?

Options:

A.

Adjust the IKE (Internet Key Exchange) and IPSec parameters, such as rekeying intervals and encryption algorithms, to optimize performance.

B.

Implement Quality of Service (QoS) on both the OCI and AWS VPN gateways to prioritize VPN traffic.

C.

Increase the MTU (Maximum Transmission Unit) size on the VPN tunnel interfaces to reduce fragmentation.

D.

Transition from a Site-to-Site VPN to a dedicated interconnect solution (e.g., FastConnect with a partner to AWS) for higher bandwidth and lower latency.

Question 16

You are troubleshooting a network connectivity issue between a compute instance in a private subnet within your VCN and a service on the public internet using Cloud Shell. You suspect a problem with the network security group (NSG) rules associated with the instance's VNIC. Which Cloud Shell command and appropriate tool combination allows you to directly inspect the NSG configuration impacting the VNIC?

Options:

A.

oci network network-security-group get --nsg-id piped to grep

B.

oci compute instance get --instance-id piped to jq '.vnics[].nic_id | oci network vnic get --vnic-id .' piped to jq '.network_security_group_ids[] | oci network network-security-group get --nsg-id .'

C.

oci compute instance get --instance-id piped to grep NetworkSecurityGroupIds

D.

oci network vnic get --vnic-id piped to awk '/network_security_group_ids/ {print $2}' | xargs oci network network-security-group get --nsg-id

Question 17

Which OCI service provides detailed logs for network traffic traversing a Network Load Balancer, offering insights into client connections and backend health checks?

Options:

A.

Flow Logs

B.

Service Logs

C.

Load Balancer Logs

D.

Audit Logs

Question 18

You are managing a critical application hosted on OCI. To enhance security, you have enabled DNSSEC for your domain using OCI DNS. You want to automate the process of monitoring the health and validity of your DNSSEC configuration and receive alerts if any issues are detected. Which OCI service can be MOST effectively used for this DNSSEC monitoring purpose?

Options:

A.

OCI Vulnerability Scanning Service.

B.

OCI Monitoring Service.

C.

OCI Audit Service.

D.

OCI Logging Analytics.

Question 19

You are designing a multi-tier application in OCI, deploying the application tier in a public subnet and the database tier in a private subnet within the same VCN. The application tier requires access to specific external internet resources for software updates and third-party API calls. However, the database tier should not have direct internet access. Which of the following is the most secure and efficient method to achieve this configuration?

Options:

A.

Configure a NAT Gateway for the private subnet and a Service Gateway for the public subnet.

B.

Configure a NAT Gateway for both the public and private subnets.

C.

Configure a NAT Gateway for the public subnet and a Service Gateway for the private subnet.

D.

Configure a NAT Gateway for the private subnet and an Internet Gateway for the public subnet.

Question 20

You are designing a hybrid cloud environment where multiple VCNs in OCI need to communicate with your on-premises network. You are using a single Dynamic Routing Gateway (DRG) to connect to your on-premises network via FastConnect. You want to ensure that each VCN is isolated from the others and that traffic between VCNs must pass through your on-premises security appliances for inspection. How should you configure the DRG attachments and route tables to enforce this security policy?

Options:

A.

Attach all VCNs and the FastConnect to the DRG. Configure the DRG route table associated with each VCN attachment to route all traffic destined for other VCNs to the FastConnect attachment. Configure the FastConnect DRG route table to route traffic destined to each VCN to the corresponding VCN attachment.

B.

Attach all VCNs and the FastConnect to the DRG. Configure static routes on each VCN's route table pointing to the DRG for any subnet not within the VCN. Enable the "Transit Routing" feature on the DRG to allow inter-VCN communication.

C.

Attach each VCN directly to the FastConnect using IPSec VPN tunnels, bypassing the DRG entirely to ensure all traffic flows through the on-premises security appliances.

D.

Attach each VCN to the DRG using a Local Peering Gateway (LPG) and then attach one VCN to FastConnect. Configure routes so that traffic traverses from LPG to LPG through the on-premises network.

Question 21

You are responsible for managing the network infrastructure of a multi-tenant SaaS application deployed on OCI. Each tenant has their own dedicated VCN. To simplify management and provide a centralized point for connectivity to your on-premises network via FastConnect, you are using a DRG. However, you need to ensure that tenants are logically isolated from each other, and no traffic can flow directly between tenant VCNs through the DRG. How can you achieve tenant isolation while still allowing each tenant to connect to your on-premises network through the centralized DRG?

Options:

A.

Create a separate DRG for each tenant and attach the respective tenant VCN to its DRG. Configure static routes on each DRG to direct traffic appropriately.

B.

Utilize a single DRG and attach all tenant VCNs to it. Implement Network Security Groups (NSGs) on each tenant VCN to explicitly block all traffic to and from other tenant VCNs.

C.

Utilize a single DRG and attach all tenant VCNs to it. For each VCN attachment, use a DRG route table that only contains a route to the FastConnect attachment. Do not include any routes to other VCN attachments in any DRG route table.

D.

Utilize a single DRG and attach all tenant VCNs to it. Create a separate compartment for each tenant VCN. This will automatically isolate tenant traffic at the DRG level.

Question 22

You are implementing IPSec over FastConnect to connect to a third-party network that is also connected to OCI via FastConnect. Your company requires a high level of security and isolation between your network and the third-party’s network. Which of the following is the MOST secure approach to ensure network isolation when implementing IPSec over FastConnect in this scenario?

Options:

A.

Implement IPSec tunnels between your on-premises network and the third-party’s on-premises network, bypassing OCI.

B.

Use OCI Network Security Groups (NSGs) or security lists to strictly control traffic between your VCN and the third-party’s VCN.

C.

Utilize a third-party virtual firewall appliance deployed in OCI and configure IPSec tunnels through the firewall to both your on-premises network and the third-party’s network.

D.

Enable flow logs to monitor the traffic that is transmitted.

Question 23

You are working as an OCI Network Specialist. Your company is migrating its on-premises IPv6 network to OCI. As part of the migration, you need to enable communication between the on-premises network and a VCN in OCI using FastConnect. Your company utilizes global unicast IPv6 addresses on-premises and wants to continue utilizing those addresses in OCI. However, you have a restriction that compute instance traffic must be limited to IPv6 only. After assigning IPv6 addresses from the prefix to the instance, they cannot ping external IPv6 addresses. What configuration most likely addresses this issue?

Options:

A.

You can’t use your own IPv6 address space in OCI. You must use OCI’s provided ULA.

B.

Ensure that there are IPv6 default routes (::/0) pointing to a NAT Gateway in your VCN route tables.

C.

Ensure that there is an Internet Gateway (IGW) attached to the VCN with a default route (::/0) in your subnet route table.

D.

Ensure that there is a Service Gateway attached to the VCN with a default route (::/0) in your subnet route table.

Question 24

In a multi-region OCI environment, which configuration is necessary to allow communication between two VCNs located in different regions through a DRG?

Options:

A.

Attaching an LPG to each VCN and configuring route tables to peer them directly.

B.

Attaching a Service Gateway to each VCN and enabling transitive routing.

C.

Attaching each VCN to the same DRG and configuring the appropriate route tables on the DRG.

D.

Configuring Internet Gateways on each VCN and using public IP addresses for communication.

Question 25

Your company uses OCI Certificates to manage SSL/TLS certificates for its public-facing applications. You need to implement a solution that automatically renews these certificates before they expire to avoid service disruptions. Which OCI Certificates feature or configuration best achieves this?

Options:

A.

Manually renew the certificates through the OCI Console before their expiration date.

B.

Enable "Automatic Renewal" option within the OCI Certificates service and ensure DNS validation is properly configured.

C.

Use OCI Vault to store the certificates and manually renew them using the Vault API.

D.

There is no automatic renewal feature in OCI Certificates; manual renewal is always required.

Question 26

In a Zero Trust network architecture, what is the primary purpose of implementing micro-segmentation within OCI VCNs?

Options:

A.

To increase network bandwidth.

B.

To reduce the number of required route tables.

C.

To limit the blast radius of potential security breaches.

D.

To simplify inter-region connectivity.

Question 27

Your organization is migrating a critical three-tier application to OCI. The application requires a highly available and performant database tier. You plan to use Oracle Autonomous Database on Dedicated Exadata Infrastructure. The Autonomous Database subnet must adhere to the organization's security policy, which mandates no direct internet access and private access to other VCN subnets. You need to ensure the proper IP address allocation and routing. Which of the following procedural steps is most effective for achieving this?

Options:

A.

Create a public subnet for the Autonomous Database and configure a Service Gateway with access to all Oracle Services in OCI. Configure NSG rules allowing only traffic from the application's compute instances.

B.

Create a private subnet for the Autonomous Database and configure a Service Gateway with access to only Object Storage and Yum Server Oracle Services in OCI. Configure NSG rules allowing only traffic from the application's compute instances, and configure routing to a Dynamic Routing Gateway (DRG) for access to other VCN subnets.

C.

Create a private subnet for the Autonomous Database and configure a Service Gateway with access to Autonomous Database Oracle Services in OCI. Configure NSG rules allowing only traffic from the application's compute instances, and configure routing to a Dynamic Routing Gateway (DRG) for access to other VCN subnets. Reserve a large CIDR block for future database expansion.

D.

Create a public subnet for the Autonomous Database, assign it a public IP address, and configure a Service Gateway with access to all Oracle Services in OCI. Configure routing to an Internet Gateway. Secure access using Security Lists allowing traffic only from approved IP ranges.

Question 28

You are designing an OCI networking architecture for a multi-tier application using Infrastructure as Code (IaC). The architecture includes an OKE cluster for the front-end, a set of Compute instances for the back-end, and an Autonomous Database. You want to ensure that all traffic between these components is encrypted. You are using Transport Layer Security (TLS) for end-to-end encryption but are concerned about the overhead of encrypting all traffic within the VCN. Which approach provides the MOST balanced approach to security and performance, minimizing the overhead of encryption while still protecting sensitive data?

Options:

A.

Implement TLS encryption only between the OKE cluster and the load balancer. Rely on the inherent security of the OCI network for traffic within the VCN.

B.

Implement mutual TLS (mTLS) for all traffic between the OKE cluster, the Compute instances, and the Autonomous Database.

C.

Use Network Security Groups (NSGs) and Security Lists to control access between components but do not implement any additional encryption within the VCN.

D.

Implement TLS encryption for traffic between the OKE cluster and the Compute instances and use Oracle Database Vault to encrypt data at rest and in transit for the Autonomous Database.

Question 29

When migrating workloads to OCI requiring consistent, high-bandwidth connections with minimal latency, and your on-premises data center has direct fiber connectivity, which OCI service is most suitable?

Options:

A.

Site-to-Site VPN

B.

Internet Gateway

C.

FastConnect Colocation with Oracle

D.

Dynamic Routing Gateway (DRG) with remote peering

Question 30

You are managing a Site-to-Site VPN connection between your on-premises network and OCI. You notice that the VPN tunnel is frequently dropping and re-establishing. You have verified the internet connectivity at both ends and confirmed that the IKE (Internet Key Exchange) parameters are correctly configured. Which of the following is the most likely cause of the intermittent VPN tunnel disconnections?

Options:

A.

The on-premises Customer-Premises Equipment (CPE) is configured with an incorrect public IP address.

B.

The OCI Dynamic Routing Gateway (DRG) is experiencing a temporary outage.

C.

There is a misconfiguration in the security rules, blocking the IKE or ESP (Encapsulating Security Payload) traffic.

D.

The on-premises firewall is configured with incorrect NAT-Traversal settings.

Question 31

You have configured DNSSEC for your domain hosted on OCI DNS. You understand the importance of regularly rotating your Key Signing Key (KSK) to maintain security best practices. Which of the following statements regarding KSK rotation in OCI DNS is TRUE?

Options:

A.

KSK rotation is a fully automated process managed by OCI DNS and requires no manual intervention.

B.

You must manually generate a new KSK and ZSK pair and upload them to OCI DNS to initiate a KSK rotation.

C.

KSK rotation in OCI DNS involves enabling a "KSK Rollover" feature, which automatically handles the key rotation process while minimizing disruption to DNS resolution.

D.

KSK rotation is not supported in OCI DNS; you must migrate your DNS zone to another provider if you require KSK rotation.

Question 32

When analyzing Flow Logs for a subnet, how can you filter logs to isolate traffic that was rejected due to a specific security list rule?

Options:

A.

By filtering on the "action" field with the value "REJECT" and the "securityListRule" field with the rule ID

B.

By filtering on the "status" field with the value "DENIED" and the "securityRule" field with the rule name

C.

By filtering on the "direction" field with the value "EGRESS" and the "port" field with the rule port

D.

By filtering on the "type" field with the value "SECURITY" and the "rule" field with the rule number

Question 33

Which aspect of OCI’s security framework is essential for continuous monitoring and verification of packet flows, a core requirement of Zero Trust Packet Routing?

Options:

A.

Static routing configurations

B.

Default security lists

C.

Flow logs and audit trails

D.

Public IP address assignments

Question 34

Your company utilizes a hybrid cloud architecture, connecting its on-premises network to an OCIVCN using a FastConnect private peering connection. You need to ensure that instances within a specific subnet in the VCN can only communicate with resources in a designated IP address range within the on-premises network. What is the MOST effective way to achieve this specific network isolation?

Options:

A.

Configure an Internet Gateway for the subnet with a route rule to the on-premises network.

B.

Modify the VCN’s default security list to restrict traffic to the on-premises IP address range.

C.

Create a custom route table for the subnet with a route rule pointing to the Dynamic Routing Gateway (DRG) and configure network security groups (NSGs) to limit traffic to the specified on-premises IP address range.

D.

Configure a Local Peering Gateway (LPG) for the subnet to route traffic to the on-premises network.

Question 35

Your company is migrating an on-premises application to OCI. The application requires direct, low-latency access to an on-premises Microsoft SQL Server database. You’ve established a FastConnect connection between your on-premises network and an OCI VCN via a Dynamic Routing Gateway(DRG). You want to access this database from the OCI VCN. Which type of endpoint, in conjunction with appropriate routing, should you use to facilitate this connection?

Options:

A.

An Internet Gateway with a public endpoint on the SQL Server.

B.

A Service Gateway configured to access the on-premises SQL Server.

C.

No specific OCI endpoint is required. The on-premises SQL Server is accessed directly through the DRG and appropriate routing.

D.

A Private Endpoint within the VCN configured to connect to the private IP address of the on-premises SQL Server.

Question 36

In a multi-tier application environment with geographically dispersed teams requiring access to private resources, how can an OCI Bastion service be optimized to reduce latency for remote users?

Options:

A.

Deploying a single Bastion host in the primary application region.

B.

Implementing Bastion hosts in multiple regions closer to user locations.

C.

Using dynamic port forwarding to allow direct connections to private resources.

D.

Configuring a Bastion service with a public load balancer.

Demo: 36 questions
Total 120 questions