What is a valid option when exporting a custom image?
A. object storage URL
B. archive storage URL
C. file storage service
D. block volume
Which two statements are true about adding secondary VNICs to an existing compute instance? (Choose two.)
A. The primary and secondary VNIC association must be in the same availability domain
B. You can assign an Ephemeral Public IP to a secondary VNIC
C. You can remove the primary VNIC after the secondary VNIC's attachment is complete
D. The primary and secondary VNIC association can be in different virtual cloud networks (VCNs)
You want an Oracle Cloud Infrastructure (OCI) compute instance in your compartment to make API calls to
other services within OCI without storing credentials in a configuration file.
What do you need to do?
A. Create a dynamic group with appropriate matching rules to include the instance, and reference this group in your IAM policy statement
B. Instances cannot access services outside their compartment
C. VM instances are treated as users. Create a user, assign the user to that VM instance, and reference the instance in your Identity and Access Management (IAM) policy statement
D. By default, all VM instances are created with an instance principal. Reference this instance principal in your IAM policy statement
You have an application server that needs to copy data on Oracle Cloud Infrastrucutre (OCI) object storage in the same region. You have created a service gateway for OCI object storage in your virtual cloud network (VCN) and modified security lists associated with the subnet to allow traffic to the service gateway. You are able to connect to the OCI object storage, however, you notice that the connectivity is over the Internet instead of the service gateway. What is the reason for this behavior?
A. The route table associated with the subnet has no route rule where the destination is object storage service
B. The service gateway created in the VCN resides in a different availability domain
C. The security list associated with the subnet has an egress rule that allows all traffic to be forwarded to a destination CIDR 0.0.0.0/0
D. Identity and Access Management (IAM) policies restrict the access to the object storage bucket
Which two Oracle Cloud Infrastructure database services allow you to dynamically scale CPU and storage? (Choose two.)
A. bare metal DB system
B. virtual machine DB system
C. Autonomous Data Warehouse (ADW)
D. Autonomous Transaction Processing (ATP)
Which two are required parameters to create a public load balancer instance? (Choose two.)
A. certificate
B. load balancer name
C. listener
D. back end set
E. two public subnets
You had an outage in your application caused by the loss of a shared volume provisioned by File Storage Service (FSS). At this point, you need to restore the data from a snapshot you created of the FSS. What are the steps to restore the data?
A. Access the directory where the shared volume is mounted, then cd into .snapshot folder, find the snapshot folder you want to recover and use cp or rsync tool to copy the files to the original location.
B. Open OCI Console, select File Storage Service, find the shared storage, then click on snapshot and restore.
C. Open OCI Console, select File Storage Service, find the snapshot you created and click restore.
D. Access the directory, where you mounted the shared volume, then cd into .snapshot folder and find the snapshot folder you want to recover and rename that folder to the original folder name.
Which storage service is used on OCI for a Data Transfer Service job?
A. An instance with enough storage to accommodate the job
B. An object bucket
C. A File System service instance
D. Block Volume
Which two statements are true about policies?
A. You can use read, write, manage, and inspect as verbs for defining a policy.
B. A policy is a document that specifies who can access which Oracle Cloud Infrastructure resources that your company has, and how.
C. Users need not do anything but still have to be added to a group with appropriate policies defined.
D. You can deny access to a group via policies.
Which two statements about the Oracle File Storage Service (FSS) Security are accurate? (Choose two.)
A. Oracle IAM controls which filesystems are mountable by which instances.
B. Security lists can be used as a virtual firewall to prevent an instance from mounting an FSS mount target within a subnet.
C. Encryption of file storage in FSS is optional.
D. Data in transit to an FSS mount target is encrypted.
E. FSS leverages UNIX user group and permission checking for file access security.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Oracle exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Z0-932 exam preparations and Oracle certification application, do not hesitate to visit our Vcedump.com to find your solutions here.