<< Prev Question Next Question >>

Question 23/77

Challenge 1 - Task 2 of 5
Authorize OCI Resources to Retrieve the Secret from the Vault
Scenario
You are working on a Python program running on a compute instance that needs to access an external service. To access the external service, the program needs credentials (password). Given that it is not a good security practice, you decide not to hard code the credential in the program. Instead, you store the password (secret) in a vault using the OCI Vault service. The requirement now is to authorize the compute instance so that the Python program can retrieve the password (secret) by making an API call to the OCI Vault.

Preconfigured:
To complete this requirement, you are provided with:
An OCI Vault to store the secret required by the program, which is created in the root compartment as PBT_Vault_SP.
An instance principal IAM service, which enables instances to be authorized actors (principals) that can retrieve the secret from the OCI Vault.
A dynamic group named PBT_Dynamic_Group_SP with permissions to access the OCI Vault. This dynamic group includes all of the instances in your compartment.
Access to Cloud Shell.
Permissions to perform only the tasks within the challenge.
Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99234021-C01 and Region us-ashburn-1.
Complete the following task:
In the field below, write the IAM policy, which allows a program running on a computer instance (principal instance) to retrieve a secret from the OCI Vault.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (77q)
Question 1: Which two reasons would a crytpo admin have to select the Vi...
Question 2: As a cloud network administrator, you have been tasked with ...
Question 3: Your company has implemented a new VPN connection policy, th...
Question 4: In Oracle Cloud Infrastructure (OCI) Secret management withi...
Question 5: Cloud Guard detected a risk score of zeroin the dashboard, w...
Question 6: Which OCI cloud service lets you centrally manage the encryp...
Question 7: What is the use case for Oracle Cloud Infrastructure (OCI) L...
Question 8: Which security issue CANNOT be identified using the Oracle C...
Question 9: An HTTP Web Server hosted on an Oracle Cloud Infrastructure ...
Question 10: What are the two items required to create a rule for the Ora...
Question 11: Which value must an application have to retrieve a secret bu...
Question 12: Which are the three rules of engagement that apply to cloud ...
Question 13: How can you restrict access to OCI console from unknown IP a...
Question 14: A company has OCI tenancy which has mount target associated ...
Question 15: "Jazz Clothing" is an e-commerce company that wants to secur...
Question 16: your company has hired a consulting firm to audit your oracl...
Question 17: You are the first responder of a security incident for ABC O...
Question 18: You have three compartments: ProjectA, ProjectB, and Project...
Question 19: which three resources are required to encrypt a block volume...
Question 20: You need to set up instance principals so that an applicatio...
Question 21: Oracle Object Storage achieves data durability by which of t...
Question 22: For how long are API calls audited and available?...
Question 23: Challenge 1 - Task 2 of 5 Authorize OCI Resources to Retriev...
Question 24: What does the following identity policy do? Allow group my-g...
Question 25: Challenge 1 - Task 1 of 5 Authorize OCI Resources to Retriev...
Question 26: In your Oracle Cloud Infrastructure environment you have cre...
Question 27: Hardware Security Modules (HSMs) in Oracle Key Management me...
Question 28: How do you enable server-side encryption in an Oracle Cloud ...
Question 29: Which three Oracle Cloud Infrastructure (OCI) services are c...
Question 30: You subscribe to a PaaS service that follows the Shared Resp...
Question 31: Which Cloud Guard component identifies issues with resources...
Question 32: You are using a custom application with third-party APIs to ...
Question 33: A customer has multiple virtual machines in a subnet that re...
Question 34: Which is NOT a part of Observability and Management Services...
Question 35: Which two Cloud Guard tasks can be configured using API or C...
Question 36: Which OCI service canindex, enrich, aggregate, explore, sear...
Question 37: A company plans to use Oracle Cloud services for their produ...
Question 38: What information do youget by using the Network Visualizer t...
Question 39: In which two ways can you improve data durability in Oracle ...
Question 40: You are tasked with building a highly available, fault toler...
Question 41: Which is NOT a compliance document?...
Question 42: Which tasks can you perform on a dedicated virtual machine h...
Question 43: As a security administrator, you found out that there are us...
Question 44: Challenge 4 - Task 4 of 6 Configure Web Application Firewall...
Question 45: An e-commerce company needs to authenticate with third-party...
Question 46: You are a cloud Security administrator for a company. You ar...
Question 47: Bot Management in OCI provides which of the features? Select...
Question 48: As a security administrator, you want to create cloud resour...
Question 49: Which architecture is based on the principle of "never trust...
Question 50: Challenge 3 - Task 1 of 4 Set Up a Bastion Host to Access th...
Question 51: When configuring inter-tenancy virtual cloud network (VCN) p...
Question 52: How can you limit access to an Oracle Cloud Infrastructure (...
Question 53: Which statements are CORRECT about Security Zone policy in O...
Question 54: Which Oracle Data Safe feature minimizes the amount of perso...
Question 55: Where is sensitive configuration data (like certificates, an...
Question 56: When configuring inter-tenancy virtual cloud network (VCN) p...
Question 57: Which Oracle Cloud Service provides restricted accessto targ...
Question 58: In which two ways can you improve data durability in Oracle ...
Question 59: Which statement is true about Oracle Cloud Infrastructure (O...
Question 60: A company, ABC, is planning to launch a new web application ...
Question 61: Challenge 4 - Task 1 of 6 Configure Web Application Firewall...
Question 62: A number of malicious requests for a web application is comi...
Question 63: How can you establish private connectivity over two VCN with...
Question 64: When creating an OCI Vault, which factors may lead to select...
Question 65: Challenge 2 Least-Privileged Model Enforcement Leveraging Cu...
Question 66: When using Management Agent to collect logs continuously, wh...
Question 67: Which of the following services are NOT Security Services in...
Question 68: You are a security administrator for your company's Oracle C...
Question 69: You want to include all instances in any of two or morecompa...
Question 70: what is the use case for Oracle cloudinfrastructure logging ...
Question 71: What is a prerequisite for creating a secret in OCI Vault? (...
Question 72: Which solution enables you to privately connect two Virtual ...
Question 73: What are Virtual Cloud Network (VCN) flow logs record detail...
Question 74: You configured the events service for your Cloud Guard probl...
Question 75: Which securityissues can be identified by Oracle Vulnerabili...
Question 76: A company has OCI tenancy which has mount target associated ...
Question 77: A programmer is developing a Node.js application which will ...