<< Prev Question Next Question >>

Question 65/77

Challenge 2
Least-Privileged Model Enforcement Leveraging Custom Security Zones
Scenario
In deploying a new application, a cloud customer needs to reflect different security postures. If a security zone is enabled with the Maximum Security Zone recipe, the customer will be unable to create or update a resource in the Security Zone if the action violates the attached Maximum Security Zone policy.
As an application requirement, the customer requires a compute instance in the public subnet. You, therefore, need to configure Custom Security Zones that allow the creation of compute instances in the public subnet.
To complete this deployment, you have to perform the following tasks in the environment provisioned for you:
* Create a Custom Security Zone recipe to allow compute instances in the public subnet.
* Create a Security Zone using the Custom Security Zone recipe.
* Configure a Virtual Cloud Network (VCN) and Public Subnet.
* Provision a Compute Instance in the public subnet.

Note: You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99234021-C01 and Region us-ashburn-1 Complete the following tasks in the provisioned OCI environment:
Create a Custom Recipe with the name
Create a Security Zone with the name
Create a VCN with the name IAD-SP-PBT-VCN-01
Create a Public Subnet with the name IAD-SP-PBT-PUBSNET-01
Create a Compute Instance with the name IAD-SP-PBT-1-VM-01, using the "Oracle Linux 8" image and "VM.Standard2.1" as shape

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (77q)
Question 1: Which two reasons would a crytpo admin have to select the Vi...
Question 2: As a cloud network administrator, you have been tasked with ...
Question 3: Your company has implemented a new VPN connection policy, th...
Question 4: In Oracle Cloud Infrastructure (OCI) Secret management withi...
Question 5: Cloud Guard detected a risk score of zeroin the dashboard, w...
Question 6: Which OCI cloud service lets you centrally manage the encryp...
Question 7: What is the use case for Oracle Cloud Infrastructure (OCI) L...
Question 8: Which security issue CANNOT be identified using the Oracle C...
Question 9: An HTTP Web Server hosted on an Oracle Cloud Infrastructure ...
Question 10: What are the two items required to create a rule for the Ora...
Question 11: Which value must an application have to retrieve a secret bu...
Question 12: Which are the three rules of engagement that apply to cloud ...
Question 13: How can you restrict access to OCI console from unknown IP a...
Question 14: A company has OCI tenancy which has mount target associated ...
Question 15: "Jazz Clothing" is an e-commerce company that wants to secur...
Question 16: your company has hired a consulting firm to audit your oracl...
Question 17: You are the first responder of a security incident for ABC O...
Question 18: You have three compartments: ProjectA, ProjectB, and Project...
Question 19: which three resources are required to encrypt a block volume...
Question 20: You need to set up instance principals so that an applicatio...
Question 21: Oracle Object Storage achieves data durability by which of t...
Question 22: For how long are API calls audited and available?...
Question 23: Challenge 1 - Task 2 of 5 Authorize OCI Resources to Retriev...
Question 24: What does the following identity policy do? Allow group my-g...
Question 25: Challenge 1 - Task 1 of 5 Authorize OCI Resources to Retriev...
Question 26: In your Oracle Cloud Infrastructure environment you have cre...
Question 27: Hardware Security Modules (HSMs) in Oracle Key Management me...
Question 28: How do you enable server-side encryption in an Oracle Cloud ...
Question 29: Which three Oracle Cloud Infrastructure (OCI) services are c...
Question 30: You subscribe to a PaaS service that follows the Shared Resp...
Question 31: Which Cloud Guard component identifies issues with resources...
Question 32: You are using a custom application with third-party APIs to ...
Question 33: A customer has multiple virtual machines in a subnet that re...
Question 34: Which is NOT a part of Observability and Management Services...
Question 35: Which two Cloud Guard tasks can be configured using API or C...
Question 36: Which OCI service canindex, enrich, aggregate, explore, sear...
Question 37: A company plans to use Oracle Cloud services for their produ...
Question 38: What information do youget by using the Network Visualizer t...
Question 39: In which two ways can you improve data durability in Oracle ...
Question 40: You are tasked with building a highly available, fault toler...
Question 41: Which is NOT a compliance document?...
Question 42: Which tasks can you perform on a dedicated virtual machine h...
Question 43: As a security administrator, you found out that there are us...
Question 44: Challenge 4 - Task 4 of 6 Configure Web Application Firewall...
Question 45: An e-commerce company needs to authenticate with third-party...
Question 46: You are a cloud Security administrator for a company. You ar...
Question 47: Bot Management in OCI provides which of the features? Select...
Question 48: As a security administrator, you want to create cloud resour...
Question 49: Which architecture is based on the principle of "never trust...
Question 50: Challenge 3 - Task 1 of 4 Set Up a Bastion Host to Access th...
Question 51: When configuring inter-tenancy virtual cloud network (VCN) p...
Question 52: How can you limit access to an Oracle Cloud Infrastructure (...
Question 53: Which statements are CORRECT about Security Zone policy in O...
Question 54: Which Oracle Data Safe feature minimizes the amount of perso...
Question 55: Where is sensitive configuration data (like certificates, an...
Question 56: When configuring inter-tenancy virtual cloud network (VCN) p...
Question 57: Which Oracle Cloud Service provides restricted accessto targ...
Question 58: In which two ways can you improve data durability in Oracle ...
Question 59: Which statement is true about Oracle Cloud Infrastructure (O...
Question 60: A company, ABC, is planning to launch a new web application ...
Question 61: Challenge 4 - Task 1 of 6 Configure Web Application Firewall...
Question 62: A number of malicious requests for a web application is comi...
Question 63: How can you establish private connectivity over two VCN with...
Question 64: When creating an OCI Vault, which factors may lead to select...
Question 65: Challenge 2 Least-Privileged Model Enforcement Leveraging Cu...
Question 66: When using Management Agent to collect logs continuously, wh...
Question 67: Which of the following services are NOT Security Services in...
Question 68: You are a security administrator for your company's Oracle C...
Question 69: You want to include all instances in any of two or morecompa...
Question 70: what is the use case for Oracle cloudinfrastructure logging ...
Question 71: What is a prerequisite for creating a secret in OCI Vault? (...
Question 72: Which solution enables you to privately connect two Virtual ...
Question 73: What are Virtual Cloud Network (VCN) flow logs record detail...
Question 74: You configured the events service for your Cloud Guard probl...
Question 75: Which securityissues can be identified by Oracle Vulnerabili...
Question 76: A company has OCI tenancy which has mount target associated ...
Question 77: A programmer is developing a Node.js application which will ...