Explanation: Activate Object Storage's server -side encryption with customer -managed keys for both data at rest and in transit. -> Correct. This approach offers the highest level of security by leveraging server -side encryption for data at rest and ensuring that customer -managed keys, which offer greater control over the encryption keys, are used. It adheres to regulatory compliance by securing sensitive health information both during transfer (in transit) and while stored (at rest), providing comprehensive protection. Utilize only private buckets and enable default server -side encryption for data at rest. -> Incorrect. While using private buckets and enabling server -side encryption enhances security, it does not offer the same level of control and compliance assurance as using customer -managed keys, especially for highly sensitive data subject to strict regulations. Implement custom encryption for data at rest and rely on public bucket settings for ease of access. -> Incorrect. Custom encryption can provide an additional layer of security, but using public buckets for storing sensitive health information poses a significant risk of unauthorized access, making this option unsuitable for compliance with healthcare regulations. Configure the Object Storage to allow unencrypted data transfers and store encryption keys on - premises. -> Incorrect. Allowing unencrypted data transfers exposes sensitive information to potential interception during transit. Storing encryption keys on -premises does not mitigate this risk and compromises the security of the data. Your organization is deploying an application on Oracle Cloud Infrastructure (OCI) that requires the ability to quickly revert its file storage to a previous state after testing new features. This capability is crucial for minimizing downtime between tests. Which OCI File Storage feature allows for the efficient creation of a point -in-time copy of the file system, which can then be used for rapid reversion or testing?
A company is looking to strengthen its cloud infrastructure's security on Oracle Cloud Infrastructure (OCI) by configuring Cloud Guard, Security Zone, and utilizing Security Advisor effectively. Which two of the following actions are the most appropriate for achieving a robust security posture utilizing these OCI services?
D. Lower Cost Explanation: Higher Performance -> Correct. The Higher Performance tier is optimized for workloads requiring elevated I/O operations per second (IOPS) and throughput, making it ideal for the application's frequent read and write operations. Standard Performance -> Incorrect. This tier offers a basic level of I/O performance suitable for general - purpose workloads, which may not suffice for disk -intensive applications requiring high throughput. Lower Cost -> Incorrect. This tier focuses on cost efficiency with lower performance characteristics, making it unsuitable for applications that demand high I/O throughput and performance. Archive Storage -> Incorrect. Archive Storage is designed for data that is rarely accessed and does not provide the I/O performance needed for disk -intensive applications. What is the most appropriate action for a cloud architect to take when notified of an upcoming infrastructure maintenance event that may affect compute instances?
to achieve this goal?
establishes a secure connection over the public internet, it does not provide a direct connection that bypasses the public internet entirely. Local Peering Gateway (LPG) -> Incorrect. A Local Peering Gateway is used for connecting two VCNs within the same region. It does not facilitate direct connections between on-premises data centers and OCI. You have set up a public -facing web application in Oracle Cloud Infrastructure (OCI) that stores sensitive information. To enhance security, you decided to implement a Web Application Firewall (WAF) policy. However, the security team insists on further restricting access to the application only to traffic originating from a specific geographic region. Which WAF policy should you implement to comply with this requirement?
IP addresses to all components increases complexity and security risks without providing clear benefits, especially for layers that should not be directly exposed to the internet. Which two of the following statements accurately explain the functionality and features of OCI Load Balancing service?