Question 1 🔥
Your company has established a hybrid cloud environment using FastConnect to connect your on - premises network to your OCI VCN. You are advertising on-premises network prefixes to OCI via BGP. You want to ensure that OCI only learns routes from your on-premises network that are within a specific range, and that any other prefixes advertised are rejected to prevent routing conflicts. Which BGP attribute and configuration on the OCI side should you use to achieve this?
Question 2 🔥
B. Service Gateway C. Network Security Groups (NSGs) D. Dynamic Routing Gateway (DRG) Explanation: Zero Trust Principles: Require explicit, identity -based access controls at every network stage. Evaluate OCI Services: Internet Gateway: Enables public internet access, no identity -based control. Service Gateway: Provides private service access, no granular routing control. NSGs: Offer stateful, identity -based rules at the VNIC level. DRG: Facilitates routing, not identity -based access control. NSG Fit: NSGs allow rules based on VNIC identity, source/destination IP, and ports, aligning with Zero Trust. Conclusion: NSGs are the best fit for granular, identity -based routing control. NSGs are pivotal for Zero Trust in OCI. The Oracle Networking Professional study guide states, "Network Security Groups provide granular, stateful security rules that can be applied to specific VNICs, enabling identity -based access controls essential for Zero Trust architectures" (OCI Networking Documentation, Section: Network Security Groups). Unlike security lists (subnet -level), NSGs offer instance -level precision. Reference: Oracle Cloud Infrastructure Documentation - Network Security Groups. You are using Terraform to deploy a multi -tier application architecture consisting of a public subnet hosting a load balancer, a private subnet hosting application servers, and another private subnet hosting a database. The Terraform code successfully creates all the required infrastructure, including route tables and security lists. However, after deployment, you realize that the load balancer cannot reach the application servers in the private subnet. You have verified that the load balancer is healthy and the application servers are running. What is the most likely cause of this connectivity problem?
Question 3 🔥
Connectivity Flow: Load balancer initiates traffic to application servers; application servers respond. Key checkpoints: routing and security rules. Analyze Routing: Private subnets typically don’t route to an Internet Gateway by default; they use NAT or Service Gateways. Misrouting (Option B) would affect outbound traffic, not inbound from the load balancer. Security Rules: Ingress (App Servers): Must allow traffic from the load balancer’s IP range. Egress (Load Balancer): Must allow traffic to the application servers. Evaluate Options: A: Missing ingress rule on application servers’ security list blocks load balancer traffic; most likely. B: Incorrect default route affects outbound, not inbound; less likely. C: NAT misconfiguration impacts outbound, not inbound; incorrect. D: Load balancer egress is necessary but secondary to application server ingress. Conclusion: Ingress rule absence on the application server subnet is the primary blocker. Security lists control traffic at the subnet level in OCI. The Oracle Networking Professional study guide explains, "For a load balancer in a public subnet to communicate with instances in a private subnet, the private subnet’s security list must include an ingress rule allowing traffic from the load balancer’s IP range" (OCI Networking Documentation, Section: Security Lists). Since Terraform deployed the infrastructure, a misconfigured security list is a common oversight. Reference: Oracle Cloud Infrastructure Documentation - Security Lists. When configuring transitive routing with a DRG across multiple VCNs and on-premises networks, which key configuration step ensures that traffic from one VCN is correctly routed through the DRG to an on - premises destination?
Question 4 🔥
premises; incorrect. Conclusion: BGP ensures scalable, accurate routing through the DRG. The DRG supports transitive routing with dynamic protocols like BGP. The Oracle Networking Professional study guide states, "For transitive routing between VCNs and on-premises networks via a DRG, configuring BGP on the DRG and CPE enables automatic route propagation, ensuring traffic is correctly routed" (OCI Networking Documentation, Section: Dynamic Routing Gateway). BGP is preferred over static routes for hybrid cloud scenarios. Reference: Oracle Cloud Infrastructure Documentation - Dynamic Routing Gateway. In a complex multi -region OCI environment using DRGs for transitive routing, which method is most efficient for ensuring that route updates from on -premises networks are propagated to all connected VCNs?
Question 5 🔥
establishment overhead?
Question 6 🔥
due to default behavior or SLAAC), but IPv4 requires explicit routing. Per the Oracle Networking Professional study guide, "Route tables must be configured to direct traffic to the appropriate next hop for inter-subnet communication within a VCN" (OCI Networking Documentation, Section: Virtual Cloud Networks). Reference: Oracle Cloud Infrastructure Documentation - Networking Overview, Route Tables. You are designing a backup solution in OCI. Compute instances in a private subnet need to back up data to OCI Object Storage. Security policy mandates that data transfer must not traverse the public internet. You need to choose the most secure and cost -effective method for accessing Object Storage. Which endpoint/gateway configuration should you implement?