Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

1z0-1104-25 Oracle Cloud Infrastructure 2025 Security Professional Questions and Answers

Questions 4

Task 7: Verify the OCI Certificate with Load Balancer

Verify HTTPS connection to the load balancer by running the following command in Cloud Shell

curl -k https://

Enter the following URL in the web browser:

https://

If prompted with a certificate error, accept the risk and continue.

Verify web page content by ensuring the text, "You are visiting Web Server 1" from the index.html file is displayed in the browser

Options:

Buy Now
Questions 5

A company has deployed OCI Zero Trust Packet Routing (ZPR) to secure its network. They have two compute instances, VM1-01 and VM-02, in a public subnet. VM-01 is tagged with the security attribute app:vm01, and VM-02 is tagged with app:vm02. The VCN is labeled with network:vcn01, The ZPR policy states:

"What is the expected outcome of this policy?

Options:

A.

VM-02 can SSH into VM-01, but VM-01 cannot SSH into VM-02.

B.

VM-01 can SSH into VM-02, but VM-02 cannot SSH into VM-01.

C.

Both VM-01 and VM-02 can SSH into each other.

D.

Neither VM-01 nor VM-02 can SSH into each other."

Buy Now
Questions 6

Based on the provided diagram, you have a group of critical compute instances in a private subnet that require vulnerability using the Oracle Cloud Infrastructure(OCI) Vulnerability Scanning Service (VSS).

"What additional configuration is required to enable VSS to scan instances in the private subnet

Options:

A.

VSS cannot scan private instances. You need to move them to a public subnet for vulnerability scanning.

B.

Configure a service gateway in the VCN and a route rule to direct traffic for the VSS service through the gateway.

C.

No additional configuration is needed. VSS can access private instances by default.

D.

Use an OCI Bastion session to establish connectivity and forward scan results from the private instances."

Buy Now
Questions 7

Within OCI IAM identity domains, the AD Bridge component serves a critical role. How does the AD Bridge functionality specifically enhance Identity and Access Management (IAM) practices?

Options:

A.

It simplifies user provisioning by enabling automated synchronization of user accounts and group memberships from an existing Microsoft Active Directory (AD) environment.

B.

It facilitates delegated administration, allowing authorized AD users to manage specific resources within the OCI identity domain.

C.

It strengthens access security by providing an additional layer of authentication through AD integration.

D.

It directly integrates with OCI MFA providers, allowing for seamless enforcement of MFA for users authenticated through AD credentials.

Buy Now
Questions 8

"Your company is building a highly available and secure web application on OCI. Because of increasing malicious web-based attacks, the security team has mandated that web servers should not be exposed directly to the Internet.

How should you architect the solution while ensuring fault tolerance and security?

Options:

A.

Deploy at least three web servers in different fault domains within a public subnet, each with a public IP address. Deploy Web Application Firewall (WAF), and configure an origin for each public IP.

B.

Deploy at least three web servers in different fault domains within a private subnet. Place a public load balancer in a public subnet, but skip WAF configuration.

C.

Deploy at least three web servers in different fault domains within a private subnet. Place a public load balancer in a public subnet and configure a back-end set for all web servers. Deploy Web Application Firewall (WAF) and set the load balancer public IP address as the origin.

D.

Deploy at least three web servers in different fault domains within a public subnet. Use OCI Traffic Management service for DNS-based load balancing."

Buy Now
Questions 9

Challenge 2 -Task 1

In deploying a new application, a cloud customer needs to reflect different security postures. If a security zone is enabled with the Maximum Security Zone recipe, the customer will be unable to create or update a resource in the security zone if the action violates the attached Maximum Security Zone policy.

As an application requirement, the customer requires a compute instance in the public subnet. You therefore, need to configure Custom Security Zones that allow the creation of compute instances in the public subnet.

Review the architecture diagram, which outlines the resoures you'll need to address the requirement:

Preconfigured

To complete this requirement, you are provided with the following:

Access to an OCI tenancy, an assigned compartment, and OCI credentials

Required IAM policies

Task 4: Create a Public Subnet

Create a public subnet named IAD-SP-PBT-PUBSNET-01, within the VCN IAD-SP-PBT-VCN-01

use a CIDR block of 10.0.1.0/24 and configure the subnet to use the internet Gateway

Options:

Buy Now
Questions 10

Task 3: Create a Master Encryption Key

Note: OCI Vault to store the key required by this task is created in the root compartment as PBI_Vault_SP

Create an RSA Master Encryption Key (MEK), where:

Key name: PBT-CERT-MEK-01-

For example, if your username is 99008677-lab.user01, then the MEK name should be PBT-CERT-MEK-01990086771abuser01

Ensure you eliminate special characters from the user name.

Key shape: 4096 bits

Enter the OCID of the Master Encryption Key created in the provided text box:

Options:

Buy Now
Exam Code: 1z0-1104-25
Exam Name: Oracle Cloud Infrastructure 2025 Security Professional
Last Update: Jun 15, 2025
Questions: 36
1z0-1104-25 pdf

1z0-1104-25 PDF

$29.75  $84.99
1z0-1104-25 Engine

1z0-1104-25 Testing Engine

$35  $99.99
1z0-1104-25 PDF + Engine

1z0-1104-25 PDF + Testing Engine

$47.25  $134.99