Free Oracle 1Z0-997-20 Exam Actual Questions

The questions for 1Z0-997-20 were last updated On Nov 21, 2024

Question No. 1

A civil engineering company is running an online portal In which engineers can upload there constructions photos, videos, and other digital files.

There is a new requirement for you to implement: the online portal must offload the digital content to an Object Storage bucket for a period of 72 hours. After the provided time limit has elapsed, the portal will hold all the digital content locally and wait for the next offload period.

Which option fulfills this requirement?

Show Answer Hide Answer
Correct Answer: D

Pre-authenticated requests provide a way to let users access a bucket or an object without having their own credentials, as long as the request creator has permission to access those objects.

For example, you can create a request that lets operations support user upload backups to

a bucket without owning API keys. Or, you can create a request that lets a business partner update shared data in a bucket without owning API keys.

When creating a pre-authenticated request, you have the following options:

You can specify the name of a bucket that a pre-authenticated request user has write access to and can upload one or more objects to.

You can specify the name of an object that a pre-authenticated request user can read from, write to, or read from and write to.

Scope and Constraints

Understand the following scope and constraints regarding pre-authenticated requests:

Users can't list bucket contents.

You can create an unlimited number of pre-authenticated requests.

There is no time limit to the expiration date that you can set.

You can't edit a pre-authenticated request. If you want to change user access options in response to changing requirements, you must create a new pre-authenticated request.

The target and actions for a pre-authenticated request are based on the creator's permissions. The request is not, however, bound to the creator's account login credentials. If the creator's login credentials change, a pre-authenticated request is not affected.

You cannot delete a bucket that has a pre-authenticated request associated with that bucket or with an object in that bucket.


Question No. 2

You are designing the network infrastructure for an application consisting of a web server (server-1) and a Domain Name Server (server-2) running in two different subnets inside the same Virtual Cloud Network (VCN) in Oracle Cloud Infrastructure (OCI). You have a requirement where your end users will access server-1 from the internet and server-2 from your customer's on-premises network. The on-premises network is connected to your VCN over a FastConnect virtual circuit.

How should you design your routing configuration to meet these requirements?

Show Answer Hide Answer
Correct Answer: C

Question No. 3

You have deployed art application server irt a private Subnet irt your virtual cloud network (VCN). For the database, you have provisioned an Autonomous Transaction Processing (ATP) serverless instance. However, you are unable to connect to the database instance from your application server.

Which two steps would you need to enable this connectivity?

Show Answer Hide Answer
Correct Answer: C, D

Question No. 4

As a solution architect, you are designing a web application to be deployed across multiple Oracle Cloud Infrastructures (OCI) regions for a global audience. Your goal is that users from each region should access the application web servers deployed in their own geographical OCI location.

Which OCI feature can be used to achieve this?

Show Answer Hide Answer
Correct Answer: D

Question No. 5

Which of the following is NOT a good use case for the volume backup feature of the Oracle Cloud Infrastructure Block Volume service?

Show Answer Hide Answer
Correct Answer: C