Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Last Attempt 1z0-1124-25 Questions

Page: 8 / 9
Total 120 questions

Oracle Cloud Infrastructure 2025 Networking Professional Questions and Answers

Question 29

You are designing a hybrid cloud architecture connecting your on-premises network to OCI. You have established a Site-to-Site VPN between your on-premises network and an OCI DRG. You have two VCNs attached to the DRG: VCN-A (10.0.0.0/16) and VCN-B (10.1.0.0/16). You need to ensure that only VCN-A can communicate with the on-premises network (192.168.1.0/24), while VCN-B should remain isolated. What is the MOST effective and secure method to achieve this connectivity requirement using DRG route tables?

Options:

A.

Create a single DRG route table. Add a route rule to the DRG route table for 192.168.1.0/24 pointing to the VPN attachment. Associate this route table with both the VCN-A and VCN-B attachments. Implement Network Security Groups (NSGs) on VCN-B to block all traffic to and from 192.168.1.0/24.

B.

Create a single DRG route table. Add a route rule to the DRG route table for 192.168.1.0/24 pointing to the VPN attachment. Associate this route table with the VCN-A attachment. Associate a default DRG route table that contains no routes for the VPN attachment with the VCN-Battachment.

C.

Create two DRG route tables: DRG-RT-A and DRG-RT-B. In DRG-RT-A, add a route rule for 192.168.1.0/24 pointing to the VPN attachment. Associate DRG-RT-A with the VCN-A attachment. In DRG-RT-B, add a route rule for 192.168.1.0/24 pointing to the VPN attachment and associate DRG-RT-B with the VCN-B attachment. Then, use security lists to block all traffic between VCN-B and the on-premises network.

D.

Create two DRG route tables: DRG-RT-A and DRG-RT-B. In DRG-RT-A, add a route rule for 192.168.1.0/24 pointing to the VPN attachment. Associate DRG-RT-A with the VCN-A attachment. Associate DRG-RT-B (containing no routes for 192.168.1.0/24) with the VCN-B attachment.

Question 30

You are troubleshooting a BGP peering issue between your on-premises router and an OCI FastConnect virtual circuit. You have verified the physical connectivity and confirmed that the BGP session is established. However, routes are not being exchanged. You suspect a problem with the BGP configuration. What is the MOST LIKELY cause of this issue, assuming the basic BGP configuration (AS numbers, peer IP addresses) is correct?

Options:

A.

The BGP keepalive timers are misconfigured, causing the session to drop intermittently.

B.

There is a mismatch in the BGP authentication keys between the on-premises router and OCI.

C.

The advertised prefixes are being filtered by a prefix list or route map on either the on-premises router or the OCI FastConnect virtual circuit.

D.

The MTU (Maximum Transmission Unit) size is mismatched, causing fragmentation and packet loss.

Question 31

Which of the following is a disadvantage of using a public internet-based VPN connection for migrating large datasets from another cloud provider to OCI?

Options:

A.

VPN connections are inherently less secure than dedicated private connections

B.

VPN connections cannot be automated using Infrastructure as Code (IaC) tools

C.

The throughput of a VPN connection is limited by the available bandwidth and latency of the public internet

D.

VPN connections are not compatible with all OCI services

Question 32

You’re tasked with creating a network diagnostic tool using Cloud Shell to test connectivity to various endpoints from within your VCN. To enhance security, you want to ensure the tool only has the necessary permissions to perform network diagnostics (e.g., ping, traceroute, nc). Which IAM principle and associated action(s) provide the MOST restrictive, least-privilege access for Cloud Shell to perform network diagnostic tasks?

Options:

A.

An IAM user with the read permission on all virtual-network-family resources.

B.

Cloud Shell session using Instance Principals, belonging to a dynamic group with a policy allowing network-security-groups and vnics to be read and used.

C.

An IAM group with inspect permission on virtual-network-family in the target compartment.

D.

An IAM group with the use permission on the virtual-network-family aggregate resource in the tenancy.

Page: 8 / 9
Total 120 questions