Question 16
When configuring connectivity for hosts in the VCN, security lists contain defaults for implementing security rules. Which TWO additional rules are needed for database systems? (Choose all correct answers)
Question 17
Assume that there are no resource limits on your underlying Exadata Cloud@Customer hardware. What is the maximum number of Autonomous container databases that can be created on one Autonomous VM cluster?
Question 18
You want to permanently delete the DB System and its attached HeatWave cluster. Which action should you perform?
