Question 11

Which architecture is based on the principle of "never trust, always verify"?
  • Question 12

    You want to make API calls against other OCI services from your instance without configuring user credentials. How would you achieve this?
  • Question 13

    A company has OCI tenancy which has mount target associated with two File Systems, CG_1 and CG_2. These File Systems are accessed by IP-based clients AB_1 and AB_2 respectively. As a security administrator, how can you provide access to both clients such that CGI has Read only access on AB1 and CG_2 has Read/Write access on AB_2?
  • Question 14

    How can you convert a fixed load balancer to a flexible load balancer?
  • Question 15

    Where is sensitive configuration data (like certificates, and credentials) is stored by Kubernetes cluster control plane?