Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

1z0-1084-25 Oracle Cloud Infrastructure 2025 Developer Professional Questions and Answers

Questions 4

Which THREE are valid statements regarding the OCI Container Engine for Kubernetes (OKE) service? (Choose three.)

Options:

A.

You must have access to an Oracle Cloud Infrastructure tenancy. Your tenancy must have sufficient quota on different types of resources.

B.

OKE cannot use existing network resources for the creation of a new cluster.

C.

OKE automatically creates and configures new network resources for the new cluster.

D.

There is a limit of three clusters within each region, but there is no limit on the number of nodes and pods you can create within each cluster.

Buy Now
Questions 5

Which of the following TWO statements are TRUE about deleting a Kubernetes cluster? (Choose two.)

Options:

A.

Upon deleting a cluster, other resources created during the cluster creation process or associated with the cluster (such as VCNS, Internet Gateways, NAT Gateways, Route Tables, Security Lists, B. Load Balancers, and Block Volumes) are deleted automatically.

B.

If you change the auto-generated name of a worker node and then delete the cluster, the renamed worker node is not deleted.

C.

Upon deleting a cluster, no other resources created during the cluster creation process or associated with the cluster (such as VCNS. Internet Gateways, NAT Gateways, Route Tables, Security Lists. Load Balancers, and Block Volumes) are deleted automatically.

D.

Changing the auto-generated name of a worker node does not affect the deletion of the worker node when the cluster in which it is created is deleted.

E.

You cannot change the autogenerated names of the worker nodes in the format oke-c--- within a Kubernetes cluster.

Buy Now
Questions 6

You are developing a polyglot serverless application using Oracle Functions. Which language cannot be used to write your function code?

Options:

A.

PL/SQL

B.

Python

C.

Node.js

D.

Go

E.

Java

Buy Now
Questions 7

Your team has created a serverless application deployed in Oracle Functions. It uses a Python function leveraging the Oracle Cloud Infrastructure (OCI) Python SDK to stop any OCI compute instance that does not comply with your corporate security standards. Although there are three non-compliant OCI compute instances, when you invoke this function, none of the instances were stopped. With respect to this issue, which of the following is a valid troubleshooting strategy?

Options:

A.

Enable function logging in the OCI console, add some print statements in your function code, and then view the logs to troubleshoot.

B.

Enable function remote debugging in the OCI console, and then use your favorite IDE to inspect the function running on Oracle Functions.

C.

Ensure that the application is deployed within the same OCI compartment as the instance, because you cannot enable function execution data from the OCI console.

D.

Enable function tracing in the OCI console, and then go to the OCI Monitoring console to view the function stack trace.

Buy Now
Questions 8

You deployed a Python application to an Oracle Container Engine for Kubernetes (OKE) cluster. However, while testing you found a bug, which you rectified and then created a new Docker image. You now need to ensure that if this new image does not work once deployed, you should be able to roll back to the previous version. Using kubect1, which strategy should you use?

Options:

A.

Blue/Green Deployment

B.

Canary Deployment

C.

Rolling Update

D.

A/B Testing

Buy Now
Questions 9

What are the TWO main reasons you would choose to implement a serverless architecture? (Choose two.)

Options:

A.

No need for integration testing

B.

Automatic horizontal scaling

C.

Easier to run long-running operations

D.

Reduced operational cost

E.

Improved in-function state management

Buy Now
Questions 10

Which concept in OCI Queue is responsible for hiding a message from other consumers for a predefined amount of time after it has been delivered to a consumer?

Options:

A.

Maximum retention period

B.

Visibility timeout

C.

Delivery count

D.

Polling timeout

Buy Now
Questions 11

Which of these is a valid use case for OCI Queue?

Options:

A.

Managing network traffic between services

B.

Storing and retrieving large files

C.

Sending real-time streaming data

D.

Building decoupled and scalable systems

Buy Now
Questions 12

You are developing a real-time monitoring application for a fleet of vehicles, which will be deployed on Oracle Cloud Infrastructure (OCI). You need to choose between using OCI Queue or OCI Streaming to handle the real-time data feeds from the vehicles. Based on the scenario described, which is the most appropriate choice for handling real-time data feeds?

Options:

A.

OCI Streaming, because it is designed for high-volume, continuous ingestion and processing of data, making it the best choice for a fleet of vehicles

B.

OCI Streaming, because it offers exactly-once message delivery, which is necessary for real-time applications

C.

OCI Queue, because it is optimized for low-latency messaging and ideal for real-time applications

D.

OCI Queue, because it provides at-least-once message delivery, which is critical for real-time monitoring applications

Buy Now
Questions 13

From a DevOps process standpoint, it is a good practice to keep changes to an application under version control. Which of the following allows changes to a Docker image to be stored in a version control system?

Options:

A.

Updating docker-compose.yml

B.

Executing docker commit

C.

Executing docker save

D.

Updating Dockerfile

Buy Now
Questions 14

A developer using Oracle Cloud Infrastructure (OCI) API Gateway needs to authenticate the API requests to their web application. The authentication process must be implemented using a custom scheme which accepts string-based parameters from the API caller. Which approach should the developer use in this scenario?

Options:

A.

Create a cross account functions authorizer.

B.

Create an authorizer function using OCI Identity and Access Management 91AM) based authentication.

C.

Create an authorizer function using request header authorization.

D.

Create an authorizer function using token-based authorization.

Buy Now
Questions 15

A service you are deploying to Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) uses a docker image from a private repository in OCI Registry (OCIR). Which configuration is necessary to provide access to this repository from OKE?

Options:

A.

Create a docker-registry secret for OCIR with API key credentials on the cluster, and specify the imagePullSecret property in the application deployment manifest.

B.

Create a docker-registry secret for OCIR with identity Auth Token on the cluster, and specify the imagePullSecret property in the application deployment manifest.

C.

Create a dynamic group for nodes in the cluster, and a policy that allows the dynamic group to read repositories in the same compartment.

D.

Add a generic secret on the cluster containing your identity credentials. Then specify a registryCredentials property in the deployment manifest.

Buy Now
Questions 16

Which of the following is defined as a configurable, low-latency infrastructure layer that controls the interaction between a network of microservices? (Choose the best answer.)

Options:

A.

Containers

B.

Kubernetes

C.

CI/CD Pipelines

D.

DevOps

E.

Service Mesh

Buy Now
Questions 17

Which TWO are part of the Cloud Native Computing Foundation (CNCF) container runtime? (Choose two.)

Options:

A.

rkt-o

B.

runc

C.

getcd

D.

containerd

Buy Now
Questions 18

What can you use to dynamically make Kubernetes resources discoverable to public DNS servers? (Choose the best answer.)

Options:

A.

kubeDNS

B.

DynDNS

C.

CoreDNS

D.

ExternalDNS

Buy Now
Questions 19

Which TWO statements accurately describe an Oracle Functions application? (Choose two.)

Options:

A.

A common context to store configuration variables that are available to all functions in the application. A Docker image containing all the functions that share the same configuration.

B.

An application based on Oracle Functions, Oracle Cloud Infrastructure (OCI) Events, and OCI API Gateway services.

C.

A small block of code invoked in response to an OCI Events service.

A logical group of functions.

D.

A Docker image containing all the functions that share the same configuration.

Buy Now
Questions 20

Which is ONE of the differences between a microservice and a serverless function?

Options:

A.

Microservices are used for long running operations while serverless functions are used for short running operations.

B.

Microservices are triggered by events while serverless functions are not.

C.

Microservices are stateless while serverless functions are stateful.

D.

Microservices always use a data store while serverless functions never use a data store.

Buy Now
Questions 21

As a Cloud Native developer, you have written a web service for your company. However, your security team has suggested that your web service should address Distributed Denial-of-Service (DDoS) attack. You are time-constrained and you need to ensure that this is implemented as soon as possible. What should you do in this scenario? (Choose the best answer.)

Options:

A.

Use a third party service integration to Implement DDoS attack mitigation.

B.

Re-write your web service and implement rate limiting.

C.

Use the OCI Virtual Cloud Network (VCN) segregation to control DDoS.

D.

Use the OCI API Gateway service and configure rate limiting.

Buy Now
Questions 22

A DevOps engineer is troubleshooting the Meshifyd application, which is running in an Oracle Cloud Infrastructure (OCI) environment. The engineer has set up the OCI Logging service to store access logs for the application but notices that the logs from the Meshifyd application are not showing up in the logging service. The engineer suspects that there might be an issue with the logging configuration. Which two statements are potential reasons for logs from the Meshifyd application not showing up in the OCI Logging service?

Options:

A.

The logconfig.json file has incorrect or missing OCID for the custom log in the logobjectId field.

B.

The OCI Logging service is set up to pre access logs by creating a log group and custom log within the same compartment.

C.

The logconfig.json file has incorrect or missing information in the application namespace in the paths field.

D.

The logconfig.json file has incorrect or missing information in the application namespace in the src field.

E.

The logconfig.json file has incorrect or missing OCID for the custom log group in the logGroupObjectId field.

Buy Now
Questions 23

Which testing strategy achieves high velocity of deployments and releases of cloud native applications? (Choose the best answer.)

Options:

A.

Penetration testing

B.

Automated testing

C.

Integration testing

D.

A/B testing

Buy Now
Questions 24

You have just finished building and compiling the software required to implement the API microservice component. You need to rebuild the API docker image, and plan to tag it as: ocIdevops/api:latest Which docker command would re-create the API docker image?

Options:

A.

docker build -t OCIdevops/api:latest

B.

docker create -t OCIdevops/api:latest

C.

docker image -t OCIdevops/api:latest

D.

docker compile -t OCI devops/api:latest

Buy Now
Questions 25

Which testing measure should be considered when using test cases that simultaneously validate a deployment and perform a selected set of functional tasks?

Options:

A.

Resource Utilization

B.

Functionality

C.

Scalability

D.

Robust Deployment

E.

Resiliency

Buy Now
Questions 26

Which option best defines microservices?

Options:

A.

A statically typed and compiled language.

B.

An open-source system for automating deployment, scaling, and management of containerized applications.

C.

A finely tuned piece of software that performs a single or small collection of tasks.

D.

An organized collection of structured information or data, typically stored electronically in a computer system.

Buy Now
Questions 27

Which of these is NOT a valid authentication method for accessing an OCI API Gateway deployment?

Options:

A.

HTTP Basic

B.

API Key

C.

OAuth

D.

SAML Token

Buy Now
Questions 28

Your organization has mandated that all deployed container images used for microservices must be signed by a specified master encryption key (MEK). You have appropriately signed the container images as part of your build process, but must now ensure that they are automatically verified when they are deployed to Oracle Cloud Infrastructure (OCI) Container Engine for Kubemetes (OKE) clusters. Which option should be used to mandate image verification when deploying to OKE clusters, assuming that MEK is already stored in an available OCI Vault? (Choose the best answer.)

Options:

A.

Enable image verification policies separately for each Kubemetes pod deployment because this is enforced at the pod level.

B.

Enable image verification policies separately for each node pool within each OKE cluster because this is enforced at the node pool level.

C.

Enable image verification policies separately for each OKE cluster because this is enforced at the cluster level.

(Correct)

D.

Enable Image verification policies for your OKE service control plane which will enforce this for all OKE clusters.

Buy Now
Questions 29

Your team has chosen to use master encryption key (MEK) within an Oracle Cloud Infrastructure (OCI) Vault for encrypting Kubernetes secrets associated with your microservice deployments in OCI Container Engine for Kubernetes (OKE) clusters so that you can easily manage key rotation. Which of the following is NOT valid about rotating keys in the OCI Vault service?

Options:

A.

Once rotated, older key versions can be used for encryption until they are deleted.

B.

Both software and HSM-protected MEKS can be rotated.

C.

When you rotate an MEK, a new key version is automatically generated.

D.

Each key version is tracked internally with separate unique OCIDS.

Buy Now
Questions 30

As a Cloud Native developer, you develop two services in Node.js and deploy them to two different Container Engine for Kubernetes (OKE) clusters that use the same Virtual Cloud Network (VCN). Your security team wants to analyze the network communication between them. How can this requirement be met in the most cost-effective way?

Options:

A.

Rewrite the application and send the application logs to an outside log aggregator.

B.

Deploy a third-party logging service and aggregate the network flow logs.

C.

Use the OCI Logging service and enable VCN flow logs.

D.

Deploy Wireshark and intercept the packets.

Buy Now
Exam Code: 1z0-1084-25
Exam Name: Oracle Cloud Infrastructure 2025 Developer Professional
Last Update: Oct 15, 2025
Questions: 100

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90