oracle 1z0-1084-25 practice test

Exam Title: Oracle Cloud Infrastructure 2025 Developer Professional

Last update: Nov 27 ,2025
Question 1

As a Cloud Native developer, you develop two services in Node.js and deploy them to two different
Container Engine for Kubernetes (OKE) clusters that use the same Virtual Cloud Network (VCN). Your
security team wants to analyze the network communication between them. How can this
requirement be met in the most cost-effective way?

  • A. Rewrite the application and send the application logs to an outside log aggregator.
  • B. Deploy a third-party logging service and aggregate the network flow logs.
  • C. Use the OCI Logging service and enable VCN flow logs.
  • D. Deploy Wireshark and intercept the packets.
Answer:

C


Explanation:
The best answer is: "Use the OCI Logging service and enable VCN flow logs." To meet the
requirement of analyzing network communication between two services deployed in different
Container Engine for Kubernetes (OKE) clusters within the same Virtual Cloud Network (VCN) in a
cost-effective way, you can use the OCI Logging service and enable VCN flow logs. The VCN flow logs
feature in OCI allows you to capture and log network traffic information for your VCN resources. By
enabling VCN flow logs, you can monitor and analyze the network communication between your
services without the need for additional third-party logging services or tools. Enabling VCN flow logs
provides visibility into the network traffic, including source and destination IP addresses, ports,
protocols, and other relevant details. This information can be collected and stored in the OCI Logging
service, where you can analyze and gain insights into the network communication patterns between
your services. By leveraging the built-in capabilities of the OCI Logging service and enabling VCN flow
logs, you can fulfill the security team's requirement for network communication analysis in a cost-
effective manner. This eliminates the need for deploying additional third-party logging services or
tools, reducing complexity and potential costs associated with their setup and maintenance. The
other options mentioned are not the most cost-effective or suitable solutions for analyzing network
communication in this scenario: Deploying a third-party logging service and aggregating the network
flow logs would introduce additional costs and complexity, which may not be necessary considering
the built-in capabilities provided by OCI. Rewriting the application to send logs to an outside log
aggregator would not directly address the requirement of analyzing network communication
between the services. It would focus more on application-level logs rather than network-level
analysis. Deploying Wireshark and intercepting packets would require additional infrastructure setup
and maintenance, which may not be the most cost-effective approach for network analysis in this
scenario.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

Which of the following step is NOT required for setting up the Container Engine for Kubernetes (OKE)
cluster access using a local installation of kubectl?

  • A. Generate Auth token from the OCI console to access the OKE cluster using kubectl.
  • B. Install and configure the Oracle Cloud Infrastructure (OCI) CLI.
  • C. Set up the kubeconfig file.
  • D. Generate an API signing key pair (if you do not already have one) and upload the public key of the API signing key pair.
Answer:

A


Explanation:
The step that is NOT required for setting up the Container Engine for Kubernetes (OKE) cluster access
using a local installation of kubectl is to generate an Auth token from the OCI console. The
authentication for accessing the OKE cluster using kubectl can be performed using the OCI CLI
configuration, specifically the API signing key pair and the kubeconfig file. Here are the correct steps
for setting up the OKE cluster access using a local installation of kubectl: Set up the kubeconfig file:
The kubeconfig file contains the necessary information to authenticate and access the OKE cluster
using kubectl. It includes details such as the cluster endpoint, authentication method, and
credentials. Generate an API signing key pair (if you do not already have one) and upload the public
key of the API signing key pair: The API signing key pair is used for authentication with the OCI
services. The public key of the key pair needs to be uploaded to the OCI Console to associate it with
your user account. Install and configure the Oracle Cloud Infrastructure (OCI) CLI: The OCI CLI
provides a command-line interface to interact with the OCI services. It needs to be installed and
configured with your OCI credentials, including the user's OCID, tenancy OCID, region, and the path
to the API signing key pair. By completing these steps, you can configure kubectl to access and
manage your OKE clusters from your local machine using the OCI CLI authentication configuration.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

Which TWO statements are correct regarding Docker images and containers? (Choose two.)

  • A. Only one container can be spawned from a given image at a time.
  • B. An image is a collection of immutable layers whereas a container is a running instance of an image.
  • C. If multiple containers are spawned from the same image, then they all use the same copy of that image in memory.
  • D. Writing and building a new Dockerfile is the only way you can create new Docker images.
  • E. A container can exist without an image but an image cannot exist without a container.
Answer:

B, C


Explanation:
Which TWO statements are correct regarding Docker images and containers? (Choose two.) Writing
and building a new Dockerfile is the only way you can create new Docker images. A container can
exist without an image but an image cannot exist without a container. Only one container can be
spawned from a given image at a time. If multiple containers are spawned from the same image,
then they all use the same copy of that image in memory. (Correct) An image is a collection of
immutable layers whereas a container is a running instance of an image. (Correct) ChatGPT The
correct statements regarding Docker images and containers are: If multiple containers are spawned
from the same image, then they all use the same copy of that image in memory. This statement is
correct. When multiple containers are created from the same Docker image, they share the
underlying layers of the image in memory. Each container has its own isolated filesystem and
runtime environment, but they all use the same base image, which helps in efficient resource
utilization. An image is a collection of immutable layers whereas a container is a running instance of
an image. This statement is also correct. Docker images are composed of multiple layers, with each
layer representing a specific change or addition to the previous layer. These layers are read-only and
can be shared among multiple containers. On the other hand, a container is a lightweight and
isolated runtime instance created from a specific image. It is a running process that has its own
filesystem, network, and runtime configuration. The statements "Writing and building a new
Dockerfile is the only way you can create new Docker images" and "A container can exist without an
image but an image cannot exist without a container" are incorrect. Docker images can be created in
various ways, including using Dockerfiles, importing from existing images, or pulling from registries.
Additionally, a container requires an image to run, so an image must exist before a container can be
created from it.

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 4

Which option best defines microservices?

  • A. A statically typed and compiled language.
  • B. An open-source system for automating deployment, scaling, and management of containerized applications.
  • C. A finely tuned piece of software that performs a single or small collection of tasks.
  • D. An organized collection of structured information or data, typically stored electronically in a computer system.
Answer:

C


Explanation:
The correct answer is: "A finely tuned piece of software that performs a single or small collection of
tasks." Microservices are a software architectural approach where a system is decomposed into
small, independent services that are responsible for performing a specific set of tasks. Each
microservice is designed to be focused, finely tuned, and highly cohesive, handling a single or a small
collection of related tasks. This granularity allows for better scalability, maintainability, and flexibility
in building complex applications. The other options provided do not accurately define microservices:
An open-source system for automating deployment, scaling, and management of containerized
applications refers to a container orchestration tool like Kubernetes, which can be used to manage
microservices but is not a definition of microservices itself. A statically typed and compiled language
describes a type of programming language characteristic and is not specific to the concept of
microservices. An organized collection of structured information or data, typically stored
electronically in a computer system is a definition of a database or data storage system and is
unrelated to microservices.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

A service you are deploying to Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes
(OKE) uses a docker image from a private repository in OCI Registry (OCIR). Which configuration is
necessary to provide access to this repository from OKE?

  • A. Create a docker-registry secret for OCIR with API key credentials on the cluster, and specify the imagePullSecret property in the application deployment manifest.
  • B. Create a docker-registry secret for OCIR with identity Auth Token on the cluster, and specify the imagePullSecret property in the application deployment manifest.
  • C. Create a dynamic group for nodes in the cluster, and a policy that allows the dynamic group to read repositories in the same compartment.
  • D. Add a generic secret on the cluster containing your identity credentials. Then specify a registryCredentials property in the deployment manifest.
Answer:

B


Explanation:
The necessary configuration to provide access to a private repository in OCI Registry (OCIR) from OCI
Container Engine for Kubernetes (OKE) is to create a docker-registry secret for OCIR with an identity
Auth Token on the cluster and specify the imagePullSecret property in the application deployment
manifest. Here's the breakdown of the steps: Create a docker-registry secret for OCIR with an identity
Auth Token: In order to authenticate with the private repository in OCIR, you need to create a secret
in your OKE cluster that contains the necessary credentials. This can be done by generating an
identity Auth Token from the OCI Console and creating a secret in the cluster using the kubectl
command. Specify the imagePullSecret property in the application deployment manifest: In your
application's deployment manifest (such as a Kubernetes Deployment or StatefulSet YAML file), you
need to include the imagePullSecret property and specify the name of the secret you created in the
previous step. This allows the OKE cluster to use the credentials from the secret to pull the docker
image from the private repository in OCIR during deployment. By following these steps, you can
ensure that your OKE cluster has the necessary access to the private repository in OCIR, and your
application can successfully pull the required docker image during deployment.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

Your Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) administrator has
created an OKE cluster with one node pool in a public subnet. You have been asked to provide a log
file from one of the nodes for troubleshooting purpose. Which step should you take to obtain the log
file?

  • A. Use the username opc and password to login.
  • B. It is impossible because OKE is a managed Kubernetes service.
  • C. SSH into the nodes using the private key.
  • D. SSH into the node using the public key.
Answer:

C


Explanation:
To obtain a log file from one of the nodes in an Oracle Cloud Infrastructure (OCI) Container Engine for
Kubernetes (OKE) cluster, you should SSH into the nodes using the private key. Here's the step-by-
step process: Obtain the private key: The private key is required to authenticate and access the nodes
in the OKE cluster. You should obtain the private key from your administrator or the appropriate key
pair used to create the cluster. SSH into the node: Use a secure shell (SSH) client, such as OpenSSH, to
connect to the desired node in the cluster. The SSH command typically includes the private key file
path and the public IP address or hostname of the node. Example command: ssh -i
<private_key_file> opc@<node_public_ip> Replace <private_key_file> with the path to the private
key file and <node_public_ip> with the public IP address of the node you want to access. Navigate to
the log file location: Once you have successfully connected to the node, navigate to the directory
where the log file is located. The exact location and name of the log file may vary depending on the
Kubernetes distribution and configuration. Copy or view the log file: You can either copy the log file
from the node to your local machine using the scp command or view the contents directly on the
node using tools like cat or less. By following these steps, you will be able to access the log file from
the desired node in the OKE cluster for troubleshooting purposes.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

You developed a microservices-based application that runs in an Oracle Cloud Infrastructure (OCI)
Container Engine for Kubernetes (OKE) cluster. Your security team wants to use SSL termination for
this application. What should you do to create a secure SSL termination for this application using the
fewest steps possible?

  • A. Create a self-signed certificate and its corresponding key. Create a Kubernetes secret using the certificate and the key. Then add these annotations to the Kubernetes service: annotations: service.beta.kubernetes.io/oci-load-balancer-ssl-ports: "443" service.beta.kubernetes.io/oci-load- balancer-tls-secret: ssl certificate-secret
  • B. Create a self-signed certificate and its corresponding key. Create a Kubernetes secret using the certificate and the key. Then add these annotations to the Kubernetes service: annotations: service.beta.kubernetes.io/oci-load-balancer-ssl-ports: "443" service.beta.kubernetes.io/oci-load- balancer-security-list management-mode: "Frontend"
  • C. Add these annotations to the kubernetes service: annotations: service.beta.kubernetes.io/oci- load-balancer-ssl-ports: "443" service.beta.kubernetes.io/oci-load-balancer-ssl-secret-key: ssl secret- key
  • D. Generate a self-signed certificate using Let's Encrypt. Use that certificate on OCI Load Balancer. Create the Kubernetes service using this load balancer.
Answer:

A


Explanation:
The correct answer is: "Create a self-signed certificate and its corresponding key. Create a
Kubernetes secret using the certificate and the key. Then add these annotations to the Kubernetes
service: annotations: service.beta.kubernetes.io/oci-load-balancer-ssl-ports: '443'
service.beta.kubernetes.io/oci-load-balancer-tls-secret: ssl certificate-secret." To create a secure SSL
termination for your microservices-based application running in an OCI Container Engine for
Kubernetes (OKE) cluster, you can follow these steps: Create a self-signed certificate and its
corresponding key: Generate a self-signed SSL certificate and its private key using a tool like
OpenSSL. Create a Kubernetes secret: Create a Kubernetes secret using the certificate and key
obtained in the previous step. This secret will securely store the certificate and key within the
Kubernetes cluster. Add annotations to the Kubernetes service: Modify the Kubernetes service that
exposes your application and add the following annotations to enable SSL termination: annotations:
service.beta.kubernetes.io/oci-load-balancer-ssl-ports: '443' (specify the SSL port as 443)
annotations: service.beta.kubernetes.io/oci-load-balancer-tls-secret: ssl certificate-secret (specify
the name of the Kubernetes secret containing the certificate and key) By following these steps, you
can create a secure SSL termination for your application using a self-signed certificate and
Kubernetes secret. The annotations added to the Kubernetes service ensure that the SSL port is
configured correctly and the TLS secret is utilized for SSL termination when traffic reaches the load
balancer. The other options provided are not the most suitable approaches for achieving secure SSL
termination in an OCI Container Engine for Kubernetes (OKE) cluster: Adding annotations related to
the OCI load balancer SSL secret key is not the correct approach for SSL termination in this scenario.
Using Let's Encrypt to generate a self-signed certificate and configuring it on the OCI Load Balancer is
not necessary when you can create and manage the SSL certificate within the Kubernetes cluster
using a Kubernetes secret.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

You are building a cloud native serverless travel application with multiple Oracle Functions in Java,
Python, and Node.js. You need to build and deploy these functions to a single application named
travel-app. Which command will help you complete this task successfully?

  • A. fn function deploy app travel-app--all
  • B. fn app deploy --app travel-app --all
  • C. fn app --app travel-app deploy --ext java pyljs
  • D. fn deploy--app travel-app --all
Answer:

D


Explanation:
The correct answer is: fn deploy --app travel-app --all Explanation:: To build and deploy multiple
Oracle Functions as part of a single application named "travel-app," you can use the fn deploy
command with the appropriate options. The command fn deploy --app travel-app --all is the correct
syntax. Here's what each part of the command does: fn deploy: This command is used to deploy
functions and applications in Oracle Functions. --app travel-app: This option specifies the application
name as "travel-app," indicating that you want to deploy functions to this application. --all: This
option indicates that you want to deploy all the functions within the application. By using fn deploy --
app travel-app --all, you can build and deploy all the functions in your travel application across
different programming languages (Java, Python, and Node.js) to the "travel-app" application in
Oracle Functions.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

Which of the following is NOT a criterion that is usually met by a microservice?

  • A. Organized around business capabilities.
  • B. Tightly coupled
  • C. Highly maintainable
  • D. Independently deployable
Answer:

B


Explanation:
The correct answer is: "Tightly coupled." Tightly coupling is not a criterion that is usually met by a
microservice. In fact, microservices are designed to be loosely coupled. Loosely coupling refers to
reducing dependencies and minimizing the direct interactions between different components or
services. Microservices promote independence and autonomy, allowing each service to operate
independently without being tightly bound to other services. The other options listed are criteria
that are typically met by microservices: Organized around business capabilities: Microservices
architecture suggests designing services around specific business capabilities or functionalities. This
allows for focused and specialized services that align with the organization's business needs.
Independently deployable: Microservices are designed to be independently deployable units. Each
microservice can be developed, tested, and deployed separately, without impacting other services.
This enables agility and scalability in the deployment process. Highly maintainable: Microservices are
often designed to be highly maintainable. They are smaller in scope and focused on specific tasks,
making it easier to manage and maintain individual services. Additionally, microservices can be
updated, patched, or replaced without affecting the entire system, facilitating easier maintenance
and evolution of the application. Therefore, the criterion that is NOT typically met by a microservice
is being tightly coupled.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

You have just finished building and compiling the software required to implement the API
microservice component. You need to rebuild the API docker image, and plan to tag it as:
ocIdevops/api:latest Which docker command would re-create the API docker image?

  • A. docker build -t OCIdevops/api:latest
  • B. docker create -t OCIdevops/api:latest
  • C. docker image -t OCIdevops/api:latest
  • D. docker compile -t OCI devops/api:latest
Answer:

A


Explanation:
The correct command to rebuild the API docker image and tag it as OCIdevops/api:latest is: docker
build -t OCIdevops/api:latest The docker build command is used to build a Docker image from a
Dockerfile. The -t flag is used to specify the name and optionally a tag for the image. In this case, the
name of the image is OCIdevops/api and the tag is latest. By running this command, the Docker
image will be recreated based on the instructions in the Dockerfile and tagged with the specified
name and tag.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 9
Viewing questions 1-10 out of 100
Go To
page 2