oracle 1z0-1124-25 practice test

Exam Title: Oracle Cloud Infrastructure 2025 Networking Professional

Last update: Nov 27 ,2025
Question 1

You are troubleshooting an issue where legitimate users are occasionally blocked by your OCI WAF,
which is configured in "Detection" mode. You need to identify the specific WAF rules that are
triggering these false positives and adjust them without disrupting legitimate traffic. Which approach
offers the most efficient way to diagnose and resolve this issue?

  • A. Analyze the OCI WAF logs in OCI Logging Analytics, focusing on the rule IDs associated with blocked requests. Then, move the specific rule to "log only".
  • B. Disable all WAF rules and then gradually re-enable them one by one until the issue reappears.
  • C. Increase the sensitivity level of the entire WAF configuration.
  • D. Whitelist the IP addresses of the affected users.
Answer:

A


Explanation:
Problem Scope: Identify and adjust WAF rules causing false positives in Detection mode without
disrupting traffic.
Detection Mode Behavior: Logs potential violations without blocking, allowing analysis.
Evaluate Options:
A: Use OCI Logging Analytics to pinpoint rule IDs from logs, then set rules to "log only" for testing;
efficient and non-disruptive.
B: Disabling all rules risks security and is time-consuming; inefficient.
C: Increasing sensitivity worsens false positives; counterproductive.
D: Whitelisting IPs is a temporary fix, not scalable or diagnostic; unsuitable.
Conclusion: Logging analysis with rule adjustment is the most efficient approach.
OCI WAF logs provide detailed insights for troubleshooting. The Oracle Networking Professional
study guide states, "In Detection mode, WAF logs all triggered rules, which can be analyzed in OCI
Logging Analytics to identify false positives. Rules can then be adjusted to 'log only' to refine policies
without affecting traffic" (OCI Networking Documentation, Section: Web Application Firewall). This
method ensures precision and minimal disruption.
Reference: Oracle Cloud Infrastructure Documentation - Web Application Firewall.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

When configuring a network appliance within a VCN to enable transitive routing, which of the
following is essential to ensure traffic flows correctly between interconnected VCNs?

  • A. Attaching the network appliance to a Service Gateway.
  • B. Configuring static routes on the DRG route tables pointing to the network appliance's private IP address.
  • C. Implementing a Load Balancer in front of the network appliance.
  • D. Using a Local Peering Gateway (LPG) to connect the network appliance to the DRG.
Answer:

B


Explanation:
Objective: Enable transitive routing via a network appliance (e.g., firewall) between VCNs.
Transitive Routing Setup: DRG connects VCNs; appliance processes traffic.
Key Requirement: DRG must route traffic to the appliance’s private IP.
Evaluate Options:
A: Service Gateway is for OCI services, not transitive routing; incorrect.
B: Static routes on DRG to appliance ensure correct traffic flow; essential.
C: Load Balancer is optional, not essential for routing; incorrect.
D: LPG is for intra-region VCN peering, not appliance-DRG connection; incorrect.
Conclusion: DRG static routes to the appliance are critical for transitive routing.
Transitive routing with a network appliance requires explicit routing configuration. The Oracle
Networking Professional study guide notes, "To enable transitive routing through a network
appliance, configure static routes in the DRG route table pointing to the appliance’s private IP as the
next hop" (OCI Networking Documentation, Section: Transitive Routing with DRG). This ensures
traffic is processed by the appliance between VCNs.
Reference: Oracle Cloud Infrastructure Documentation - Dynamic Routing Gateway.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

Your company has a FastConnect circuit established between your on-premises data center and OCI.
However, you have a specific regulatory requirement to encrypt all traffic, even over dedicated
connections like FastConnect. You need to implement IPSec encryption without significantly
impacting the available bandwidth of your FastConnect circuit. Which is the most effective approach
to implement IPSec encryption over your existing FastConnect circuit, while maintaining high
bandwidth?

  • A. Configure a Site-to-Site VPN using the OCI Dynamic Routing Gateway (DRG) over the FastConnect virtual circuit. Use a low-overhead encryption algorithm like AES-GCM.
  • B. Deploy virtual firewall appliances within OCI and your on-premises network and configure IPSec tunnels between them, routing all traffic through the firewalls. Use a high-security encryption algorithm like AES-256.
  • C. Terminate IPSec VPN on compute instances in a public subnet on the OCI side.
  • D. Establish a second, separate Site-to-Site VPN connection to OCI over the public internet, and route all sensitive traffic over this VPN, while routing non-sensitive traffic over the FastConnect circuit.
Answer:

A


Explanation:
Requirements: Encrypt FastConnect traffic with minimal bandwidth impact.
IPSec Options:
DRG VPN: Native OCI solution over FastConnect.
Firewall Appliances: Adds overhead and complexity.
Compute Instances: Resource-intensive, not scalable.
Internet VPN: Uses public internet, against requirements.
Evaluate Options:
A: DRG VPN with AES-GCM (low-overhead encryption) leverages FastConnect; optimal.
B: Firewalls with AES-256 add overhead, reducing bandwidth; less effective.
C: Compute-based VPN is inefficient and public-facing; unsuitable.
D: Public internet VPN violates privacy requirement; incorrect.
Conclusion: DRG VPN with AES-GCM is the most effective solution.
OCI supports IPSec over FastConnect via DRG. The Oracle Networking Professional study guide
explains, "A Site-to-Site VPN over FastConnect using the DRG provides encrypted traffic with low-
overhead algorithms like AES-GCM, maintaining high bandwidth" (OCI Networking Documentation,
Section: FastConnect with VPN). This meets regulatory and performance needs efficiently.
Reference: Oracle Cloud Infrastructure Documentation - Site-to-Site VPN over FastConnect.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

You have deployed a distributed application across OCI and Azure. You have established the OCI-
Azure Interconnect. You are experiencing packet loss and performance degradation when
transmitting large volumes of data between the two cloud providers. You have verified that the
network devices on both sides are correctly configured. Which is NOT a typical root cause to
investigate when troubleshooting performance issues across the OCI-Azure Interconnect?

  • A. Evaluate Network Security Groups (NSGs) and Security Lists on both OCI and Azure to verify that traffic is allowed between the necessary subnets and ports.
  • B. Inspect routing tables on both OCI and Azure to confirm that routes are correctly configured to direct traffic across the interconnect.
  • C. Review the pricing tiers in OCI to ensure that the current OCI Compute usage has not exceeded maximum bandwidth limits.
  • D. Assess the MTU (Maximum Transmission Unit) size settings on both OCI and Azure VNICs to ensure that fragmentation is not occurring.
Answer:

C


Explanation:
Problem: Packet loss and degradation over OCI-Azure Interconnect.
Typical Causes: Security rules, routing, MTU mismatches.
Evaluate Options:
A: NSGs/Security Lists blocking traffic is a common issue; typical.
B: Routing misconfiguration can drop packets; typical.
C: Pricing tiers affect billing, not interconnect bandwidth; not typical.
D: MTU mismatches cause fragmentation and loss; typical.
Conclusion: Pricing tiers are unrelated to interconnect performance issues.
Interconnect performance issues stem from network configuration, not pricing. The Oracle
Networking Professional study guide states, "Troubleshooting multi-cloud interconnects involves
checking security rules, routing, and MTU settings, as these directly impact traffic flow" (OCI
Networking Documentation, Section: Multi-Cloud Connectivity). Pricing tiers influence resource
limits, not interconnect bandwidth.
Reference: Oracle Cloud Infrastructure Documentation - OCI-Azure Interconnect.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

You are managing a Site-to-Site VPN connection between your on-premises network and OCI. You
notice that the VPN tunnel is frequently dropping and re-establishing. You have verified the internet
connectivity at both ends and confirmed that the IKE (Internet Key Exchange) parameters are
correctly configured. Which of the following is the most likely cause of the intermittent VPN tunnel
disconnections?

  • A. The on-premises Customer-Premises Equipment (CPE) is configured with an incorrect public IP address.
  • B. The OCI Dynamic Routing Gateway (DRG) is experiencing a temporary outage.
  • C. There is a misconfiguration in the security rules, blocking the IKE or ESP (Encapsulating Security Payload) traffic.
  • D. The on-premises firewall is configured with incorrect NAT-Traversal settings.
Answer:

C


Explanation:
Symptoms: VPN tunnel drops intermittently despite stable internet and IKE settings.
VPN Components: Requires IKE (UDP 500/4500) and ESP (IP 50) traffic.
Evaluate Options:
A: Incorrect CPE IP would prevent tunnel establishment, not intermittent drops; incorrect.
B: DRG outage would cause full downtime, not intermittent; unlikely.
C: Security rules blocking IKE/ESP intermittently (e.g., rate limiting) is common; most likely.
D: NAT-Traversal issues typically prevent initial setup, not intermittent drops; less likely.
Conclusion: Security rule misconfiguration is the most probable cause.
VPN stability depends on unblocked IKE and ESP traffic. The Oracle Networking Professional study
guide notes, "Intermittent VPN tunnel drops are often caused by security rules or firewalls blocking
IKE (UDP 500/4500) or ESP (IP Protocol 50) traffic" (OCI Networking Documentation, Section: Site-to-
Site VPN Troubleshooting). This aligns with the scenario’s symptoms.
Reference: Oracle Cloud Infrastructure Documentation - Site-to-Site VPN.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

Your company is migrating its on-premises data center to OCI. A critical security requirement is to
maintain centralized logging and auditing of all network traffic traversing the OCI Network Firewall.
You need to ensure that every session that passes through the firewall is logged and can be analyzed
for security events. Which OCI service should you configure in conjunction with the Network Firewall
to achieve this centralized logging?

  • A. OCI Audit Service.
  • B. OCI Logging Analytics.
  • C. OCI Service Connector Hub with OCI Logging.
  • D. OCI Cloud Guard.
Answer:

C


Explanation:
Requirement: Centralized logging of Network Firewall traffic for analysis.
OCI Services:
Audit Service: Logs API calls, not network traffic.
Logging Analytics: Analyzes logs but needs log ingestion.
Service Connector Hub with Logging: Moves firewall logs to OCI Logging.
Cloud Guard: Monitors security posture, not detailed logging.
Evaluate Options:
A: Audit Service is for API events; incorrect.
B: Logging Analytics requires log source; incomplete.
C: Service Connector Hub with Logging captures and stores firewall logs; best fit.
D: Cloud Guard is for threat detection, not logging; incorrect.
Conclusion: Service Connector Hub with OCI Logging meets the requirement.
OCI Network Firewall logs require integration with OCI Logging. The Oracle Networking Professional
study guide states, "Service Connector Hub can be configured to transfer Network Firewall logs to
OCI Logging for centralized storage and analysis, meeting auditing requirements" (OCI Networking
Documentation, Section: Network Firewall Logging). This ensures every session is logged and
auditable.
Reference: Oracle Cloud Infrastructure Documentation - Service Connector Hub.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

You are a cloud architect designing a multi-tiered application on OCI. One tier consists of publicly
accessible web servers that must be protected from common web exploits. You plan to use OCI
Network Firewall to achieve this. You need to configure the Network Firewall to detect and prevent
SQL injection attacks against the web servers. Which Network Firewall feature is most suitable for
this purpose?

  • A. Stateful Inspection, configured with default IPS policies.
  • B. Intrusion Detection and Prevention System (IDPS) signatures with custom rule sets for SQL injection.
  • C. URL Filtering with predefined categories blocking SQL injection attempts.
  • D. Geo-location filtering to block traffic from countries known for SQL injection attacks.
Answer:

B


Explanation:
Goal: Protect web servers from SQL injection using Network Firewall.
Firewall Features:
Stateful Inspection: Basic traffic tracking, limited exploit detection.
IDPS: Detects and prevents exploits via signatures.
URL Filtering: Blocks URLs, not payload-based attacks.
Geo-location: Blocks regions, not specific threats.
Evaluate Options:
A: Default IPS lacks SQL injection specificity; insufficient.
B: IDPS with custom signatures targets SQL injection; most suitable.
C: URL Filtering doesn’t address SQL injection payloads; incorrect.
D: Geo-location is broad, not precise; ineffective.
Conclusion: IDPS with custom rules is the best feature.
IDPS in OCI Network Firewall is designed for exploit prevention. The Oracle Networking Professional
study guide explains, "The Intrusion Detection and Prevention System (IDPS) uses signatures to
detect and block specific threats like SQL injection, with custom rule sets for tailored protection" (OCI
Networking Documentation, Section: Network Firewall IDPS). This ensures precise defense against
web exploits.
Reference: Oracle Cloud Infrastructure Documentation - Network Firewall.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

You are designing a hybrid cloud environment where multiple VCNs in OCI need to communicate
with your on-premises network. You are using a single Dynamic Routing Gateway (DRG) to connect to
your on-premises network via FastConnect. You want to ensure that each VCN is isolated from the
others and that traffic between VCNs must pass through your on-premises security appliances for
inspection. How should you configure the DRG attachments and route tables to enforce this security
policy?

  • A. Attach all VCNs and the FastConnect to the DRG. Configure the DRG route table associated with each VCN attachment to route all traffic destined for other VCNs to the FastConnect attachment. Configure the FastConnect DRG route table to route traffic destined to each VCN to the corresponding VCN attachment.
  • B. Attach all VCNs and the FastConnect to the DRG. Configure static routes on each VCN's route table pointing to the DRG for any subnet not within the VCN. Enable the "Transit Routing" feature on the DRG to allow inter-VCN communication.
  • C. Attach each VCN directly to the FastConnect using IPSec VPN tunnels, bypassing the DRG entirely to ensure all traffic flows through the on-premises security appliances.
  • D. Attach each VCN to the DRG using a Local Peering Gateway (LPG) and then attach one VCN to FastConnect. Configure routes so that traffic traverses from LPG to LPG through the on-premises network.
Answer:

A


Explanation:
Requirements: VCN isolation, inter-VCN traffic via on-premises appliances.
DRG Role: Central hub for VCN and FastConnect connectivity.
Evaluate Options:
A: DRG routes inter-VCN traffic via FastConnect to on-premises; meets isolation and inspection
needs.
B: Transit Routing allows direct VCN-to-VCN communication, bypassing on-premises; incorrect.
C: Bypassing DRG with VPNs is complex and unsupported; incorrect.
D: LPG is for intra-region peering, not DRG-to-FastConnect; incorrect.
Conclusion: Option A enforces the policy via DRG route tables.
DRG route tables control traffic flow. The Oracle Networking Professional study guide states, "To force
inter-VCN traffic through an on-premises network via FastConnect, configure DRG route tables to
route VCN-destined traffic to the FastConnect attachment, ensuring isolation and inspection" (OCI
Networking Documentation, Section: DRG Routing). This setup leverages a single DRG effectively.
Reference: Oracle Cloud Infrastructure Documentation - Dynamic Routing Gateway.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

You are deploying a three-tier web application using Infrastructure as Code (IaC) and Oracle
Kubernetes Engine (OKE) within a single VCN. The application consists of a public-facing web tier
(running in OKE), an application tier, and a database tier. You want to ensure that only the web tier
can access the application tier, and only the application tier can access the database tier. You are
leveraging Network Security Groups (NSGs) for granular access control. Your IaC code successfully
creates all the components, but you are experiencing connectivity issues. Specifically, Pods in the
web tier cannot reach the application tier. Reviewing your IaC configuration, you realize the NSG
assignments for the OKE cluster's node pool are misconfigured. Which of the following NSG
configuration errors would most likely cause this connectivity issue?

  • A. The NSG associated with the OKE node pool (web tier) allows ingress traffic from 0.0.0.0/0 on port 80, but egress traffic to the application tier's NSG is missing a rule allowing TCP traffic on port 8080 (the port the application tier is listening on).
  • B. The NSG associated with the OKE node pool (web tier) is missing an ingress rule allowing traffic from the VCN CIDR on port 443. This is causing a routing problem within the VCN.
  • C. The NSG associated with the application tier allows ingress traffic from the VCN CIDR, but the NSG associated with the OKE node pool (web tier) has no ingress rules at all. Therefore, the OKE nodes are not reachable.
  • D. The NSG associated with the OKE node pool (web tier) only allows egress traffic to the internet and does not have a rule permitting egress traffic to the application tier's NSG on the required port (8080).
Answer:

D


Explanation:
Problem: OKE web tier pods cannot reach the application tier.
Traffic Flow: Web tier (OKE) initiates outbound (egress) traffic to application tier (port 8080).
NSG Role: Controls traffic at VNIC level; must allow egress from OKE and ingress to app tier.
Evaluate Options:
A: Missing egress rule on OKE NSG blocks traffic; plausible but incomplete context.
B: Ingress on OKE NSG affects incoming traffic, not outbound to app tier; incorrect.
C: No ingress on OKE NSG doesn’t block egress to app tier; incorrect.
D: Egress limited to internet blocks app tier access (port 8080); most likely.
Conclusion: Missing egress rule to app tier NSG is the primary issue.
NSGs require explicit egress rules for outbound traffic. The Oracle Networking Professional study
guide notes, "For OKE pods to communicate with other tiers, the node pool’s NSG must include
egress rules to the destination NSG or CIDR on the required ports" (OCI Networking Documentation,
Section: Network Security Groups with OKE). Option D reflects a common misconfiguration in IaC
setups.
Reference: Oracle Cloud Infrastructure Documentation - OKE Networking.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

You are using the OCI Application Load Balancer (ALB) for your web application. You want to
implement a blue/green deployment strategy to minimize downtime during application updates. You
have two backend sets: 'blue' (the current version) and 'green' (the new version). What is the most
efficient way to switch traffic from the 'blue' backend set to the 'green' backend set using the ALB's
traffic management capabilities?

  • A. Update the listener to point directly to the 'green' backend set.
  • B. Create a new listener that points to the 'green' backend set and delete the old listener.
  • C. Use the ALB's routing rules to gradually shift traffic from the 'blue' backend set to the 'green' backend set based on a percentage weight.
  • D. Update the health check policy of the 'blue' backend set to mark all servers as unhealthy, forcing the ALB to send traffic to the 'green' backend set.
Answer:

C


Explanation:
Goal: Minimize downtime in blue/green deployment with ALB.
ALB Capabilities: Supports weighted routing for gradual traffic shifts.
Evaluate Options:
A: Immediate switch risks downtime if ‘green’ fails; less efficient.
B: Listener swap causes abrupt change; not optimal.
C: Gradual shift with weights ensures smooth transition; most efficient.
D: Forcing ‘blue’ unhealthy is disruptive and hacky; inefficient.
Conclusion: Weighted routing provides the smoothest transition.
ALB supports blue/green via routing rules. The Oracle Networking Professional study guide states,
"Application Load Balancer’s routing rules allow weighted traffic distribution between backend sets,
enabling blue/green deployments with minimal downtime" (OCI Networking Documentation,
Section: Load Balancer Routing). This method ensures stability during updates.
Reference: Oracle Cloud Infrastructure Documentation - Application Load Balancer.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 11
Viewing questions 1-10 out of 120
Go To
page 2