You are building a cloud native, serverless travel application with multiple Oracle Functions in Java, Python and Node.js. You need to build and deploy these functions to a single applications named travel-app. Which command will help you complete this task successfully?
A. oci fn function deploy --ap travel-ap --all
B. fn deploy --ap travel-ap -- all
C. oci fn application --application-name-ap deploy --all
D. fn function deploy --all --application-name travel-ap
Which statement accurately describes Oracle Cloud Infrastructure (OCI) Load Balancer integration with OCI Container Engine for Kubernetes (OKE)?
A. OKE service provisions an OCI Load Balancer instance for each Kubernetes service with LoadBalancer type in the YAML configuration.
B. OCI Load Balancer instance provisioning is triggered by OCI Events service for each Kubernetes service with LoadBalancer type in the YAML configuration.
C. OCI Load Balancer instance must be manually provisioned for each Kubernetes service that requires traffic balancing.
D. OKE service provisions a single OCI Load Balancer instance shared with all the Kubernetes services with LoadBalancer type in the YAML configuration.
Which Oracle Cloud Infrastructure (OCI) load balancer shape is used by default in OCI container Engineer for Kubernetes?
A. 400 Mbps
B. 8000 Mbps
C. There is no default. The shape has to be specified.
D. 100 Mbps
Which two statements are true for service choreography?
A. Service choreographer is responsible for invoking other services.
B. Services involved in choreography communicate through messages/messaging systems.
C. Service choreography relies on a central coordinator.
D. Service choreography should not use events for communication.
E. Decision logic in service choreography is distributed.
As a cloud-native developer, you have written a web service for your company. You have used Oracle Cloud Infrastructure (OCI) API Gateway service to expose the HTTP backend. However, your security team has suggested that your web
service should handle Distributed Denial-of-Service (DDoS) attack. You are time-constrained and you need to make sure that this is implemented as soon as possible.
What should you do in this scenario?
A. Use OCI virtual cloud network (VCN) segregation to control DDoS.
B. Use a third party service integration to implement a DDoS attack mitigation,
C. Use OCI API Gateway service and configure rate limiting.
D. Re-write your web service and implement rate limiting.
Given a service deployed on Oracle Cloud infrastructure Container Engine for Kubernetes (OKE), which annotation should you add in the sample manifest file to specify a 400 Mbps load balancer?
A. service.beta, kubernetes. lo/oci-load-balancer-kind: 400Mbps
B. service, beta, kubernetes. lo/oci-load-balancer-value: 4 00Mbps
C. service . beta. kubernetes . lo/oci-load-balancer-shape: 400Mbps
D. service . beta . kubernetes . lo/oci-load-balancer-size: 400Mbps
Which two are characteristics of microservices?
A. Microservices are hard to test in isolation.
B. Microservices can be independently deployed.
C. All microservices share a data store.
D. Microservices can be implemented in limited number of programming languages.
E. Microservices communicate over lightweight APIs.
What is the open source engine for Oracle Functions?
A. Apache OpenWhisk
B. OpenFaaS
C. Fn Project
D. Knative
Which two statements accurately describe Oracle SQL Developer Web on Oracle Cloud Infrastructure (OCI) Autonomous Database?
A. It is available for databases with dedicated Exadata infrastructure only.
B. After provisioning into an OCI compute Instance, it can automatically connect to the OCI Autonomous Databases instances.
C. It is available for databases with both dedicated and shared Exadata infrastructure.
D. It provides a development environment and a data modeler interface for OCI Autonomous Databases.
E. It must be enabled via OCI Identity and Access Management policy to get access to the Autonomous Databases instances.
Which pattern can help you minimize the probability of cascading failures in your system during partial loss of connectivity or a complete service failure?
A. Retry pattern
B. Anti-corruption layer pattern
C. Circuit breaker pattern
D. Compensating transaction pattern