OCI_foundation_questions

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 28

Financially backed commitment -Minimum

Defined as -nines for a month

Ability to manage, monitor and modify resources


Each Availability Domain has three fault domain

Your tenancy, default root compartment

Can have sub compartments

Compartment, logically separate


FD

It can analyze

It is centralized single pane


Alarms

Monitoring
Marketplace

Weekly Universal Credits


Exadata DB System

Cost-tracking tag

Compartment
ta

Layer 4 (Transport)
 Peered VCNs can exist in the same OCI region.

 Peered VCNs can exist in different OCI regions.

2- Network Security Groups.


3- Security Lists.

Choose the region that is in close proximity to end users for best performance.

Configure instances across multiple availability domains.


Compartments are logical entities.

Compartments can be nested.

Compartments can have sub-compartments.

Some regions provide a single availability domain.


Some regions provide multiple availability domains.

Setup your application across multiple Fault Domains.

Kubernetes
Compartments are restricted to a single region.

Data egress to the Internet.


Fault domains are used to mitigate hardware failures.

Fault domains are logical data center within regions.

It is included as part of the Data Science service.


It is a Python library that makes common tasks faster, easier, and
less error prone.

Primary Private IP address

Container Instance.
Autoscaling
Runs the certified VMware product stack in the cloud.

Customers can leverage same set of tools and processes used on-
premises.

Provides full administrative control to customers.


OCI Dedicated Region

1. Data Integration
Data Flow

 It provides a repository of searchable metadata.


 It can automate harvesting of data.
 It enables enrichment of the metadata.
4- A single registry can contain both private and public Docker repositories.

Container Engine for Kubernetes (OKE)


Oracle Functions

Resource Manager
Object Storage
Block Volume
Identity and Access Management

Network Security Group


Filter malicious web traffic

Virtual Machine (VM) or Bare Metal (BM) compute instances

File Storage Service


OCI virtual or Bare Metal DB Systems

Block Volume

Policy
Budget and compartment quotas

Allow group <group_name> to <verb> <resource-type> in tenancy


Data Encryption keys

Master Encryption keys


Web Application Firewall

JSON Web Algorithm (JWA)

OS packages that require updates and patches to address vulnerabilities


Ultra high performance

Archive tier
You can clone an existing block volume

Object Lifecycle Management (*)

You might also like