QUESTIONS AND FULL SOLUTION UPDATED
◉ Which 2 actions will occur when a back-end server that is
registered with a backend set is marked to drain connections?
- It disallows new connections to that backend server
- keeps the connections to that instance open and attempts to
complete any in-flight requests
- redirects the requests to a user-defined error page.
- immediately closes all existing connections to that instance
- forcibly closes all connections to that instance after a timeout
period.
Answer: - It disallows new connections to that backend server
- keeps the connections to that instance open and attempts to
complete any in-flight requests
Explanation
if you set the server's drain status to true, the load balancer stops
forwarding new TCP connections and new non-sticky HTTP requests
to this backend server. This setting allows an administrator to take
the server out of rotation for maintenance purposes.
,◉ Which 2 statements are true about restoring a block volume from
a manual or policy based block volume backup?
- It can be restored as new volumes with different sizes from the
backups
- It can be restored as a new volume to any AD across different
regions
- It must be restored as a new volume to the same AD on which the
original block volume backup resides
- It can be restored as a new volume to any AD in the same region.
Answer: - It can be restored as new volumes with different sizes
from the backup
- It can be restored as a new volume to any AD in the same region
Explanation
When you restore the backup you select a name for the block volume
and choose the availability domain in which you want to restore
it.You can restore a block volume backup to a larger volume size. To
do this, check Custom Block Volume Size (GB), and then specify the
new size.
◉ In what 2 ways does OCI File Storage service differ from OCI
Object Storage and Block Volume services?
,• File storage mount target does not provide a private IP address,
while the object storage bucket provides one
• File Storage uses the Network File System (NFS) protocol, whereas
block volume uses ISCSI (Small Computer System Interface)
• Block volume service is NVMe based, while file storage service is
not.
• You can move object storage buckets, block volumes and file
storage mount targets between compartments.
Answer: • File Storage uses the Network File System (NFS) protocol,
whereas block volume uses ISCSI (Small Computer System Interface)
• You can move object storage buckets, block volumes and file
storage mount targets between compartments
Explanation
The mount target provides the IP address or DNS name that is used
together with a unique export path to mount the file system. You can
move mount targets from one compartment to another.
◉ You have been notified of an application failure indicating that one
or more of the OCI resources have become unavailable. After
scanning the Compute and Database consoles, you notice that one of
the DD Systems is missing.
What would you do to identify the reason for this missing resource?
, - Navigate to the Audit console and search the previous 24 hours for
all Delete actions to get a list of any resource that was deleted in the
past 24 hours
- Create a serial console connection to the DB System that does not
appear in the management console. Connect to the serial console
connection, and then review the system logs under
/var/log/messages
- View the service limits associated with your account to ensure that
you have not exceeded the allowable number of DB Systems in your
tenancy
- Navigate to the Audit console and search the previous 24 hours for
all List actions to get a list of every event that occurred in the pas.
Answer: - Navigate to the Audit console and search the previous 24
hours for all Delete actions to get a list of any resource that was
deleted in the past 24 hours
Explanation
You can filter results by request actions to zero in on only the events
with operations that interest you. For example, say that you only
want to know about instances that were deleted during a specific
time frame. Select a delete request action filter to see only the events
with delete operations.
◉ Which 2 statements are true about adding secondary VNICs to an
existing compute instance?