Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

1z0-1084-25 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

1z0-1084-25 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: Oracle Cloud Infrastructure 2025 Developer Professional
  • Last Update: Sep 14, 2025
  • Questions and Answers: 100
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

1z0-1084-25 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

1z0-1084-25 Practice Exam Questions with Answers Oracle Cloud Infrastructure 2025 Developer Professional Certification

Question # 6

Which TWO statements are true for serverless computing and serverless architectures? (Choose two.)

A.

Serverless function execution is fully managed by third party.

B.

Applications running on a FaaS (Functions as a Service) platform.

C.

Long running tasks are perfectly suited for serverless.

D.

Application DevOps team is responsible for scaling.

E.

Serverless function state should never be stored externally.

Full Access
Question # 7

Which of the following is NOT a criterion that is usually met by a microservice?

A.

Organized around business capabilities.

B.

Tightly coupled

C.

Highly maintainable

D.

Independently deployable

Full Access
Question # 8

Which is NOT a valid option to execute a function deployed in Oracle Functions?

A.

Invoke from the Docker CLI.

B.

Send signed HTTP requests to the function's invoke endpoint.

C.

Invoke from the Fn Project CLI.

D.

Trigger by an event in the Oracle Cloud Infrastructure (OCI) Events service.

E.

Invoke from the OCI CLI.

Full Access
Question # 9

Having created a Container Engine for Kubernetes (OKE) cluster, you can use Oracle Cloud Infrastructure (OCI) Logging to view and search the logs of applications running on the worker node compute instances in the cluster. Which task is NOT required to collect and parse application logs? (Choose the best answer.)

A.

Create a dynamic group with a rule that includes all worker nodes In the cluster.

B.

Set the OCI Logging option to Enabled for the cluster.

C.

Enable monitoring for all worker nodes in the cluster.

D.

Configure a custom log in OCI Logging with the appropriate agent configuration.

Full Access
Question # 10

You encounter an unexpected error when invoking Oracle Functions from your Cloud Shell session named myfunction in the myapp application. Which option will get you more information on the error?

A.

fn --verbose invoke myapp myfunction

B.

fn --debug invoke myapp myfunction

C.

Contact Oracle support with your error message

D.

DEBUG=1 fn invoke myapp myfunction

Full Access
Question # 11

As a developer, you have been tasked with implementing a microservices-based application. Which THREE technologies are best suited to accomplish the task? (Choose three.)

A.

Terraform

B.

Big Data

C.

Anomaly Detection

D.

Service Mesh

E.

Docker

F.

Kubemetes

Full Access
Question # 12

(CHK_1>3) You have an e-commerce application that loads customers' transactional data into the Oracle Cloud Infrastructure (OCI) Streaming service. The data must now be extracted and transformed before sending it to a third-party REST endpoint. You have been directed to leverage the OCI Service Connector Hub to automate this process. Which configuration option would address this requirement?

A.

Configure a new service connector as follows: • Source: Streaming • Task: Functions • Target: Functions

B.

Configure a new service connector as follows: • Source: Streaming • Task: API Gateway • Target: Notifications

C.

Configure a new service connector as follows: • Source: Streaming • Task: None • Target: Notifications

D.

Configure a new service connector as follows: • Source: Streaming • Task: API Gateway • Target: Functions

E.

Configure a new service connector as follows: • Source: Streaming • Task: Functions • Target: API Gateway

Full Access
Question # 13

Your organization has deployed their e-commerce application on Oracle Container Engine for Kubernetes (OKE) and they are using the Oracle Cloud Infrastructure Registry (OCIR) service as their Docker image repository. They have deployed the OKE cluster using the 'custom create' option, and their Virtual Cloud Network (VCN) has three public subnets with associated Route Tables, Security Lists, and Internet Gateway. However, their application containers are failing to deploy. On investigation, they discover that the images are not being pulled from the designated OCIR repository, even though the YAML configuration has the correct path to the images. What is a valid concern here that needs to be further investigated?

A.

Security List rule for TCP port 22 needs to be added to connect to the OCIR service.

B.

VCN hosting the OKE cluster worker nodes needs to have a NAT gateway to access OCIR repositories.

C.

Identity and Access Management (IAM) credentials need to be added for each user that deploys applications to the OKE cluster.

D.

OKE cluster needs to have a secret with the credentials of their OCIR repository and use that secret in the Kubernetes deployment manifest.

Full Access
Question # 14

To enforce mutual TLS (mTLS) authentication for clients of your microservices, your team has chosen to leverage the Oracle Cloud Infrastructure (OCI) API Gateway service to create new API Deployments that will direct requests to your microservices. Which is NOT valid regarding the mTLS options in OCI API Gateway?

A.

Custom CA or custom CA bundles can be added to your gateway's trust store ONLY if they already exist in the OCI Certificates service.

B.

Adding a custom certificate authority (CA) or custom CA bundle to your gateway's trust store for mTLS is optional unless you need to reject certificates that do not contain particular values (such as a domain name).

C.

The mTLS request policy can only be enabled at the API deployment specification level, which then applies globally to ALL routes in that deployment.

D.

Once the mTLS request policy is enabled, ALL requests with valid certificates are routed to the backend unless you have defined one or more particular values (such as a domain name).

Full Access
Question # 15

Oracle Functions monitors all deployed functions and collects and reports various metrics. Which is NOT available when viewing the Application metrics in the Oracle Cloud Infrastructure (OCI) Console?

A.

The length of time a function runs for.

B.

The number of retries made by the function before failing due to an error.

C.

The number of requests to invoke a function that failed due to throttling.

D.

The number of requests to invoke a function that failed with an error response.

Full Access
Question # 16

As a Cloud Native developer, you have written a web service for your company. However, your security team has suggested that your web service should address Distributed Denial-of-Service (DDoS) attack. You are time-constrained and you need to ensure that this is implemented as soon as possible. What should you do in this scenario? (Choose the best answer.)

A.

Use a third party service integration to Implement DDoS attack mitigation.

B.

Re-write your web service and implement rate limiting.

C.

Use the OCI Virtual Cloud Network (VCN) segregation to control DDoS.

D.

Use the OCI API Gateway service and configure rate limiting.

Full Access
Question # 17

A service you are deploying to Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) uses a docker image from a private repository in OCI Registry (OCIR). Which configuration is necessary to provide access to this repository from OKE?

A.

Create a docker-registry secret for OCIR with API key credentials on the cluster, and specify the imagePullSecret property in the application deployment manifest.

B.

Create a docker-registry secret for OCIR with identity Auth Token on the cluster, and specify the imagePullSecret property in the application deployment manifest.

C.

Create a dynamic group for nodes in the cluster, and a policy that allows the dynamic group to read repositories in the same compartment.

D.

Add a generic secret on the cluster containing your identity credentials. Then specify a registryCredentials property in the deployment manifest.

Full Access
Question # 18

You are developing a real-time monitoring application for a fleet of vehicles, which will be deployed on Oracle Cloud Infrastructure (OCI). You need to choose between using OCI Queue or OCI Streaming to handle the real-time data feeds from the vehicles. Based on the scenario described, which is the most appropriate choice for handling real-time data feeds?

A.

OCI Streaming, because it is designed for high-volume, continuous ingestion and processing of data, making it the best choice for a fleet of vehicles

B.

OCI Streaming, because it offers exactly-once message delivery, which is necessary for real-time applications

C.

OCI Queue, because it is optimized for low-latency messaging and ideal for real-time applications

D.

OCI Queue, because it provides at-least-once message delivery, which is critical for real-time monitoring applications

Full Access
Question # 19

A DevOps engineer is troubleshooting the Meshifyd application, which is running in an Oracle Cloud Infrastructure (OCI) environment. The engineer has set up the OCI Logging service to store access logs for the application but notices that the logs from the Meshifyd application are not showing up in the logging service. The engineer suspects that there might be an issue with the logging configuration. Which two statements are potential reasons for logs from the Meshifyd application not showing up in the OCI Logging service?

A.

The logconfig.json file has incorrect or missing OCID for the custom log in the logobjectId field.

B.

The OCI Logging service is set up to pre access logs by creating a log group and custom log within the same compartment.

C.

The logconfig.json file has incorrect or missing information in the application namespace in the paths field.

D.

The logconfig.json file has incorrect or missing information in the application namespace in the src field.

E.

The logconfig.json file has incorrect or missing OCID for the custom log group in the logGroupObjectId field.

Full Access
Question # 20

As a Cloud Native developer, you develop two services in Node.js and deploy them to two different Container Engine for Kubernetes (OKE) clusters that use the same Virtual Cloud Network (VCN). Your security team wants to analyze the network communication between them. How can this requirement be met in the most cost-effective way?

A.

Rewrite the application and send the application logs to an outside log aggregator.

B.

Deploy a third-party logging service and aggregate the network flow logs.

C.

Use the OCI Logging service and enable VCN flow logs.

D.

Deploy Wireshark and intercept the packets.

Full Access
Question # 21

Which statement best describes the term "cloud native"?

A.

Cloud native refers to the process of migrating applications from on-premises infrastructure to the cloud.

B.

Cloud native refers to the use of cloud-based development tools to build traditional on-premises applications.

C.

Cloud native refers to the design and deployment of applications that are optimized for cloud infrastructure.

D.

Cloud native refers to the use of cloud infrastructure to run traditional on-premises applications.

Full Access
Question # 22

You deployed a Python application to an Oracle Container Engine for Kubernetes (OKE) cluster. However, while testing you found a bug, which you rectified and then created a new Docker image. You now need to ensure that if this new image does not work once deployed, you should be able to roll back to the previous version. Using kubect1, which strategy should you use?

A.

Blue/Green Deployment

B.

Canary Deployment

C.

Rolling Update

D.

A/B Testing

Full Access
Question # 23

Which TWO are required to access the Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) cluster from the kubectl CLI? (Choose two.)

A.

Tiller enabled on the OKE cluster.

B.

An SSH key pair with the public key added to the cluster worker nodes.

C.

Install and configure the OCI CLI.

D.

A configured OCI API signing key pair.

E.

OCI Identity and Access Management (IAM) Auth Token.

Full Access
Question # 24

Which option best defines microservices?

A.

A statically typed and compiled language.

B.

An open-source system for automating deployment, scaling, and management of containerized applications.

C.

A finely tuned piece of software that performs a single or small collection of tasks.

D.

An organized collection of structured information or data, typically stored electronically in a computer system.

Full Access
Question # 25

What is the difference between blue/green and canary deployment strategies? (Choose the best answer.)

A.

In blue/green, current applications are slowly replaced with new ones. In canary, the application Is deployed Incrementally to a select group of people.

B.

In blue/green, both old and new applications are in production at the same time. In canary, the application Is deployed incrementally to a select group of people.

C.

In blue/green, current applications are slowly replaced with new ones. In canary, both old and new applications are in production at the same time.

D.

In blue/green, the application Is deployed In minor Increments to a select group of people. In canary, both old and new applications are simultaneously in production.

Full Access
Question # 26

From a DevOps process standpoint, it is a good practice to keep changes to an application under version control. Which of the following allows changes to a Docker image to be stored in a version control system?

A.

Updating docker-compose.yml

B.

Executing docker commit

C.

Executing docker save

D.

Updating Dockerfile

Full Access
Question # 27

In the DevOps lifecycle, what is the difference between continuous delivery and continuous deployment? (Choose two.)

A.

Continuous delivery involves automation of developer tasks, while continuous deployment involves manual operational tasks.

B.

Continuous delivery utilizes automatic deployment to a development environment, while continuous deployment involves automatic deployment to a production environment.

C.

Continuous delivery requires more automatic linting, while continuous deployment testing must be run manually.

D.

Continuous delivery is a process that initiates deployment manually, while continuous deployment is based on automating the deployment process.

Full Access
Question # 28

You are developing a polyglot serverless application using Oracle Functions. Which language cannot be used to write your function code?

A.

PL/SQL

B.

Python

C.

Node.js

D.

Go

E.

Java

Full Access
Question # 29

You are instructed to automate manual tasks and help software teams manage complex environments at scale using the Oracle Cloud Infrastructure (OCI) services. Which THREE OCI services can be leveraged to securely store and version your application's source code, and automate the building, testing, and deployment of applications to the OCI platform? (Choose three.)

A.

DevOps

B.

Container Engine for Kubernetes

C.

Oracle APEX Application Development

D.

Resource Manager

E.

Oracle Cloud Infrastructure Registry

F.

Oracle Cloud Logging Analytics

Full Access
Question # 30

You are developing a serverless application with Oracle Functions and Oracle Cloud Infrastructure Object Storage. Your function needs to read a JSON file object from an Object Storage bucket named "input-bucket" in compartment "qa-compartment". Your corporate security standards mandate the use of Resource Principals for this use case. Which two statements are needed to implement this use case? (Choose two.)

A.

Set up a policy to grant all functions read access to the bucket: allow all functions in compartment qa-compartment to read objects in target.bucket.name= "input-bucket'

B.

Set up a policy to grant your user account read access to the bucket: allow user XYZ to read objects in compartment qa-compartment where target.bucket.name= "input-bucket'

C.

Set up the following dynamic group for your function's OCID: Name: read-file-dg Rule: resource.id = "ocid1.fnfunc.oc1.phx.aaaaaaaakeaobctakezjz5i4ujj7g25q7sx5m vr55pms6f4da'

D.

No policies are needed. By default, every function has read access to Object Storage buckets in the tenancy.

E.

Set up a policy with the following statement to grant read access to the bucket: allow dynamic-group read-file-dg to read objects in compartment qa- compartment where target.bucket.name= 'input-bucket'

Full Access