exam questions

Exam 1z0-1072-20 All Questions

View all questions & answers for the 1z0-1072-20 exam

Exam 1z0-1072-20 topic 1 question 24 discussion

Actual exam question from Oracle's 1z0-1072-20
Question #: 24
Topic #: 1
[All 1z0-1072-20 Questions]

Your company uses the Oracle Cloud Infrastructure (OCI) Object Storage service to share large data sets with its data science team. The data science team consists of 20 people who work from offices in Washington, D.C., and Tokyo. While working in these offices, employees are assigned an IP address from the public IP range 129.146.31.0/27
Which two steps should you take to ensure that the Object Storage bucket used in this scenario was only accessible from these office locations? (Choose two.)

  • A. Write an IAM policy that includes the conditional statement where request.networkSource.name = CorpNet
  • B. Set the bucket visibility to public and only share the URL with the data science team via email
  • C. Create a pre-authenticated request for each data set and only share with the data science team via email
  • D. Create a Network Source named CorpNetwork with a CIDR block of 129.146.31.0/27
  • E. Create a Network Source named CorpNetwork with a CIDR block of 129.146.0.0/16
  • F. Write an IAM policy that includes the conditional statement where request.region = 129.146.31.0/27
Show Suggested Answer Hide Answer
Suggested Answer: AD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Davar39
Highly Voted 4 years, 4 months ago
Correct Answers are A,D. I just think that answer "A" is missing the rest of the word, it should be "CorpNetwork". The rest of the answers just don't make sense. Admins pretty please review the answers for this one. Thanks.
upvoted 7 times
...
ClaudiaCA
Highly Voted 3 years, 11 months ago
AD are correct
upvoted 5 times
mifune
3 years, 6 months ago
I think that AD are correct, however there is a name mismatch between both
upvoted 4 times
...
...
hberrayana
Most Recent 3 years, 3 months ago
Selected Answer: AD
think that AD is correct
upvoted 1 times
...
Rishadpp
3 years, 3 months ago
Selected Answer: AD
Introduction to Network Sources A network source is a set of defined IP addresses. The IP addresses can be public IP addresses or IP addresses from VCNs within your tenancy. After you create the network source, you can reference it in policy or in your tenancy's authentication settings to control access based on the originating IP address. https://docs.oracle.com/en-us/iaas/Content/Identity/Tasks/managingnetworksources.htm this means that AD are correct. 1.D. make a network name 2.A. Make a policy.
upvoted 3 times
...
Rishadpp
3 years, 3 months ago
Introduction to Network Sources A network source is a set of defined IP addresses. The IP addresses can be public IP addresses or IP addresses from VCNs within your tenancy. After you create the network source, you can reference it in policy or in your tenancy's authentication settings to control access based on the originating IP address. https://docs.oracle.com/en-us/iaas/Content/Identity/Tasks/managingnetworksources.htm this means that AD are correct. 1.D. make a network name 2.A. Make a policy.
upvoted 2 times
...
okixavi
3 years, 4 months ago
Selected Answer: DF
I would go with D and F
upvoted 3 times
...
Mohamed79
4 years, 1 month ago
I'd go with A,D
upvoted 3 times
...
satyalanka
4 years, 1 month ago
Answer is C and E.. as per the standard CIDR should be /16
upvoted 1 times
Mohamed79
4 years, 1 month ago
Did not get your point? The CIDR mentioned in the question is not/16
upvoted 2 times
...
Hemanth
4 years ago
Standard CIDR should be /16 on the OCI side , not on the Customer end.
upvoted 2 times
...
...
alfonso_223
4 years, 5 months ago
What would be the point in creating a network source name and then not creating a rule to use it? What is the relevance of creating a PAR, since the requirement is to limit the accessibility of the files to a certain specific location (identified via the endpoint's ip addresses?
upvoted 3 times
alfonso_223
4 years, 5 months ago
AD are correct https://docs.cloud.oracle.com/en-us/iaas/Content/Identity/Tasks/managingnetworksources.htm
upvoted 13 times
ces26015
3 years, 6 months ago
agree: To restrict access to requests made from a set of IP addresses, do the following: 1. Create a network source that specifies the allowed IP addresses. 2. Write a policy that uses the network source variable in a condition
upvoted 2 times
Joe_Qu
2 years, 11 months ago
Also the question starts with "Which two steps ..." . That confirms D and A as the correct answer because A follows D as a 2-step solution
upvoted 1 times
...
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago