Test: Skill Check: Building a Second-Gen Secure Cloud
1. Which is NOT an example of operational security?
Ans: Coding standard
2. Which statement is NOT true about OCI Gen2 cloud platform?
Ans: It is a SaaS service
3. Which factor is NOT considered for risk evaluation of a data center site?
Ans: News report on cyber ri sks
4. Which design principal in OCI Gen2 cloud protects against VM escape attacks?
Ans: Isolated network virtualization
5. An application developer who develops applications in a development environment is found to be accessing the production environment.
Which security practice has been violated?
Ans: Principle of least privilege
Test: Skill Check: Oracle Cloud Security Services
1. You want to add another step of user verification along with password authentication.
What should you use to achieve this?
Ans: Multi-factor Authentication
2. Your IT team has created a web-based marketing site that needs to be protected against internet threats including Cross-Site Scripting (XSS) and SQL Injection.
Which OCI security service should they use?
Ans: Web Application Firewall
3. You want to centrally manage the encryption keys and secret credentials that protect your data.
What should you use to achieve this?
Ans: Vault
4. Which key encryption algorithm is NOT supported by the OCI Vault service?
Elliptic curve digital signature algorithm (ECDSA)
Ans: JSON Web Algorithm (JWA)
5. Which statement is true about Security Zones?
Ans: They are associated with a compartment.
Test: Skill Check: Processes and People
1. Which is a guide for developers to produce secure code?
Ans: Oracle Secure Coding Standards
2. Which cloud provider has a cloud interoperability partnership with Oracle Cloud Infrastructure?
Ans: Microsoft Azure
3. Which security team follow the security methodology of collect, detect, respond, and remediate?
Ans: Defensive Security Team
4. Which design points are Oracle Cloud Infrastructure services engineered to meet?
Ans: Service-level objectives
5. Which is NOT a compliance document?
Ans: SOP