- 36 Actual Exam Questions
- Compatible with all Devices
- Printable Format
- No Download Limits
- 90 Days Free Updates
Get All Oracle Cloud Infrastructure 2025 Security Professional Exam Questions with Validated Answers
| Vendor: | Oracle |
|---|---|
| Exam Code: | 1Z0-1104-25 |
| Exam Name: | Oracle Cloud Infrastructure 2025 Security Professional |
| Exam Questions: | 36 |
| Last Updated: | April 10, 2026 |
| Related Certifications: | Oracle Cloud , Oracle Cloud Infrastructure |
| Exam Tags: | Expert or Advanced Level Oracle Cloud EngineersOracle Cloud Security Professionals |
Looking for a hassle-free way to pass the Oracle Cloud Infrastructure 2025 Security Professional exam? DumpsProvider provides the most reliable Dumps Questions and Answers, designed by Oracle certified experts to help you succeed in record time. Available in both PDF and Online Practice Test formats, our study materials cover every major exam topic, making it possible for you to pass potentially within just one day!
DumpsProvider is a leading provider of high-quality exam dumps, trusted by professionals worldwide. Our Oracle 1Z0-1104-25 exam questions give you the knowledge and confidence needed to succeed on the first attempt.
Train with our Oracle 1Z0-1104-25 exam practice tests, which simulate the actual exam environment. This real-test experience helps you get familiar with the format and timing of the exam, ensuring you're 100% prepared for exam day.
Your success is our commitment! That's why DumpsProvider offers a 100% money-back guarantee. If you don’t pass the Oracle 1Z0-1104-25 exam, we’ll refund your payment within 24 hours no questions asked.
Don’t waste time with unreliable exam prep resources. Get started with DumpsProvider’s Oracle 1Z0-1104-25 exam dumps today and achieve your certification effortlessly!
"Your company is building a highly available and secure web application on OCI. Because of increasing malicious web-based attacks, the security team has mandated that web servers should not be exposed directly to the Internet.
How should you architect the solution while ensuring fault tolerance and security?
SIMULATION
Task 6: Create Load Balancer and Attach Certificate
Create a Load Balancer with the name PBT-CERT-LB-01 in subnet LB-Subnet-PBT-CERT-SNET-02
Create a Listener for the load balancer, where:
Name: PBT-CERT-LB_LTSN_01
Protocol: HTTPS
Port: 443
Attach the certificate PBT-CERT-01-
Attach the security list PBT-CERT-LB-SL-01 to subnet LB-Subnet-PBT-CERT-SNET-02
Task 6: Create Load Balancer and Attach Certificate
Step 1: Create the Load Balancer
Log in to the OCI Console.
Navigate to Networking > Load Balancers.
Click Create Load Balancer.
Enter the following details:
Name: PBT-CERT-LB-01
Compartment: Select your assigned compartment.
Load Balancer Type: Select Public.
Virtual Cloud Network: Select PBT-CERT-VCN-01.
Subnet: Select LB-Subnet-PBT-CERT-SNET-02.
Shape: Choose a shape (e.g., 10 Mbps, adjust based on needs).
Click Next.
Leave backend sets and listeners as default for now (we'll configure the listener next).
Click Create Load Balancer and wait for it to be provisioned.
Step 2: Create a Listener
Once the load balancer is created, go to the Load Balancers page and click on PBT-CERT-LB-01.
Under Resources, click Listeners.
Click Create Listener.
Enter the following details:
Name: PBT-CERT-LB_LTSN_01
Protocol: Select HTTPS.
Port: Enter 443.
Certificate: Click Add Certificate, then select the PBT-CERT-01<username> certificate (e.g., PBT-CERT-0199008677labuser01) created in Task 5.
Leave other settings (e.g., SSL handling) as default unless specified.
Click Create.
Step 3: Configure the Backend Set
In the PBT-CERT-LB-01 details page, under Resources, click Backend Sets.
Click Create Backend Set (if not already created).
Enter basic details (e.g., name like PBT-CERT-BS-01).
Add a backend server:
IP Address: Use the private IP of PBT-CERT-VM-01 (find this in the instance details under Compute > Instances).
Port: 80 (HTTP, as configured on the web server).
Protocol: HTTP.
Click Create.
Step 4: Attach the Security List to the Subnet
Navigate to Networking > Virtual Cloud Networks.
Select PBT-CERT-VCN-01 and click Subnets.
Click on LB-Subnet-PBT-CERT-SNET-02.
Under Security Lists, ensure PBT-CERT-LB-SL-01 is attached. If not:
Click Edit.
Remove the default security list and add PBT-CERT-LB-SL-01.
Click Save Changes.
Step 5: Verify the Configuration
Ensure the load balancer health status is OK (check under Backend Sets > Health).
Test by accessing https://<load-balancer-public-ip> in a browser (replace with the public IP from the load balancer details).
"You are part of the security operations of an organization with thousands of users accessing Oracle Cloud Infrastructure (OCI). It is reported that an unknown user action was executed resulting in configuration errors. You are tasked with identifying the details of all users who were active in the last six hours along with any REST API calls that were executed.
Which OCI feature should you use?
A company has deployed OCI Zero Trust Packet Routing (ZPR) to secure its network. They have two compute instances, VM1-01 and VM-02, in a public subnet. VM-01 is tagged with the security attribute app:vm01, and VM-02 is tagged with app:vm02. The VCN is labeled with network:vcn01, The ZPR policy states:


"What is the expected outcome of this policy?
SIMULATION
Task 3: Create a Master Encryption Key
Note: OCI Vault to store the key required by this task is created in the root compartment as PBI_Vault_SP
Create an RSA Master Encryption Key (MEK), where:
Key name: PBT-CERT-MEK-01-
For example, if your username is 99008677-lab.user01, then the MEK name should be PBT-CERT-MEK-01990086771abuser01
Ensure you eliminate special characters from the user name.
Key shape: 4096 bits
Enter the OCID of the Master Encryption Key created in the provided text box:
Task 3: Create a Master Encryption Key
Step 1: Access the OCI Vault
Log in to the OCI Console.
Navigate to Identity & Security > Vault.
Select the root compartment.
Locate and click on the vault named PBI_Vault_SP.
Step 2: Create the Master Encryption Key
In the PBI_Vault_SP vault details page, under Resources, click Keys.
Click Create Key.
Enter the following details:
Name: Replace <username> with your username (e.g., if your username is 99008677-lab.user01, remove special characters like - and . to get 99008677labuser01, then use PBT-CERT-MEK-0199008677labuser01).
Key Shape: Select RSA with 4096 bits.
Protection Mode: Select HSM (Hardware Security Module) if available, or Software if HSM is not required (based on vault capabilities).
Compartment: Ensure it's set to the root compartment (where PBI_Vault_SP resides).
Leave other settings (e.g., key usage) as default unless specified.
Click Create Key and wait for the key to be generated.
Step 3: Retrieve and Enter the OCID
After the key is created, go to the Keys section under PBI_Vault_SP.
Click on the key named PBT-CERT-MEK-01<username> (e.g., PBT-CERT-MEK-0199008677labuser01).
Copy the OCID (a long string starting with ocid1.key., unique to your tenancy) from the key details page.
Enter the copied OCID exactly as it appears into the provided text box.
Task 4: Create a Certificate Authority (CA)
Create a certificate authority, where:
CA name: PBT-CERT-CA-01-<username>
For example, if your username is 99008677-lab.user01, then the certificate authority name should be PBT-CERT-CA-01990086771abuser01
Ensure you eliminate special characters from the user name.
Common name: PBT-CERT-OCICA-01
Master Encryption Key: PBT-CERT-MEK-01 (created in the previous task)
Task 4: Create a Certificate Authority (CA)
Step 1: Access the OCI Vault
Log in to the OCI Console.
Navigate to Identity & Security > Vault.
Select the root compartment.
Locate and click on the vault named PBI_Vault_SP.
Step 2: Create the Certificate Authority
In the PBI_Vault_SP vault details page, under Resources, click Certificate Authorities.
Click Create Certificate Authority.
Enter the following details:
Name: Replace <username> with your username (e.g., if your username is 99008677-lab.user01, remove special characters like - and . to get 99008677labuser01, then use PBT-CERT-CA-0199008677labuser01).
Common Name: Enter PBT-CERT-OCICA-01.
Master Encryption Key: Select the PBT-CERT-MEK-01<username> key created in Task 3 (e.g., PBT-CERT-MEK-0199008677labuser01).
Subject: Leave as default or adjust (e.g., Organization, Country) if required by your setup.
Validity Period: Set as needed (e.g., 10 years), or use the default.
Compartment: Ensure it's set to the root compartment.
Click Create Certificate Authority and wait for the CA to be provisioned.
Step 3: Verify the Certificate Authority
After creation, go to the Certificate Authorities section under PBI_Vault_SP.
Confirm the CA PBT-CERT-CA-01<username> (e.g., PBT-CERT-CA-0199008677labuser01) is listed and its status is active.
Security & Privacy
Satisfied Customers
Committed Service
Money Back Guranteed