Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 1
Total 10 questions
Exam Code: 1z0-1104-25                Update: Oct 15, 2025
Exam Name: Oracle Cloud Infrastructure 2025 Security Professional

Oracle Oracle Cloud Infrastructure 2025 Security Professional 1z0-1104-25 Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

An OCI administrator notices that a compute instance running in the production compartment is unable to create Object Storage buckets using the OCI CLI command:

oci os bucket create --name mybucket --compartment-id --auth instance_principal

The error message returned states:

"NotAuthorizedOrNotFound: You are not authorized to perform this action."

The administrator verifies that the instance has Internet access and can reach OCI endpoints.

What then could be causing the issue?

A.

The instance is using the wrong OCI CLI authentication method.

B.

The bucket name is already in use, causing a conflict.

C.

The policy is written at the root compartment instead of the production compartment.

D.

The instance is not part of any Dynamic Group or the matching rule is incorrect.

Question # 2

Based on the provided diagram, you have a group of critical compute instances in a private subnet that require vulnerability using the Oracle Cloud Infrastructure(OCI) Vulnerability Scanning Service (VSS).

"What additional configuration is required to enable VSS to scan instances in the private subnet

A.

VSS cannot scan private instances. You need to move them to a public subnet for vulnerability scanning.

B.

Configure a service gateway in the VCN and a route rule to direct traffic for the VSS service through the gateway.

C.

No additional configuration is needed. VSS can access private instances by default.

D.

Use an OCI Bastion session to establish connectivity and forward scan results from the private instances."

Question # 3

Which Oracle Data Safe feature enables the Internal test, development, and analytics teams to operate effectively while minimizing their exposure to sensitive data?

A.

Security assessment

B.

Data encryption

C.

Data auditing

D.

Sensitive data discovery

Question # 4

"Your company is in the process of migrating its sensitive data to Oracle Cloud Infrastructure (OCI) and is prioritizing the strongest possible security measures. Encryption is a key part of this strategy, but you are particularly concerned about the physical security of the hardware where your encryption keys will be stored.

Which characteristic of OCI Key Management Service (KMS) helps ensure the physical security of your encryption keys?

A.

Granular customer control over key access permissions

B.

Centralized key management for simplified administration

C.

Seamless integration with other OCI services for streamlined workflows

D.

Utilization of FIPS 140-2 validated Hardware Security Modules (HSMs)"

Question # 5

Within OCI IAM identity domains, the AD Bridge component serves a critical role. How does the AD Bridge functionality specifically enhance Identity and Access Management (IAM) practices?

A.

It simplifies user provisioning by enabling automated synchronization of user accounts and group memberships from an existing Microsoft Active Directory (AD) environment.

B.

It facilitates delegated administration, allowing authorized AD users to manage specific resources within the OCI identity domain.

C.

It strengthens access security by providing an additional layer of authentication through AD integration.

D.

It directly integrates with OCI MFA providers, allowing for seamless enforcement of MFA for users authenticated through AD credentials.

Question # 6

Task 5: Create a Certificate

Create a certificate, where:

Certificate name: PBT-CERT-01-

For example, if your username is 99008677-lab.user01, then the certificate name should be PBT-CERT-01990086771abuser01

Ensure you eliminate special characters from the user name.

Common name: PBT-CERT-OCICERT-01

Certificate Authority: PBT-CERT-CA-01 (created in the previous task)

Question # 7

Task 3: Create a Master Encryption Key

Note: OCI Vault to store the key required by this task is created in the root compartment as PBI_Vault_SP

Create an RSA Master Encryption Key (MEK), where:

Key name: PBT-CERT-MEK-01-

For example, if your username is 99008677-lab.user01, then the MEK name should be PBT-CERT-MEK-01990086771abuser01

Ensure you eliminate special characters from the user name.

Key shape: 4096 bits

Enter the OCID of the Master Encryption Key created in the provided text box:

Question # 8

Challenge 2 -Task 1

In deploying a new application, a cloud customer needs to reflect different security postures. If a security zone is enabled with the Maximum Security Zone recipe, the customer will be unable to create or update a resource in the security zone if the action violates the attached Maximum Security Zone policy.

As an application requirement, the customer requires a compute instance in the public subnet. You therefore, need to configure Custom Security Zones that allow the creation of compute instances in the public subnet.

Review the architecture diagram, which outlines the resoures you'll need to address the requirement:

Preconfigured

To complete this requirement, you are provided with the following:

Access to an OCI tenancy, an assigned compartment, and OCI credentials

Required IAM policies

Task 2: Create a Security Zone

Create a security Zone named IAD_SAP-PBT-CSZ-01 in your assigned compartement and associate it with the Custom Security Zone Recipe (IAD-SAP-PBT-CSP-01) created in the previous task.

Enter the OCID of the created Security zone in the box below.

Question # 9

Task 7: Verify the OCI Certificate with Load Balancer

Verify HTTPS connection to the load balancer by running the following command in Cloud Shell

curl -k https://

Enter the following URL in the web browser:

https://

If prompted with a certificate error, accept the risk and continue.

Verify web page content by ensuring the text, "You are visiting Web Server 1" from the index.html file is displayed in the browser

Question # 10

Challenge 2 -Task 1

In deploying a new application, a cloud customer needs to reflect different security postures. If a security zone is enabled with the Maximum Security Zone recipe, the customer will be unable to create or update a resource in the security zone if the action violates the attached Maximum Security Zone policy.

As an application requirement, the customer requires a compute instance in the public subnet. You therefore, need to configure Custom Security Zones that allow the creation of compute instances in the public subnet.

Review the architecture diagram, which outlines the resoures you'll need to address the requirement:

Preconfigured

To complete this requirement, you are provided with the following:

Access to an OCI tenancy, an assigned compartment, and OCI credentials

Required IAM policies

Task 1: Create a Custom Security Zone Recipe

Create a Custom Security Zone Recipe named IAD-SP-PBT-CSP-01 that allows the provisioning of compute instances in the public subnet.

Enter the OCID of the created custom security zone recipe in the text box below.

Page: 1 / 1
Total 10 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 15 Oct 2025