Questions for the 1Z0-1104-25 were updated on : Dec 01 ,2025
"Your company is in the process of migrating its sensitive data to Oracle Cloud Infrastructure (OCI)
and is prioritizing the strongest possible security measures. Encryption is a key part of this strategy,
but you are particularly concerned about the physical security of the hardware where your
encryption keys will be stored.
Which characteristic of OCI Key Management Service (KMS) helps ensure the physical security of
your encryption keys?
D
"Your company is building a highly available and secure web application on OCI. Because of
increasing malicious web-based attacks, the security team has mandated that web servers should
not be exposed directly to the Internet.
How should you architect the solution while ensuring fault tolerance and security?
C
"A company, ABC, is planning to launch a new web application on OCI. Based on past experiences,
they expect a significant surge in traffic after the launch. You are responsible for ensuring that the
application is highly available.
Which step would you perform to achieve this goal?
D
A company has deployed OCI Zero Trust Packet Routing (ZPR) to secure its network. They have two
compute instances, VM1-01 and VM-02, in a public subnet. VM-01 is tagged with the security
attribute app:vm01, and VM-02 is tagged with app:vm02. The VCN is labeled with network:vcn01,
The ZPR policy states:

"What is the expected outcome of this policy?
B
"A programmer is developing a Node.js application which will run on a Linux server on their on-
premises data center. This application will access various Oracle Cloud Infrastructure (OCI) services
using OCI SDKs.
What is the secure way to access OCI services with OCI Identity and Access Management (IAM)?
B
"A business has a hybrid cloud infrastructure with Oracle Linux instances running in OCI and on-
premises. They want to reduce the amount of bandwidth used when patching systems.
Which component of OS Management Hub can help to reduce the bandwidth usage for patching?
D
Based on the provided diagram, you have a group of critical compute instances in a private subnet
that require vulnerability using the Oracle Cloud Infrastructure (OCI) Vulnerability Scanning Service
(VSS).
"What additional configuration is required to enable VSS to scan instances in the private subnet
B
"You are designing a secure access strategy for compute instances deployed within a private subnet
of an OCI Virtual Cloud Network (VCN). Your security policy requires that no compute instances in the
private subnet should have direct Internet access, and administrative access should be controlled.
Which statement best describes the role of an OCI Bastion in securing access to these private
compute instances?
D
"You are part of the security operations of an organization with thousands of users accessing Oracle
Cloud Infrastructure (OCI). It is reported that an unknown user action was executed resulting in
configuration errors. You are tasked with identifying the details of all users who were active in the
last six hours along with any REST API calls that were executed.
Which OCI feature should you use?
A
Which are the essential components to create a rule for the Oracle Cloud Infrastructure (OCI) Events
Service?
C
You are the first responder of a security incident for ABC Org. You have identified several IP addresses
and URLs in the logs that you suspect may be related to the incident. However, you need more
information to confidently determine whether they are indeed malicious or not.
Which OCI service can you use to obtain a more refined information and confidence score for these
identified indicators?
B
You're managing an Oracle Cloud Infrastructure (OCI) environment where a public website hosts
downloadable assets stored in Object Storage buckets. These buckets need to be publicly accessible
for website visitors, but Cloud Guard keeps flagging them as security risks.
How can Cloud Guard be configured to ignore problems specific to public buckets while still ensuring
security checks are applied to other resources that require them?
D
Which Oracle Data Safe feature enables the Internal test, development, and analytics teams to
operate effectively while minimizing their exposure to sensitive data?
D
When trying to encrypt plaintext using Command Line Interface (CLI), the developer gets a Service
Error. This is the command the developer tried to run:
What is the reason for this error?
B
You are a security architect at your organization and have noticed an increase in cyberattacks on your
applications, including Cross-Site Scripting (XSS) and SQL Injection. To mitigate these threats, you
decide to use OCI Web Application Firewall (WAF).
Which type of OCI WAF rule should you configure to protect against these attacks?
B